Schedule your class now   Schedule >

Certified Security Principles C)SP

Duration: 5 Days

COURSE OVERVIEW

Mile2’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control and multi‐factor authentication become standard methods of protection. Students are given real world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.

 

COURSE OBJECTIVES

  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Manage data, application, and host security.
  • Implement network security.
  • Identify and implement access control and account management security measures.
  • Manage certificates.
  • Identify and implement compliance and operational security measures.
  • Manage risk.
  • Troubleshoot and manage security incidents.
  • Plan for business continuity and disaster recovery.

 

WHO SHOULD ATTEND?

IT professionals with networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks and is familiar with other operating systems (Linux, etc.)

 

Prerequisites:

Participants should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.

CEUs: 40

 

WHO SHOULD ATTEND?

IT professionals with networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks and is familiar with other operating systems (Linux, etc.)

 

 

COURSE DETAILS

 

Module 1 - Threats and Vulnerabilities

  1. Types of Malware
  2. Types of Attacks
  3. Social Engineering
  4. Mitigating Attacks
  5. Discovering vulnerabilities and threats
  6. Vulnerability Assessment and Penetration Testing

Module 2 - Cryptography

  1. Understanding crypto concepts
  2. Crypto methods and where to use them
  3. PKI and Certificate Management

Module 3 - Identity and Access Control

  1. Why IAM?
  2. Various Authentication Services
  3. AAA
  4. Implementing the Controls

Module 4 - Network Security

  1. Network Devices
  2. Other Devices
  3. Administering and Implementing Security
  4. Network Design
  5. Protocols and Services
  6. Wireless Networking

Module 5 - Host/Server Security

  1. The Operating Systems
  2. Hardening the OS
  3. OS additional software security
  4. Physical security

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Module 6 - Data Security

  1. Different Types of Storage
  2. Risks associated with all types of storage
  3. Encryption Options
  4. Corporate Management Options
  5. Various device uses
  6. Hardware security options for storage

Module 7 - Application Security

  1. Application Security Principals
  2. Secure Coding Concepts
  3. Hacking for the purpose of testing
  4. Top 10 OWASP Risks
  5. How to harden against those risks
  6. Patch Management

Module 8 - Mobile Security

  1. What devices are we talking about?
  2. The Risk
  3. Hardening these Devices!
  4. Corporate Management and Legal issues

Module 9 - Compliance and Operational Security

  1. Managing Risk
  2. Managing Risk with third parties
  3. Implementing Corporate Strategies
  4. Incident Response and Forensics Procedures
  5. Utilizing Physical and Environmental Controls

 

Schedule your class now   Schedule >