Everyone is at risk of a cyber-attack. Mainly because cybercriminals don’t generally target individuals or organisations – they target vulnerabilities. And unfortunately, because technology continues to advance rapidly and the rewards of cybercrime are so great, the threats have dramatically increased as well. This course is ideal for experienced IT admin professionals who are interested in gaining a broader and deeper knowledge of cybersecurity and/or those who are preparing for the CompTIA Security+ exam.
The Certificate of CompTIA Security+ is an online program that will give you the skills to become cyber-security-certified, from being able to identify and mitigate risks, to providing infrastructure security and troubleshooting security incidents.
In this professional development course, you will study the value of business impact analysis; the components that support organisational security, identity concepts and access services; and the threats to the current IT landscape.
You will also learn how to implement security protocols and network architecture concepts, and undertake penetration testing, vulnerability scanning and security assessments using software tools.
On completion of this course, you will be able to identify security threats and defend against them, and take your career to the next (secure) level by undertaking the CompTIA Security+ exam!
Course Structure
Unit 1 - Business impact analysis and risk
- The value of BIA and risk management
- Describe the purpose of a BCP
- Identify the general steps in a BIA
- Define concepts related to recovery time such as MTD, RTO, and RPO
- Define mean time between failure (MTBF) and mean time to repair (MTR)
- Describe privacy impact assessment and privacy threshold assessment
- Define risk management
- Describe risk assessment
- Identify risks to an organisation
- Specify how to and who should be testing for risks
- Define risk analysis
- Describe qualitative risk analysis
- Describe quantitative risk analysis
- Define methods that can be used to respond to risk
- Define procedures for implementing change
- Practice: BIA and Risk Management
- Recall business impact assessment and risk management concepts
Unit 2 - Components support organisational security
- Components of organisational security
- Define firewalls
- Describe VPN concentrators
- Compare NIDS and NIPS
- Compare bridges and switches
- Describe routers
- Compare proxies and load balancers
- Recognize wireless access points
- Define SIEM systems
- Describe DLP systems
- Define NAC gateways
- Describe mail gateways
- Define media gateways
- Define encryption gateways
- Recognise specialty appliances
- Practice: Organisational Components
- Describe the various components that support organisational security
Unit 3 - Identity concepts and access services
- Identity and access services
- Compare identity and access management concepts
- Compare and contrast identity and access management concepts
- Define NTLM
- Compare PAP, CHAP, and MSCHAP
- Describe RADIUS
- Describe Terminal Access Controller Access Control System (TACACS+)
- Recognise Kerberos
- Define LDAP
- Describe secure token
- Define SAML
- Specify openid Connect
- Define oauth
- Describe Shibboleth
- Practice: identity concepts/access services
- Describe identity concepts and various access services
Unit 4 - Implement secure network architecture concepts
- Secure network architecture concepts
- Start the course
- Describe the reasoning behind implementing different zones and topologies
- Define how physical, logical, virtual, and air gap separation provide security
- Describe site-to-site and remote access vpns
- Define where various devices and technologies should be placed for maximum security benefits
- Describe the security concerns surrounding the SDN
- Practice: Secure Network Concepts
- Recall the purpose of various secure network architecture concepts
Unit 5 - Implementing secure protocols
- Implementing secure protocols
- Start the course
- Work with SSH
- Describe secure sockets layer and transport layer security (SSL/TLS)
- Describe https
- Describe DNSSEC
- Describe SRTP
- Describe FTPS
- Describe SFTP
- Describe IDAPS
- Describe work with SNMPV3
- Describe NTPV3
- Describe secure pop/IMAP
- Describe s/MIME
- Work with routing protocol authentication
- Practice: secure versions of protocols
- Recognise various secure versions of common protocols
Unit 6 - Penetration testing and vulnerability scanning
- Penetration testing concepts
- Start the course
- Compare active vs. Passive reconnaissance
- Describe a pivot
- Specify initial exploitation
- Define persistence
- Recognise escalation of privilege
- Compare black vs. Gray vs. White box
- Vulnerability scanning concepts
- Compare pen testing vs. vulnerability scanning
- Passively test security controls
- Identify vulnerability
- Identify lack of security controls
- Identify common misconfigurations
- Compare intrusive vs. non-intrusive
- Compare credentialed vs. non-credentialed
- Describe false positives
- Practice: pen testing and scanning
- Recognise penetration testing and vulnerability scanning methods
Unit 7 - Policies, plans, and procedures
- Introducing policies, plans, and procedures
