Mastering Cybersecurity/Security+
Overview
Policies and technologies need dedicated people who can implement and manage them. Become part of a well-trained workforce that effectively combats hackers, fights attacks and battles other threats.
This in-depth course builds on Essentials of Cybersecurity to expand your knowledge in the cybersecurity field. Topics include communication security, infrastructure security, cloud computing, cryptography, access control, authentication, external attacks, operational and organization security.
8 Continuing Education Units
80 Military Clock Hours | 10 Military Clock Hours Per Week
Who Should Register?
Mastering Cybersecurity/Security+ is designed for the cyber or IT security professionals interested in learning more in-depth information about the cyber security profession, as well as those interested in obtaining the CompTIA Security+™ certification.
Are you an experienced cybersecurity professional?
If you can answer “yes” to these questions, then you may be ready for Mastering Cybersecurity/Security+. If not, then you should begin with Essentials of Cybersecurity.
- Are you familiar with the most commonly used ports, protocols, and services?
- Are you familiar with IT components such as Windows AD, DNS, and routers/switches?
- Are you familiar with networking protocols such as TCP or UDP?
Course offerings and associated prices are subject to change without prior notice. Pricing for multi-course certificate programs varies depending on course selection. View the Professional Education Catalog for more information on the courses and programs.
What You’ll Study
At the conclusion of this course, you should be able to:
- Identify assets, vulnerabilities, and threats, and assess risk mitigation strategies
- Name and describe security policies that facilitate compliance
- Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
- List and explain three types of access control and six authentication mechanisms
- Identify threats to wireless communications and cloud security
- Evaluate various types of firewalls and other network security tools
- Explain the goals, processes, and core elements of cryptography
- Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS, and specify ways to mitigate these threats
- Outline the basic steps involved in incident response and disaster recovery
Curriculum
8 Week Course
Introduction to Mastering Cybersecurity/Security+™, Part 1
- List and explain three types of access control and six authentication mechanisms
- Identify assets, vulnerabilities, and threats and assess risk mitigation strategies
- Determine specific risks associated with cloud computing and virtualization
- Name and describe security policies that facilitate compliance
- Summarize five basic network classifications and their standard building blocks
- Diagram the OSI model layers and the TCP/IP stack components
Introduction to Mastering Cybersecurity/Security+™, Part 2
- Evaluate various types of firewalls and other network security tools
- Explain how RADIUS, TACACS+ and DIAMETER provide access control
- Recommend methods for securing SMTP, IMAP, POP and wireless networks
- Identify threats to email and wireless communications
- Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
- Outline the basic steps involved in incident response and forensic analysis
Security in Transmissions, Part 1
- Classify the different types of IP addresses and address-translation strategies
- Identify common wireless security tools and relate how 802.11 networks operate
- Explain the role of Snort and honeypots in network intrusion detection (NID)
- Summarize the best practices for handling digital evidence
- Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS and specify ways to mitigate these threats
Security in Transmissions, Part 2
- Specify the basic strategies behind the triad of attacks
- Categorize the three primary types of password authentication
- Identify various types of malware and social engineering techniques
- State the full name and responsibilities of organizations more commonly known by their acronyms
- Recommend ways to enhance password-based authentication
Security in the Infrastructure, Part 1
- Explain how the Kerberos authentication process operates
- Identify and compare several major access control models
- Diagram the layers of defense and specify the different types of access control for each layer
- Cite the security concerns associated with social networking and peer-to-peer networking
- Define attack terminology and outline the system hacking life cycle
- Describe the processes involved in hardening an operating system and hardening applications
Security in the Infrastructure, Part 2
- Identify application vulnerabilities and strategies to overcome them
- List key steps to enhancing the security of the software development life cycle
- Explain the goals, processes, and core elements of cryptography and steganography
- Define common hashing algorithms and advanced cryptographic concepts
- Describe how users gain remote network access via telnet, SSH, and VPNs
- Outline the basic IPsec configurations and email encryption protocols
Operational Security, Part 1
- Identify and contrast the three basic types of identity proofing
- Define PKI and explain its use of digital certificates, digital signatures, and key management
- Specify common web server and browser vulnerabilities and propose countermeasures to address them
- Outline the components and functions of the major web protocols: HTTP, SSL/TLS, HTTPS, and LDAP
- Describe the purpose of controls, and differentiate between operational, technical, and physical controls
Operational Security, Part 2
- Describe the various tools and measures that can be implemented to harden a network
- List the different types of specialized network devices and explain how they are used
- Identify wireless vulnerabilities and implement strategies to combat them
- Compare the channels used by IEEE 802.11 for wireless networking
- Outline the steps involved in redundancy planning, disaster recovery, and change management
- Compare and evaluate the different kinds of logical access controls
If you’re going to pay by credit card, you can either get started with installment payments or pay in full. Just let your enrollment representative know the option that works best for you.
Corporate Tuition Assistance
-
Corporate TA
Corporate tuition assistance is paid by your employer. You will need to provide appropriate forms for processing, prior to enrollment. Subject to employer benefit policies.
-
Deferred Corporate TA
Pay tuition now and have your employer reimburse you. Additional documentation will be needed to process this payment. Subject to employer benefit policies.
Military Benefits
Active Duty
Villanova offers a 15% savings, per certificate course, to active-duty servicemembers, Guardsmen and Reservists (upon verification of military status).
Veterans
Villanova offers a 15% savings, per certificate course to veterans (upon verification of military status). You may also use your Department of Veterans Affairs (VA) education benefits for many of Villanova’s 100% online non-credit programs, based upon your individual eligibility.
Spouses and Dependents
Villanova offers a 15% savings, per certificate course, to active-duty servicemembers, veterans, Guardsmen, Reservists and their spouses and dependents (upon verification of military status).