Course Overview
Courses in bundle: Security+ (with exam), CISM, CISSP, EC-Council Certified Encryption Specialist, COMSEC Resources
8140 DCWF Work Role: COMSEC Manager (Work Role Code: 723)
NICE Work Role: Communications Security (COMSEC) Management (Nice Work Role ID: OG-WRL-001)
Combined Work Role Description: Responsible for managing the Communications Security (COMSEC) resources of an organization, including all aspects of COMSEC as outlined in CNSSI No. 4009.
High-level bundle description: This bundle was intricately designed to equip participants with the knowledge and skills necessary to develop the abilities to accomplish defined tasks (KSATs) associated with the NICE and 8140 DCWF Work Roles for Cybersecurity Policy and Strategic Planning. It Incorporates Online Self-Paced Instructor Led Training and labs, covering content for the CompTIA Security+, CISM, CISSP and EC-Council Certified Encryption Specialist (ECES) certifications.
Requirements for certification: To earn the ITI certification and be awarded the applied micro degree, the student must complete all courses and pass the exams for the CompTIA Security+, ISACA CISM or ISC2 CISSP and EC-Council ECES certifications.
Recommended prerequisites, certification validity and renewals: Visit our dedicated webpage for more information and vendor links.
Specific COMSEC Resources: The COMSEC references included in this bundle are designed to enhance understanding and implementation of Communications Security (COMSEC) protocols, primarily based on the Department of the Navy, Marine Corps and Coast Guard requirements, but applicable to most federal positions. Students will be asked to take an open book exam based on these materials.
Topics Covered (estimated 24-32 hours to review and complete final exam):
1. Introduction to COMSEC
- Purpose and Scope: Protect sensitive and classified information from unauthorized access.
- Key Elements: Transmission Security (TRANSEC), Cryptographic Security, Physical Security, Emissions Security (TEMPEST).
2. Transmission Security (TRANSEC)
- Modes of Transmission: Electromagnetic (radio, telephone, email) and non-electromagnetic (face-to-face, hand delivery).
- Protection Measures: Frequency changes, secure communications, authentication, use of authorized codes.
3. Cryptographic Security
- Crypto Systems: Design and use of secure cryptographic systems.
- Best Practices: Follow operating instructions, perform key changes, limit access, use approved key material.
4. Physical Security
- Storage and Handling: Use GSA-approved containers, maintain surveillance during working hours, conduct end-of-day security checks.
- Control Access Areas (CAA): Limit access to authorized personnel only, use identification methods like personal recognition, access lists, security badges.
5. Emissions Security (TEMPEST)
- Purpose: Prevent unauthorized access to information through electromagnetic emanations.
- Countermeasures: Implement TEMPEST standards, use appropriate physical security, apply specific countermeasures based on system vulnerability analysis.
6. Information and Classifications
- Types of Information: Top Secret, Secret, Confidential, For Official Use Only (FOUO), Sensitive but Unclassified (SBU).
- Handling: Ensure proper marking, storage, and dissemination procedures to prevent unauthorized disclosure.
7. Security Incidents
- Types: Personnel, physical, and cryptographic insecurities.
- Reporting: Immediate reporting of suspected incidents, use of secure communication channels, follow documented reporting procedures.
8. COMSEC Custodian Responsibilities
- Role: Handle and safeguard COMSEC materials, manage inventories, ensure proper storage.
- Key Tasks: Conduct regular inventories, oversee the destruction of unneeded materials, manage access control, report incidents.
9. COMSEC Incident Management
- Types of Incidents: Unauthorized disclosure, physical insecurities, cryptographic insecurities.
- Response Procedures: Notify the Responsible COMSEC Officer, document the incident, secure compromised materials, conduct investigations, implement corrective actions.
10. Common Fill Device (CFD)
- Purpose: Securely load cryptographic keys into communication equipment.
- Significance: Ensures secure exchange of encrypted information.
11. Responsible COMSEC Officer (RCO)
- Role: Oversee the implementation and management of the COMSEC program.
