This is a course for those interested in pursuing CompTIA Security+ certification. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. The course includes an exam voucher and our on-site testing centre allows you to take the exam when you're ready.
Jobs that use CompTIA Security+
- Security Administrator
- Helpdesk Manager / Analyst
- Security Engineer / Analyst
- IT Auditor
- Systems Administrator
- Network / Cloud Engineer
- DevOps / Software Developer
- IT Project Manager
It is recommended that you hold CompTIA Network+ Certification and have two years of experience in IT administration with a security focus.
5 days. Hands-on.
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you’re ready for the job.
CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.
CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
- Monitor and secure hybrid environments, including cloud, mobile, and IoT.
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance.
- Identify, analyze, and respond to security events and incidents.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
Why is it different?
- More choose Security+
- Chosen by more corporations and defense organizations than any other certification on the market to validate baseline security skills and for fulfilling the DoD 8570 compliance.
- Security+ proves hands-on skills
- The only baseline cybersecurity certification emphasizing hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of today’s complex issues.
- More job roles turn to Security+ to supplement skills
- Baseline cybersecurity skills are applicable across more of today’s job roles to secure systems, software and hardware.
- Security+ is aligned to the latest trends and techniques
- Covering the most core technical skills in risk assessment and management, incident response, forensics, enterprise networks, hybrid/cloud operations, and security controls, ensuring high-performance on the job.
The primary goal of this course is to help you pass the exam required to earn the Security+ certification. To do this, your knowledgeable instructor will blend hands-on labs with tailored lectures and practice exams to help you prepare. The course includes an exam voucher and our on-site testing centre allows you to take the exam when you're ready.
What skills will you learn?
- Attacks, Threats and Vulnerabilities
- Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
- Architecture and Design
- Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.
- Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.
- Operations and Incident Response
- Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
- Governance, Risk and Compliance
- Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.
General Security Concepts.
Compare and contrast various types of security controls.
Summarize fundamental security concepts.
Explain the importance of change management processes and the impact to security.
Explain the importance of using appropriate cryptographic solutions.
Threats, Vulnerabilities, and Mitigations.
Compare and contrast common threat actors and motivations.
Explain common threat vectors and attack surfaces.
Explain various types of vulnerabilities.
Given a scenario, analyze indicators of malicious activity.
Explain the purpose of mitigation techniques used to secure the enterprise.
Compare and contrast security implications of different architecture models.
Given a scenario, apply security principles to secure enterprise infrastructure.
Compare and contrast concepts and strategies to protect data.
Explain the importance of resilience and recovery in security architecture.
Given a scenario, apply common security techniques to computing resources.
Explain the security implications of proper hardware, software, and data asset management.
Explain various activities associated with vulnerability management.
Explain security alerting and monitoring concepts and tools.
Given a scenario, modify enterprise capabilities to enhance security.
Given a scenario, implement and maintain identity and access management.
Explain the importance of automation and orchestration related to secure operations.
Explain appropriate incident response activities.
Given a scenario, use data sources to support an investigation.
Security Program Management and Oversight.
Summarize elements of effective security governance.
Explain elements of the risk management process.
Explain the processes associated with third-party risk assessment and management.
Summarize elements of effective security compliance.
Explain types and purposes of audits and assessments.
Given a scenario, implement security awareness practices.