Computer Security Technician (CompTIA Security+ and Network+) Certificate Program with Externship

Computer Security Technician (CompTIA Security+ and Network+) Certificate Program with Externship

Computer Security Technician (CompTIA Security+ and Network+)

The Computer Security Technician CompTIA Security+ and Network+ program is designed to prepare students to function as computer professionals in multiple technical, business, and healthcare settings. Sec+ technicians serve many technical support and IT operation roles with job titles such Systems Administrator, Security Administrator, Junior IT/Auditor, Penetration Tester, and Security Consultant as well as Network Field Technician, Help Desk Technician, and Network Support Specialist.


Computer Security Technician (CompTIA Security+ and Network+) Program

The Computer Security Technician CompTIA Security+ and Network+ Program program is to prepare students to support the IT infrastructure through installing and configuring systems to secure applications, networks, and devices as well as perform threat analysis and respond with appropriate mitigation techniques. It also prepares students to students learn to manage, maintain, troubleshoot, install, operate, and configure basic network infrastructure as well as describe networking technologies, understand basic design principles, adhere to wiring standards, and use testing tools.


Program Objectives

At the conclusion of this program, students will be able to:

  • Designing,implementing,configuring,managing,and maintaining networks and network devices
  • Troubleshooting network problems
  • Identifying strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend against them
  • Applying the principles of organizational security and the elements of effective security policies
  • Applying the technologies and uses of cryptographic standards and products
  • Installing and configuring network- and host-based security technologies
  • Enforcing wireless and remote access security
  • Applying the standards and products used to enforce security on web and communications technologies
  • Implementing strategies for ensuring business continuity,fault tolerance,and disaster recovery
  • Identifying application and coding vulnerabilities and the development and deployment methods designed to mitigate them
  • Communicating effectively and professionally

TOPOLOGIES, THE OSI MODEL, AND ETHERNET

  • Explain devices, applications, protocols, and services at their appropriate OSI layers
  • Explain the concepts and characteristics of routing and switching
  • Compare and contrast the characteristics of network topologies, types, and technologies
  • Deploy the appropriate cabling solution

HUBS, BRIDGES, AND SWITCHES

  • Explain the concepts and characteristics of routing and switching
  • Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
  • Explain common mitigation techniques and their purposes

INFRASTRUCTURE AND DESIGN, POLICIES AND BEST PRACTICES

  • Explain the concepts and characteristics of routing and switching
  • Compare and contrast the characteristics of network topologies, types, and technologies
  • Identify policies and best practices

INTERNET PROTOCOL AND IP ADDRESSING

  • Explain the purposes and uses of ports and protocols
  • Configure the appropriate IP addressing components
  • Explain the concepts and characteristics of routing and switching

DHCP AND APIPA

  • Explain the purposes and uses of ports and protocols
  • Given a scenario, configure the appropriate IP addressing components
  • Explain the functions of network services

ROUTING

  • Explain the concepts and characteristics of routing and switching
  • Configure the appropriate IP addressing components
  • Determine the appropriate placement of networking devices on a network and install/configure them

TCP AND UDP

  • Explain the purposes and uses of ports and protocols
  • Explain common scanning, monitoring, and patching processes and summarize their expected outputs

NAME RESOLUTION

  • Explain the purposes and uses of ports and protocols
  • Explain the functions of network services

MONITORING, SCANNING, AND NETWORK TROUBLESHOOTING

  • Explain the purposes and uses of ports and protocols
  • Explain common scanning, monitoring, and patching processes and summarize their expected outputs
  • Implement network device hardening
  • Explain the network troubleshooting methodology
  • Troubleshoot common wired connectivity and performance issues
  • Troubleshoot common network service issues

APPLICATIONS AND SERVICES, VIRTUALIZATION, SAN, AND CLOUD SERVICES

  • Explain the purposes and uses of ports and protocols
  • Explain the concepts and characteristics of routing and switching
  • Explain the functions of network services
  • Determine the appropriate placement of networking devices on a network and install/configure them
  • Explain the purposes and use cases for advanced networking devices
  • Troubleshoot common wired connectivity and performance issues
  • Troubleshoot common network service issues
  • Summarize cloud concepts and their purposes
  • Explain the purposes of virtualization and network storage technologies

