CompTIA Security+

by Lumify Group Claim Listing

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

$4037

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

5 Days

Course Details

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

CompTIA Security+ validates core knowledge required of any cybersecurity role, and emphasises vendor-neutral, hands-on practical skills.

This will ensure the security professional is better prepared to problem solve a wider variety of today’s complex issues faced by organisations, such as improving baseline security readiness and incident response by applying best practices for preventing and addressing the latest attacks, threats, and vulnerabilities.

This five-day instructor-led training course will help you prepare for the CompTIA Security+ (SY0-601) exam.

 

What You’ll Learn

On successful course completion, students will be able to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions

  • Monitor and secure hybrid environments, including cloud, mobile, and IoT

  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance

  • Identify, analyse, and respond to security events and incidents

 

Who Is The Course For?

  • Security Administrator

  • Systems Administrator

  • Helpdesk Manager / Analyst

  • Security Analyst

  • Network / Cloud Engineer

  • IT Auditors

  • Security Engineer

  • IT Project Manager

  • Security Officer

  • Information Security Manager

  • DevOps / Software Developer

  • Security Architect

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.

 

 

 

Course Subjects

Attacks, Threats and Vulnerabilities

  • Compare and contrast different types of social engineering techniques

  • Analyse potential indicators to determine the type of attack

  • Explain different threat actors, vectors, and intelligence sources

  • Explain security concerns associated with various types of vulnerabilities

  • Summarise techniques used in security assessments

  • Explain techniques used in penetration testing

Architecture and Design

  • Explain importance of security concepts in an enterprise environment

  • Summarise virtualisation and cloud computing concepts

  • Summarise secure application development, deployment, and automation concepts

  • Summarise authentication and authorisation design concepts

  • Given a scenario, implement cybersecurity resilience

  • Explain the security implications of embedded and specialised systems

  • Explain the importance of physical security controls

  • Summarise the basics of cryptographic concepts

Implementation

  • Given a scenario, implement secure protocols

  • Given a scenario, implement host or application security solutions

  • Given a scenario, implement secure network designs

  • Given a scenario, install and configure wireless security settings

  • Given a scenario, implement secure mobile solutions

  • Given a scenario, apply cybersecurity solutions to the cloud

  • Given a scenario, implement identity and account management controls

  • Given a scenario, implement authentication and authorisation solutions

  • Given a scenario, implement public key infrastructure

Operations and Incident Response

  • Given a scenario, use appropriate tool to assess organisational security

  • Summarise importance of policies, processes, and procedures for incident response

  • Given an incident, utilise appropriate data sources to support investigations

  • Given an incident, apply mitigation techniques or controls to secure an environment

  • Explain key aspects of digital forensics

Governance, Risk and Compliance

  • Compare and contrast various types of controls

  • Explain importance of applicable regulations, standards, or frameworks that impact organisational security posture

  • Explain importance of policies to organisational security

  • Summarise risk management processes and concepts

  • Explain privacy and sensitive data concepts in relation to security

 

Prerequisites

  • Basic Microsoft Windows user skills

  • Basic Windows and Linux Administrator skills

  • Ability to implement fundamental networking and IP addressing concepts

It is strongly recommended to have a minimum of 12 months' working experience in network administration (including configuring security parameters).

CompTIA A+ and Network+ are also recommended but not required.

  • Canberra Branch

    Level 2, 221 London Circuit, Canberra
  • Sydney Branch

    Level 24, 477 Pitt Street, Sydney
  • Melbourne Branch

    Level 12A, 45 William Street, Melbourne
  • Brisbane Branch

    Level 8, 201 Charlotte Street, Brisbane
  • Perth Branch

    Level 7, 553 Hay Street, Perth
  • Adelaide Branch

    Level 15, 33 King William Street, Adelaide

Check out more Cybersecurity courses in Australia

ALC Training Logo

Cyber Security For Executives

With the cyber security threat landscape constantly evolving, Executives and Directors are increasingly aware that they have a critical role in ensuring the resilience of their organisation at this time of unprecedented risk.

by ALC Training [Claim Listing ]
Chisholm Institute Logo

Certificate IV In Cyber Security

The Certificate IV in Cyber Security is a high tech and high-speed program that will prepare you with the skills and knowledge required to be job ready in a rapidly growing sector

by Chisholm Institute [Claim Listing ]
  • Price
  • Start Date
  • Duration
Brighton College Logo

Advanced Diploma of Information Technology (Telecommunications Network Engineering and Cyber Security)

This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function

by Brighton College [Claim Listing ]
Housley Logo

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents.

by Housley [Claim Listing ]
Thebarton Senior College Logo

Cybersecurity

Students gain valuable skills and knowledge that will help them to generate solutions to protect their own personal online profile from cyber security threats and to limit the potential impact of online security breaches.

by Thebarton Senior College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy