CYBR 202 Information Security II
Continues building a foundation in network security. Learn theory and concepts, cryptography, encryption algorithms, communication and remote access, policy and incident response. This is the second course in a series of two to prepare for the CompTIA Security+ certification. Passing a professional IT certification requires many additional hours of study before and after the course lecture. Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional certification.
Distribution
Career TrainingOffered
Winter, Summer
Outcomes
- Define security protocols and their use in the industry
- Demonstrate configuring rights, permissions, and policies by utilizing templates and groups to comply with confidentiality, integrity, and availability
- Demonstrate use of industry standard tools to monitor systems and networks, conduct audits, and perform risk assessment practices assessing vulnerabilities as conducted in industry
- Describe access control models such as MAC, DAC, RBAS, and ABAC, plus methodologies such as implicit deny and job rotation as used in the industry
- Describe cryptography concepts, encryption algorithms, and hashing basics as implemented by industry standards
- Discuss physical security and authentication models and components as to industry standard
- Identify the importance of user education by applying methods and techniques to defeat social engineering attacks
- Prepare for and successfully complete industry certification.