I. Security Attacks and Cryptography
A. Section A
1. Notes: Introduction to Security
2. Textbook Reading: Chapter 1
3. Study Aid: Unit 1 Section A: Flash Cards
4. Unit 1: Section A Videos
5. Watch Unit 1: Section A Videos Here
6. PowerPoint: Introduction to Security
7. Study Aid: Unit 1 Section A: Matching Game
8. Answer Key: End of Chapter 1 Textbook Questions
9. Study Aid: Unit 1 Section A: Learning Game
10. Quiz 1
B. Section B
1. Notes: Malware and Social Engineering Attacks
2. Textbook Reading: Chapter 2
3. Study Aid: Unit 1 Section B: Flash Cards
4. Unit 1: Section B Videos
5. Watch Unit 1: Section B Videos Here
6. PowerPoint: Malware and Social Engineering Attacks
7. Study Aid: Unit 1 Section B: Matching Game
8. Answer Key: End of Chapter 2 Textbook Questions
9. Study Aid: Unit 1 Section B: Learning Game
10. Quiz 2
11. Lab: Social Engineering Reconnaissance
C. Section C
1. Notes: Basic Cryptography
2. Textbook Reading: Chapter 3
3. Study Aid: Unit 1 Section C: Flash Cards
4. Unit 1: Section C Videos
5. Watch Unit 1: Section C Videos Here
6. PowerPoint: Basic Cryptography
7. Study Aid: Unit 1 Section C: Matching Game
8. Answer Key: End of Chapter 3 Textbook Questions
9. Study Aid: Unit 1 Section C: Learning Game
10. Quiz 3
D. Completion
1. Study Aid: Unit 1: Flash Cards
2. Study Aid: Unit 1: Matching Game
3. Study Aid: Unit 1: Learning Game
4. Exam 1
II. Security and Networking
A. Section A
1. Notes: Advanced Cryptography and PKI
2. Textbook Reading: Chapter 4
3. Study Aid: Unit 2 Section A: Flash Cards
4. Unit 2: Section A Videos
5. Watch Unit 2: Section A Videos Here
6. PowerPoint: Advanced Cryptography and PKI
7. Study Aid: Unit 2 Section A: Matching Game
8. Answer Key: End of Chapter 4 Textbook Questions
9. Study Aid: Unit 2 Section A: Learning Game
10. Quiz 4
11. Lab: Understanding PKI Concepts
B. Section B
1. Notes: Application and Networking-Based Attacks
2. Textbook Reading: Chapter 5
3. Study Aid: Unit 2 Section B: Flash Cards
4. Unit 2: Section B Videos
5. Watch Unit 2: Section B Videos Here
6. PowerPoint: Networking and Server Attacks
7. Study Aid: Unit 2 Section B: Matching Game
8. Answer Key: End of Chapter 5 Textbook Questions
9. Study Aid: Unit 2 Section B: Learning Game
10. Quiz 5
11. Lab: Implementing DNSSEC
12. Lab: Protocols and Services - SNMP
C. Section C
1. Notes: Network Security Devices, Design, and Technology
2. Textbook Reading: Chapter 6
3. Study Aid: Unit 2 Section C: Flash Cards
4. Unit 2: Section C Videos
5. Watch Unit 2: Section C Videos Here
6. PowerPoint: Network Security Devices, Design, and Technology
7. Study Aid: Unit 2 Section C: Matching Game
8. Answer Key: End of Chapter 6 Textbook Questions
9. Study Aid: Unit 2 Section C: Learning Game
10. Quiz 6
11. Lab: Firewall Rule Based Management
12. Lab: Firewalls and Evasion
13. Lab: NAT and OpenSSH
14. Lab: Install and Configure Network Load Balancing
D. Completion
1. Study Aid: Unit 2: Flash Cards
2. Study Aid: Unit 2: Matching Game
3. Study Aid: Unit 2: Learning Game
4. Exam 2
III. Securing Networks and Clients
A. Section A
1. Notes: Administering a Secure Network
2. Textbook Reading: Chapter 7
3. Study Aid: Unit 3 Section A: Flash Cards
4. Unit 3: Section A Videos
5. Watch Unit 3: Section A Videos Here
6. PowerPoint: Administering a Secure Network
7. Study Aid: Unit 3 Section A: Matching Game
8. Answer Key: End of Chapter 7 Textbook Questions
9. Study Aid: Unit 3 Section A: Learning Game
10. Quiz 7
11. Lab: Application Data - Establish Host Security
12. Lab: Implementing a Network Policy Server
B. Section B
1. Notes: Wireless Network Security
2. Textbook Reading: Chapter 8
3. Study Aid: Unit 3 Section B: Flash Cards
4. Unit 3: Section B Videos
5. Watch Unit 3: Section B Videos Here
6. PowerPoint: Wireless Network Security
7. Study Aid: Unit 3 Section B: Matching Game
8. Answer Key: End of Chapter 8 Textbook Questions
