CompTIA Security+ is a five-day course that teaches competency in network security, compliance and operational security, threats and vulnerabilities, application, data and host security, access control and identity management, as well as cryptography. The course includes lectures, demonstrations, and hands-on exercises that provide real-world experience.
Registration includes: Classroom training, certification exam voucher, course book, study materials, Exam Pass Guarantee, snacks, beverages, and peer networking opportunities.
Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.
Recent updates ensure the exam keeps pace with the evolving security landscape. Security+ is developed by leading IT experts and industry-wide survey feedback.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. The CompTIA Security+ Certification is Department of Defense (DoD) 8570 approved for the following Information Assurance (IA) position categories:
Information Assurance Technical (IAT) Level II
Information Assurance Management (IAM) Level I
In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security while learning how to:
Identify the fundamental components of information security.
Identify various threats to information security.
Conduct security assessments to detect vulnerabilities.
Implement security for hosts and software.
Implement security for networks.
Manage identity and access.
Implement cryptographic solutions in the organization.
Implement security at the operational level.
Address security incidents.
Ensure the continuity of business operations in the event of an incident.
Identifying Security Fundamentals
Identify Information Security Concepts
Identify Basic Security Controls
Identify Basic Authentication and Authorization Concepts
Identify Basic Cryptography Concepts
Analyze Organizational Risk
Analyze the Business Impact of Risk
Identifying Security Threats
Identify Types of Attackers
Identify Social Engineering Attacks
Identify Software-Based Threats
Identify Network-Based Threats
Identify Wireless Threats
Identify Physical Threats
Conducting Security Assessments
Implement Penetration Testing
Implementing Host and Software Security
Implement Host Security
Imp lement Cloud and Virtualization Security
Implement Mobile Device Security
Incorporate Security in the Software Development Lifecycle
Implementing Network Security
Configure Network Security Technologies
Secure Network Design Elements
Implement Secure Networking Protocols and Services
Secure Wireless Traffic
Managing Identity and Access
Implement Identity and Access Management
Configure Directory Services
Configure Access Services
Identify Advanced Cryptography Concepts
Select Cryptographic Algorithms
Configure a Public Key Infrastructure
Back Up and Restore Certificates and Private Keys
Implementing Operational Security
Evaluate Security Frameworks and Guidelines
Incorporate Documentation in Operational Security
Implement Security Strategies
Manage Data Security Processes
Implement Physical Controls
Addressing Security Incidents
Troubleshoot Common Security Issues
Respond to Security Incidents
Investigate Security Incidents
Ensuring Business Continuity
Select Business Continuity and Disaster Recovery Processes
Develop a Business Continuity Plan