Curso de Security Plus

Solicita información

Analisis de educaedu

Pablo Nieves

Curso de Security Plus

  • Modalidad de impartición El Curso de Security Plus se imparte de modo Presencial.
  • Número de horas Consultar la duración de este Curso.
  • Titulación oficial InterSoftware otorga un Diploma certificado de participación, tras finalizar este Curso.
  • Valoración del programa El objetivo de este Curso es brindar el conocimiento relacionado con la identificación de problemas de seguridad, así como para evitarlos y eliminarlos, proporcionando una cobertura completa de temas de análisis y pruebas de seguridad de red, logrando certificarse oficialmente tras finalizar este curso.
  • Precio del curso Consultar precio.
  • Dirigido a Este Curso está dirigido a aquellos egresados de Licenciaturas en Sistemas, programación y afines, interesados en las ciencias computacionales y la programación y operación de sistemas.
  • Empleabilidad El campo laboral del egresado de este Curso se extiende dentro del sector productivo, como parte de empresas públicas o privadas, en departamentos y áreas de diseño, implementación, operación, mantenimiento y soporte de sistemas computacionales, así como de manera independiente en consultorías, la docencia y la investigación a nivel nacional e internacional.

Curso de Security Plus

  • Objetivos del curso Course Objective: You will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.
  • Curso dirigido a This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
  • Contenido CompTIA Security+® (2008 Objectives) is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ (2008 Edition) Certification examination (exam number SY0-201). In this course, you will build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.

    Basic Windows skills and fundamental understanding of computer and networking concepts are required. Students can obtain this level of skill and knowledge by taking the following Element K courses: Introduction to Networks and the Internet and any one or more of the following: Introduction to Personal Computers: Using Windows XPWindows XP: Introduction Introduction to Personal Computers: Using Windows Vista Microsoft Windows Vista: Level 1 and Level 2

    CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following Element K courses: CompTIA A+ Certification: A Comprehensive Approach for all 2006 Exam ObjectivesNetwork+ Certification: Fourth Edition – A CompTIA Certification or CompTIA Network+® (2009 Objectives)

    Additional introductory courses or work experience in application development and programming or in network and operating system administration for any software platform or system are helpful but not required.

    Upon successful completion of this course, students will be able to:
    • identify fundamental concepts of computer security.
    • identify security threats.
    • harden internal systems and services.
    • harden internetwork devices and services.
    • secure network communications.
    • establish security best practices for creating and running web-based applications.
    • manage public key infrastructure (PKI).
    • manage certificates.
    • enforce organizational security policies.
    • monitor the security infrastructure.
    • manage security incidents.

    Temario:


    Lesson 1: Security Fundamentals
    Topic 1A: Security Building Blocks
    Topic 1B: Authentication Methods
    Topic 1C: Cryptography Fundamentals
    Topic 1D: Security Policy Fundamentals

    Lesson 2: Security Threats
    Topic 2A: Social Engineering
    Topic 2B: Software-Based Threats
    Topic 2C: Network-Based Threats
    Topic 2D: Hardware-Based Threats

    Lesson 3: Hardening Internal Systems and Services
    Topic 3A: Harden Operating Systems
    Topic 3B: Harden Directory Services
    Topic 3C: Harden DHCP Servers
    Topic 3D: Harden File and Print Servers

    Lesson 4: Hardening Internetwork Devices and Services
    Topic 4A: Harden Internetwork Connection Devices
    Topic 4B: Harden DNS and BIND Servers
    Topic 4C: Harden Web Servers
    Topic 4D: Harden Email Servers
    Topic 4E: Harden Conferencing and Messaging Servers
    Topic 4F: Secure File Transfers

    Lesson 5: Securing Network Communications
    Topic 5A: Protect Network Traffic with IP Security (IPSec)
    Topic 5B: Secure Wireless Traffic
    Topic 5C: Secure the Network Telephony Infrastructure
    Topic 5D: Secure the Remote Access Channel

    Lesson 6: Securing Web Applications
    Topic 6A: Prevent Input Validation Attacks
    Topic 6B: Protect Systems from Buffer Overflow Attacks
    Topic 6C: Implement ActiveX and Java Security
    Topic 6D: Protect Systems from Scripting Attacks
    Topic 6E: Implement Secure Cookies
    Topic 6F: Harden a Web Browser

    Lesson 7: Managing Public Key Infrastructure (PKI)

    Topic 7A: Install a Certificate Authority (CA) Hierarchy
    Topic 7B: Harden a Certificate Authority
    Topic 7C: Back Up a CA
    Topic 7D: Restore a CA

    Lesson 8: Managing Certificates
    Topic 8A: Enroll Certificates
    Topic 8B: Secure Network Traffic by Using Certificates
    Topic 8C: Renew Certificates
    Topic 8D: Revoke Certificates
    Topic 8E: Back Up Certificates and Private Keys
    Topic 8F: Restore Certificates and Private Keys

    Lesson 9: Enforcing Organizational Security Policies

    Topic 9A: Perform a Risk Assessment
    Topic 9B: Enforce Corporate Security Policy Compliance
    Topic 9C: Enforce Legal Compliance
    Topic 9D: Enforce Physical Security Compliance
    Topic 9E: Educate Users
    Topic 9F: Plan for Disaster Recovery
    Topic 9G: Conduct a Security Audit

    Lesson 10: Monitoring the Security Infrastructure
    Topic 10A: Scan for Vulnerabilities
    Topic 10B: Monitor for Security Anomalies
    Topic 10C: Set Up a Honeypot

    Lesson 11: Managing Security Incidents

    Topic 11A: Respond to Security Incidents
    Topic 11B: Evidence Administration
    Topic 11C: Recover From a Security Incident

Otra formación relacionada con informática