CompTIA Security+ 2008: Threat Mitigation

This course is included in our On-demand training solution.


The central goals of network security are integrity, confidentiality, and availability. Even the most secure data systems are threatened on a daily basis, providing the challenge to administrators as well as users to maintain security. A decision must be made as to whether or not the cost of adding additional security outweighs possible losses that may be incurred with current configurations. Companies are constantly deciding how much risk is acceptable. This course introduces methods used to perform core system maintenance, manage viruses and spyware, securing browser software, and identify and mitigate social engineering threats. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience

Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.


Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration

120 min.

Course Objectives

Core System Maintenance

  • identify key threats to network security
  • secure the operating system
  • configure Windows Firewall
  • Virus and Spyware Detection and Management

  • distinguish between network security threats
  • scan a system for spyware
  • configure Windows Mail to prevent spam
  • Securing the System

    Web Application Security

  • recognize the security vulnerabilities and safeguards of JavaScript
  • recognize the security vulnerabilities and safeguards of ActiveX
  • recognize the security vulnerabilities and safeguards of Java applets
  • Pop-ups, Cookies, and Input Validation

  • manage pop-ups
  • recognize the security vulnerabilities and safeguards of cookies
  • recognize input validation attacks and how to prevent them
  • Social Engineering

  • recognize social engineering threats and safeguards
  • Managing Pop-ups and Social Engineering Defense