LearnKey Training

A+ (220-902) Domain 3: Security Course

A+ (220-902) Domain 3: Security Course

A+ (220-902) Domain 3: Security Course

1 Sessions -
3 Hours of Interactive Training

Security is an integral part of what an A+ technician needs to succeed. This course will cover many security aspects, including common threats and vulnerabilities and how to prevent them, Windows security settings, workstation security, mobile device security, and security for networks, both wired and wireless. The emphasis for network security will be on small office home office (SOHO) networks, which are networks an A+ technician is expected to secure and support. This course will also cover proper methods for data destruction and disposal. This course thoroughly covers the objectives in the Security domain on the A+ 220-902 exam. ____________________________________________________ Included with the purchase of this course is a project workbook. With 215 pages of practice exercises consisting of hands-on labs, conceptual design exercises, and troubleshooting exercises, all with the purpose of sharpening your skills in preparation for the A+ 220-902 exam. The workbook maps directly to the video portion of this course, making it easy for you to get the right kind of training and practice for each exam objective.

  • Gain the skills and confidence required to successfully obtain your A+ certification
  • Interactive labs and dozens of pre/post test questions covering all exam objectives
  • View your online courseware anytime, anywhere

About The Author
Jason Manibog, LearnKey’s senior instructor, has spent over 15 years in the Information Technology arena as a trainer, consultant, and courseware writer. Jason is a Microsoft Certified Trainer with multiple certifications in Microsoft, CompTIA, and Adobe. Jason brings a wealth of real-world experience and the ability to explain things in very practical, real-life like terms to any class he teaches, courseware he writes, or e-Learning courses he develops.

Session 1

Section A: Security

  • Introduction

Section B: Common Threats and Vulnerabilities

  • Malware
  • Phishing
  • Spear Phishing
  • Spoofing
  • Social Engineering
  • Shoulder Surfing
  • Zero Day Attack
  • Zombie/Botnet
  • Password Attacks
  • Non-Compliant Systems
  • Security Violations
  • Tailgating
  • Man-in-the-Middle

Section C: Prevention Methods

  • Door Locks and Mantraps
  • Physical and Document Security
  • Digital Security
  • Password Security
  • Directory Permissions
  • Ports and Connections
  • Authentication
  • Other Digital Security Factors
  • User Education
  • Principle of Least Privilege

Section D: Windows Security Settings

  • Users and Groups
  • NTFS vs. Share Permissions
  • Shared Files and Folders
  • System Files and Folders
  • User Authentication
  • Running Programs as Administrator
  • BitLocker
  • BitLocker To Go
  • Encrypted File System

Section E: Workstation Security

  • Password Best Practices
  • Account Management
  • Screen Lockout
  • Disable AutoPlay
  • Data Encryption
  • Patch and Update Management

Section F: Mobile Device Security

  • Screen Locks
  • Remote Wipes
  • Locator Applications
  • Remote Backup Applications
  • Failed Login Attempts Restrictions
  • Antivirus/Antimalware
  • Patching/OS Updates
  • Biometric Authentication
  • Full Device Encryption
  • Multifactor Authentication
  • Authenticator Applications
  • Trusted and Untrusted Sources
  • Firewalls
  • Policies and Procedures

Section G: Data Destruction and Disposal

  • Physical Destruction
  • Recycling and Repurposing Best Practices

Section H: Securing SOHO and Wireless Networks

  • Securing Wireless Networks
  • Changing Default Settings
  • MAC Filtering
  • Assigning Static IP Addresses
  • Firewall Settings
  • Port Forwarding and Mapping
  • Disabling Ports
  • Content Filtering
  • Updating Firmware
  • Physical Security