- Start the course
- Describe the benefits of using standard operating procedures
- Define various agreements such as BPA, SLA, ISA, and MOU
- Describe the benefits of enforcing mandatory vacations, job rotation, separation of duties, and the principle of least privilege
- Describe the benefits of a clean desk policy, a background check policy, exit interviews, NDA, and onboarding
- Describe the benefits of security awareness training
- Define the purpose of acceptable use policies
- Describe the benefits of social media policies and personal email policies
- Practice: policies, plans, and procedures
- Recall the purpose of various policies, plans, and procedures
Unit 8 - Security assessment using software tools
- Security assessment tools
- Start the course
- Work with protocol analysers
- Work with network scanners
- Specify wireless scanners/cracker
- Work with password crackers
- Describe vulnerability scanners
- Define configuration compliance scanner
- Describe exploitation frameworks
- Compare data sanitisation tools
- Define steganography tools
- Describe honeypots
- Configure backup utilities
- Define banner grabbing
- Compare passive vs. active
- Describe other command line tools
- Practice: using security assessment tools
- Work with security assessment using software tools
Unit 9 - The present threat landscape
- The threat landscape
- Start the course
- Describe the threat landscape
- Basic security terms
- Describe risks and vulnerabilities
- Define threats, threat agents, exploits, and payloads
- Define countermeasures and mitigation
- Describe IOCS
- Threat actors
- Describe script kiddies and hacktivists
- Compare organised crime, states, and APTSs
- Describe insider and competitor threats
- Attributes of threat actors
- Compare internal and external threats
- Compare structured and unstructured threats
- Define levels of sophistication, resources, and funding of threats
- Recognize threat intent and motivation
- Describe different open-source intelligence in threats
- Identify different malware threats
- Practice: the threat landscape and agents
- Define and describe the threat landscape and agents
Assessment
Assessment
When you study with Australian Online Courses, you will be assessed using a competency-based training method.
Competency-based training focuses on the achievement of skills and knowledge against set criteria to ensure your competency is industry relevant. You will not be benchmarked against other students.
If you do not achieve a competency result on your first attempt, you have two more attempts to pass your assessment. So, you have three attempts in total to obtain a competency result.
In this way, you can complete your course in your own time and at your own pace with the assistance of unlimited tutor support.
In this course, you will be assessed via multiple-choice questions to determine your mastery of details and specific knowledge gained during your studies to achieve a ‘competent’ or ‘not yet competent’ result.
Benefits of Multiple-Choice Assessments
- Appropriate for assessing students’ mastery of details and specific knowledge.
- Can be used to assess both simple knowledge and complex concepts.
- Questions can be answered quickly to accurately assess a students’ mastery of many topics relatively quickly.
- Assessment can be quickly and reliably scored to achieve a ‘competent’ or ‘not yet competent’ result.
- As the answers are visible, multiple-choice questions offer the opportunity for the continuation of the learning process, offering educational value.
This is a CompTIA Preparation Program. Examination not included.
Course FAQs
Why Choose Australian Online Courses?
- Professional development that is widely recognised and respected;
- Improve your employment opportunities;
- Study online, anywhere via our elearning system;
- High-quality professional development programs written by industry experts;
- No entry requirements;
- All course materials provided online – no textbooks to buy;
- Unlimited tutor support;
- Easy to understand course content;
- We offer twelve (12) months’ access, with extensions available upon application (fees apply);
- Certificate of Attainment/Completion issued for your CV (hard copy provided); and
- Course may be tax deductible; see your tax advisor.
How long will it take to complete this course?
The approximate study hours for this course is 6 hours. We offer twelve (12) months’ access, with extensions available upon application (fees apply).
Can I purchase optional printed materials?
While printed materials are not available for purchase, transcripts of video lectures and other learning resources are available for printing via our elearning system.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
Will I receive a certificate upon completion of this course?
Yes! You will receive a Certificate of Attainment upon successful completion of your assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our e-learning system and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.
Career Pathways
Future growth
Strong
Unemployment
Low
Professional Development for:-
- Junior Network Administrator
- Network Technician
- Computer Technician
- Help Desk Technician