Course CatalogDemo CourseUpcoming CoursesTechnical SupportTraining Center   Back to Training Home


 Other Courses in the Curriculum
 Network Infrastructure Security - Part 1
 NetWork Infrastructure Security - Part 2
 Communication Security
 Cryptography Concepts
 Operational and Organizational Security

Course Name General Security Concepts
Audience Audience: This curriculum is targeted at individuals working in the IT field and having general knowledge of security related topics. Professionals who are striving to get TruSecure ICSA Certified Security Associate (TICSA) or Certified Information Systems Security Professional (CISSP) or CompTIA Security+ certification are the core audience for this course. 
Course Requirements You need Microsoft Internet Explorer 5.0 or above OR Netscape Navigator/Communicator 4.78 or above.

Plug-in Requirements
Macromedia Shockwave plug-in for Windows for IE/NN
Macromedia Flash plug-in for Windows for IE/NN

Note: Macromedia Flash plug-in comes built in with IE 5.5 and above and NN 6.x. To download the plug-ins, click on the relevant icon below.

 
Pre-requisites Prerequisites: 2 years of computer networking experience, complete knowledge of TCP/IP, and A+ or Network+ certification. 
Course Duration 3.7  hours
Course Objectives The General Security Concepts course provides an overview of various security concepts, such as security goals, assets, risks, threats, and vulnerabilities. The course also covers the three access modes and provides information on the concept of authentication and various authentication methods including username/password, certificates, kerbos, Challenge Handshake Authentication Protocol (CHAP), token, multifactor, biometric, and mutual authentication. In addition, the course focuses on auditing, various kinds of security attacks, malignant code and the associated types of the malignant codes. The course also covers the scanning techniques, such as Transmission Control Protocol (TCP), Internet Control Message protocol (ICMP), Address Resolution Protocol (ARP), and User Datagram Protocol (UDP) scanning. After completing this course, users will be able to identify the:
  • characteristics of various access control models
  • working of various authentication methods
  • procedure for the auditing process
  • key concepts of non-essential services and network scanning methods
  • features of a Denial of Service (DoS) attack
  • features of a Distributed Denial of Service (DDoS) attack
  • features of various types of spoofing attacks
  • features of a source routing attack
  • features of the Man in the Middle attack
  • features of a replay attack and social engineering attack
  • features of TCP/IP hijacking
  • features of various password attacks
  • features of various code and cryptography attacks
  • characteristics of different types of backdoors
  • features of a buffer overflow attack
  • features of various malignant code-based attacks
 
Course Outline
  1. Security Basics
    1. Access Control Models
    2. Authentication Methods
    3. Auditing Features
    4. Non-essential Services and Protocols
    5. Network Scanning Methods
    6. Quiz
  2. Active Security Attacks
    1. DoS and DDoS Attacks
    2. Spoofing and Source Routing Attacks
    3. MITM and Replay Attacks
    4. Social Engineering and TCP/IP Hijacking Attacks
    5. Quiz
  3. Encrypted Data Attacks
    1. Password Attacks
    2. Code and Cryptographic Attacks
    3. Quiz
  4. Software-based Attacks
    1. Back Door and Buffer Overflow Attacks
    2. Malignant Code-based Attacks
    3. Quiz