The Security+ training session explores industry-wide topics including communication security, infrastructure security, cryptography, access control, authentication, external attack and operational and organization security. Information Assurance (IA) professionals will benefit from this seminar. The Security+ certification is on the approved list of certifications that meets the DoD D8570.1 requirements. In short, the directive requires that many military personnel, government personnel, and contractors that have their hands in the networks of the military and or government must have certain certifications. Security+ is one of these.
Learning Objectives
- Identify non-essential services and protocols
- Recognize attacks and malicious code and specify appropriate actions
- Understand the concept of and know how to reduce the risks of social engineering
- Understand the concept and significance of auditing, logging and system scanning
- Recognize and understand the administration of types of remote access technologies
- Recognize and understand the administration of email security concepts
- Recognize and understand the administration of Internet security concepts
- Recognize and understand the administration of directory security concepts
- Recognize and understand the administration of file transfer protocols and concepts
- Recognize and understand the administration of wireless technologies and concepts
- Understand security concerns and concepts of types of devices and media
- Understand concepts of Security Baselines
- Be able to identify and explain the of different kinds of cryptographic algorithms
- Understand and be able to explain concepts of PKI (Public Key Infrastructure)
- Identify and be able to differentiate different cryptographic standards and protocols
- Understand and be able to explain concepts of Key Management and Certificate Lifecycles
- Understand the application of concepts of physical security
- Understand the security implications of topics of disaster recovery and business continuity
- Understand the concepts and uses of types of policies and procedures
- Recognize and be able to differentiate between and explain access control models and methods of authentication
- Explain concepts of privilege management
- Understand the concepts of topics of forensics
- Understand and be able to explain concepts of risk identification
- Understand the security relevance of the education and training of end users, executives and human resources
- Understand and explain documentation concepts
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.