Mastering Cybersecurity/security+

Villanova University

How long?

  • online
  • on demand

What are the topics?

Villanova University

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

Reviews

Comprehensive course analysis

Unbiased reviews from past participants
Global companies alumni of this course worked for
Positions of participants who took this course
Countries where most past participants are from
FREE
Individual needs analysis

Who should attend

Mastering Cybersecurity/Security+ is designed for the cyber or IT security professionals interested in learning more in-depth information about the cyber security profession, as well as those interested in obtaining the CompTIA Security+™ certification.

About the course

Policies and technologies need dedicated people who can implement and manage them. Become part of a well-trained workforce that effectively combats hackers, fights attacks and battles other threats.

This in-depth course builds on Essentials of Cybersecurity to expand your knowledge in the cybersecurity field. Topics include communication security, infrastructure security, cloud computing, cryptography, access control, authentication, external attacks, operational and organization security.

What You’ll Study

At the conclusion of this course, you should be able to:

  • Identify assets, vulnerabilities, and threats, and assess risk mitigation strategies
  • Name and describe security policies that facilitate compliance
  • Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
  • List and explain three types of access control and six authentication mechanisms
  • Identify threats to wireless communications and cloud security
  • Evaluate various types of firewalls and other network security tools
  • Explain the goals, processes, and core elements of cryptography
  • Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS, and specify ways to mitigate these threats
  • Outline the basic steps involved in incident response and disaster recovery

Curriculum

Introduction to Mastering Cybersecurity/Security+™, Part 1

  • List and explain three types of access control and six authentication mechanisms
  • Identify assets, vulnerabilities, and threats and assess risk mitigation strategies
  • Determine specific risks associated with cloud computing and virtualization
  • Name and describe security policies that facilitate compliance
  • Summarize five basic network classifications and their standard building blocks
  • Diagram the OSI model layers and the TCP/IP stack components
  • Introduction to Mastering

Cybersecurity/Security+™, Part 2

  • Evaluate various types of firewalls and other network security tools
  • Explain how RADIUS, TACACS+ and DIAMETER provide access control
  • Recommend methods for securing SMTP, IMAP, POP and wireless networks
  • Identify threats to email and wireless communications
  • Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
  • Outline the basic steps involved in incident response and forensic analysis

Security in Transmissions, Part 1

  • Classify the different types of IP addresses and address-translation strategies
  • Identify common wireless security tools and relate how 802.11 networks operate
  • Explain the role of Snort and honeypots in network intrusion detection (NID)
  • Summarize the best practices for handling digital evidence
  • Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS and specify ways to mitigate these threats

Security in Transmissions, Part 2

  • Specify the basic strategies behind the triad of attacks
  • Categorize the three primary types of password authentication
  • Identify various types of malware and social engineering techniques
  • State the full name and responsibilities of organizations more commonly known by their acronyms
  • Recommend ways to enhance password-based authentication

Security in the Infrastructure, Part 1

  • Explain how the Kerberos authentication process operates
  • Identify and compare several major access control models
  • Diagram the layers of defense and specify the different types of access control for each layer
  • Cite the security concerns associated with social networking and peer-to-peer networking
  • Define attack terminology and outline the system hacking life cycle
  • Describe the processes involved in hardening an operating system and hardening applications

Security in the Infrastructure, Part 2

  • Identify application vulnerabilities and strategies to overcome them
  • List key steps to enhancing the security of the software development life cycle
  • Explain the goals, processes, and core elements of cryptography and steganography
  • Define common hashing algorithms and advanced cryptographic concepts
  • Describe how users gain remote network access via telnet, SSH, and VPNs
  • Outline the basic IPsec configurations and email encryption protocols

Operational Security, Part 1

  • Identify and contrast the three basic types of identity proofing
  • Define PKI and explain its use of digital certificates, digital signatures, and key management
  • Specify common web server and browser vulnerabilities and propose countermeasures to address them
  • Outline the components and functions of the major web protocols: HTTP, SSL/TLS, HTTPS, and LDAP
  • Describe the purpose of controls, and differentiate between operational, technical, and physical controls

Operational Security, Part 2

  • Describe the various tools and measures that can be implemented to harden a network
  • List the different types of specialized network devices and explain how they are used
  • Identify wireless vulnerabilities and implement strategies to combat them
  • Compare the channels used by IEEE 802.11 for wireless networking
  • Outline the steps involved in redundancy planning, disaster recovery, and change management
  • Compare and evaluate the different kinds of logical access controls

Mastering Cybersecurity/security+ at Villanova University

From  $2,495
Add coaching to your course booking

Coaching can personalize and deepen learning for you and your organization.


Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.