$110 (USD)

Add To Cart

A new session of each course opens each month, allowing you to enroll whenever your busy schedule permits!

How does it work? Once a session starts, two lessons will be released each week, for the six-week duration of your course. You will have access to all previously released lessons until the course ends.

Keep in mind that the interactive discussion area for each lesson automatically closes 2 weeks after each lesson is released, so you’re encouraged to complete each lesson within two weeks of its release.

The Final Exam will be released on the same day as the last lesson. Once the Final Exam has been released, you will have 2 weeks plus 10 days to complete the Final and finish any remaining lessons in your course. No further extensions can be provided beyond these 10 days.

Week One

Lesson 01 - The Security+ Exam and Basic Network Security

Computer security and related computer-support specialties are among today's fastest-growing occupations. Getting a CompTIA Security+ credential is your first step to gaining entrance into this exciting, fast-paced field. By the time you finish this first lesson, you'll know what you need to do to achieve a Security+ credential. You'll also understand the basic goals, tools, and techniques of computer security.

Lesson 02 - Network Security Administration

In this lesson, we'll review the tasks and actions a secure network administrator performs, including setting up security rules and ensuring secure device configurations. We'll also cover what you need to consider in the design of a secure network. You'll learn the definitions, structures, and methods that combine to create a secure network environment.

Week Two

Lesson 03 - Network Security Protocols

In Lesson 3, we'll explore the common network security protocols and ports in use on secure networks, and we'll discuss which ones are most likely to show up on the Security+ exam. You'll learn the purpose and function of each of the protocols and features in this lesson. This knowledge will help you not only pass the exam, but also work as a successful secure network administrator.

Lesson 04 - Compliance and Operational Security: Part 1

If you work as a secure network administrator, you'll spend most of your days focusing on risk. Risk comes in many forms, and identifying, mitigating, and reducing risk is what network security is all about. In this lesson, you'll get a broad overview of how we deal with risks. We'll explore security policies, risk analysis, risk control methods, and the duties of risk administration.

Week Three

Lesson 05 - Incident Response

Despite your best efforts, there are times when a security incident will occur. In this lesson, you'll learn how to respond to an incident. We'll explore the forensic processes you can use to gather evidence after an incident, and we'll go over the procedures you'll use to report and record the outcome of your investigation. With thorough incident response, you'll be able to minimize the damage from an incident and find out how you can prevent similar incidents from happening in the future.

Lesson 06 - Compliance and Operational Security: Part 2

In this lesson, we'll explore some topics important to keeping your network secure and performing at its best. We'll start with user awareness. When it comes to preventing security incidents, how can you make an organization's employees your allies instead of your enemies? We'll look at some compliance procedures that can help. We'll also discuss how we classify information according to its sensitivity and then apply security protections accordingly. Next, we'll investigate some physical and logical security options. Finally, we'll talk about how to secure the network's environment from hazards such as weather, fire, and high heat or humidity. There's a lot to think about when securing a network, but you'll get a good grasp on the ins and outs in this lesson.

Week Four

Lesson 07 - Threat Awareness, User Behaviors, and Business Continuity

Many of the threats that face a secure network come from sources you might not expect. Network users can be unknowingly creating vulnerabilities every day. The Web provides avenues to attackers who wish to infect networks with viruses, phishing attacks, and other types of exploits. The expansion of social networking and even simple peer-to-peer file sharing across a network can also add new types of threats to your network. While these threats can affect the network, they can also interrupt the continuity of your business operations. In this lesson, we'll investigate each potential threat and how you can keep threats at bay.

Lesson 08 - Redundancy, Fault Tolerance, and Resiliency

Even the best security designs and implementations are only in effect if an entire system is up and running. If part of a system or network fails, its security measures could also fail simply because they aren't running. In this lesson, we'll look at the various methods and technologies that help to ensure that a system or network remains up and running. We'll explore redundancy and fault tolerance, and how RAID can help us achieve them. We'll also look at high availability, clustering, load balancing, failover, and network resiliency. By the end of this lesson, you'll have a good understanding of how these technologies help prevent network downtime.

Week Five

Lesson 09 - Malware, Network, and Social Engineering Attacks

This is the first of three lessons in which we'll focus on threats and vulnerabilities. In Lesson 9, we'll cover the various types of malware, the different types of attacks that threaten your network, and the variety of social engineering attacks that seek to gain information about you, your users, your organization, and your network. Once you know your enemy, you'll be better prepared to protect your network.

Lesson 10 - Wireless Threats and Vulnerabilities

So far, we've talked about many threats that affect wired networks. But wireless networks have their own unique set of threats and vulnerabilities. In this lesson, we'll look at these wireless threats and vulnerabilities. You'll find out the strategies behind many wireless attacks, including client-to-client attacks, war jacking, interception attacks, and more. Finally, you'll see how to design a wireless network for maximum security and mitigation of these threats.

Week Six

Lesson 11 - Application and Injection Attacks

In this lesson, we'll continue our exploration of the many types of threats and vulnerabilities that can hurt a network with a look at application and injection attacks. This time, we'll also focus on the actions of attackers, the types of attacks they can launch, and the mitigation methods we can use to determine the nature and damage of an attack. By the end of this lesson, you'll not only be well-informed about the types of attacks you can expect to see while working in network security, but you'll also know what methods you can use to prevent and minimize damage from attacks.

Lesson 12 - Protective Measures

In the final lesson of the course, we'll explore a few methods and security measures that you can apply to a network to reduce its vulnerabilities. First, we'll talk about the hardening process, which includes tasks such as securing accounts, removing unnecessary accounts, and applying port security. Then we'll look at different types of intrusion detection and prevention systems. We'll wrap up with a discussion of the tools and processes some of these systems use. I'll show you how you can put some of the concepts you've been learning throughout this course into practice on a network.

 Close Nav
  • Learn a new skill or enhance existing skills for professional development or personal enrichment.
  • New sessions starting monthly with lessons and assignments released weekly.
  • 2-4 hours a week in a convenient six-week format.
  • Interactive learning environment. Classroom built around discussion areas where you can engage with classmates and instructors.
  • Expert instructors develop, lead, and interact with students in each course.
  • Award of completion from your learning institution with passing score.
  • Gain the knowledge needed to move forward with your education.
  • Start anytime. Access Granted upon registration.
  • Courses are designed to be completed within 6-12 weeks.
  • Interactive multi-media instruction with integrated assessment, allowing you to work at your own pace.
  • Professional instructors support you throughout your learning experience.
  • Confirmation of successful course completion.
  • Build industry skills or earn continuing education credits in a variety of fields.
  • Start Anytime. Access to all course material and assessments from day one.
  • Many tutorials can be completed in just a few hours.
  • Quick independent study. Learn something new or expand your knowledge while working at your own pace.
  • Material developed by industry leaders and student support offered.
  • Certificate of completion awarded with passing score.

Forgot Password?