CompTIA Security+
CompTIA Security+ certification validates the baseline skills necessary for core security functions and pursuing an IT security career. Covering topics such as communication security, infrastructure security, and cryptography, this course also delves into protocols used in Linux, UNIX, and Windows. Gain knowledge in capturing, analyzing, and generating IP traffic, exploiting protocol weaknesses, and examining defensive solutions.
Exam
Certification by
per person
Level
Duration
Training Delivery Format
Face-to-face / Virtual Class
Associated Certification
per person
Level
Duration
Training Delivery Format
Face-to-face (F2F) / Virtual Class
Associated Certification
Class types
Public Class
Private Class
In-House Training
Bespoke
About this course
CompTIA Security+ opens the door to your Cybersecurity career. Covering Risk Management, Incident Response, Security Control, and more.
This globally recognized CompTIA™ IT Security+ training course and certification program helps prepare a student for the Security+ IT certification exam. Students will learn about IT industry-wide security topics, including communication security, infrastructure security, cryptography, access control, authentication, external attack, and operational and organizational security.
Other topics included in this course are protocols used in Linux, UNIX, and Windows in addition to the TCP/IP suite component protocols, and Ethernet operations. Students will gain knowledge in capturing, analyzing, and generating IP traffic, how to exploit protocol weaknesses and examine defensive solutions. Packet filtering, password policies, and file integrity checking are also covered.
Join our Comptia Security+ face-to-face class in Malaysia or virtual class from anywhere.
Who should attend?
This CompTIA Security+ course is for you if you are:
- Business Analyst
- Cybersecurity Manager
- Software Developer
- System Administrator
- MSP Personnel
- Security Consultant
Learning Outcome
At the end of this course, you will be able to:
- Demonstrate knowledge of security threats
- Understand communication and infrastructure security
- Understand cryptography, access control and authentication
- Prevent against external attack
- Demonstrate knowledge of operational and organization security
Prerequisites
- Thorough Knowledge of TCP/IP
- Network+ certification or equivalent knowledge and experience
Course Content
Lesson 1: Comparing Security roles and Security Controls
- Topic 1A: Compare and Contrast Information Security Roles
- Topic 1B: Compare and Contrast Security Control and Framework Types
- Topic 1C: Compare and Contrast Social Engineering Attack Types
- Topic 1D: Determine Malware Types
Lesson 2: Explaining Threat Actors and Threat Intelligence
- Topic 2A: Explain Threat Actor Types and Attack Vectors
- Topic 2B: Explain Threat Intelligence Sources
Lesson 3: Performing Security Assessments
- Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
- Topic 3B: Explain Security Concerns with General Vulnerability Types
- Topic 3C: Summarize Vulnerability Scanning Techniques
- Topic 3D: Explain Penetration Testing Concepts
Lesson 4: Identifying Social Engineering and Malware
- Topic 4A: Compare and Contrast Social Engineering Techniques
- Topic 4B: Analyze Indicators of Malware-Based Attacks
Lesson 5: Summarizing Basic Cryptographic Concepts
- Topic 5A: Compare and Contrast Cryptographic Ciphers
- Topic 5B: Summarize Cryptographic Modes of Operation
- Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
- Topic 5D: Summarize Other Cryptographic Technologies
Lesson 6: Implementing Public Key Infrastructure
- Topic 6A: Implement Certificates and Certificate Authorities
- Topic 6B: Implement PKI Management
Lesson 7: Implementing Authentication Controls
- Topic 7A: Summarize Authentication Design Concepts
- Topic 7B: Implement Knowledge-Based Authentication
- Topic 7C: Implement Authentication Technologies
- Topic 7D: Summarize Biometrics Authentication Concepts
Lesson 8: Implementing Identity and Account Management Controls
- Topic 8A: Implement Identity and Account Types
- Topic 8B: Implement Account Policies
- Topic 8C: Implement Authorization Solutions
- Topic 8D: Explain the Importance of Personnel Policies
Lesson 9: Implementing Secure Network Design
- Topic 9A: Implement Secure Network Designs
- Topic 9B: Implement Secure Switching and Routing
- Topic 9C: Implement Secure Wireless Infrastructure
- Topic 9D: Implement Load Balancer
Lesson 10: Implementing Network Security Appliances
- Topic 10A: Implement Firewalls and Proxy Servers
- Topic 10B: Implement Network Security Monitoring
- Topic 10C: Summarize the Use of SIEM
