Register Now
Classroom Login
Call Now
Call Now 855-300-1473

Mastering IS Security+™ Curriculum


Module 1 – Introduction to Mastering IS Security+TM


  • Course Introduction
  • Security Concepts
  • Risk Management
  • Risk-Based Security
  • Cloud Computing
  • Virtualization
  • Organizational Policies and Controls
  • Network Design Elements
  • OSI Model
  • TCP/IP Review
  • Firewalls and Other Network Security Tools
  • RADIUS and TACACS+
  • SMTP, IMAP, and POP
  • Threats to Email
  • Wireshark
  • IDS and IPS Security Applications
  • Incident Response
  • Basic Forensic Procedures
  • IP Protocol
  • Wireless Protocols
  • Wireless Attacks

Module 2 – Security in Transmissions


  • IP Addressing, Part 1
  • IP Addressing, Part 2
  • Wireless Site Security
  • IEEE 802.11 Inner Workings
  • Snort
  • Honeypots
  • Digital Evidence
  • Trojans and Backdoors
  • Botnets
  • DDoS
  • System and Vulnerability Scanning
  • Password Attacks
  • Malware and Social Engineering
  • Alphabet Soup of the Internet
  • Password Security
  • Helper Protocols
  • Adware and Spyware
  • Antivirus
  • Passwords and Authentication

Module 3 – Security in the Infrastructure


  • Kerberos, Part 1
  • Kerberos, Part 2
  • Access Control Models
  • Applying Access Control – Part 1
  • Applying Access Control – Part 2
  • Social Networking
  • Attack Terminology
  • Hardening the Operating System
  • Hardening Applications
  • Application Vulnerabilities
  • Developing Secure Applications
  • General Cryptographic Concepts, Part 1
  • General Cryptographic Concepts, Part 2
  • Hashing
  • Applied Cryptographic Concepts
  • Telnet vs. Secure Shell
  • IP Security
  • VPNs: L2TP and PPTP
  • Securing Email

Module 4 – Operational Security


  • Operational Security Issues
  • Introduction to PKI
  • More PKI and Key Management
  • PKI Certificates
  • Certificate Variations
  • Web Protocols and Encryption
  • Web Vulnerabilities
  • Data Exchange Attacks
  • SSL/TLS, HTTPS, and LDAP
  • Controls
  • Physical Security
  • Environmental Controls
  • Hardening the Network, Part 1
  • Hardening the Network, Part 2
  • Network Appliances
  • Wireless Vulnerabilities, Part 1
  • Wireless Vulnerabilities, Part 2
  • 2.4 GHz Band Wireless
  • Redundancy Planning
  • Disaster Recovery
  • Change Management
  • Logical Control Mechanisms
  • Ten Important Things to Know
  • Course Conclusion

VA Benefit Eligibility: Visit the U.S. Department of Veterans Affairs Web Enabled Approval Management System (WEAMS) to view which programs of study or courses are currently certified. Benefit certification depends upon your VA determined eligibility, enrollment status and certified program of study.