CompTIA Security+

by Lumify Group Claim Listing

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

$4037

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

5 Days

Course Details

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

CompTIA Security+ validates core knowledge required of any cybersecurity role, and emphasises vendor-neutral, hands-on practical skills.

This will ensure the security professional is better prepared to problem solve a wider variety of today’s complex issues faced by organisations, such as improving baseline security readiness and incident response by applying best practices for preventing and addressing the latest attacks, threats, and vulnerabilities.

This five-day instructor-led training course will help you prepare for the CompTIA Security+ (SY0-601) exam.

 

What You’ll Learn

On successful course completion, students will be able to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions

  • Monitor and secure hybrid environments, including cloud, mobile, and IoT

  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance

  • Identify, analyse, and respond to security events and incidents

 

Who Is The Course For?

  • Security Administrator

  • Systems Administrator

  • Helpdesk Manager / Analyst

  • Security Analyst

  • Network / Cloud Engineer

  • IT Auditors

  • Security Engineer

  • IT Project Manager

  • Security Officer

  • Information Security Manager

  • DevOps / Software Developer

  • Security Architect

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.

 

 

 

Course Subjects

Attacks, Threats and Vulnerabilities

  • Compare and contrast different types of social engineering techniques

  • Analyse potential indicators to determine the type of attack

  • Explain different threat actors, vectors, and intelligence sources

  • Explain security concerns associated with various types of vulnerabilities

  • Summarise techniques used in security assessments

  • Explain techniques used in penetration testing

Architecture and Design

  • Explain importance of security concepts in an enterprise environment

  • Summarise virtualisation and cloud computing concepts

  • Summarise secure application development, deployment, and automation concepts

  • Summarise authentication and authorisation design concepts

  • Given a scenario, implement cybersecurity resilience

  • Explain the security implications of embedded and specialised systems

  • Explain the importance of physical security controls

  • Summarise the basics of cryptographic concepts

Implementation

  • Given a scenario, implement secure protocols

  • Given a scenario, implement host or application security solutions

  • Given a scenario, implement secure network designs

  • Given a scenario, install and configure wireless security settings

  • Given a scenario, implement secure mobile solutions

  • Given a scenario, apply cybersecurity solutions to the cloud

  • Given a scenario, implement identity and account management controls

  • Given a scenario, implement authentication and authorisation solutions

  • Given a scenario, implement public key infrastructure

Operations and Incident Response

  • Given a scenario, use appropriate tool to assess organisational security

  • Summarise importance of policies, processes, and procedures for incident response

  • Given an incident, utilise appropriate data sources to support investigations

  • Given an incident, apply mitigation techniques or controls to secure an environment

  • Explain key aspects of digital forensics

Governance, Risk and Compliance

  • Compare and contrast various types of controls

  • Explain importance of applicable regulations, standards, or frameworks that impact organisational security posture

  • Explain importance of policies to organisational security

  • Summarise risk management processes and concepts

  • Explain privacy and sensitive data concepts in relation to security

 

Prerequisites

  • Basic Microsoft Windows user skills

  • Basic Windows and Linux Administrator skills

  • Ability to implement fundamental networking and IP addressing concepts

It is strongly recommended to have a minimum of 12 months' working experience in network administration (including configuring security parameters).

CompTIA A+ and Network+ are also recommended but not required.

  • Canberra Branch

    Level 2, 221 London Circuit, Canberra
  • Sydney Branch

    Level 24, 477 Pitt Street, Sydney
  • Melbourne Branch

    Level 12A, 45 William Street, Melbourne
  • Brisbane Branch

    Level 8, 201 Charlotte Street, Brisbane
  • Perth Branch

    Level 7, 553 Hay Street, Perth
  • Adelaide Branch

    Level 15, 33 King William Street, Adelaide

Check out more Cybersecurity courses in Australia

Pwc Auditor Training Logo

Information Security Management Systems

With cyber attacks and data security breaches on the rise and in the headlines, keeping your organisation’s data secure has never been more important.  The ISO standard for Information Security, ISO/IEC 27001:2022 Information Security Management Systems, provides the framework to ensure your b...

by Pwc Auditor Training [Claim Listing ]
ILX Group Australia Logo

Introduction to Cyber Security training programmes

The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.

by ILX Group Australia [Claim Listing ]
UNSW Sydney Logo

Cyber Security Bootcamp

This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.

by UNSW Sydney [Claim Listing ]
South Metropolitan TAFE Logo

Certificate IV in Cyber Security

Delve into the world of cyber security and become a trusted professional in a fast-growing industry. In a world where cyber attacks are constantly on the rise, there has never been a better time to gain in-demand skills that can set you up for a lucrative career in cyber security.

by South Metropolitan TAFE [Claim Listing ]
Housley Logo

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.

by Housley [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy