ECI – EMSP Security + Course
Course Description
ECI – EMSP Security+ is a course where you will perform over 80 hands-on activities to reinforce concepts such as managing browser security, encrypting and digitally signing e-mail messages, and installing and configuring vulnerability scanners and intrusion detection systems. You will establish the essential components of a public key infrastructure, including starting a certificate authority, granting and revoking certificates, and configuring a secure web server using SSL. You will configure group policies and access control methods for restricting access to file shares. You will assess computer security using a baseline analyzer and you will test user security by attempting to crack passwords and scan systems for vulnerable ports.
What You’ll Learn in Class
- Cryptography
- Authentication systems
- Messaging security and user and role-based security
- Public key infrastructure
- Network, wireless, and remote access security
- Vulnerability testing
- CompTIA Security+ objectives map and acronyms
Who Needs to Attend
Individuals desiring further education in security principles.
Prerequisites
EMSP A+ and EMSP Network+ completion or equivalent experience
Certification
This course is part of the following certification programs:
- CompTIA Security+ Certification
- Certified Wireless Security Professional (CWSP)
Course Content
- Mitigating Threats
- Core system maintenance
- Virus and spyware management
- Browser security
- Social engineering threats
- Cryptography
- Symmetric cryptography
- Public key cryptography
- Authentication Systems
- Authentication
- Hashing
- Authentication systems
- Messaging Security
- E-mail security
- Messaging and peer-to-peer security
- User and Role-Based Security
- Security policies
- Securing file and print resources
- Public Key Infrastructure (PKI)
- Key management and life cycle
- Setting up a certificate server
- Web server security with PKI
- Access Security
- Biometric systems
- Physical access security
- Peripheral and component security
- Storage device security
- Ports and Protocols
- TCP/IP review
- Protocol-based attacks
- Network Security
- Common network devices
- Secure network topologies
- Browser-related network security
- Virtualization
- Wireless Security
- Wi-F- network security
- Non-PC wireless devices
- Remote Access Security
- Remote Access
- Virtual private networks
- Auditing, Logging, and Monitoring
- System logging
- Server monitoring
- Vulnerability Testing
- Risk and vulnerability assessment
- IDS and IPS
- Forensics
- Organizational Security
- Organizational policies
- Education and training
- Disposal and destruction
- Business Continuity
- Redundancy planning
- Backups
- Environmental controls