Path Home About Initiatives Cyber Security Education Consortium Courses SEC Course Information - Objectives
Jump to navigation

SEC Course Information - Objectives

Course Learning Objectives:

There are 9 exams covering these topics and objectives, a final exam and a hands-on performance final. Upon completion of these modules, students will be able to perform tasks related to:

  • Secure E-Commerce Concepts & Practices: In this topic, the core concepts that comprise secure e-commerce are explored. The most common practices used today are examined.

    Objectives:

    1. Define E-Commerce and identify the key components.
    2. Examine the history of E-Commerce and how E-commerce integrates into the economy.
    3. Examine the common methods used in E-Commerce.
    4. Explore the security risks associated with E-Commerce.
    5. Examine how E-Commerce is included in security policies.
    6. Explore current and future trends in E-Commerce practices.
  • Trusted Network Implementation: In this topic, you will examine and identify the transition towards the implementation of trusted networks, including their requirements and critical components.

    Objectives:

    1. Examine reasons for migrating networks from defense to trust.
    2. Analyze the requirements of a trusted network.
    3. Define the fundamentals of cryptography.
    4. Define the role of strong authentication.
    5. Define the role of a public key infrastructure.
  • Planning a Trusted Network: In this topic, you will be introduced to the concepts and documents required in planning a trusted network. You will examine trusted network architectures, certificate paths, certificate policies, certification practice statements, and the certificate policy framework.

    Objectives:

    1. Examine the components required for a trusted network implementation.
    2. Analyze certificate paths.
    3. Analyze trusted network planning documents.
    4. Examine the certificate practices framework.
  • Microsoft Trusted Networks: In this topic, you will examine the requirements for Certificate Authorities (CA) in general and the various models of CAs that are implemented in practice. You will study the key elements that have to be in place in order for a Certificate Authority to have any meaning for the organization it is designed to serve.

    Objectives:

    1. Examine the requirements surrounding the implementation of a CA.
    2. Examine the critical function that trust plays between CAs in a network built on trust.
    3. Examine the types of certificates in a trusted network.
    4. Implement a standalone Microsoft Certificate Authorities hierarchy.
    5. Implement a Microsoft Enterprise Root CA.
  • Linux Certificate Authorities: In this topic, you will examine the basics of certificate authorities on Linux.

    Objectives:

    1. Examine the requirements for implementing Certificate Authorities on a Linux platform.
    2. Examine multiple CA options on Linux.
    3. Prepare a Linux server for a CA implementation.
    4. Examine the fundamentals of LDAP.
    5. Install and configure a Linux CA package.
  • Managing Certificates: In this topic, you will examine issues related to the management of certificates. Depending upon the size of the organization and depending upon whether the CA is hosted internally or not, certificate issuance policies may vary.

    Objectives:

    1. Examine the management of certificates base on end entity needs.
    2. Create certificate requests and use a CA to generate the certificates for computers and users.
    3. Issue multiple types of digital certificates.
    4. Assign the issued certificate to the entity that requested it.
    5. Implement certificates on smart cards.
  • Local Resource Security: In this topic, you will examine multiple systems and technologies available to secure data stored locally on your computer.

    Objectives:

    1. Examine how Windows operating systems function.
    2. Configure Windows Encrypted File System (EFS).
    3. Configure a system to prevent users from using EFS.
    4. Implement EFS to protect files.
    5. Implement data security using biometrics.
  • Secure Email: In this topic, you will examine the current vulnerabilities of email and the reasons that plaintext is a serious security risk for any enterprise.

    Objectives:

    1. Examine the benefits and challenges of secure email.
    2. Implement PGP (Pretty Good Privacy) to secure email.
    3. Implement S/MIME to secure email.
    4. Explore other options to secure email.
  • Building Trusted Networks (Lab Only): In this topic, you will take the different pieces that you have worked with through the course and tie them together in a simulated environment.

    Objectives:

    1. Implement a multi-platform CA structure.
    2. Configure the CA hierarchy.
    3. Configure the Linux CA.
    4. Implement trusting CAs.
    5. Implement multi-platform secure email.
    6. Revoke certificates and verify revocation.
Jump to content