- Responsibilities: Ensure compliance with policies, address security incidents, manage overall COMSEC operations.
CTI CISSP Description: The Certified Information Systems Security Professional (CISSP) course is designed to provide comprehensive training in the field of cybersecurity. This course covers key concepts such as Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. Each module delves deep into the principles and practices necessary for securing and managing information systems effectively. This course includes 19+ hours of ILT broken up into over 45 videos and 8 topics and provides over 250 exam preparation questions, as well as 25 hours of labs.
Topics Covered (19+ hours):
- Module 1: Security and Risk Management
- Module 2: Asset Security
- Module 3: Security Architecture and Engineering
- Module 4: Communication and Network Security
- Module 5: Identity and Access Management (IAM)
- Module 6: Security Assessment and Testing
- Module 7: Security Operations
- Module 8: Software Development Security
Labs Included (25 hours):
- Introduction to CISSP
- Security and Risk Management
- Encryption and Hashing
- SCCM Configuration Items and Baselines
- Implement OpenPGP
- Two factor Authentication with SSH
- Implement SSL VPN using ASA Device Manager
- Configure and Verify IPv4 and IPv6 Access Lists for Traffic Filtering
- Configuring IPtables
- Windows Command Line Tools
- Administering and Deploying Endpoint Protection
- Bitlocker on Portable Media
- Managing Remote Desktop
- Manage Role-based Security
- Configuring MBSA Scanner
- Compliance Patching
- Passive Topology Discovery
- Scanning and Remediating Vulnerabilities with OpenVAS
- Installing Kali
- Implement Backup and Recovery
- Installation and Verification of Snort
- Configuring and Securing IIS
- Upgrading and Securing SSH Connection
- DVWA – Manual SQL Injection and Password Cracking
CTI Custom Online Self-Paced Security+ ILT with Labs Description: Master cybersecurity with our Security+ 701 Online, Self-Paced ILT Course, designed for aspiring security specialists, network administrators, and IT auditors. This course covers essential cybersecurity principles and practices, aligning with the latest trends and techniques. Gain the core skills necessary to protect against digital threats and excel in today’s dynamic IT security landscape. Included in this course is 30 hours of content, delivered over 100+ short easily digestible videos, covering 5 topic areas, and providing more than 250 prep practice questions. Once purchased, you have 12 months’ access to the course.
- Certificate of Completion for CompTIA Security+ SY0-701
Topics Areas Included:
- Fundamental Security Concepts
- Threat Types Comparison
- Cryptographic Solutions
- Identity and Access Management
- Securing Enterprise and Cloud Network Architectures
- Resiliency and Site Security
- Vulnerability Management
- Network Security Capabilities
- Endpoint Security Capabilities
- Application Security Capabilities
- Incident Response and Monitoring
- Indicators of Malicious Activity
- Security Governance Concepts
- Risk Management Processes
- Data Protection and Compliance Concepts
Modules include (30 hours):
- Module 1 – SY0-701 General Security Concepts
- Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
- Module 3 – SY0-701 Security Architecture
- Module 4 – SY0-701 Security Operations
- Module 5 – SY0-701 Security Program Management and Oversight
Labs Included (17 hours):
- Security Concept Fundamentals
- Cryptographic Solutions
- Threat Vectors and Attack Surfaces
- Identifying Security Vulnerabilities
- Analyze Malicious Activity
- Mitigation Techniques
- Security Architecture Models
- Securing Enterprise Infrastructures
- Data Protection Strategies
- Resilience in Security Architecture
- Securing Computing Resources
- Asset Management Techniques
- Vulnerability Management
- Monitoring Computing Resources
- Enhancing Enterprise Security
- Implement Identity & Access Management
- Implementation of Automation & Orchestration for Security Operations
- Investigative Data Sources
Official CompTIA CertMaster Learn with Integrated CertMaster Labs Description
Security+ CertMaster Learn is a comprehensive eLearning experience that helps learners gain the knowledge and practical skills necessary to be successful on CompTIA certification exams, and in their IT career. A Learning Plan helps learners stay on track with their studies, while robust analytics bring awareness of strengths and weaknesses.
