CompTIA Security+ (Online Course)

CompTIA Security+ (Online Course)

  • R 4,500.00


Course Details

CompTIA Security+ Course Overview

You will learn how to install and configure systems to secure applications, networks and devices. Perform threat analysis and respond with appropriate mitigation techniques.
Participate in risk mitigation activities and operate with an awareness of applicable policies, laws and regulations.
This courses will also help you prepare for the CompTIA Security+ SY0-501 certification exam.

CompTIA Security+ Course Outcomes

  1. Identify security threats and vulnerabilities.
  2. Manage data, application, and host security.
  3. Implement network security.
  4. Identify and implement access control and account management security measures.
  5. Manage certificates.
  6. Identify and implement compliance and operational security measures.
  7. Manage risk.
  8. Troubleshoot and manage security incidents.
  9. Plan for business continuity and disaster recovery.

      What does the course include?

      1. 5 Sessions with 30h+ online video training content.
      2. Multiple Exercise Labs
      3. 5 Pre Assessment 
      4. 5 Post Assessment
      5. Certificate on competion.

      All you need to pass your CompTIA Security+ SY0-501 certification exam.

        Benefits & Prerequisites 

        Benefits

        1. Gain the skills and confidence required to successfully obtain your Security+ certification.
        2. Test prep questions that meet all Security+ SY0-501 exam objectives.
        3. View your online courseware anytime, anywhere.

          Prerequisites

          1. Basic computer and English literacy.
          2. Networking experience is helpful but not mandatory.
          3. ​A+ certification or equivalent skills and knowledge is helpful but not mandatory.

             

            Course Outline

            CompTIA Security+ Course Outline

             1. Security Fundamentals

            Information Security Cycle
            Information Security Controls
            Authentication Methods
            Cryptography Fundamentals
            Security Policy Fundamentals


            2. Identifying Security Threats & Vulnerabilities
            Social Engineering
            Malware
            Physical Threats and Vulnerabilities
            Software-Based Threats
            Network-Based Threats
            Wireless Threats and Vulnerabilities
            Physical Threats and Vulnerabilities


            3. Managing Data, Application, and Host Security
            Manage Data Security
            Manage Application Security
            Manage Device and Host Security
            Manage Mobile Security


            4. Implementing Network Security
            Configure Security Parameters on Network Devices and Technologies
            Network Design Elements and Components
            Implement Networking Protocols and Services
            Apply Secure Network Administration Principles
            Secure Wireless Traffic


            5. Implementing Access Control, Authentication, and Account Management
            Access Control and Authentication Services
            Implement Account Management Security Controls


            6. Managing Certificates
            Install a Certificate Authority (CA) Hierarchy
            Enroll Certificates
            Secure Network Traffic by Using Certificates
            Renew Certificates
            Revoke Certificates
            Backup and Restore Certificates and Private Keys
            Restore Certificates and Private Keys


            7. Implementing Compliance and Operational Security
            Physical Security
            Legal Compliance
            Security Awareness and Training
            Integrate Systems and Data with Third Parties​

            8. Risk Management
            Risk Analysis
            Implement Vulnerability Assessment Tools and Techniques
            Scan for Vulnerabilities
            Mitigation and Deterrent Techniques


            9. Troubleshooting and Managing Security Incidents
            Respond to Security Incidents
            Recover from a Security Incident


            10. Business Security and Disaster Recovery Planning
            ​Business Continuity
            Plan for Disaster Recovery
            Execute Disaster Recovery Plans and Procedures

             

            Delivery Details

            You will receive you're online coursed registration and login details via email. Once purchased you will receive your email in less than 24 working hours. You will have all the instructions required to begin practicing.