Login 
Password
  
 


Free Exams!
Test your skills with one of our certification exams and see how you stack up right now.

Homepage
Visit our homepage and find out more about what NCSA can do for you.

Learn More About Us
Find out more about how our certifications can benefit you.

Course Descriptions
View a complete listing of certifications available through NCSA.

Access 2000
Excel 2000
Word 2000
PowerPoint 2000
Access 2002
Excel 2002
Word 2002
PowerPoint 2002
Office 2000
Office XP
Windows 2000 Pro
Windows 2000 Server
Visual C++
JavaScript
Computer Hardware
ColdFusion 4.5
HTML 4.0

HTML Tag Library
Visit our HTML tag library, a free reference we provide to our visitors.

Certificate Database
Lookup a certification in our online database.

Affiliate Program
Make money by helping people get the computer training and certification they need. Sign-up Here!

Support Center
If you have questions or concerns feel free to visit our online support center.


 


In addition to our training courses we also offer free online certification exams on several topics including Microsoft Office, Computer Hardware, HTML, PC Basics and more.

Click here for online certification exams.


Security+ certification is recognized around the world as the benchmark for foundation level security professionals. Incorporating a comprehensive range of security knowledge areas, Security+ was developed with input from industry, government, academia, and front-line practitioners, so you can be assured of its relevance.

   CompTIA Security+ (5 CD Set) $399.00
   Shipping (US only)
FREE

Course Instructor: Kevin Wolford

Kevin Wolford started his computer career in 1983. He has been a technical writer, network administrator, and trainer. Kevin spent many years with Novell and is a CNI and Master CNE. In 1998 Kevin founded Tech Training, giving him a chance to test his training concepts on live labs. He is also an MCSE, MCT, and is certified in SMS, SQL Server, TCP/IP, NT Workstation, NT Server, Exchange Server, Windows 9x and 2000. Kevin has authored Microsoft certification books for New Riders and Sybex. He also owns a consulting company dedicated to teaching complex technical topics in a simple way.

Lesson 1: General Security Concepts


Access control
Foundation of a secure network
Access Control methods
Authentication
Overview
Kerberos
CHAP
Certificates
Username/Password
Tokens
Multi-Factor
Mutual Authentication
Biometrics
Auditing
Protecting Your Network
Non-essential services & protocols – disabling unnecessary systems/process/attacks
Attacks
Malicious Code
Social Engineering
Auditing
Logging & System Scanning


Level 2: Communication Security


Remote Access
802.1x
VPN
RADIUS
TACACS/+
L2TP/PPTP
SSH
IPSEC
Vulnerabilities
E-mail
S/MIME
PGP
Vulnerabilities
Web
SSL/TLS
HTTP/S
Instant Messaging
Directory Services
SSL/TLS
LDAP
File Transfer
S/FTP
Blind FTP/Anonymous
File Sharing
Vulnerabilities
Wireless
WTLS
802.1x
WEP/WAP
Vulnerabilities


Level 3: Infrastructure Security


Devices
Firewalls
Routers
Switches
Wireless
Modems
RAS
Telecom/PBX
VPN
IDS
Network Monitoring/Diagnostic
Workstation
Servers
Mobile Devices
Media
Coax
UTP/STP
Fiber
Removable Media
Security Topologies
Security Zones
VLANs
NAT
Tunneling
Intrusion Detection
Network Based
Host based
Active Detection
Honey Pots
Incident Response
Security
OS/NOS Hardening (Concepts & Processes)
Network Hardening
Application Hardening


Level 4: Basics of Cryptography


Algorithms
Hashing
Symmetric
Asymmetric
Concepts of Cryptography
Confidentiality
Integrity
Authentication
Non-Repudiation
Access Control
PKI
Distinguishing Certificates
Revocation
Trust Models
Standard & Protocols
Key Management/Certificate Lifecycle
Centralized vs. Decentralized
Storage
Escrow
Expiration
Revocation
Suspension
Recovery
Renewal
Destruction
Key Usage


Level 5: Operational/Organizational Security


Physical Security
Access Control
Social Engineering
Environment
Disaster Recovery
Backups
Secure Recovery
Disaster Recovery Plan
Business Continuity
Utility
High Availability/Fault Tolerance
Backups
Policy & Procedure
Security Policy
Incident Response Policy
Privilege Management
User/Group/Role Management
Single Sign-on
Centralized vs. Decentralized
Auditing (Privilege, Usage, Escalation)
MAC/DAC/RBAC
Forensic (Awareness, Conceptual Knowledge & Understanding-knowing your role
Chain of Custody
Preservation of Evidence
Collection of Evidence
Risk Identification
Asset Identification
Risk Assessment
Threat Identification
Vulnerabilities
Education-training of end-users, executives, & HR
Communication
User Awareness
Education
Online Resources
Documentation
Standard and Guidelines
System Architecture
Change Documentation
Logs and Inventories
Classification
Retention/Storage
Destruction


 


Please visit our special offers page to view some superb offers from our partners on the web. To view our special offers click here.

Or continue browsing our courses below.


3D Studio Max
A+ 2003
Microsoft Access 2007
Acrobat 4
ActiveX and OLE
Adobe Illustrator
Adobe InDesign CS
Adobe PhotoShop CS
ASP .NET
AutoCAD 2000
C Programming
C# Programming
Cisco CCNA
CompTIA Security+
CorelDRAW 10
Crystal Reports 8
Delphi 6

Exchange Server 2000
Flash 5
Frontpage 2000
ICDL/ECDL
IIS 5
Java 2
Linux 101
Linux 102
Lotus Notes 5
MicroSoft .NET
Network+ 2002
Oracle 8iR2
Outlook 2000
Outlook XP
PageMaker 6.5
Paradox 8

Perl 5
PhotoDraw 2000
PhotoPaint 8
SQL Server 2000
TCP/IP 4
Unix
Visio 2002
VB .NET
VBScript 5
Visual FoxPro 6
MCSE 2000
Windows XP User
WordPerfect 9
WordPerfect 11
XML
ZenWorks 3.0

     

     


Typing Speed Test
Test your typing speed with our certified typing speed test today.

  
HOME      EMPLOYERS    TESTING CENTERS    CERTIFICATION LIST    INSURANCE QUOTES    AFFILIATES    CONTACT US

© 2002-2010 National Computer Science Academy, All Rights Reserved.