CertMaster Labs make it easy for learners to practice and apply their skills in real workplace scenarios in preparation for the certification exam. All lab activities use real equipment and software, offer feedback and hints, and provide a score based on learner inputs, ultimately guiding learners to the most correct and efficient path through job tasks.
In the integrated experience, CertMaster Labs are integrated as Study Tasks within the CertMaster Learn Learning Plan, accessible through a single login and seamless workflow.
- Lessons cover all exam objectives with integrated videos
- Hundreds of practice questions test your knowledge
- Performance-based questions apply what you’ve learned in a scenario
- Assisted Labs guide you step-by-step through tasks
- Applied Labs present goal-oriented scenarios and require critical thinking and analysis
- Flashcards ensure you know the terminology and acronyms required for the exam
- The Learning Plan keeps you on track with your studies
Topics Covered
- Lesson 1: Summarize Fundamental Security Concepts
- Lesson 2: Compare Threat Types
- Lesson 3: Explain Cryptographic Solutions
- Lesson 4: Implement Identity and Access Management
- Lesson 5: Secure Enterprise Network Architecture
- Lesson 6: Secure Cloud Network Architecture
- Lesson 7: Explain Resiliency and Site Security Concepts
- Lesson 8: Explain Vulnerability Management
- Lesson 9: Evaluate Network Security Capabilities
- Lesson 10: Assess Endpoint Security Capabilities
- Lesson 11: Enhance Application Security Capabilities
- Lesson 12: Explain Incident Response and Monitoring Concepts
- Lesson 13: Analyze Indicators of Malicious Activity
- Lesson 14: Summarize Security Governance Concepts
- Lesson 15: Explain Risk Management Processes
- Lesson 16: Summarize Data Protection and Compliance Concepts
Labs Available:
- Assisted Lab: Exploring the Lab Environment
- Assisted Lab: Perform System Configuration Gap Analysis
- Assisted Lab: Configuring Examples of Security Control Types
- Assisted Lab: Finding Open Service Ports
- Assisted Lab: Using SET to Perform Social Engineering
- Applied Lab: Using Storage Encryption
- Assisted Lab: Using Hashing and Salting
- Assisted Lab: Managing Password Security
- Assisted Lab: Managing Permissions
- Assisted Lab: Setting up Remote Access
- Assisted Lab: Using TLS Tunneling
- Assisted Lab: Using Containers
- Assisted Lab: Using Virtualization
- Assisted Lab: Implement Backups
- Assisted Lab: Performing Drive Sanitization
- Assisted Lab: Exploiting and Detecting SQLi
- Assisted Lab: Working with Threat Feeds
- Assisted Lab: Performing Vulnerability Scans
- Assisted Lab: Understanding Security Baselines
- Applied Lab: Implementing a Firewall
- Assisted Lab: Using Group Policy
- Applied Lab: Hardening
- Assisted Lab: Performing DNS Filtering
- Assisted Lab: Configuring System Monitoring
- Applied Lab: Incident Response: Detection
- Applied Lab: Performing Digital Forensics
- Assisted Lab: Performing Root Cause Analysis
- Assisted Lab: Detecting and Responding to Malware
- Assisted Lab: Understanding On-Path Attacks
- Adaptive Lab: Using a Playbook
- Assisted Lab: Implementing Allow Lists and Deny Lists
- Assisted Lab: Performing Reconnaissance
- Assisted Lab: Performing Penetration Testing
- Assisted Lab: Training and Awareness through Simulation
- Capstone Lab: Discovering Anomalous Behavior
- Assisted Lab: Use Cases of Automation and Scripting
- Applied Lab: Using Network Sniffers
License Information
One license provides access to CertMaster Learn for Security+ (SY0-701) with CertMaster Labs integrated throughout the course and ITU custom Security+ training and labs.
Once activated, the license is valid for 12 months
How to Access the training and labs
An access key and instructions will be sent via email after your purchase is complete.