Lesson 11: Implementing Secure Protocols
- Topic 11A: Implement Secure Network Operations Protocols
- Topic 11B: Implement Secure Application Protocols
- Topic 11C: Implement Secure Remote Access Protocols
Lesson 12: Implementing Host Security Solutions
- Topic 12A: Implement Secure Firmware
- Topic 12B: Implement Endpoint Security
Lesson 13: Implementing Secure Mobile Solutions
- Topic 13A: Implement Mobile Device Management
- Topic 13B: Implement Secure Mobile Device Connections
Lesson 14: Summarizing Secure Applications Concepts
- Topic 14A: Analyze Indicators of Application Attacks
- Topic 14B: Analyze Indicators of Web Application Attacks
- Topic 14C: Summarize Secure Coding Practices
- Topic 14D: Implement Secure Script Environments
- Topic 14E: Summarize Deployment and Automation Concepts
Lesson 15: Implementing Secure Cloud Solutions
- Topic 15A: Summarize Secure Cloud and Virtualization Services
- Topic 15B: Apply Cloud Security Solutions
- Topic 15C: Summarize Infrastructure as Code Concepts
Lesson 16: Explaining Data Privacy & Protection Concepts
- Topic 16A: Explain Privacy and Data Sensitivity Concepts
- Topic 16B: Explain Privacy and Data Protection Controls
Lesson 17: Performing Incident Response
- Topic 17A: Summarize Incident Response Procedures
- Topic 17B: Utilize Appropriate Data Sources for Incident Response
- Topic 17C: Apply Mitigation Controls
Lesson 18: Explaining Digital Forensics
- Topic 18A: Explain Key Aspects of Digital Forensics Documentation
- Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Lesson 19: Summarizing Risk Management Concepts
- Topic 19A: Explain Risk Management Processes and Concepts
- Topic 19B: Explain Business Impact Analysis Concepts
Lesson 20: Implementing Cybersecurity Resilience
- Topic 20A: Implement Redundancy Strategies
- Topic 20B: Implement Backup Strategies
- Topic 20C: Implement Cybersecurity Resiliency Strategies
Lesson 21: Explaining Physical Security
- Topic 21A: Explain the Importance of Physical Site Security Controls
- Topic 21B: Explain the Importance of Physical Host Security Controls
Certification
CompTIA Security+
CompTIA Security+ Opens the door to your Cybersecurity career. Covering Risk Management, Incident Response, Security Control, and more. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
The CompTIA Security+ is getting more popular than before due to several reasons including:
- Chosen by more organizations: Chosen by more corporations and defense organizations than any other certification on the market to validate baseline security skills and for fulfilling the DoD 8570 compliance.
- Get hands-on cybersecurity experience: The only baseline cybersecurity certification emphasizing hands-on practical skills, ensuring the security professional is better prepared to problem-solve a wider variety of today’s complex issues.
- Learn the latest trends and techniques: Gain core cybersecurity knowledge applicable across more of today’s job roles to secure systems, software, and hardware.
About the exam
CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
Exam Details
Exam Codes: SY0-601
Launch Date: November 12, 2020
Exam Description: The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents
Number of Questions: Maximum of 90 questions
Type of Questions: Multiple choice and performance-based
Length of Test: 90 minutes
Passing Score: 750 (on a scale of 100-900)
Recommended Experience: CompTIA Network+ and two years of experience in IT administration with a security focus
Retirement: Usually three years after launch
FAQs
How can I prepare for the exam?
You can join our face-to-face public or virtual or Bespoke class. Just choose the right class type for your learning needs and goal.
As an alternative, you can join the training offered by CompTIA. They have a wealth of certification training that is designed to help you to succeed in the exam.
How can I keep my CompTIA Security+ certification up to date?
Keep your certification up to date with CompTIA’s Continuing Education (CE) program. It’s designed to be a continued validation of your expertise and a tool to expand your skillset. It’s also the ace up your sleeve when you’re ready to take the next step in your career.
Why do I need to renew my CompTIA Security+?
Technology is one of the fastest-evolving things on the planet. In order to stay relevant in your career, it’s not only important for you to stay up-to-date on the latest technologies, but also to be able to prove that you know your IT
Is this an HRDC claimable course?
Yes, this is an HRDC claimable course
At this time, this course is available for private class and in-house training only. Please contact us for any inquiries.