Overview

The CompTIA Security+ course provides students with the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation. In addition, this course will teach students with the skills and knowledge required to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities and operate with an awareness of applicable policies, laws and regulations. This course will prepare you to take the CompTIA Security+ SY0-501 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, such as CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).

Pre-requisites

Before attending this course, students should have: • Attended the CompTIA Network+ and have two years of experience in IT administration with a security focus.

Audience

CompTIA Security+ is aimed at IT professionals with job roles such as security engineer, security consultant, information assurance, junior auditor, penetration tester, security administrator, system and network administrator.

Course Outcome

On completion of the course, delegates will be able to: Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them. Understand the principles of organizational security and the elements of effective security policies. Know the technologies and uses of cryptographic standards and products. Install and configure network and host-based security technologies. Describe how wireless and remote access security is enforced. Describe the standards and products used to enforce security on web and communications technologies. Identify strategies for ensuring business continuity, fault tolerance and disaster recovery. Application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.

Stay Updated with Our Latest News and Insights

Subscribe to our newsletter and never miss out on industry trends, exclusive content, and special offers. Join our community today!

Your information is safe with us! unsubscribe anytime.