Feb 05, 2025  
2024-2025 General Catalog 
    
2024-2025 General Catalog
Add to Pathway (opens a new window)

NET 643 - Intermediate CompTIA CySA+


Course Department: Business
3 Credits
Total Lecture Hours: 2
Total Lab Hours: 1
Total Clinical Hours: 0
Course Description:
This class is intended to equip learners with the knowledge and skills needed to be information security professionals. While teaching the fundamentals of cybersecurity by using the CompTIA Security+ exam objectives as its framework, the class takes a comprehensive view of security by examining in depth today’s attacks against networks and endpoints and what is needed to defend against these attacks.   

Prerequisites: NET 641 - Intro to CompTIA CySA+  
Mode(s) of Instruction: Traditional/Face-to-Face

Course Fees: None

Student Learning Outcomes and Objectives:
Course Objectives:

Module 1: Introduction to Security

  1. Define information security and explain why it is important.
  2. Identify threat actors and their attributes.
  3. Describe the different types of vulnerabilities and attacks.
  4. Explain the impact of attacks.

Module 2: Threat Management and Cybersecurity Resources

  1. Explain what a penetration test is.
  2. Identify the rules of engagement and how to perform a pen test.
  3. Define vulnerability scanning.
  4. Describe different cybersecurity resources.

Module 3: Threats and Attacks on Endpoints

Identify the different types of attacks using malware.

  1. Define application attacks.
  2. Explain how threat actors use application attacks.
  3. Define adversarial artificial intelligence attacks.

Module 4: Endpoint and Application Development Security

  1. Describe different threat intelligence sources.
  2. List the steps for securing an endpoint.
  3. Explain how to create and deploy SecDevOps.

Module 5: Mobile, Embedded, and Specialized Device Security

  1. List and compare the different types of mobile devices and how they are deployed.
  2. Explain the ways to secure a mobile device.
  3. Describe the vulnerabilities and protections of embedded and specialized devices.
  4. Explain the issues surrounding securing specialized devices.

Module 6: Basic Cryptography

  1. Define cryptography.
  2. Describe hash, symmetric, and asymmetric cryptographic algorithms.
  3. Explain different cryptographic attacks.
  4. List the various ways in which cryptography is used.

Module 7: Public Key Infrastructure and Cryptographic Protocols

  1. Define digital certificates.
  2. Describe the components of Public Key Infrastructure (PKI).
  3. Describe the different cryptographic protocols.
  4. Explain how to implement cryptography.

Module 8: Networking Threats, Assessments, and Defenses

  1. Describe the different types of networking-based attacks.
  2. List the different network assessment tools.
  3. Explain how physical security defenses can be used.

Module 9: Network Security Appliances and Technologies

  1. List the different types of network security appliances and how they can be used.
  2. Describe network security technologies.

Module 10: Cloud and Virtualization Security

  1. Define the cloud and explain how it is used and managed.
  2. Explain virtualization.
  3. Describe cloud and virtualization security controls.
  4. List different secure network protocols.

Module 11: Wireless Network Security

  1. Describe the different types of wireless network attacks.
  2. List the vulnerabilities of WLAN security.
  3. Explain the solutions for securing a wireless network.

Module 12: Authentication

  1. Describe the different types of authentication credentials.
  2. Explain the different attacks on authentication.
  3. Describe how to implement authentication security solutions.

Module 13: Incident Preparation, Response, and Investigation

  1. Explain the steps in preparing for a cybersecurity incident.
  2. Describe how to respond in an incident.
  3. List the steps in an incident investigation.

Module 14: Cybersecurity Resilience

  1. Define business continuity.
  2. Describe how to achieve resilience through redundancy.
  3. Explain what a policy is.
  4. Describe different types of security policies.

Module 15: Risk Management and Data PrivacyDefine risk.

  1. Describe strategies for reducing risk.
  2. Explain concerns surrounding data privacy.
  3. List methods for protecting data.



Add to Pathway (opens a new window)