CompTIA Security+

by Jumping Bean

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to install and configure systems, secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Jumping Bean Logo

img Duration

Please Enquire

Course Details

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to install and configure systems, secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques.

A student who successfully completes this course can participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

 

Course Objectives:

Threats, Attacks, and Vulnerabilities

  • Given a scenario, analyze indicators of compromise and determine the type of malware
  • Compare and contrast types of attacks.
  • Explain threat actor types and attributes.
  • Explain penetration testing concepts
  • Explain vulnerability scanning concepts
  • Explain the impact associated with types of vulnerabilities

 

Technologies and Tools

  • Install and configure network components, both hardware- and software-based, to support organizational security
  • Given a scenario, use appropriate software tools to assess the security posture of an organization
  • Given a scenario, troubleshoot common security issues
  • Given a scenario, analyze and interpret output from security technologies
  • Given a scenario, deploy mobile devices securely
  • Given a scenario, implement secure protocols

 

Architecture and Design

  • Explain use cases and purpose for frameworks, best practices and secure configuration guides
  • Given a scenario, implement secure network architecture concepts
  • Given a scenario, implement secure systems design
  • Explain the importance of secure staging deployment concepts
  • Explain the security implications of embedded systems
  • Summarize secure application development and deployment concepts
  • Summarize cloud and virtualization concepts
  • Explain how resiliency and automation strategies reduce risk
  • Explain the importance of physical security controls

 

Identity and Access Management

  • Compare and contrast identity and access management concepts
  • Given a scenario, install and configure identity and access services
  • Given a scenario, implement identity and access management controls
  • Given a scenario, differentiate common account management practices
  • Risk Management
  • Explain the importance of policies, plans, and procedures related to organizational security
  • Summarize business impact analysis concepts
  • Explain risk management processes and concepts
  • Given a scenario, follow incident response procedures
  • Summarize basic concepts of forensics
  • Explain disaster recovery and continuity of operation concepts
  • Compare and contrast various types of controls
  • Given a scenario, carry out data security and privacy practice

 

Cryptography and PKI

  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics
  • Given a scenario, install and configure wireless security settings
  • Given a scenario, implement public key infrastructure
  • Randburg Branch

    3 Appian Place 373 Kent Ave, Ferndale, Randburg, Johannesburg

Check out more Cybersecurity courses in South Africa

Jumping Bean Logo

Certified Cloud Security Professional CCSP

In the context of rising cloud adoption, securing the cloud infrastructure is paramount. The Certified Cloud Security Professional (CCSP) certification by ISC2 is designed for individuals who wish to showcase their expertise in securing cloud infrastructure.

by Jumping Bean
Growth in Motion Logo

Cyber Security Awareness

Through our webinars and online training you will learn how serious cybercrime is and what you can do to protect yourself by understanding how cyber crimes are committed.

by Growth in Motion
  • Price
  • Start Date
  • Duration
Village Tech Logo

CompTIA Network+

This certification is an ISO-17024 compliant, vendor neutral technology certification that verifies that a certified individual has the skills and knowledge needed to take on a pivotal role in building, managing, and protecting the critical asset that is the data network.

by Village Tech [Claim Listing ]
Jumping Bean Logo

Certified Information Security Manager (CISM)

ISACA's Certified Information Security Manager training is for those with technical expertise and experience in IS/IT security and control who want to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, pee...

by Jumping Bean
Dynamic DNA Logo

Cyber Security CySA+

Cyber Security CySA+ course is offered by Dynamic DNA. Dynamic DNA is one of the leading institutions that offer IT and Business courses in South Africa.

by Dynamic DNA

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy