CompTIA Network+ 2012: Network Security Part 3


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number


Overview/Description
Firewalls are a critical part of the defense of all PCs and networks. Firewalls can be either software- or hardware-based, but all firewalls are intended to restrict the connections and types of connection into and out of a host or network. Firewalls can't be the only defense used to guard against the increasing number of threats to computers and networks. Additional security appliances and programs, such as IPS and IDS, port and network scanners, as well as a variety of vulnerability assessment tools should be deployed to ensure that as many precautions as possible are taken. This course discusses many of these security measures and explains the properties and operations of firewalls. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+.

Target Audience
The audience for CompTIA Network+ 2012 training will comprise IT personnel with at least nine to 12 months of IT networking experience. Good computer literacy along with a sound technical acumen should be present. This learning path is also suitable for students looking to acquire job skills, and to be trained specifically to pass the associated CompTIA Network+ (2012 Edition) certification exam. It is recommended, but not required, that candidates for the CompTIA Network+ 2012 exam obtain the CompTIA A+ certification or equivalent knowledge.

Expected Duration (hours)
1.0

Lesson Objectives

CompTIA Network+ 2012: Network Security Part 3

  • recognize common firewall types
  • recognize how firewalls operate
  • describe the process of Network Address Translation
  • describe the different categories of intrusion detection systems
  • recognize examples of IPS and vulnerability tools
  • match the program with the correct type of scanner
  • describe the characteristics of a firewall in a given scenario
  • describe the characteristics of an IDS in a given scenario
  • recognize examples of other network security solutions
  • Course Number:
    cs_ctmt_a10_it_enus