Have a question?
Name
Email
Preferred Mode of Training
Notes
Delete file
Are you sure you want to delete this file?
Message sent Close

CompTIA Security+

CompTIA Security+ is a globally recognized certification validating essential skills for IT security roles. It serves as a foundational certification, ... Show more
0
0 reviews
  • Description
  • Reviews
Security+

COMPTIA SECURITY+

COURSE DESCRIPTION

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

SKILLS YOU WILL LEARN

  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
  • Governance, Risk and Compliance

WHAT’S INCLUDED IN THE TRAINING

  • Webinar type of Training
  • E-Book
  • Certification Exam Voucher
  • Videos that demonstrate key concepts and processes
  • Personalized Learning Plan
  • Easy self-assessments
  • Learning progress analytics and reporting
  • Certified best trainer
  • Mock Exam
  • Certificate of Training Completion

COURSE OUTLINE

  • Module 01: Summarize Fundamental Security Concepts
  • Module 02: Compare Threat Types
  • Module 03: Explain Cryptographic Solutions
  • Module 04: Implement Identity and Access Management
  • Module 05: Secure Enterprise Network Architecture
  • Module 06: Secure Cloud Network Architecture
  • Module 07: Explain Resiliency and Site Security Concepts
  • Module 08: Explain Vulnerability Management
  • Module 09: Evaluate Network Security Capabilities
  • Module 10: Assess Endpoint Security Capabilities
  • Module 11: Enhance Application Security Capabilities
  • Module 12: Explain Incident Response and Monitoring Concepts
  • Module 13: Analyze Indicators of Malicious Activity
  • Module 14: Summarize Security Governance Concepts
  • Module 15: Explain Risk Management Processes
  • Module 16: Summarize Data Protection and Compliance Concepts

INTEGRATED LABS

  • Assisted Lab: Exploring the Lab Environment

  • Assisted Lab: Perform System Configuration Gap Analysis

  • Assisted Lab: Configuring Examples of Security Control Types

  • Assisted Lab: Finding Open Service Ports

  • Assisted Lab: Using SET to Perform Social Engineering

  • Applied Lab: Using Storage Encryption

  • Assisted Lab: Using Hashing and Salting
  • Assisted Lab: Managing Password Security
  • Assisted Lab: Managing Permissions
  • Assisted Lab: Setting up Remote Access
  • Assisted Lab: Using TLS Tunneling
  • Assisted Lab: Using Containers
  • Assisted Lab: Using Virtualization
  • Assisted Lab: Implement Backups
  • Assisted Lab: Performing Drive Sanitization
  • Assisted Lab: Exploiting and Detecting SQLi
  • Assisted Lab: Working with Threat Feeds
  • Assisted Lab: Performing Vulnerability Scans
  • Assisted Lab: Understanding Security Baselines
  • Applied Lab: Implementing a Firewall
  • Assisted Lab: Using Group Policy
  • Applied Lab: Hardening
  • Assisted Lab: Performing DNS Filtering
  • Assisted Lab: Configuring System Monitoring
  • Applied Lab: Incident Response: Detection
  • Applied Lab: Performing Digital Forensics
  • Assisted Lab: Performing Root Cause Analysis
  • Assisted Lab: Detecting and Responding to Malware
  • Assisted Lab: Understanding On-Path Attacks
  • Adaptive Lab: Using a Playbook
  • Assisted Lab: Implementing Allow Lists and Deny Lists
  • Assisted Lab: Performing Reconnaissance
  • Assisted Lab: Performing Penetration Testing
  • Assisted Lab: Training and Awareness through Simulation
  • Capstone Lab: Discovering Anomalous Behavior
  • Assisted Lab: Use Cases of Automation and Scripting
  • Applied Lab: Using Network Sniffers

Please contact us for the schedules and for booking a private class.

Inquire Now

Course details
Duration 5 Days

Archive

Working hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday Closed
Sunday Closed