Course Description

This course covers topics on threats, attacks, and vulnerabilities for Security+. It also includes the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. In addition, students will learn the characteristics of the various types of threat actors, the skills they have and the tools they use to defend the cyberspace. Finally, they will acquire knowledge and skills about penetration testing and vulnerability scanning and how they are used to help tighten security and mitigate potential breaches. 

By the end of this ____ week-long course, students will have a solid understanding of the various threats and and likely the tools to be used to mitigate these threats.

Sept. 12, 2020

Program Requirements

Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationSecurity +


  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts 
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security 
  • Implement secure network architecture concepts and systems design 
  • Install and configure identity and access services, as well as management controls 
  • Implement and summarize risk management best practices and the business impact 
  • Install and configure wireless security settings and implement public key infrastructure


Students must have obtained the Network+ credential and have at least two years of IT administration experience with a security focus. 

Course Content

  1. Analyzing Indicators of Compromise & Determining Malware Types 
  2. Comparing & Contrasting Attacks Types 
  3. Exploring Threat Actor Types and Attributes 
  4. Defining the Penetration Testing Process 
  5. Defining the Vulnerability Scanning Process 
  6. Impacts Associated with Types of Vulnerabilities
  1. Installing and Configuring Network Components 
  2. Assessing the Security Posture of an Organization 
  3. Troubleshooting Common Security Issues 
  4. Analyzing and Interpreting Output from Security Technologies 
  5. Deploying Mobile Devices Securely 
  6. Implementing Secure Protocols
  1. Frameworks, Best Practices, and Secure Configuration Guides 
  2. Implementing Secure Network Architecture 
  3. Implementing Secure Systems Design 
  4. Secure Staging Deployment 
  5. Security Implications of Embedded Systems 
  6. Secure Application Development and Deployment 
  7. Cloud and Virtualization 
  8. Reducing Risk with Resiliency and Automation Strategies 
  9. Physical Security Controls

  1. Comparing and Contrasting Identity and Access Management Concepts 
  2. Installing and Configuring Identity and Access Services 
  3. Implementing Identity and Access Management Controls 
  4. Differentiating Common Account Management Practices
  1. Understanding Organizational Policies, Plans, and Procedures 
  2. Business Impact Analysis Concepts 
  3. Understanding Risk Management Processes and Concepts 
  4. Following Incident Response Procedures
  5. Reviewing the Fundamentals of Digital Forensics 
  6. Defining Disaster Recovery and Continuity of Operation 
  7. Comparing and Contrasting Various Types of Controls 
  8. Performing Data Security and Privacy Practices
  1. Comparing and Contrasting Basic Cryptography Concepts 
  2. Deciphering Cryptographic Algorithms 
  3. Installing and Configuring Wireless Security Settings 
  4. Implementing Public Key Infrastructure