About - Syllabus


Table of Contents

Chapter-1 - Cryptographic Tools and Techniques

Cryptographic Tools and Techniques
The History of Cryptography
Cryptographic Services
Cryptographic Goals
Cryptographic Terms
Cipher Types and Methods
Symmetric Encryption
Data Encryption Standard
Advanced Encryption Standard
International Data Encryption Algorithm
Rivest Cipher Algorithms
Asymmetric Encryption
Elliptic Curve Cryptography
El Gama
Merle–Hellman Knapsack
Hybrid Encryption
Hashing and Message Digests
MD Series
Message Authentication Code
Digital Signatures
Public Key Infrastructure
Certificate Authority
Registration Authority
Certificate Revocation List
Digital Certificates
Certificate Distribution
The Client’s Role in PKI
Cryptographic Solutions
Application Layer Encryption
Transport Layer Encryption
Internet Layer Controls
Physical Layer Controls
Cryptographic Attacks

Chapter 2 - Comprehensive Security Solutions

Comprehensive Security Solutions
Advanced Network Design
Remote Access
Placement of Security Devices
Network Interface Layer
Internet Layer
Transport Layer
Application Layer
Secure Communication Solutions
Secure Facility Solutions
Building Layouts
Facilities Management
Secure Network Infrastructure Design
Router Configuration
Enterprise Service Bus
Web Services Security

CHAPTER - 3 Securing Virtualized, Distributed, and shared Computing

Distinguis and select among different types of virtualized, distributed, and shared computing
Advantages and Disadvantages sof virtualizing servers and minimizing physical space requirements
Securing virtual enviroments, appliances, and equipment
Vulerabilities associated with a single physical server hosting multiple companies virtual machies
Securing virtual enviroments, appliances, and equipment
Vulerabilities associated with a single physical server hosting multiple companies virtual machies
Vulnerabilities associated with co-mingling of hosts with differents security requiremnts
Enterprise Security
Cloud computing providers
Benefits of cloud computing
Endpoint Security software
spam filters
Host hardening
Explain the Security implications of enterprise storage

CHAPTER -4 The following comptia casp exam objects are coverd Distinguish among security controls for hosts firewalls and Access control lists

Host-based firewalls
Trusted OS
End point security software
Spam filters
Host hardening
Security/group policy implementation
Command shell restrictions
Warning banners
Restricted interfaces
Asset management (inventory control)
Data exfiltration
Intrusion Detectionand and Prevention

CHAPTER - 5 Application Security and Penetration Testing Explain the importance of application security web application security design considerations

Specific application issues
Process handlng at the cient and server
State Management
Buffer overflow
Memory leaks
Integer overflows
Race conditions
time of check
time of usev Resource exhaustion
Distinguish and select the method or tool that is appropriate to conduct an assessment

CHAPTER - 6 Risk Management

Risk management of new products, new technolgies and user behaviors
New or changing Business Models / Strategies
Internal and external influences
Audit findings
client requirements
Top-level Management
Impact of depaerimeterization

CHAPTER - 7 Policies, Procedures, and Incident Response

A High-Level View of Documentation
The Policy Development Process
Policies and Procedures
Business Documents Used to Support Security
Documents and Controls Used for Sensitive Information
Why Security?
Personally Identifiable Information Controls
Data Breach
Policies Used to Manage Employees
Auditing Requirements and Frequency
The Incident Response Framework
Digital Forensics
The Role of Training and Employee Awareness

CHAPTER - 8 Security Research and Analysis

Analyzing Industry Trends and Outlining Potential Impact
Performing Ongoing Research
Best Practices
New Technologies
Situational Awareness
Research Security Implications of New Business Tools
Global IA Industry Community
Research Security Requirements for Contracts
Carrying Out Relevant Analysis to Secure the Enterprise
Prototyping and Testing Multiple Solutions
Cost-Benefit Analysis
Analyzing and Interpreting Trend Data to Anticipate Cyber Defense Aids
Reviewing Effectiveness of Existing Security
Reverse Engineering or Deconstructing Existing Solutions
Analyzing Security Solutions to Ensure They Meet Business Needs
Conducting a Lessons Learned/After-Action Review
Using Judgment to Solve Difficult Problems
Conducting Network Traffic Analysis

CHAPTER - 9 Enterprise Security Integration

Integrate Enterprise Disciplines to Achieve Secure Solutions
The Role of Governance in Achieving Enterprise Security
Interpreting Security Requirements and Goals to Communicate with Other Disciplines
Guidance to Management
Establish Effective Collaboration within Teams to Implement Secure Solutions
Explain the Security Impact of Interorganizational Change
Security Concerns of Interconnecting Multiple Industries
Design Considerations During Mergers, Acquisitions, and De-mergers
Assuring Third-Party Products Only Introduce Acceptable Risk
Network Secure Segmentation and Delegation
Integration of Products and Services

CHAPTER - 10 Security Controls for Communication and Collaboration

Selecting and Distinguishing the Appropriate Security Controls
Unified Communication Security
VoIP Security
VoIP Implementation
Remote Access
Enterprise Configuration Management of Mobile Devices
Secure External Communications
Secure Implementation of Collaboration Platforms
Prioritizing Traffic with QuoS
Mobile Devices
Advanced Authentication Tools, Techniques, and Concepts
Federated Identity Management
Service Provisioning Markup Language
Certificate-Based Authentication
Carrying Out Security Activities across the Technology Life Cycle
End-to-End Solution Ownership
Understanding the Results of Solutions in Advance
Systems Development Life Cycle
Addressing Emerging Threats and Security Trends
Validating System Designs

© 2015 by Learncertification All Rights Reserved. The certification names are the trademarks of their respective owners. Terms & Privacy Policy