Course Description

This course covers Domain 1 of the Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for Security+, you’ll learn about the various types of threats and attacks every company faces. First, the ins and outs of Malware, ransomware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks will be discussed.

Next is the characteristics of the various types of threat actors, the skills they have, and the tools they use. Finally, the penetration testing and vulnerability scanning and how they’re used to help tighten security and mitigate potential breaches will follow.

By the end of this course, you’ll have a solid understanding of the various threats you’re likely to face and what tools are available to mitigate these threats.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationSecurity+ CE

Objectives

  • Assess the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security failures
  • Critique and assess the strengths and weaknesses of general cybersecurity models, including the CIA triad
  • Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people
  • Assess how all domains of security interact to achieve effective system-wide security at the enterprise level.
  • Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security domains (IT, physical, classification, personnel, and so on)
  • Assess the role of strategy and policy in determining the success of information security
  • Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans
  • Design a notional information security plan that incorporates relevant principles of the lifecycle management
  • Evaluate the principles of risk and conduct a notional risk management exercise
  • Assess the role of good metrics and key performance indicators (KPIs) in security assessment and governance
  • Create a good set of information security metrics
  • Critique the current legal and regulatory environment as it applies to cybersecurity
  • Identify and contrast the most common security standards and associated catalogs of security controls
  • Contrast the various approaches to security training and formulate a simple training agenda
  • Justify the need for business continuity planning and propose how to implement such a plan successfully within a modern enterprise
  • Compare and contrast logical and physical security
  • Appraise the current structure of cybersecurity roles across the DoD enterprise, including the roles and responsibilities of the relevant organizations
  • Assess the strengths and weaknesses of the certification and accreditation approach to cybersecurity
  • Evaluate the trends and patterns that will determine the future state of cybersecurity.

Prerequisite

This course is intended for DoD civilians and military personnel who perform security leadership and management duties. All students will be required to have achieved the Security Fundamentals Professional Certification (SFPC) under the DoD Security Professional Education Development Program (SPēD) or to have a comparable fundamental knowledge of DoD security programs.

Course Content

The Security Environment

Principles of Cybersecurity

Cybersecurity Management Concepts

Enterprise Roles and Structures

Strategy and Strategic Planning

Security Plans and Policies

Laws and Regulatory Requirements

Security Standards and Controls

Risk Management

Security Metrics and Key Performance Indicators (KPIs)

Physical Security and Environmental Events

Contingency Planning

Security Education, Training, and Awareness

Managing information security across the DoD enterprise (1)

Managing information security across the DoD enterprise (2)

The future of cybersecurity