5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     CompTIA     CompTIA Network+     CompTIA Network+ N10-008

Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats.


In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You’ll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you’ll examine authentication methods and how to perform security assessments.


You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.



Objectives

CompTIA Network+ (N10-008): Security Concepts & Threats

  • discover the key concepts covered in this course
  • describe the confidentiality, integrity, and availability (CIA) triad and outline how it can guide policies for information security within an organization
  • recognize the most common potential internal and external threats to a network
  • describe common network vulnerabilities such as zero-day attacks
  • outline the characteristics of common exploits, including IP spoofing and eavesdropping
  • outline the principle of least privilege
  • recognize when and where to use role-based access control (RBAC)
  • describe the zero trust security model
  • outline the purpose and features of the defense in depth cybersecurity approach and how it can encompass separation of duties, network segmentation, network access control, and honeypots
  • differentiate between authentication methods including multifactor, Terminal Access Controller Access-Control System Plus (TACACS+), Single sign-on (SSO), Remote Authentication Dial-in User Service (RADIUS), LDAP, Kerberos, local authentication, 802.1X, and Extensible Authentication Protocol (EAP)
  • describe the benefits of security assessments and outline the most common assessment techniques including vulnerability assessments, penetration testing, risk assessments, and posture assessments
  • outline the purpose and characteristics of the security information and event management (SIEM) software
  • differentiate between common technology-based attacks including DNS poisoning, VLAN hopping, ARP spoofing, rogue DHCP, rogue access point (AP), evil twin, brute-force, dictionary, MAC spoofing, IP spoofing, and deauthentication
  • describe ransomware attacks and outline how to prevent and remove them
  • recognize best practices for preventing malware attacks
  • outline the purpose and characteristics of an on-path attack
  • describe commonly used password attack methods
  • outline the purpose and characteristics of denial of service (DoS), distributed denial of service (DDoS), and Botnet or command and control attacks
  • differentiate between common types of social engineering attacks including phishing, tailgating, piggybacking, and shoulder surfing
  • summarize the key concepts covered in this course