CompTIA Security+


CompTIA Security+


CompTIA Security+ is a five-day course that teaches competency in network security, compliance and operational security, threats and vulnerabilities, application, data and host security, access control and identity management, as well as cryptography. The course includes lectures, demonstrations, and hands-on exercises that provide real-world experience.


Registration includes: Classroom training, certification exam voucher, course book, study materials, Exam Pass Guarantee, snacks, beverages, and peer networking opportunities.


  • Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.

  • Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.

  • Recent updates ensure the exam keeps pace with the evolving security landscape. Security+ is developed by leading IT experts and industry-wide survey feedback.

  • Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. The CompTIA Security+ Certification is Department of Defense (DoD) 8570 approved for the following Information Assurance (IA) position categories:

    • Information Assurance Technical (IAT) Level II

    • Information Assurance Management (IAM) Level I

In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security while learning how to:

  • Identify the fundamental components of information security.

  • Analyze risk.

  • Identify various threats to information security.

  • Conduct security assessments to detect vulnerabilities.

  • Implement security for hosts and software.

  • Implement security for networks.

  • Manage identity and access.

  • Implement cryptographic solutions in the organization.

  • Implement security at the operational level.

  • Address security incidents.

  • Ensure the continuity of business operations in the event of an incident.

Course outline

Identifying Security Fundamentals

  • Identify Information Security Concepts

  • Identify Basic Security Controls

  • Identify Basic Authentication and Authorization Concepts

  • Identify Basic Cryptography Concepts

Analyzing Risk

  • Analyze Organizational Risk

  • Analyze the Business Impact of Risk

Identifying Security Threats

  • Identify Types of Attackers

  • Identify Social Engineering Attacks

  • Identify Malware

  • Identify Software-Based Threats

  • Identify Network-Based Threats

  • Identify Wireless Threats

  • Identify Physical Threats

Conducting Security Assessments

  • Identify Vulnerabilities

  • Assess Vulnerabilities

  • Implement Penetration Testing

Implementing Host and Software Security

  • Implement Host Security

  • Imp lement Cloud and Virtualization Security

  • Implement Mobile Device Security

  • Incorporate Security in the Software Development Lifecycle

Implementing Network Security

  • Configure Network Security Technologies

  • Secure Network Design Elements

  • Implement Secure Networking Protocols and Services

  • Secure Wireless Traffic

Managing Identity and Access

  • Implement Identity and Access Management

  • Configure Directory Services

  • Configure Access Services

  • Manage Accounts

Implementing Cryptography

  • Identify Advanced Cryptography Concepts

  • Select Cryptographic Algorithms

  • Configure a Public Key Infrastructure

  • Enroll Certificates

  • Back Up and Restore Certificates and Private Keys

  • Revoke Certificates

Implementing Operational Security

  • Evaluate Security Frameworks and Guidelines

  • Incorporate Documentation in Operational Security

  • Implement Security Strategies

  • Manage Data Security Processes

  • Implement Physical Controls

Addressing Security Incidents

  • Troubleshoot Common Security Issues

  • Respond to Security Incidents

  • Investigate Security Incidents

Ensuring Business Continuity

  • Select Business Continuity and Disaster Recovery Processes

  • Develop a Business Continuity Plan