NDG Security+

Security+ is a vendor-neutral certification that proves competency in network security and risk management. Security+ labs focus on the principles and best practices in network security. Students gain hands-on practice in the skills needed to secure a network and prepare for industry certification.

Coming Soon: These labs are currently in development/QA, release date to be announced. The details provided below are subject to change. Additional information on enabling these labs will be added to this page when available.

Security+ Supported Labs

Lab Title Mappings to Exam Objectives
1 ARP Poisoning Attack and Mitigation Techniques 1.2: Compare and contrast type of attacks
2 Password Cracking with Linux 1.2: Compare and contrast type of attacks
3 Password Cracking with Windows 2.2: Given a scenario use appropriate software tools to assess the security posture of an organization
1.2: Compare and contrast type of attacks
4 Performing Active Reconnaissance with Windows 1.4: Explain penetration testing concepts
5 Performing Active Reconnaissance with Linux 2.2: Given a scenario, use appropriate software tools to assess the security posture of an organization 1.5: Explain Vulnerability scanning concepts
6 Wireless Networking Attack and Mitigation Techniques 1.2: Compare and contrast type of attacks
7 Analyze and Differentiate Types of Attacks and Mitigations Techniques 1.2: Compare and contrast type of attacks
8 Analyze and Differentiate Types of Malware and Application Attacks 1.1: Given a scenario, analyze indicators of compromise and determine the types of malware
9 Analyzing Types of Web Application Attacks 1.2: Compare and contrast type of attacks
10 Basic Command Line Tool Techniques 2.2: Given a scenario use appropriate software tools to assess the security posture of an organization
11 Configuring a Network-Based Firewall 2.1: Install and configure network components, both hardware and software-based, to support organizational security
3.2: Given a scenario, implement secure network architecture
12 Identifying & Analyzing Network/Host Intrusion Detection System Alerts 2.3: Given a scenario, troubleshoot common security issues
13 Secure Network Administration Principles Log Analysis 2.3: Given a scenario, troubleshoot common security issues
14 Configuring a Proxy Server 2.1: Install and configure network components, both hardware and software, to support organizational security
15 Implementing Common Protocols and Services for Basic Security Practices 2.1: Install and configure network components, both hardware and software-based, to support organizational security
2.6: Given a scenario implement secure protocols
16 Working with Android 2.5: Given a scenario deploy devices securely
17 Connecting to a Remote System 2.2: Given a scenario, use appropriate software tools to assess the security posture of an organization
2.6: Given a scenario, implement secure protocols
18 Capturing Network Traffic 2.2: Given a scenario, use appropriate software tools to assess the security posture of an organization
19 Incident Response Procedures 1.2: Compare and contrast types of attacks
5.4: Given a scenario, follow incident response procedures
20 Cryptography Concepts 2.2: Given a scenario use appropriate software tools to assess the security posture of an organization
21 Configuring a RADIUS Server with Windows 2.1: Install and configure network components, both hardware and software, to support organizational security
22 Windows Server Account Management and GPOs 4.4: Given a scenario, differentiate common account management practices
23 Linux Account Management 4.4: Given a scenario, differentiate common account management practices
24 PKI Management with Windows 6.4: Given a scenario implement public key infrastructure
25 Performing Backups 5.6: Explain disaster recovery and continuity of operations concepts
26 Securing Data with Encryption Software 6.1: Compare and contrast basic concepts of cryptography