CompTIA Network+ 2009: Network Security


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The need for network security has grown immensely in recent years and as a consequence, security technologies have grown as well. Security technologies can take the form of protocols, applications, and hardware devices, and many, if not all, of these things can be found in today’s enterprise networks as well as most home networks. This course focuses on the threats facing today's networks and information, and the steps administrators can take to mitigate these issues. It also explores the processes and procedures that should be in place to prevent security breaches and to recover from threats that get past network defenses. In addition, types of security software, such as antivirus and anti-spyware scanners are covered, along with the various protocols and services, such as SSH and SSL, used in an overall network security system. Also described are basic security procedures including policy creation, user training, and software patching and updating. This course maps to the CompTIA Network+ (2009) exam objectives for explaining the function of hardware and software security devices and the issues that affect device security, explaining common features of a firewall, explaining the methods of network access security and user authentication, and identifying common security threats and mitigation techniques.

Target Audience
The audience for CompTIA Network+ 2009 training will comprise IT personnel with at least 9 months IT networking experience. Good computer literacy along with a sound technical acumen should be present. Students looking to acquire job skills, and to be trained specifically to pass the associated CompTIA Network+ (2009 Edition) certification exam will want to study this learning path.

Expected Duration (hours)
2.5

Lesson Objectives

CompTIA Network+ 2009: Network Security

  • recognize basic attack types
  • recognize how viruses work and how to defend against malicious code
  • recognize different ways "social engineering" can be used when attacking a network
  • recognize what should be included in security policies
  • distinguish between different types of security audits
  • recognize how patches and updates affect network security
  • recognize how education can affect network security
  • recognize the most appropriate protocol to use in a given situation
  • recognize how access can be restricted by MAC and IP filtering
  • recognize the functions of tunneling protocols
  • identify security threats to a network in a given scenario
  • recognize basic functions of firewalls
  • recognize common scanning techniques
  • distinguish between stateful and stateless firewalls
  • recognize how content filtering works
  • recognize how to work with incident response-based Intrusion Detection Systems
  • recognize the functions of host-based and network-based Intrusion Detection Systems
  • recognize the functions of an Intrusion Prevention System
  • recognize how to configure a VPN access
  • recognize the functions of physical security and authentication
  • recognize the security risks of hardware and transmissions
  • recognize the functions of common access protocols
  • recognize the most appropriate security solution in a given scenario
  • recognize the security threats and most appropriate security solution in a given scenario
  • Course Number:
    cs_ctnt_a12_it_enus