Course

Course Summary
Credit Type:
Course
ACE ID:
PGCC-0004
Organization's ID:
ACE-HTT: 3- Security+
Location:
Classroom-based
Length:
8 days (60 hours)
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 Computer Information Systems, Management Information Systems, or Information Technology
Description

Objective:

The course objective is to learn the security requirements for protecting the confidentiality, integrity, and availability (CIA) of information and information systems; and learn how to select the appropriate technical, management, and operational controls to mitigate risk within information technology environment. This course helps the student to prepare and take the CompTIA Security+ certification exam.

Learning Outcomes:

  • Implement security configuration parameters on network devices and other technologies
  • Given a scenario, implement common protocols and services
  • Explain the importance of risk related concepts
  • Given a scenario, implement basic forensic procedures
  • Explain the importance of security related awareness and training
  • Summarize risk management best practices
  • Given a scenario, select the appropriate control to meet the goals of security
  • Summarize various types of attacks
  • Summarize social engineering attacks and the associated effectiveness with each attack
  • Explain types of wireless attacks
  • Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
  • Explain the proper use of penetration testing versus vulnerability scanning
  • Explain the importance of application security controls and techniques
  • Compare and contrast alternative methods to mitigate security risks in static environments
  • Compare and contrast the function and purpose of authentication services
  • Given a scenario, select the appropriate authentication, authorization or access control
  • Given a scenario, use appropriate cryptographic methods
  • Given a scenario, use appropriate PKI, certificate management, and associated components
  • Given a scenario, use secure network administration principles
  • Explain network design elements and components
  • Given a scenario, troubleshoot security issues related to wireless networking
  • Summarize the security implications of integrating systems and data with third parties
  • Given a scenario, implement appropriate risk mitigation strategies
  • Summarize common incident response procedures
  • Compare and contrast physical security and environmental controls
  • Explain types of malware
  • Explain types of application attacks
  • Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
  • Summarize mobile security concepts and technologies
  • Given a scenario, select the appropriate solution to establish host security, given a scenario
  • Implement the appropriate controls to ensure data security
  • Install and configure security controls when performing account management, based on best practices
  • Given a scenario, utilize general cryptography concepts

General Topics:

  • Mitigating threats
  • Cryptography
  • Authentication
  • User- and role-based security
  • Peripheral security
  • Public key infrastructure
  • Application and messaging security
  • Ports and protocols
  • Network security
  • Wireless security
  • Remote access security
  • Vulnerability testing and monitoring
  • Organizational security
  • Business continuity
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Classroom Exercise
  • Computer Based Training
  • Discussion
  • Laboratory
  • Learner Presentations
  • Lectures
  • Practical Exercises

Methods of Assessment:

  • Case Studies
  • Examinations
  • Other
  • Performance Rubrics (Checklists)
  • Quizzes

Minimum Passing Score:

70%
Supplemental Materials