Advanced Security Implementation

Course Specifications

Course number: 079540
Course length: 5
Software: PBC N/A

Course Description

This course is designed to provide the foundation knowledge to network administrators and security professionals who are seeking to learn about advanced security issues surrounding PKI and biometrics. Advanced Security Implementation is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the second level of the Security Certified Program. This course is followed by Enterprise Security Solutions (ESS).

Prerequisites:  To ensure your success, you are strongly recommended to first take the following Element K courses or have equivalent knowledge:

Delivery Method:  Instructor-led, group-paced, classroom-delivery learning model with structured, hands-on activities.

Hardware/Software Requirements

You will need:


Performance-Based Objectives


Course Content

Lesson 1: Introduction to Trusted Networks
Topic 1A: The Need For Trusted Networks
Topic 1B: Authentication and Identification
Topic 1C: Public Key Infrastructure
Topic 1D: Applications of PKI

Lesson 2: Cryptography and Data Security
Topic 2A: History of Cryptography
Topic 2B: Math and Algorithms
Topic 2C: Private Key Exchange
Topic 2D: Public Key Exchange
Topic 2E: Message Authentication

Lesson 3: Computer Forensics
Topic 3A: Incident Response
Topic 3B: Computer Forensic Fundamentals
Topic 3C: Hard Disk Structure
Topic 3D: Forensic Tools
Topic 3E: Investigating Computers
Topic 3F: Computer Forensics Solutions

Lesson 4: Law and Legislation
Topic 4A: Intellectual Property
Topic 4B: Categories and Types of Law
Topic 4C: Process of Handling Evidence
Topic 4D: Information Security-related Laws and Acts

Lesson 5: Biometrics—Who You Are
Topic 5A: The Process of Biometrics Today
Topic 5B: Accuracy of Biometrics
Topic 5C: Applications of Biometrics
Topic 5D: Fingerprint Scanning
Topic 5E: Facial Scanning
Topic 5F: Iris and Retinal Scanning
Topic 5G: Vocal Scanning
Topic 5H: Further Biometric Technologies
Topic 5I: Techniques for Compromising Biometrics

Lesson 6: Strong Authentication
Topic 6A: Why Strong Authentication
Topic 6B: Authentication Tokens
Topic 6C: RSA SecurID
Topic 6D: Smart Cards

Lesson 7: Digital Certificates
Topic 7A: Paper Certificates and Identity Cards
Topic 7B: Authorities that Issue Physical Certificates
Topic 7C: The Importance of Protecting the Identity of the CA
Topic 7D: Differences between Physical and Digital Certificates
Topic 7E: Standards for Digital Certificates
Topic 7F: X.509 as an Authentication Standard
Topic 7G: Case Study—VeriSign’s Digital Certificates

Lesson 8: Digital Signatures
Topic 8A: Signatures as Identifiers
Topic 8B: Features of Digital Signatures
Topic 8C: Digital Signatures in Practice
Topic 8D: Standards for Digital Signatures
Topic 8E: Digital Signatures and PKI

Appendix A: About FIPS PUB
Federal Information Processing Standards Publication

Appendix B: PKI-related Acronyms
PKI-related Acronyms