CompTIA Security+ 2008: Ports, Protocols, and Network Security

This course is included in our On-demand training solution.


Internetwork communications are the foundation of the modern Internet. Selecting the correct devices, properly configuring those devices, and placing them in the correct locations both within and outside a network to defend against attack is a task every network administrator faces on a daily basis. This course discusses, TCP/IP configuration and attack defences, network devices selection and proper placement, and securing the networking environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience

Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.


Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration

180 min.

Course Objectives


  • distinguish between TCP/IP protocols
  • recognize examples of IPv4 addresses
  • recognize examples of IPv6 addresses
  • Protocol-based Attacks I

  • recognize DoS and DDoS attacks and how to prevent them
  • configure a server to prevent SYN flood attacks
  • Protocol-based Attacks II

  • recognize man-in-the-middle attacks and how to prevent them
  • Defending against Protocol Attacks

    The OSI Reference Model and Networking Devices

  • recognize the function of each layer in the OSI Reference Model
  • recognize key characteristics of common networking devices
  • Firewalls and Device Security

  • recognize key characteristics of firewalls
  • recognize key network device weaknesses
  • recognize ways to prevent device attacks
  • Defending against Protocol-based Attacks and Device Attacks

    Secure Network Topology

  • recognize security considerations when designing network topologies
  • Browser-related Network Security and Virtualization

  • configure the Phishing Filter
  • set security zones
  • set privacy options
  • recognize the benefits of virtualization
  • Setting Browser-related Security