CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.
CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.
CompTIA Security+ validates core knowledge required of any cybersecurity role, and emphasises vendor-neutral, hands-on practical skills.
This will ensure the security professional is better prepared to problem solve a wider variety of today’s complex issues faced by organisations, such as improving baseline security readiness and incident response by applying best practices for preventing and addressing the latest attacks, threats, and vulnerabilities.
This five-day instructor-led training course will help you prepare for the CompTIA Security+ (SY0-601) exam.
What You’ll Learn
On successful course completion, students will be able to:
Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
Monitor and secure hybrid environments, including cloud, mobile, and IoT
Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
Identify, analyse, and respond to security events and incidents
Who Is The Course For?
Security Administrator
Systems Administrator
Helpdesk Manager / Analyst
Security Analyst
Network / Cloud Engineer
IT Auditors
Security Engineer
IT Project Manager
Security Officer
Information Security Manager
DevOps / Software Developer
Security Architect
We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.
Course Subjects
Attacks, Threats and Vulnerabilities
Compare and contrast different types of social engineering techniques
Analyse potential indicators to determine the type of attack
Explain different threat actors, vectors, and intelligence sources
Explain security concerns associated with various types of vulnerabilities
Summarise techniques used in security assessments
Explain techniques used in penetration testing
Architecture and Design
Explain importance of security concepts in an enterprise environment
Summarise virtualisation and cloud computing concepts
Summarise secure application development, deployment, and automation concepts
Summarise authentication and authorisation design concepts
Given a scenario, implement cybersecurity resilience
Explain the security implications of embedded and specialised systems
Explain the importance of physical security controls
Summarise the basics of cryptographic concepts
Implementation
Given a scenario, implement secure protocols
Given a scenario, implement host or application security solutions
Given a scenario, implement secure network designs
Given a scenario, install and configure wireless security settings
Given a scenario, implement secure mobile solutions
Given a scenario, apply cybersecurity solutions to the cloud
Given a scenario, implement identity and account management controls
Given a scenario, implement authentication and authorisation solutions
Given a scenario, implement public key infrastructure
Operations and Incident Response
Given a scenario, use appropriate tool to assess organisational security
Summarise importance of policies, processes, and procedures for incident response
Given an incident, utilise appropriate data sources to support investigations
Given an incident, apply mitigation techniques or controls to secure an environment
Explain key aspects of digital forensics
Governance, Risk and Compliance
Compare and contrast various types of controls
Explain importance of applicable regulations, standards, or frameworks that impact organisational security posture
Explain importance of policies to organisational security
Summarise risk management processes and concepts
Explain privacy and sensitive data concepts in relation to security
Prerequisites
Basic Microsoft Windows user skills
Basic Windows and Linux Administrator skills
Ability to implement fundamental networking and IP addressing concepts
It is strongly recommended to have a minimum of 12 months' working experience in network administration (including configuring security parameters).
CompTIA A+ and Network+ are also recommended but not required.
Lumify Group was previously known as DDLS Group. We help business and enterprise customers turn change into opportunity through instructor-led, vendor-certified, IT and process training.
Developed in partnership with the world’s leading tech vendors and delivered by industry-accredited experts, our courses are pragmatic, future-focused and real-world ready.
From cybersecurity to cloud computing, AI to agile, our award-winning trainers deliver cutting-edge content to over 20,000 students online, in classrooms and in workplaces, every year.
Learn From The Experts
Leaders in their respective fields and with an average student rating of 4.8/5, our industry-accredited trainers will inspire your team to learn, thrive and grow.
Train Your Way
From face-to-face sessions with our expert trainers to self-directed courses delivered entirely online, our training methods can be easily adapted to suit you and your team.
With cyber attacks and data security breaches on the rise and in the headlines, keeping your organisation’s data secure has never been more important. The ISO standard for Information Security, ISO/IEC 27001:2022 Information Security Management Systems, provides the framework to ensure your b...
The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.
This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.
Delve into the world of cyber security and become a trusted professional in a fast-growing industry. In a world where cyber attacks are constantly on the rise, there has never been a better time to gain in-demand skills that can set you up for a lucrative career in cyber security.
Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy