Everyone is at risk of a cyber-attack. Mainly because cybercriminals don’t generally target individuals or organisations – they target vulnerabilities. And unfortunately, because technology continues to advance rapidly and the rewards of cybercrime are so great, the threats have dramatically increased as well. This course is ideal for experienced IT admin professionals who are interested in gaining a broader and deeper knowledge of cybersecurity and/or those who are preparing for the CompTIA Security+exam.
CompTIA Security+is an online program that will give you the skills to become cyber-security-certified, from being able to identify and mitigate risks, to providing infrastructure security and troubleshooting security incidents.
In this professional development course, you will study the value of business impact analysis; the components that support organisational security, identity concepts and access services; and the threats to the current IT landscape.
You will also learn how to implement security protocols and network architecture concepts, and undertake penetration testing, vulnerability scanning and security assessments using software tools.
On completion of this course, you will be able to identify security threats and defend against them, and take your career to the next (secure) level by undertaking the CompTIA Security+exam!
Unit 1 - Business impact analysis and risk
The value of BIA and risk management
Describe the purpose of a BCP
Identify the general steps in a BIA
Define concepts related to recovery time such as MTD, RTO, and RPO
Define mean time between failure (MTBF) and mean time to repair (MTR)
Describe privacy impact assessment and privacy threshold assessment
Define risk management
Describe risk assessment
Identify risks to an organisation
Specify how to and who should be testing for risks
Define risk analysis
Describe qualitative risk analysis
Describe quantitative risk analysis
Define methods that can be used to respond to risk
Define procedures for implementing change
Practice: BIA and Risk Management
Recall business impact assessment and risk management concepts
Unit 2 - Components support organisational security
Components of organisational security
Describe VPN concentrators
Compare NIDS and NIPS
Compare bridges and switches
Compare proxies and load balancers
Recognize wireless access points
Define SIEM systems
Describe DLP systems
Define NAC gateways
Describe mail gateways
Define media gateways
Define encryption gateways
Recognise specialty appliances
Practice: Organisational Components
Describe the various components that support organisational security
Unit 3 - Identity concepts and access services
Identity and access services
Compare identity and access management concepts
Compare and contrast identity and access management concepts
Compare PAP, CHAP, and MSCHAP
Describe Terminal Access Controller Access Control System (TACACS+)
Describe secure token
Specify openid Connect
Practice: identity concepts/access services
Describe identity concepts and various access services
Unit 4 - Implement secure network architecture concepts
Secure network architecture concepts
Start the course
Describe the reasoning behind implementing different zones and topologies
Define how physical, logical, virtual, and air gap separation provide security
Describe site-to-site and remote access vpns
Define where various devices and technologies should be placed for maximum security benefits
Describe the security concerns surrounding the SDN
Practice: Secure Network Concepts
Recall the purpose of various secure network architecture concepts
Unit 5 - Implementing secure protocols
Implementing secure protocols
Start the course
Work with SSH
Describe secure sockets layer and transport layer security (SSL/TLS)
Describe work with SNMPV3
Describe secure pop/IMAP
Work with routing protocol authentication
Practice: secure versions of protocols
Recognise various secure versions of common protocols
Unit 6 - Penetration testing and vulnerability scanning
Penetration testing concepts
Start the course
Compare active vs. Passive reconnaissance
Describe a pivot
Specify initial exploitation
Recognise escalation of privilege
Compare black vs. Gray vs. White box
Vulnerability scanning concepts
Compare pen testing vs. vulnerability scanning
Passively test security controls
Identify lack of security controls
Identify common misconfigurations
Compare intrusive vs. non-intrusive
Compare credentialed vs. non-credentialed
Describe false positives
Practice: pen testing and scanning
Recognise penetration testing and vulnerability scanning methods
Unit 7 - Policies, plans, and procedures
Introducing policies, plans, and procedures
Start the course
Describe the benefits of using standard operating procedures
Define various agreements such as BPA, SLA, ISA, and MOU
Describe the benefits of enforcing mandatory vacations, job rotation, separation of duties, and the principle of least privilege
Describe the benefits of a clean desk policy, a background check policy, exit interviews, NDA, and onboarding
Describe the benefits of security awareness training
Define the purpose of acceptable use policies
Describe the benefits of social media policies and personal email policies
Practice: policies, plans, and procedures
Recall the purpose of various policies, plans, and procedures
Unit 8 - Security assessment using software tools
Security assessment tools
Start the course
Work with protocol analysers
Work with network scanners
Specify wireless scanners/cracker
Work with password crackers
Describe vulnerability scanners
Define configuration compliance scanner
Describe exploitation frameworks
Compare data sanitisation tools
Define steganography tools
Configure backup utilities
Define banner grabbing
Compare passive vs. active
Describe other command line tools
Practice: using security assessment tools
Work with security assessment using software tools
Unit 9 - The present threat landscape
The threat landscape
Start the course
Describe the threat landscape
Basic security terms
Describe risks and vulnerabilities
Define threats, threat agents, exploits, and payloads
Define countermeasures and mitigation
Describe script kiddies and hacktivists
Compare organised crime, states, and APTSs
Describe insider and competitor threats
Attributes of threat actors
Compare internal and external threats
Compare structured and unstructured threats
Define levels of sophistication, resources, and funding of threats
Recognize threat intent and motivation
Describe different open-source intelligence in threats
Identify different malware threats
Practice: the threat landscape and agents
Define and describe the threat landscape and agents
When you study with Australian Online Courses, you will be assessed using a competency-based training method.
Competency-based training focuses on the achievement of skills and knowledge against set criteria to ensure your competency is industry relevant. You will not be benchmarked against other students.
If you do not achieve a competency result on your first attempt, you have two more attempts to pass your assessment. So, you have three attempts in total to obtain a competency result.
In this way, you can complete your course in your own time and at your own pace with the assistance of unlimited tutor support.
In this course, you will be assessed via multiple-choice questions to determine your mastery of details and specific knowledge gained during your studies to achieve a ‘competent’ or ‘not yet competent’ result.
Benefits of Multiple-Choice Assessments
Appropriate for assessing students’ mastery of details and specific knowledge.
Can be used to assess both simple knowledge and complex concepts.
Questions can be answered quickly to accurately assess a students’ mastery of many topics relatively quickly.
Assessment can be quickly and reliably scored to achieve a ‘competent’ or ‘not yet competent’ result.
As the answers are visible, multiple-choice questions offer the opportunity for the continuation of the learning process, offering educational value.
This is a CompTIA Preparation Program. Examination not included.
D. Van der Loos, Brisbane, QLD | CompTIA Security+
Why Choose Australian Online Courses?
Professional development that is widely recognised and respected;
Improve your employment opportunities;
Study online, anywhere via our elearning system;
High-quality professional development programs written by industry experts;
No entry requirements;
All course materials provided online – no textbooks to buy;
Unlimited tutor support;
Easy to understand course content;
We offer twelve (12) months’ access, with extensions available upon application (fees apply);
Certificate of Attainment/Completion issued for your CV (hard copy provided); and
Course may be tax deductible; see your tax advisor.
How long will it take to complete this course?
The approximate study hours for this course is 6 hours. We offer twelve (12) months’ access, with extensions available upon application (fees apply).
Can I purchase optional printed materials?
While printed materials are not available for purchase, transcripts of video lectures and other learning resources are available for printing via our elearning system.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
Will I receive a certificate upon completion of this course?
Yes! You will receive a Certificate of Attainment upon successful completion of your assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our e-learning system and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.