Exam Voucher and Exam Pass Guarantee
This bundle includes an Security+ exam voucher and an exam pass guarantee: if you don’t pass the exam on the first try, we will provide a second voucher and another 12 months of access to our custom online self-paced ILT. In order to qualify for the exam pass guarantee, you have to show proof that you completed all training materials, to include course content, labs and practice prep questions prior to taking your exam.
CTI CISM Course Description: This intensive training course is tailored for professionals looking to excel in information security management. It covers essential topics such as information security governance, risk management, program development, and incident management, equipping participants with the skills to develop and enforce robust security frameworks and best practices within their organizations. Participants will engage in practical applications and in-depth studies of security architecture, risk assessment, and incident response, all aimed at preparing them for the CISM certification exam and advancing their careers in information security management. This course includes over 17 hours of ILT covered over 45+ videos and 6 topic areas and provides 100 exam preparation questions.
Course Outline (17 hours):
Module 1: Introduction
- Instructor Introduction
- Course Introduction
- Exam Overview
Module 2: Information Security Governance
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
- Module Overview
- Alignment and Resource Management – Task and Knowledge
- Key Relationships
- Standards Awareness and Training – Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices – Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
Module 5: Information Security Incident Management
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment – Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
Module 6: Exam Prep
- Case Study – Security On a Shoestring Budget
- Case Study – APT In Action
- Summary
- Exam Prep
Official Online Self-Paced EC-Council Certified Encryption Specialist (ECES): The EC-Council CertifiedEncryption Specialist (ECES) program introduces professionals and studentsto the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the detailsof algorithms such as FeistelFunctions, DES, and AES. ECES provides necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course covering various algorithms and the key concepts behind those algorithms.
Course Outline (20 hours over 3 days):
Module 01: Introduction and History of Cryptography
- Overview: What is Cryptography?, History of Cryptography
- Ciphers: Mono-Alphabet Substitution (e.g., Caesar Cipher, Atbash Cipher), Multi-Alphabet Substitution (e.g., Vigenère Cipher, Playfair Cipher), Homophonic Substitution, Null and Book Ciphers, Rail Fence Ciphers
- Tools and Machines: The Enigma Machine, CrypTool
Module 02: Symmetric Cryptography and Hashes
- Fundamentals: Symmetric Cryptography, Information Theory, Kerckhoffs’s Principle, Substitution and Transposition, Binary Math
- Algorithms: Block vs. Stream Ciphers, Symmetric Block Ciphers (e.g., DES, AES, Blowfish, Twofish), Symmetric Stream Ciphers (e.g., RC4), Hash Functions (e.g., MD5, SHA, RIPEMD-160)
- Tools: CryptoBench
Module 03: Number Theory and Asymmetric Cryptography
- Basics: Asymmetric Encryption, Number Theory, Birthday Theorem, Random Number Generators
- Key Algorithms: Diffie-Hellman, RSA, Digital Signature Algorithm, Elliptic Curve, Elgamal
- Tools: CrypTool
Module 04: Applications of Cryptography
- Standards and Certificates: FIPS Standards, Digital Signatures, Public Key Infrastructure (PKI), Digital Certificate Management, Trust Models
- Encryption in Practice: Wi-Fi Encryption, SSL/TLS, VPNs, File and Disk Encryption (e.g., BitLocker, VeraCrypt), Steganography
- Common Mistakes and Best Practices: Common Cryptography Mistakes, Unbreakable Encryption, Steganalysis Tools
Module 05: Cryptanalysis
- Techniques: Breaking Ciphers, Frequency Analysis, Kasiski Examination, Linear and Differential Cryptanalysis, Integral Cryptanalysis
- Tools and Successes: Cryptanalysis Resources, Rainbow Tables, Password Cracking
License Information
One license provides access to the course.
Once activated, the license is valid for 12 months
How to Access the training and labs
An access key and instructions will be sent via email after your purchase is complete.
Exam Voucher and Exam Pass Guarantee
This bundle includes EC-Council Certified Encryption Specialist exam voucher and one retake. The exam can be taken online through the EC-Council’s remote proctoring service or at authorized testing centers.