CYBR 202 Information Security II

Continues building a foundation in network security. Learn theory and concepts, cryptography, encryption algorithms, communication and remote access, policy and incident response. This is the second course in a series of two to prepare for the CompTIA Security+ certification. Passing a professional IT certification requires many additional hours of study before and after the course lecture. Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional certification.

Credits

5

Distribution

Career Training

Offered

Winter, Summer

Outcomes

  1. Define security protocols and their use in the industry
  2. Demonstrate configuring rights, permissions, and policies by utilizing templates and groups to comply with confidentiality, integrity, and availability
  3. Demonstrate use of industry standard tools to monitor systems and networks, conduct audits, and perform risk assessment practices assessing vulnerabilities as conducted in industry
  4. Describe access control models such as MAC, DAC, RBAS, and ABAC, plus methodologies such as implicit deny and job rotation as used in the industry
  5. Describe cryptography concepts, encryption algorithms, and hashing basics as implemented by industry standards
  6. Discuss physical security and authentication models and components as to industry standard
  7. Identify the importance of user education by applying methods and techniques to defeat social engineering attacks
  8. Prepare for and successfully complete industry certification.

Field Based Experience

0