Course Outline
Mitigating threats
• System maintenance.
• Application security.
• Physical security.
• Malware.
• Social engineering.
Cryptography
• Symmetric cryptography.
• Public key cryptography.
Authentication
• Authentication factors and requirements.
• Authentication systems.
• Authentication system vulnerabilities.
User- and role-based security
• Baseline security policies.
• Resource access.
• Peripheral security.
File and disk encryption
• Peripheral and component security.
• Mobile device security.
Public key infrastructure
• Public key cryptography.
• Implementing public key infrastructure.
• Web server security with PKI.
Application and messaging security
• Application security.
• E-mail security.
• Social networking and messaging.
Ports and protocols
• TCP/IP basics.
• Protocol-based attacks.
Network security
• Network devices.
• Secure network topologies.
Secure networking
• Virtualization and cloud computing.
• Wireless security.
• Wireless network security.
• Mobile device security.
Remote access security
• Remote access.
• Virtual private networks.
• Vulnerability testing and monitoring.
• Risk and vulnerability assessment.
Auditing and logging
• Intrusion detection and prevention systems.
• Incident response.
Organizational security
• Organizational policies.
• Education and training.
• Disposal and destruction.
Business continuity
• Business continuity planning.
• Disaster recovery.
• Environmental controls.
No comments:
Post a Comment