CompTIA Network+ 2009: Network Security

This course is included in our On-demand training solution.


The need for network security has grown immensely in recent years and as a consequence, security technologies have grown as well. Security technologies can take the form of protocols, applications, and hardware devices, and many, if not all, of these things can be found in today’s enterprise networks as well as most home networks. This course focuses on the threats facing today’s networks and information, and the steps administrators can take to mitigate these issues. It also explores the processes and procedures that should be in place to prevent security breaches and to recover from threats that get past network defenses. In addition, types of security software, such as antivirus and anti-spyware scanners are covered, along with the various protocols and services, such as SSH and SSL, used in an overall network security system. Also described are basic security procedures including policy creation, user training, and software patching and updating.
This course maps to the CompTIA Network+ (2009) exam objectives for explaining the function of hardware and software security devices and the issues that affect device security, explaining common features of a firewall, explaining the methods of network access security and user authentication, and identifying common security threats and mitigation techniques.

Target Audience

The audience for CompTIA Network+ 2009 training will comprise IT personnel with at least 9 months IT networking experience. Good computer literacy along with a sound technical acumen should be present. Students looking to acquire job skills, and to be trained specifically to pass the associated CompTIA Network+ (2009 Edition) certification exam will want to study this learning path.


Expected Duration

150 min.

Course Objectives

Common Network Security Threats

  • recognize basic attack types
  • recognize how viruses work and how to defend against malicious code
  • recognize different ways “social engineering” can be used when attacking a network
  • Mitigating Network Security Threats

  • recognize what should be included in security policies
  • distinguish between different types of security audits
  • recognize how patches and updates affect network security
  • recognize how education can affect network security
  • Network Access Security

  • recognize the most appropriate protocol to use in a given situation
  • recognize how access can be restricted by MAC and IP filtering
  • recognize the functions of tunneling protocols
  • Identifying Network Security Threats

    Firewall Technology

  • recognize basic functions of firewalls
  • recognize common scanning techniques
  • distinguish between stateful and stateless firewalls
  • recognize how content filtering works
  • Network Security Devices

  • recognize how to work with incident response-based Intrusion Detection Systems
  • recognize the functions of host-based and network-based Intrusion Detection Systems
  • recognize the functions of an Intrusion Prevention System
  • recognize how to configure a VPN access
  • Network Device Security

  • recognize the functions of physical security and authentication
  • recognize the security risks of hardware and transmissions
  • recognize the functions of common access protocols
  • Identifying Security Solutions