CompTIA Security +

CompTIA Security+ training and certification is aimed towards delivering the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ training subsumes best practices in hands-on trouble-shooting to make sure that security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ are enlightened about how to address security incidents and not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. CompTIA Security+ training also helps you in gaining skills you’ll be needing to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, and laws.

Training Logo
Overview

CompTIA's vendor-neutral certification program is one of the best recognized in the IT industry. Since CompTIA developed its A+ credential in 1993, it has issued more than two million certifications. In early 2018, CompTIA introduced its CompTIA Infrastructure Career Pathway. While you'll still see the same familiar certifications that form the bedrock of the CompTIA certification portfolio, this new career pathway program more closely aligns CompTIA certifications to the real-world skills that IT professionals need to ensure success when managing and supporting IT infrastructures.

  • Duration
    40 hours
  • Batches
    Customizable as per your need
  • Suitable for
    professionals, students etc.
  • Course Details
    Download PDF
What you will learn
  • A thorough understanding of knowledge and skills required for an IS AuditorHow to analyze indicators of compromise and determine the type of malware
  • How to compare and contrast types of attacks and explain threat actor types and attributes
  • How to explain penetration testing and vulnerability scanning concepts
  • How to explain the impact associated with types of vulnerabilities
  • How to install and configure network components, both hardware and software-based, to support organizational security
  • How to use appropriate software tools to assess the security posture of an organization
  • How to troubleshoot common security issues
  • How to analyze and interpret output from security technologies
  • How to deploy mobile devices securely
  • How to implement secure protocols
  • How to explain use cases and purpose for frameworks, best practices and secure configuration guides
  • How to implement secure network architecture concepts and secure systems design
  • How to explain the importance of secure staging deployment concepts
  • How to explain the security implications of embedded systems
  • How to summarize secure application development and deployment concepts
  • How to summarize cloud and virtualization concepts
  • How to explain how resiliency and automation strategies reduce risk
  • How to explain the importance of physical security controls
  • How to compare and contrast identity and access management concepts
  • How to install and configure identity and access services
  • How to implement identity and access management controls and how to differentiate common account management practices
  • How to explain the importance of policies, plans and procedures related to organizational security
  • How to summarize business impact analysis concepts
  • How to explain risk management processes and concepts
  • How to follow incident response procedures
  • How to summarize basic concepts of forensics
  • How to explain disaster recovery and continuity of operation concepts
  • How to compare and contrast various types of controls
  • How to carry out data security and privacy practices
  • How to compare and contrast basic concepts of cryptography and how to explain cryptography algorithms and their basic characteristics
  • How to install and configure wireless security settings
  • How to implement public key infrastructure
background

Course Agenda

01

Part 1: Threats, Attacks and Vulnerabilities

  • Chapter 1: Malware and Indicators of Compromise
  • Chapter 2: Attacks
  • Chapter 3: Threat Actors
  • Chapter 4: Vulnerability Scanning and Penetration Testing
  • Chapter 5: Vulnerabilities and Impacts

02

Part 2: Technologies and Tools

  • Chapter 6: Network Components
  • Chapter 7: Security Tools and Technologies
  • Chapter 8: Troubleshoot Common Security Issues
  • Chapter 9: Deploy Mobile Devices Securely

03

Part 3: Architecture and Design

  • Chapter 11: Architecture Frameworks and Secure Network Architectures
  • Chapter 12: Secure Systems Design and Deployment
  • Chapter 13: Embedded Systems
  • Chapter 14: Application Development and Deployment
  • Chapter 15: Cloud and Virtualization
  • Chapter 16: Resiliency and Automation strategies
  • Chapter 17: Physical Security Controls

04

Part 4: Identity and Access Management

  • Chapter 18: Identity, Access and Accounts
  • Chapter 19: Identity and Access Services
  • Chapter 20: Identity and Access Management Controls

05

Part 5: Risk Management

  • Chapter 21: Policies, Plans and Procedures
  • Chapter 22: Risk Management and Business Impact Analysis Concepts
  • Chapter 23: Incident Response, Disaster Recovery and Continuity of Operation
  • Chapter 24: Digital forensics
  • Chapter 25: Compare and contrast various types of controls
  • Chapter 26: Data Security and Privacy Practices

06

Part 6: Cryptography and PKI

  • Chapter 27: Cryptography Concepts
  • Chapter 28: Cryptography Algorithms
  • Chapter 29: Wireless Security
  • Chapter 30: Public Key Infrastructure
background

Why Choose us?

Over 200 classes are scheduled conveniently every year with small training groups and industry experienced faculties that provides:

  • One-Stop shop for IT Training
  • Companywide IT Training Solutions
  • Interactive Teaching Methodology
  • Job Oriented Training Solutions
  • Flexible modes of training
  • Recorded sessions are available
  • Live Project Experience

In a hurry? Let's chat!

Contact us on Whatsapp
logo
Our Locations