CompTIA Network+ 2012: Network Security Part 1

Target Audience
Expected Duration
Lesson Objectives
Course Number

A network’s security is only as strong as the security of its individual systems. Before connecting individual computers to the network, you need to ensure that the computers are secured using proper security mechanisms. This level of security will help you overcome any potential issues that might occur otherwise. Unsecured systems can result in compromised data and, ultimately, lost revenue. Identifying the appropriate steps and measures you can implement to protect your systems and keeping your resources and revenue safe from potential attacks is a key aspect of securing systems on your network. This course explores security in wired and wireless environments. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+.

Target Audience
The audience for CompTIA Network+ 2012 training will comprise IT personnel with at least nine to 12 months of IT networking experience. Good computer literacy along with a sound technical acumen should be present. This learning path is also suitable for students looking to acquire job skills, and to be trained specifically to pass the associated CompTIA Network+ (2012 Edition) certification exam. It is recommended, but not required, that candidates for the CompTIA Network+ 2012 exam obtain the CompTIA A+ certification or equivalent knowledge.

Expected Duration (hours)

Lesson Objectives

CompTIA Network+ 2012: Network Security Part 1

  • define the encryption protocols used in wireless networks
  • describe other measures to secure wireless networks
  • recognize the different ways access controls are used
  • match the type of VPN to its correct description
  • describe VPN encryption and VPN connection models
  • describe remote access
  • describe encryption components and additional encryption protocols
  • recognize the different types of authentication
  • recognize examples of authentication protocols and services
  • sequence the steps to authenticate a remote session connection
  • recognize security methods for a wireless network
  • describe remote control protocols for remote access
  • recognize the components of PKI encryption
  • describe user authentication
  • Course Number: