CompTIA Security+

COURSE OVERVIEW

The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents .

Prerequisites

No

Exams

  • SY0-601
Duration 1 Month
ELIGIBILITY: Any
Enquire Now
  • Threats, Attacks, and Vulnerabilities

    • Compare and contrast different types of social engineering techniques
    • Given a scenario, analyze potential indicators to determine the type of attack.
    • Given a scenario, analyze potential indicators associated with application attacks.
    • Given a scenario, analyze potential indicators associated with network attacks.
    • Explain different threat actors, vectors, and intelligence sources.
    • Explain the security concerns associated with various types of vulnerabilities
    • Summarize the techniques used in security assessments.
    • Explain the techniques used in penetration testing
  • Architecture and Design

    • Explain the importance of security concepts in an enterprise environment.
    • Summarize virtualization and cloud computing concepts.
    • Summarize secure application development, deployment, and automation concepts
    • Summarize authentication and authorization design concepts.
    • Given a scenario, implement cybersecurity resilience.
    • Explain the security implications of embedded and specialized systems
    • Explain the importance of physical security controls.
    • Summarize the basics of cryptographic concepts.
  • Implementation

    • Given a scenario, implement secure protocols
    • Given a scenario, implement host or application security solutions
    • Given a scenario, implement secure network designs.
    • Given a scenario, install and configure wireless security settings.
    • Given a scenario, implement secure mobile solutions
    • Given a scenario, apply cybersecurity solutions to the cloud.
    • Given a scenario, implement identity and
    • account management controls.
    • Given a scenario, implement authentication
    • and authorization solutions
    • Given a scenario, implement public key infrastructure.
  • Operations and Incident Response

    • Given a scenario, use the appropriate tool to
    • assess organizational security.
    • Summarize the importance of policies, processes, and procedures for incident response.
    • Given an incident, utilize appropriate data
    • sources to support an investigation.
    • Given an incident, apply mitigation techniques
    • or controls to secure an environment.
    • Explain the key aspects of digital forensics.
  • Governance, Risk, and Compliance

    • Compare and contrast various types of controls
    • Explain the importance of applicable regulations, standards, or
    • frameworks that impact organizational security posture.
    • Explain the importance of policies to organizational security.
    • Summarize risk management processes and concepts
    • Explain privacy and sensitive data concepts in relation to security.

Found your courseGet Started Now