Preloader spinner

CompTIA Security+

Image of laptop displaying an image containing the words CompTIA Security+

OVERVIEW

This course maps to the CompTIA Security+ certification exam (SK0-601) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs. This course emphasizes both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities. CompTIA Security+ is a globally trusted, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. CompTIA Security+ is also a DoD Approved 8570 Baseline Certification and this course meets DoD 8140/8570 Training requirements

This course may earn a Credly Badge.

LEARNING OBJECTIVES

In this course you will:

  • Prepare for the CompTIA Security+ exam
  • Confidently explain and define an array of security vulnerabilities
  • Navigate the complexities of secure system and network design
  • Explore the defensive measures like PKI, firewalls and IDS
  • Implement robust identity management and access control

TARGET AUDIENCE

This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.

This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.

OTHER PREREQUISITES

A+, Network+

COURSE OUTLINE

1 - COMPARING SECURITY ROLES AND CONTROLS

Topic 1A: Compare and Contrast Information Security Roles

Topic 1B: Compare and Contrast Security Control and Framework Types

2 - EXPLAINING THREAT ACTORS AND THREAT INTELLIGENCE

Topic 2A: Explain Threat Actor Types and Attack Vectors

3 - PERFORMING SECURITY ASSESSMENTS

Topic 3A: Assess Organizational Security with Network Reconnaissance Tools

Topic 3B: Explain Security Concerns with General Vulnerability Types

Topic 3C: Summarize Vulnerability Scanning Techniques

Topic 3D: Explain Penetration Testing Concepts

4 - IDENTIFYING SOCIAL ENGINEERING AND MALWARE

Topic 4A: Compare and Contrast Social Engineering Techniques

Topic 4B: Analyze Indicators of Malware-Based Attacks

5 - SUMMARIZING BASIC CRYPTOGRAPHIC CONCEPTS

Topic 5A: Compare and Contrast Cryptographic Ciphers

Topic 5B: Summarize Cryptographic Modes of Operation

Topic 5C: Summarize Cryptographic Use Cases and Weaknesses

Topic 5D: Summarize Other Cryptographic Technologies

6 - IMPLEMENTING PUBLIC KEY INFRASTRUCTURE

Topic 6A: Implement Certificates and Certificate Authorities

Topic 6B: Implement PKI Management

7 - IMPLEMENTING AUTHENTICATION CONTROLS

Topic 7A: Summarize Authentication Design Concepts

Topic 7B: Implement Knowledge-Based Authentication

Topic 7C: Implement Authentication Technologies

Topic 7D: Summarize Biometrics Authentication Concepts

8 - IMPLEMENTING IDENTITY AND ACCOUNT MANAGEMENT CONTROLS

Topic 8A: Implement Identity and Account Types

Topic 8B: Implement Account Policies

Topic 8C: Implement Authorization Solutions

Topic 8D: Explain the Importance of Personnel Policies

9 - IMPLEMENTING SECURE NETWORK DESIGNS

Topic 9A: Implement Secure Network Designs

Topic 9B: Implement Secure Switching and Routing

Topic 9C: Implement Secure Wireless Infrastructure

Topic 9D: Implement Load Balancers

10 - IMPLEMENTING NETWORK SECURITY APPLIANCES

Topic 10A: Implement Firewalls and Proxy Servers

Topic 10B: Implement Network Security Monitoring

Topic 10C: Summarize the Use of SIEM

11 - IMPLEMENTING SECURE NETWORK PROTOCOLS

Topic 11A: Implement Secure Network Operations Protocols

Topic 11B: Implement Secure Application Protocols

Topic 11C: Implement Secure Remote Access Protocols

12 - IMPLEMENTING HOST SECURITY SOLUTIONS

Topic 12A: Implement Secure Firmware

Topic 12B: Implement Endpoint Security

Topic 12C: Explain Embedded System Security Implications

13 - IMPLEMENTING SECURE MOBILE SOLUTIONS

Topic 13A: Implement Mobile Device Management

Topic 13B: Implement Secure Mobile Device Connections

14 - SUMMARIZING SECURE APPLICATION CONCEPTS

Topic 14A: Analyze Indicators of Application Attacks

Topic 14B: Analyze Indicators of Web Application Attacks

Topic 14C: Summarize Secure Coding Practices

Topic 14D: Implement Secure Script Environments

Topic 14E: Summarize Deployment and Automation Concepts

15 - IMPLEMENTING SECURE CLOUD SOLUTIONS

Topic 15A: Summarize Secure Cloud and Virtualization Services

Topic 15B: Apply Cloud Security Solutions

Topic 15C: Summarize Infrastructure as Code Concepts

16 - EXPLAINING DATA PRIVACY AND PROTECTION CONCEPTS

Topic 16A: Explain Privacy and Data Sensitivity Concepts

Topic 16B: Explain Privacy and Data Protection Controls

17 - PERFORMING INCIDENT RESPONSE

Topic 17A: Summarize Incident Response Procedures

Topic 17B: Utilize Appropriate Data Sources for Incident Response

Topic 17C: Apply Mitigation Controls

18 - EXPLAINING DIGITAL FORENSICS

Topic 18A: Explain Key Aspects of Digital Forensics Documentation

Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

19 - SUMMARIZING RISK MANAGEMENT CONCEPTS

Topic 19A: Explain Risk Management Processes and Concepts

20 - IMPLEMENTING CYBERSECURITY RESILIENCE

Topic 20A: Implement Redundancy Strategies

Topic 20B: Implement Backup Strategies

Topic 20C: Implement Cybersecurity Resiliency Strategies

21 - EXPLAINING PHYSICAL SECURITY

Topic 21A: Explain the Importance of Physical Site Security Controls

Topic 21B: Explain the Importance of Physical Host Security Controls

Actual course outline may vary depending on offering center. Contact your sales representative for more information.

View the CompTIA IT Certification Roadmap

Information relating to CompTIA Testing and Exam Prices.

Note - This course is delivered via our training partner Global Knowledge.

Global Knowledge logo

Download PDF outline

Public Schedule

RRP:  
£2,795 per delegate
Our price:  
£2,295 per delegate

Virtual Private Training

Contact us for pricing.

Onsite Training

Contact us for pricing.

Note

All prices exclude VAT at 20%.

VAT registration number: 450 4347 14

You may also like...

CompTIA Advanced Security Practitioner (CASP+)

Advance your cybersecurity career with our CompTIA CASP+ course, designed for seasoned professionals.

An icon of a clock
Duration:

5 Days

CompTIA PenTest+

Cybersecurity pros, master penetration testing and vulnerability management with the CompTIA PenTest+ course.

An icon of a clock
Duration:

5 Days

CompTIA IT Fundamentals (ITF+)

Begin your IT career with our CompTIA IT Fundamentals (ITF+) course, introducing you to the core concepts.

An icon of a clock
Duration:

4 Days

Enquire about this course

CompTIA Security+
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our mailing list

Receive details on our new courses and special offers

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.