CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.
CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.
CompTIA Security+ validates core knowledge required of any cybersecurity role, and emphasises vendor-neutral, hands-on practical skills.
This will ensure the security professional is better prepared to problem solve a wider variety of today’s complex issues faced by organisations, such as improving baseline security readiness and incident response by applying best practices for preventing and addressing the latest attacks, threats, and vulnerabilities.
This five-day instructor-led training course will help you prepare for the CompTIA Security+ (SY0-601) exam.
What You’ll Learn
On successful course completion, students will be able to:
Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
Monitor and secure hybrid environments, including cloud, mobile, and IoT
Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
Identify, analyse, and respond to security events and incidents
Who Is The Course For?
Security Administrator
Systems Administrator
Helpdesk Manager / Analyst
Security Analyst
Network / Cloud Engineer
IT Auditors
Security Engineer
IT Project Manager
Security Officer
Information Security Manager
DevOps / Software Developer
Security Architect
We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.
Course Subjects
Attacks, Threats and Vulnerabilities
Compare and contrast different types of social engineering techniques
Analyse potential indicators to determine the type of attack
Explain different threat actors, vectors, and intelligence sources
Explain security concerns associated with various types of vulnerabilities
Summarise techniques used in security assessments
Explain techniques used in penetration testing
Architecture and Design
Explain importance of security concepts in an enterprise environment
Summarise virtualisation and cloud computing concepts
Summarise secure application development, deployment, and automation concepts
Summarise authentication and authorisation design concepts
Given a scenario, implement cybersecurity resilience
Explain the security implications of embedded and specialised systems
Explain the importance of physical security controls
Summarise the basics of cryptographic concepts
Implementation
Given a scenario, implement secure protocols
Given a scenario, implement host or application security solutions
Given a scenario, implement secure network designs
Given a scenario, install and configure wireless security settings
Given a scenario, implement secure mobile solutions
Given a scenario, apply cybersecurity solutions to the cloud
Given a scenario, implement identity and account management controls
Given a scenario, implement authentication and authorisation solutions
Given a scenario, implement public key infrastructure
Operations and Incident Response
Given a scenario, use appropriate tool to assess organisational security
Summarise importance of policies, processes, and procedures for incident response
Given an incident, utilise appropriate data sources to support investigations
Given an incident, apply mitigation techniques or controls to secure an environment
Explain key aspects of digital forensics
Governance, Risk and Compliance
Compare and contrast various types of controls
Explain importance of applicable regulations, standards, or frameworks that impact organisational security posture
Explain importance of policies to organisational security
Summarise risk management processes and concepts
Explain privacy and sensitive data concepts in relation to security
Prerequisites
Basic Microsoft Windows user skills
Basic Windows and Linux Administrator skills
Ability to implement fundamental networking and IP addressing concepts
It is strongly recommended to have a minimum of 12 months' working experience in network administration (including configuring security parameters).
CompTIA A+ and Network+ are also recommended but not required.
Lumify Group was previously known as DDLS Group. We help business and enterprise customers turn change into opportunity through instructor-led, vendor-certified, IT and process training.
Developed in partnership with the world’s leading tech vendors and delivered by industry-accredited experts, our courses are pragmatic, future-focused and real-world ready.
From cybersecurity to cloud computing, AI to agile, our award-winning trainers deliver cutting-edge content to over 20,000 students online, in classrooms and in workplaces, every year.
Learn From The Experts
Leaders in their respective fields and with an average student rating of 4.8/5, our industry-accredited trainers will inspire your team to learn, thrive and grow.
Train Your Way
From face-to-face sessions with our expert trainers to self-directed courses delivered entirely online, our training methods can be easily adapted to suit you and your team.
With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.
The Certificate IV in Cyber Security is a high tech and high-speed program that will prepare you with the skills and knowledge required to be job ready in a rapidly growing sector
This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents.
Students gain valuable skills and knowledge that will help them to generate solutions to protect their own personal online profile from cyber security threats and to limit the potential impact of online security breaches.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy