NET 643 - Intermediate CompTIA CySA+ Course Department: Business 3 Credits Total Lecture Hours: 2 Total Lab Hours: 1 Total Clinical Hours: 0 Course Description: This class is intended to equip learners with the knowledge and skills needed to be information security professionals. While teaching the fundamentals of cybersecurity by using the CompTIA Security+ exam objectives as its framework, the class takes a comprehensive view of security by examining in depth today’s attacks against networks and endpoints and what is needed to defend against these attacks.
Prerequisites: NET 641 - Intro to CompTIA CySA+ Mode(s) of Instruction: Traditional/Face-to-Face
Course Fees: None
Student Learning Outcomes and Objectives: Course Objectives:
Module 1: Introduction to Security
- Define information security and explain why it is important.
- Identify threat actors and their attributes.
- Describe the different types of vulnerabilities and attacks.
- Explain the impact of attacks.
Module 2: Threat Management and Cybersecurity Resources
- Explain what a penetration test is.
- Identify the rules of engagement and how to perform a pen test.
- Define vulnerability scanning.
- Describe different cybersecurity resources.
Module 3: Threats and Attacks on Endpoints
Identify the different types of attacks using malware.
- Define application attacks.
- Explain how threat actors use application attacks.
- Define adversarial artificial intelligence attacks.
Module 4: Endpoint and Application Development Security
- Describe different threat intelligence sources.
- List the steps for securing an endpoint.
- Explain how to create and deploy SecDevOps.
Module 5: Mobile, Embedded, and Specialized Device Security
- List and compare the different types of mobile devices and how they are deployed.
- Explain the ways to secure a mobile device.
- Describe the vulnerabilities and protections of embedded and specialized devices.
- Explain the issues surrounding securing specialized devices.
Module 6: Basic Cryptography
- Define cryptography.
- Describe hash, symmetric, and asymmetric cryptographic algorithms.
- Explain different cryptographic attacks.
- List the various ways in which cryptography is used.
Module 7: Public Key Infrastructure and Cryptographic Protocols
- Define digital certificates.
- Describe the components of Public Key Infrastructure (PKI).
- Describe the different cryptographic protocols.
- Explain how to implement cryptography.
Module 8: Networking Threats, Assessments, and Defenses
- Describe the different types of networking-based attacks.
- List the different network assessment tools.
- Explain how physical security defenses can be used.
Module 9: Network Security Appliances and Technologies
- List the different types of network security appliances and how they can be used.
- Describe network security technologies.
Module 10: Cloud and Virtualization Security
- Define the cloud and explain how it is used and managed.
- Explain virtualization.
- Describe cloud and virtualization security controls.
- List different secure network protocols.
Module 11: Wireless Network Security
- Describe the different types of wireless network attacks.
- List the vulnerabilities of WLAN security.
- Explain the solutions for securing a wireless network.
Module 12: Authentication
- Describe the different types of authentication credentials.
- Explain the different attacks on authentication.
- Describe how to implement authentication security solutions.
Module 13: Incident Preparation, Response, and Investigation
- Explain the steps in preparing for a cybersecurity incident.
- Describe how to respond in an incident.
- List the steps in an incident investigation.
Module 14: Cybersecurity Resilience
- Define business continuity.
- Describe how to achieve resilience through redundancy.
- Explain what a policy is.
- Describe different types of security policies.
Module 15: Risk Management and Data PrivacyDefine risk.
- Describe strategies for reducing risk.
- Explain concerns surrounding data privacy.
- List methods for protecting data.
Add to Pathway (opens a new window)
|