9. Study Aid: Unit 3 Section B: Learning Game
10. Quiz 8
11. Lab: Network Vulnerabilities Part 1
12. Lab: Network Vulnerabilities Part 2
13. Lab: Password Cracking Tools
C. Section C
1. Notes: Client and Application Security
2. Textbook Reading: Chapter 9
3. Study Aid: Unit 3 Section C: Flash Cards
4. Unit 3: Section C Videos
5. Watch Unit 3: Section C Videos Here
6. PowerPoint: Client and Application Security
7. Study Aid: Unit 3 Section C: Matching Game
8. Answer Key: End of Chapter 9 Textbook Questions
9. Study Aid: Unit 3 Section C: Learning Game
10. Quiz 9
11. Lab: Data Encryption
D. Completion
1. Study Aid: Unit 3: Flash Cards
2. Study Aid: Unit 3: Matching Game
3. Study Aid: Unit 3: Learning Game
4. Exam 3
IV. Mobile Security and Access Management
A. Section A
1. Notes: Mobile and Embedded Device Security
2. Textbook Reading: Chapter 10
3. Study Aid: Unit 4 Section A: Flash Cards
4. Unit 4: Section A Videos
5. Watch Unit 4: Section A Videos Here
6. PowerPoint: Mobile and Embedded Device Security
7. Study Aid: Unit 4 Section A: Matching Game
8. Answer Key: End of Chapter 10 Textbook Questions
9. Study Aid: Unit 4 Section A: Learning Game
10. Quiz 10
B. Section B
1. Notes: Authentication and Account Management
2. Textbook Reading: Chapter 11
3. Study Aid: Unit 4 Section B: Flash Cards
4. Unit 4: Section B Videos
5. Watch Unit 4: Section B Videos Here
6. PowerPoint: Authentication and Account Management
7. Study Aid: Unit 4 Section B: Matching Game
8. Answer Key: End of Chapter 11 Textbook Questions
9. Study Aid: Unit 4 Section B: Learning Game
10. Quiz 11
11. Lab: Implementing AD Federation Services
12. Lab: Configuring RADIUS
C. Section C
1. Notes: Access Management
2. Textbook Reading: Chapter 12
3. Study Aid: Unit 4 Section C: Flash Cards
4. Unit 4: Section C Videos
5. Watch Unit 4: Section C Videos Here
6. PowerPoint: Access Management
7. Study Aid: Unit 4 Section C: Matching Game
8. Answer Key: End of Chapter 12 Textbook Questions
9. Study Aid: Unit 4 Section C: Learning Game
10. Quiz 12
11. Lab: Implement Patching using WSUS
D. Completion
1. Study Aid: Unit 4: Flash Cards
2. Study Aid: Unit 4: Matching Game
3. Study Aid: Unit 4: Learning Game
4. Exam 4
V. Business Continuity and Risk Mitigation
A. Section A
1. Notes: Vulnerability Assessment and Data Security
2. Textbook Reading: Chapter 13
3. Study Aid: Unit 5 Section A: Flash Cards
4. Unit 5: Section A Videos
5. Watch Unit 5: Section A Videos Here
6. PowerPoint: Vulnerability Assessment and Data Security
7. Study Aid: Unit 5 Section A: Matching Game
8. Answer Key: End of Chapter 13 Textbook Questions
9. Study Aid: Unit 5 Section A: Learning Game
10. Quiz 13
11. Lab: Scanning and Remediating Vulnerabilities with OpenVAS
B. Section B
1. Objective 5.6: Explain disaster recovery and continuity of operation concepts.
2. Notes: Business Continuity
3. Textbook Reading: Chapter 14
4. Study Aid: Unit 5 Section B: Flash Cards
5. Unit 5: Section B Videos
6. Watch Unit 5: Section B Videos Here
7. PowerPoint: Business Continuity
8. Study Aid: Unit 5 Section B: Matching Game
9. Answer Key: End of Chapter 14 Textbook Questions
10. Study Aid: Unit 5 Section B: Learning Game
11. Quiz 14
12. Lab: Configuring IDS and Honeypots
13. Lab: Backup and Recovery
14. Lab: Managing Local Storage and Virtual Hard Disks
15. Lab: Introduction to Digital Forensics
C. Section C
1. Notes: Risk Mitigation
2. Textbook Reading: Chapter 15
3. Study Aid: Unit 5 Section C: Flash Cards
4. Unit 5: Section C Videos
5. Watch Unit 5: Section C Videos Here
6. PowerPoint: Risk Mitigation
7. Study Aid: Unit 5 Section C: Matching Game
8. Answer Key: End of Chapter 15 Textbook Questions
9. Study Aid: Unit 5 Section C: Learning Game
10. Quiz 15
11. Lab: Managing Certificates
12. Lab: Implementing Software RAID
D. Completion
1. Study Aid: Unit 5: Flash Cards
2. Study Aid: Unit 5: Matching Game
3. Study Aid: Unit 5: Learning Game
