CompTIA Security+ 2008: Messaging, User, and Role Security

This course is included in our On-demand training solution.


E-mail and instant messaging have taken over from snail mail, memos, and even to a large extent from phone conversations in modern office environments. The challenge is to ensure that these forms of communication are secure, readily accessible, and that the identity of both parties involved can be confirmed. This course analyzes and demonstrates the methods for securing e-mail and instant messages along with creating security on the Active Directory domain and client computers so that these forms of communication can be done with confidentiality, integrity, availability and nonrepudiation. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience

Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.


Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration

180 min.

Course Objectives

E-mail Vulnerabilities

  • recognize the types of e-mail attacks and how to combat them
  • recognize how to secure an e-mail server
  • Encryption, PGP, and S/MIME

  • recognize how PGP encrypts e-mail messages
  • recognize how S/MIME encrypts e-mail messages
  • recognize how to send an e-mail message with restricted permission
  • recognize how to obtain a digital ID and digitally sign e-mail messages
  • Securing E-mail Messages

    Instant Messaging Risks and Countermeasures

  • recognize the security risks of instant messaging and combat them
  • Securing the IM Client

  • recognize the guidelines for IM client security
  • configure IM client security
  • Implementing IM Security

    Local Security Policies

  • create a console to manage local security policies
  • recognize how to design domain GPOs
  • Group Policy Settings and Security Templates

  • implement domain GPOs
  • analyze a Windows Vista computer’s security
  • User, File System, and Printer Security

  • create users and groups based on security needs
  • secure file resources
  • secure printer resources
  • Configuring and Securing Users and Resources