Minnesota and California
877 568-4324
security@ecinetworks.com

ECI – EMSP Security + Course

Infrastructure and Innovation

ECI – EMSP Security + Course

Course Description

ECI – EMSP Security+ is a course where you will perform over 80 hands-on activities to reinforce concepts such as managing browser security, encrypting and digitally signing e-mail messages, and installing and configuring vulnerability scanners and intrusion detection systems. You will establish the essential components of a public key infrastructure, including starting a certificate authority, granting and revoking certificates, and configuring a secure web server using SSL. You will configure group policies and access control methods for restricting access to file shares. You will assess computer security using a baseline analyzer and you will test user security by attempting to crack passwords and scan systems for vulnerable ports.

What You’ll Learn in Class

  • Cryptography
  • Authentication systems
  • Messaging security and user and role-based security
  • Public key infrastructure
  • Network, wireless, and remote access security
  • Vulnerability testing
  • CompTIA Security+ objectives map and acronyms

Who Needs to Attend

Individuals desiring further education in security principles.

Prerequisites

EMSP A+ and EMSP Network+ completion or equivalent experience

Certification

This course is part of the following certification programs:

  • CompTIA Security+ Certification
  • Certified Wireless Security Professional (CWSP)

Course Content

  1. Mitigating Threats
    • Core system maintenance
    • Virus and spyware management
    • Browser security
    • Social engineering threats
  1. Cryptography
    • Symmetric cryptography
    • Public key cryptography
  1. Authentication Systems
    • Authentication
    • Hashing
    • Authentication systems
  1. Messaging Security
    • E-mail security
    • Messaging and peer-to-peer security
  1. User and Role-Based Security
    • Security policies
    • Securing file and print resources
  1. Public Key Infrastructure (PKI)
    • Key management and life cycle
    • Setting up a certificate server
    • Web server security with PKI
  1. Access Security
    • Biometric systems
    • Physical access security
    • Peripheral and component security
    • Storage device security
  1. Ports and Protocols
    • TCP/IP review
    • Protocol-based attacks
  1. Network Security
    • Common network devices
    • Secure network topologies
    • Browser-related network security
    • Virtualization
  1. Wireless Security
    • Wi-F- network security
    • Non-PC wireless devices
  1. Remote Access Security
    • Remote Access
    • Virtual private networks
  1. Auditing, Logging, and Monitoring
    • System logging
    • Server monitoring
  1. Vulnerability Testing
    • Risk and vulnerability assessment
    • IDS and IPS
    • Forensics
  1. Organizational Security
    • Organizational policies
    • Education and training
    • Disposal and destruction
  1. Business Continuity
    • Redundancy planning
    • Backups
    • Environmental controls