5 days


This course is the primary curriculum you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.

The course is aimed toward the IT professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; plus familiarity with other operating systems, such as macOS, Unix or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics.

You can also take this course to prepare for the CompTIA Security+ certification (Exam SY0-501) examination.

Key Topics

Detailed Info
  • Comparing and Contrasting Attacks
  • Comparing and Contrasting Security Controls
  • Using Security Assessment Tools
  • Comparing and Contrasting Basic Concepts of Cryptography
  • Implementing Public Key Infrastructure
  • Implementing Identity and Access Management Controls
  • Managing Access Services and Accounts
  • Implementing Secure Network Architecture Concepts
  • Installing and Configuring Security Appliances
  • Deploying Secure Host, Embedded, and Mobile Systems
  • Implementing Secure Network Access Protocols
  • Implementing Secure Network Applications
Skills Gained
Key Topics
Target Audience

Skills Gained

On course completion, you will be able to:

  • Compare and contrast attacks.
  • Compare and contrast security controls.
  • Use security assessment tools.
  • Explain basic cryptography concepts.
  • Implement a public key infrastructure.
  • Implement identity and access management controls.
  • Manage access services and accounts.
  • Implement a secure network architecture.
  • Install and configure security appliances.
  • Install and configure wireless and physical access security.
  • Deploy secure host, mobile, and embedded systems.
  • Implement secure network access protocols.
  • Implement secure network applications.
  • Explain risk management and disaster recovery concepts.
  • Describe secure application development concepts.
  • Explain organizational security concepts.

Key Topics

Lesson 1: Comparing and Contrasting Attacks

  • Compare and Contrast Information Security Roles
  • Explain Threat Actor Types Topic 1C: Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types

Lesson 2: Comparing and Contrasting Security Controls

  • Compare and Contrast Security Control and Framework Types
  • Follow Incident Response Procedures

Lesson 3: Using Security Assessment Tools

  • Explain Penetration Testing Concepts
  • Use Topology Discovery Software Tools
  • Use Fingerprinting and Sniffing Software Tools
  • Use Vulnerability Scanning Software Tools

Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography

  • Compare and Contrast Basic Concepts of Cryptography
  • Compare and Contrast Cryptographic Attack Types
  • Explain Hashing and Symmetric Cryptographic Algorithms
  • Explain Asymmetric Cryptographic Algorithms

Lesson 5: Implementing Public Key Infrastructure

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management

Lesson 6: Implementing Identity and Access Management Controls

  • Compare and Contrast Identity and Authentication Concepts
  • Install and Configure Authentication Protocols
  • Implement Multifactor Authentication

Lesson 7: Managing Access Services and Accounts

  • Install and Configure Authorization and Directory Services
  • Implement Access Management Controls
  • Differentiate Account Management Practices
  • Implement Account Auditing and Recertification

Lesson 8: Implementing Secure Network Architecture Concepts

  • Implement Secure Network Architecture Concepts
  • Install and Configure Secure Switching Infrastructure
  • Install and Configure Network Access Control
  • Install and Configure Secure Routing and NAT Infrastructure

Lesson 9: Installing and Configuring Security Appliances

  • Install and Configure Firewalls and Proxies
  • Install and Configure Load Balancers
  • Install and Configure Intrusion Detection/Prevention Systems
  • Install and Configure Logging and SIEM Systems

Lesson 10: Installing and Configuring Wireless and Physical Access Security

  • Install and Configure Wireless Infrastructure
  • Install and Configure Wireless Security Settings
  • Explain the Importance of Physical Security Controls

Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems

  • Implement Secure Hardware Systems Design
  • Implement Secure Host Systems Design
  • Implement Secure Embedded Systems Design
  • Implement Secure Mobile Device Systems Design

Lesson 12: Implementing Secure Network Access Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Remote Administration Protocols

Lesson 13: Implementing Secure Network Applications

  • Implement Secure Web Services
  • Implement Secure Communications Services
  • Implement Secure Virtualization Infrastructure
  • Implement Secure Cloud Services

Lesson 14: Explaining Risk Management and Disaster Recovery Concepts

  • Explain Risk Management Processes and Concepts
  • Explain Disaster Recovery Planning Concepts
  • Explain Resiliency and Continuity of Operations Strategies
  • Summarize Basic Concepts of Forensics

Lesson 15: Summarizing Secure Application Development Concepts

  • Explain the Impact of Vulnerability Types
  • Summarize Secure Application Development Concepts

Lesson 16: Explaining Organizational Security Concepts

  • Explain the Importance of Security Policies
  • Implement Data Security and Privacy Practices
  • Explain the Importance of Personnel Management

Appendix A: Mapping Course Content to CompTIA Security+ (Exam SY0-501)

Target Audience

  • Systems Administrator
  • Security Administrator
  • Security Specialist
  • Security Engineer
  • Network Administrator
  • Junior IT Auditor/Penetration Tester
  • Security Consultant


Students should have basic Windows user skills and a fundamental understanding of computer and networking concepts. Achievement of CompTIA A+ and Network+ certifications, plus two years of experience with IT administration with a security focus.

Print course details

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Book Your Course

You don't appear to have Javascript enabled, our contact forms & booking process unfortunately requires it.

If you'd like more information, or to book a course please email us

April 13 - April 17
May 11 - May 15
June 1 - June 5

Email Course Outline
Request a Callback

Enter your details below and we'll email you a pdf of the course outline.

Enter your details below and one of our team will give you a call to answer any questions you may have.