4. Exam 5
VI. Business Continuity and Risk Mitigation
A. Course Completion
1. Textbook Reading: Review
2. Study Aid: Final Review: Flash Cards
3. Practice Final Exam Quiz
4. Study Aid: Final Review: Matching Game
5. Course Completion Survey Feedback
6. Study Aid: Final Review: Learning Game
7. Final Exam
1. Can I register for
programs if I am an international student?
Yes, because ed2go programs are online you never
have to
actually travel to the school. Most
schools offer telephone or online registration.
2. How long does it
take to complete a program?
All of our programs are self-paced and open
enrollment, so
you can start them when you want and finish them at your own pace. When you register, you'll receive six (6)
months to complete the program.
3. What if I don't
have enough time to complete my program within the time frame provided?
The time allotted to complete your program has
been
calculated based on the number of hours for each program, so don't
worry too
much about not completing in time. If, after a concerted effort, you
are still
unable to complete, your Student Advisor will help you work out a
suitable
completion date. Please note that a fee may be charged for an extension.
4. Do I have to buy
additional materials?
No, you will receive a book with your
registration.
5. Can I get
financial
assistance?
ed2go courses are non-credit courses, so they do
not qualify
for federal aid. In some states,
vocational rehab or workforce development boards will pay for qualified
students to take our courses.
Additionally, some students may qualify for financial assistance
when
they enroll, if they meet certain requirements.
6. What happens when
I complete the program?
Upon successful completion of the program, you
will be
awarded a certificate of completion.
7. Am I guaranteed a
job?
ed2go programs will provide you with the skills
you need to
obtain an entry-level position in most cases.
We don't provide direct job placement services, but our
facilitators and
career counselors will help you build your resume and are available to
give
advice on finding your first job.
Facilitators will also be available to use as a professional
reference
upon completion of the program.
Potential students should always do research on the job market
in their
area before registering.
8. Who will be my
instructor?
Each student is paired with a facilitator for
one-on-one
interaction. The facilitator will be
available (via e-mail) to answer any questions you may have and to
provide
feedback on your performance. All of our
facilitators are successful working professionals in the fields in
which they
teach.
9. What software or
hardware do I need in order to take online programs and what are the
system
requirements?
In order to take our online programs, you must
have access
to a computer and the Internet. You can
access the program contents from any Web-enabled computer.
You don't have to use the same computer to
log-in to the program every time. We
recommend that you have a word-processing program (Microsoft Word is
the best)
and the latest version of Internet Explorer.
10. Can I use a Mac?
Yes
11. How can I get
more information about this program?
If you have questions that are not answered on our
website,
please feel free to contact us via LIVE chat (click the button above). If you are visiting us during non-business
hours, please feel free to send us a question using the "Contact Us"
form to
the right. You may also call us at
1-877-221-5151. We will answer your
questions promptly.
12. When can I start
the program?
Our programs are all open enrollment.
You can register and start the program as
soon as you are ready.
Please note: Once the
program curriculum is accessed online or through submission of a
material
shipment confirmation, refunds cannot be issued.
13. Does this program
prepare for a certification?
Yes, CompTIA Security+ SYO-501.