Course Description

This course covers Domain 1 of the Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for Security+, you’ll learn about the various types of threats and attacks every company faces. First, the ins and outs of Malware, ransomware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks will be discussed.

Next is the characteristics of the various types of threat actors, the skills they have, and the tools they use. Finally, the penetration testing and vulnerability scanning and how they’re used to help tighten security and mitigate potential breaches will follow.

By the end of this course, you’ll have a solid understanding of the various threats you’re likely to face and what tools are available to mitigate these threats.

Sept. 12, 2020

Program Requirements

Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationSecurity+ CE


  • Assess the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security failures
  • Critique and assess the strengths and weaknesses of general cybersecurity models, including the CIA triad
  • Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people
  • Assess how all domains of security interact to achieve effective system-wide security at the enterprise level.
  • Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security domains (IT, physical, classification, personnel, and so on)
  • Assess the role of strategy and policy in determining the success of information security
  • Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans
  • Design a notional information security plan that incorporates relevant principles of the lifecycle management
  • Evaluate the principles of risk and conduct a notional risk management exercise
  • Assess the role of good metrics and key performance indicators (KPIs) in security assessment and governance
  • Create a good set of information security metrics
  • Critique the current legal and regulatory environment as it applies to cybersecurity
  • Identify and contrast the most common security standards and associated catalogs of security controls
  • Contrast the various approaches to security training and formulate a simple training agenda
  • Justify the need for business continuity planning and propose how to implement such a plan successfully within a modern enterprise
  • Compare and contrast logical and physical security
  • Appraise the current structure of cybersecurity roles across the DoD enterprise, including the roles and responsibilities of the relevant organizations
  • Assess the strengths and weaknesses of the certification and accreditation approach to cybersecurity
  • Evaluate the trends and patterns that will determine the future state of cybersecurity.


This course is intended for DoD civilians and military personnel who perform security leadership and management duties. All students will be required to have achieved the Security Fundamentals Professional Certification (SFPC) under the DoD Security Professional Education Development Program (SPēD) or to have a comparable fundamental knowledge of DoD security programs.

Course Content

1.    Threats, vulnerabilities, and consequences
2.    Advanced persistent threats
3.    The state of security today
4.    Why security matters to DoD

1.    The interrelated components of the computing environment
2.    Cybersecurity models (the CIA triad, the star model, the Parkerianhexad)
3.    Variations on a theme: computer security, information security, and information assurance

1.    Security governance
2.    Management models, roles, and functions

1.    Information security roles and positions
2.    Alternative enterprise structures and interfaces

1.    Strategy
2.    Strategic planning and security strategy
3.    The information security lifecycle
4.    Architecting the enterprise

1.    Levels of planning
2.    Planning misalignment
3.    The System Security Plan (SSP)
4.    Policy development and implementation

1.    Timeline of U.S. laws related to information security
2.    The Federal Information Security Management Act (FISMA)

1.    Security standards and controls
2.    Certification and accreditation (C&A)

1.    Principles of risk
2.    Types of risk
3.    Risk strategies
4.    The Risk Management Framework (RMF)

1.    The challenge of security metrics
2.    What makes a good metric
3.    Approaches to security metrics
4.    Metrics and FISMA

1.    Physical and environmental threats
2.    Physical and environmental controls

1.    Developing a contingency plan
2.    Understanding the different types of contingency plan
3.    Responding to events

1.    Human factors in security
2.    Developing and implementing a security training plan
3.    Cross-domain training (IT and other security domains)

1.    The purpose of certification and accreditation
2.    Trends in certification and accreditation

1.    The strategic direction of DoD IT and information security
2.    Responsibilities within the DoD enterprise

1.    Key future uncertainties
2.    Possible future scenarios
3.    How to apply what you’ve learned