Register Now
Classroom Login
Call Now
Call Now 855-300-1473

Mastering IS Security+™ Curriculum


Module 1 – Introduction to Mastering IS Security+TM


  • Course Introduction
  • Security Concepts
  • Risk Management
  • Risk-Based Security
  • Cloud Computing
  • Virtualization
  • Organizational Policies and Controls
  • Network Design Elements
  • OSI Model
  • TCP/IP Review
  • Firewalls and Other Network Security Tools
  • RADIUS and TACACS+
  • SMTP, IMAP, and POP
  • Threats to Email
  • Wireshark
  • IDS and IPS Security Applications
  • Incident Response
  • Basic Forensic Procedures
  • IP Protocol
  • Wireless Protocols
  • Wireless Attacks

Module 2 – Security in Transmissions


  • IP Addressing, Part 1
  • IP Addressing, Part 2
  • Wireless Site Security
  • IEEE 802.11 Inner Workings
  • Snort
  • Honeypots
  • Digital Evidence
  • Trojans and Backdoors
  • Botnets
  • DDoS
  • System and Vulnerability Scanning
  • Password Attacks
  • Malware and Social Engineering
  • Alphabet Soup of the Internet
  • Password Security
  • Helper Protocols
  • Adware and Spyware
  • Antivirus
  • Passwords and Authentication

Module 3 – Security in the Infrastructure


  • Kerberos, Part 1
  • Kerberos, Part 2
  • Access Control Models
  • Applying Access Control – Part 1
  • Applying Access Control – Part 2
  • Social Networking
  • Attack Terminology
  • Hardening the Operating System
  • Hardening Applications
  • Application Vulnerabilities
  • Developing Secure Applications
  • General Cryptographic Concepts, Part 1
  • General Cryptographic Concepts, Part 2
  • Hashing
  • Applied Cryptographic Concepts
  • Telnet vs. Secure Shell
  • IP Security
  • VPNs: L2TP and PPTP
  • Securing Email

Module 4 – Operational Security


  • Operational Security Issues
  • Introduction to PKI
  • More PKI and Key Management
  • PKI Certificates
  • Certificate Variations
  • Web Protocols and Encryption
  • Web Vulnerabilities
  • Data Exchange Attacks
  • SSL/TLS, HTTPS, and LDAP
  • Controls
  • Physical Security
  • Environmental Controls
  • Hardening the Network, Part 1
  • Hardening the Network, Part 2
  • Network Appliances
  • Wireless Vulnerabilities, Part 1
  • Wireless Vulnerabilities, Part 2
  • 2.4 GHz Band Wireless
  • Redundancy Planning
  • Disaster Recovery
  • Change Management
  • Logical Control Mechanisms
  • Ten Important Things to Know
  • Course Conclusion