CompTIA Security + 2008: Ports, Protocols, and Network Security

MD Capacitación & Sistemas
A Distancia

$ 160
¿Querés hablar con un Asesor sobre este curso?

Información importante

Tipología Curso
Metodología A distancia
Horas lectivas 3h
  • Curso
  • A distancia
  • 3h

This course discusses, TCP/IP configuration and attack defences, network devices selection and proper placement, and securing the networking environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.
Dirigido a: Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects

Preguntas Frecuentes

· Requisitos

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.


Todavía no hay opiniones de este curso


CompTIA Security+ 2008: Ports, Protocols, and Network Security

  • distinguish between TCP/IP protocols
  • recognize examples of IPv4 addresses
  • recognize examples of IPv6 addresses
  • recognize DoS and DDoS attacks and how to prevent them
  • configure a server to prevent SYN flood attacks
  • recognize man-in-the-middle attacks and how to prevent them
  • mitigate protocol-based attacks
  • configure a server to prevent SYN flood attacks
  • recognize the function of each layer in the OSI Reference Model
  • recognize key characteristics of common networking devices
  • recognize key characteristics of firewalls
  • recognize key network device weaknesses
  • recognize ways to prevent device attacks
  • design a security strategy for protocol-based attacks and attacks that exploit network devices
  • recognize security considerations when designing network topologies
  • configure the Phishing Filter
  • set security zones
  • set privacy options
  • recognize the benefits of virtualization
  • set browser-related security