NETWORK SECURITY DESIGN AND APPLIANCES

  • Implement network device hardening
  • Explain common mitigation techniques and their purposes
  • Troubleshoot common wired connectivity and performance Issues
  • Explain the purposes and use cases for advanced networking devices
  • Summarize common network attacks
  • Troubleshoot common network service issues

AUTHENTICATION, ENDPOINT SECURITY, AND NETWORK SITE MANAGEMENT

  • Explain the purposes and uses of ports and protocols
  • Explain the purposes and use cases for advanced networking devices
  • Explain authentication and access controls
  • Summarize common networking attacks
  • Explain common mitigation techniques and their purposes
  • Deploy the appropriate cabling solution
  • Use appropriate documentation and diagrams to manage the network
  • Compare and contrast business continuity and disaster recovery concepts
  • Summarize the purposes of physical security devices

INSTALLING CABLED NETWORKS

  • Given a scenario, deploy the appropriate cabling solution
  • Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
  • Troubleshoot common wired connectivity and performance issues

INSTALLING WIRELESS NETWORKS

  • Compare and contrast the characteristics of network topologies, types, and technologies
  • Given a scenario, implement the appropriate wireless technologies and configurations
  • Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
  • Explain the purposes and use cases for advanced networking devices
  • Given a scenario, secure a basic wireless network
  • Summarize common networking attacks
  • Troubleshoot common wireless connectivity and performance issues

INSTALLING WAN LINKS

  • Explain the concepts and characteristics of routing and switching
  • Compare and contrast the characteristics of network topologies, types, and technologies
  • Implement the appropriate wireless technologies and configurations
  • Determine the appropriate placement of networking devices on a network and install/configure them
  • Compare and contrast WAN technologies

CONFIGURING REMOTE ACCESS

  • Explain the purposes and uses of ports and protocols
  • Explain the purposes and use cases for advanced networking devices
  • Compare and contrast WAN technologies

INDICATORS OF COMPROMISE

  • Analyze indicators of compromise and determine the type of malware
  • Compare and contrast types of attacks
  • Explain threat actor types and attributes
  • Troubleshoot common security issues

CRITICAL SECURITY CONTROLS AND SECURITY POSTURE ASSESSMENT TOOLS

  • Explain penetration testing concepts
  • Explain vulnerability scanning concepts
  • use appropriate software tools to assess the security posture of an organization
  • Explain use cases and purpose for frameworks, best practices, and secure configuration guides
  • Explain risk management processes and concepts
  • Compare and contrast various types of controls
  • Use appropriate software tools to assess the security posture of an organization

INCIDENT RESPONSE

  • Follow incident response procedure

CRYPTOGRAPHY

  • Compare and contrast types of attacks
  • Explain the impact associated with types of vulnerabilities
  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics

PUBLIC KEY INFRASTRUCTURE

  • Explain the impact associated with types of vulnerabilities
  • Install and configure network components, both hardware- and software-based, to support organizational security
  • Explain cryptography algorithms and their basic characteristics
  • Implement public key infrastructure

IDENTIFICATION AND AUTHENTICATION

  • Compare and contrast types of attacks
  • Given a scenario, use appropriate software tools to assess the security posture of an organization
  • Troubleshoot common security issues
  • Compare and contrast identity and access management concepts
  • Install and configure identity and access services
  • Implement identity and access management controls
  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics

IDENTITY AND ACCESS SERVICES AND ACCOUNT MANAGEMENT

  • Implement secure protocols
  • Compare and contrast identity and access management concepts
  • Install and configure identity and access services
  • Explain the impact associated with types of vulnerabilities
  • Differentiate common account management practices

