Skip to Scheduled Dates
Course Overview
CompTIA Security+ is a globally recognized entry-level cybersecurity certification that validates core skills in areas like network security, risk management, and incident response.
With cybersecurity jobs projected to grow 35% from 2021 to 2031, according to the U.S. Bureau of Labor Statistics, this certification is an essential starting point for roles such as security administrator and systems administrator, providing a solid foundation for advancing in the fast-growing field.
Who Should Attend
This course is designed for people who are seeking to launch a career in cybersecurity.
Course Objectives
By the end of this course, participants will be able to assess and secure enterprise environments, protect hybrid systems against emerging threats, and implement secure identity and access controls. They will also develop skills to detect and respond to security incidents while ensuring compliance with relevant laws and governance frameworks.
Additionally, this course prepares learners for the CompTIA Security+ SY0-701 certification exam by reinforcing key security concepts across its five domains: general security concepts, threats and mitigations, security architecture, security operations, and security program management.
Course Outline
1. Security Roles, Controls, and Threat Intelligence
-
Compare security roles and responsibilities across IT and cybersecurity teams.
-
Differentiate between preventive, detective, and corrective security controls.
-
Identify threat actors, attack vectors, and cyber threat intelligence sources.
-
Understand security frameworks and compliance requirements that guide cybersecurity best practices.
2. Security Assessments & Threat Mitigation
-
Conduct risk assessments and vulnerability scans to identify security gaps.
-
Recognize social engineering attacks, phishing tactics, and malware threats.
-
Explain cryptographic principles, including encryption, hashing, and digital signatures.
-
Implement cryptographic techniques to secure data and communications.
3. Implementing Authentication & Identity Management
-
Deploy authentication methods, including passwords, multifactor authentication (MFA), and biometrics.
-
Manage identity and access controls to enforce least privilege and role-based access.
-
Implement Public Key Infrastructure (PKI) for certificate-based security.
4. Securing Network Architecture & Infrastructure
-
Design and implement secure network architectures (DMZ, segmentation, zero trust).
-
Configure and deploy network security appliances such as firewalls, IDS/IPS, and VPNs.
-
Use secure network protocols (TLS, SSH, IPsec) to protect data in transit.
-
Implement wireless security best practices, including encryption and access controls.
5. Endpoint, Mobile, and Cloud Security
-
Deploy endpoint security solutions, including anti-malware, host-based firewalls, and patch management.
-
Implement secure mobile device management (MDM) policies for BYOD environments.
-
Apply secure coding practices to prevent software vulnerabilities and exploits.
-
Configure cloud security controls to protect virtualized environments and cloud workloads.
6. Data Protection & Privacy
-
Explain data classification, storage, and encryption methods to safeguard sensitive information.
-
Implement data loss prevention (DLP) strategies to prevent unauthorized access and exfiltration.
-
Understand privacy laws and compliance requirements such as GDPR, HIPAA, and PCI-DSS.
7. Incident Response & Digital Forensics
-
Develop an incident response plan, including identification, containment, eradication, and recovery.
-
Utilize forensic tools and techniques to analyze security breaches and collect digital evidence.
-
Follow legal and regulatory considerations for handling security incidents and investigations.
8. Risk Management & Cyber Resilience
-
Apply risk management concepts such as risk assessment, mitigation, and acceptance.
-
Implement business continuity and disaster recovery strategies to maintain cyber resilience.
-
Strengthen system and network defenses against evolving threats through proactive security measures.
9. Physical Security & Access Controls
-
Understand physical security controls such as surveillance, access badges, and secure facilities.
-
Implement hardware security solutions, including secure boot and hardware encryption.
-
Apply personnel security best practices, such as security awareness training and insider threat mitigation.