CompTIA Security+ 2008: Ports, Protocols, and Network Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Internetwork communications are the foundation of the modern Internet. Selecting the correct devices, properly configuring those devices, and placing them in the correct locations both within and outside a network to defend against attack is a task every network administrator faces on a daily basis. This course discusses, TCP/IP configuration and attack defences, network devices selection and proper placement, and securing the networking environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience
Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.

Prerequisites
Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration (hours)
3.0

Lesson Objectives

CompTIA Security+ 2008: Ports, Protocols, and Network Security

  • distinguish between TCP/IP protocols
  • recognize examples of IPv4 addresses
  • recognize examples of IPv6 addresses
  • recognize DoS and DDoS attacks and how to prevent them
  • configure a server to prevent SYN flood attacks
  • recognize man-in-the-middle attacks and how to prevent them
  • mitigate protocol-based attacks
  • configure a server to prevent SYN flood attacks
  • recognize the function of each layer in the OSI Reference Model
  • recognize key characteristics of common networking devices
  • recognize key characteristics of firewalls
  • recognize key network device weaknesses
  • recognize ways to prevent device attacks
  • design a security strategy for protocol-based attacks and attacks that exploit network devices
  • recognize security considerations when designing network topologies
  • configure the Phishing Filter
  • set security zones
  • set privacy options
  • recognize the benefits of virtualization
  • set browser-related security
  • Course Number:
    cs_sety_a06_it_enus