SECURE NETWORK DESIGN

  • Compare and contrast types of attacks
  • Explain the impact associated with types of vulnerabilities
  • Install and configure network components, both hardware- and software-based, to support organizational security
  • Implement secure network architecture concepts

FIREWALLS, LOAD BALANCERS, IDS, AND SIEM

  • Analyze and interpret output from security technologies

SECURE WIRELESS ACCESS AND PHYSICAL SECURITY CONTROLS

  • Install and configure network components, both hardware- and software-based, to support organizational security
  • Troubleshoot common security issues
  • Analyze and interpret output from security technologies
  • Implement secure network architecture concepts
  • Compare and contrast types of attacks
  • Install and configure wireless security settings
  • Explain the importance of physical security controls

SECURE PROTOCOLS, SERVICES, AND REMOTE ACCESS

  • Compare and contrast types of attacks
  • Explain the impact associated with types of vulnerabilities
  • Install and configure network components, both hardware- and software-based, to support organizational security
  • Implement secure protocols
  • Implement secure network architecture concepts

SECURE SYSTEMS DESIGN

  • Explain the impact associated with types of vulnerabilities
  • Troubleshoot common security issues
  • Analyze and interpret output from security technologies
  • Given a scenario, implement secure systems design
  • Explain the security implications of embedded systems

SECURE MOBILE DEVICE SERVICES, VIRTUALIZATION, AND CLOUD SERVICES

  • Given a scenario, deploy mobile devices securely
  • Explain the impact associated with types of vulnerabilities
  • Summarize cloud and virtualization concepts

FORENSICS

  • Summarize basic concepts of forensics

DISATER RECOVERY, RESILIENCY, AND RISK MANAGEMENT

  • Explain the impact associated with types of vulnerabilities
  • Use appropriate software tools to assess the security posture of an organization
  • Explain how resiliency and automation strategies reduce risk
  • Explain disaster recovery and continuity of operation concepts
  • Troubleshoot common security issues
  • Summarize business impact analysis concepts
  • Explain risk management processes and concepts

SECURE APPLICATION DEVELOPMENT AND ORGANIZATIONAL SECURITY

  • Compare and contrast types of attacks
  • Explain the impact associated with types of vulnerabilities
  • Explain the importance of secure staging deployment concepts
  • Summarize secure application development and deployment concepts
  • Given a scenario, use appropriate software tools to assess the security posture of an organization
  • Explain the importance of policies, plans, and procedures related to organizational security
  • Carry out data security and privacy practices

Note: This program can be completed in 6 months. However, students will have online access to this program for a 24-month period.

Education and National Certifications

  • Students should have or be pursuing a high school diploma or GED.
  • There are no state approval and/or state requirements associated with this program.
  • There are several National Certification exams that are available to students who successfully complete this program:
    • CompTIA Security+ Certification (Exam SY0-501) and CompTIA Network+ Certification (Exam N10-007).

National Certification

Upon successful completion of this Auburn University program, students would be eligible to sit for the CompTIA Security+ and CompTIA Network+ Certification Exams and the Microsoft Office Specialist (MOS) exam. Although there are no state approval, state registration or other state requirements for this program, students who complete this program at Auburn University will be prepared and are eligible to sit for the national certification exams. Students who complete this program are encouraged to complete the externship option with their program. Students who complete this program can and do sit for the CompTIA Security+ and CompTIA Network+ and MOS national certification exams and are qualified, eligible and prepared to do so. Auburn University works with each student to complete the exam application and register the student to take their national certification exam.

Externship / Hands on Training / Practicum

Although not a requirement, once students complete the program, they have the ability to participate in an externship and/or hands on practicum so as to practice the skills necessary to perform the job requirements of a professional in this field. Students will be assisted with completing a resume and/or other requirements necessary to work in this field. All students who complete this program are eligible to participate in an externship and will be placed with a participating organization near their location. Auburrn University works with national organizations and has the ability to place students in externship opportunities nationwide.

Note: No refunds can be issued after the start date published in your Financial Award document.