CompTIA Security+ Course

Course

Online

Save 50%

Special Emagister price

£ 195 £ 395 VAT inc.

Call the centre

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

"Course Description

This CompTIA Security+ course offers invaluable preparation for the latest CompTIA security Exam SY0-501.

Students will learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this course helps you consolidate your knowledge base in preparation for the Security+ exam.

We use real life examples to illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application.

This CompTIA security+ course covers security concerns from both a professional setting and on a personal level. Topics are covered from a ground up perspective to ensure inexperienced students have a clear understanding of the course content. We expand beyond the scope of the CompTIA certification exam SY0-501 objectives to allow for real life application.

This course has been designed to align with the latest version of the CompTIA security exam.

Master essential security technologies, tools, and tasks
Understand how Security+ concepts are applied in the real world
Test your knowledge along the way with practice questions

To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyse and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you're ready to take the first step toward a rewarding IT security career, this CompTIA Security+ course is ideal for a thorough exam preparation.

Entry Requirements

it is recommended that you earn the CompTIA Network+ certification before studying the CompTIA Security+ course.

Bulk discounts
"

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

"Who Is This Course For?

This course is aimed at individuals and teams looking to learn more about IT security and prepare for the latest CompTIA security Exam SY0-501.

Our online course is a cost-effective and successful approach for many individuals and teams. It provides a flexible learning method, allowing candidates to schedule learning at a time that suits them and fits in with other commitments; ideal for those who find it difficult to take time away from their workplace. It also allows candidates to work at their own pace, and revisit sections of the course as often as needed, leading to a fuller understanding of all the topics covered.

In addition, there are none of the high costs of travel and accommodation associated with courses at an external venue."

"Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player."

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Risk
  • Access
  • Networking
  • Risk Management
  • Testing
  • Network
  • Algorithms
  • Design
  • Systems
  • IT risk
  • Application Development
  • Network Training
  • Wireless
  • Architecture Design

Course programme

"

Course Outline


Course Outline

Module 1 - Threats, Attacks, and Vulnerabilities

  • 1.1 Introduction
  • 1.2 Types Of Malware - Part 1
  • 1.3 Types Of Malware - Part 2
  • 1.4 Types Of Attacks - Part 1
  • 1.5 Types Of Attacks - Part 2
  • 1.6 Types Of Attacks - Part 3
  • 1.7 Types Of Attacks - Part 4
  • 1.8 Types Of Attacks - Part 5
  • 1.9 Threat Actors - Part 1
  • 1.10 Threat Actors - Part 2
  • 1.11 Penetration Testing And Vulnerability Scanning - Part 1
  • 1.12 Penetration Testing And Vulnerability Scanning - Part 2
  • 1.13 Impact Of Vulnerabilities - Part 1
  • 1.14 Impact Of Vulnerabilities - Part 2

Module 2 - Technologies and Tools

  • 2.1 Networking Hardware And Software - Part 1
  • 2.2 Networking Hardware And Software - Part 2
  • 2.3 Networking Hardware And Software - Part 3
  • 2.4 Networking Hardware And Software - Part 4
  • 2.5 Networking Hardware And Software - Part 5
  • 2.6 Networking Hardware And Software - Part 6
  • 2.7 Security Assessment - Part 1
  • 2.8 Security Assessment - Part 2
  • 2.9 Troubleshooting Issues - Part 1
  • 2.10 Troubleshooting Issues - Part 2
  • 2.11 Securing Mobile Devices - Part 1
  • 2.12 Securing Mobile Devices - Part 2
  • 2.13 Securing Mobile Devices - Part 3
  • 2.14 Securing Mobile Devices - Part 4
  • 2.15 Secure Protocols - Part 1
  • 2.16 Secure Protocols - Part 2

Module 3 - Architecture and Design

  • 3.1 Secure Network Architecture - Part 1
  • 3.2 Secure Network Architecture - Part 2
  • 3.3 Secure System Designs - Part 1
  • 3.4 Secure System Designs - Part 2
  • 3.5 Secure Staging Deployment Concepts
  • 3.6 Embedded Systems - Part 1
  • 3.7 Embedded Systems - Part 2
  • 3.8 Application Development And Deployment - Part 1
  • 3.9 Application Development And Deployment - Part 2
  • 3.10 Application Development And Deployment - Part 3
  • 3.11 Physical Security Controls - Part 1
  • 3.12 Physical Security Controls - Part 2
  • 3.13 Physical Security Controls - Part 3
  • 3.14 Cloud Virtualization - Part 1
  • 3.15 Cloud Virtualization - Part 2

Module 4 - Identity and Access Management

  • 4.1 Identity And Access Management - Part 1
  • 4.2 Identity And Access Management - Part 2
  • 4.3 Identity And Access Services - Part 1
  • 4.4 Identity And Access Services - Part 2
  • 4.5 Management Controls - Part 1
  • 4.6 Management Controls - Part 2
  • 4.7 Account Management Practices - Part 1
  • 4.8 Account Management Practices - Part 2
  • 4.9 Account Management Practices - Part 3

Module 5 - Risk Management

  • 5.1 Organizational Security - Part 1
  • 5.2 Organizational Security - Part 2
  • 5.3 Business Impact Analysis Concepts - Part 1
  • 5.4 Business Impact Analysis Concepts - Part 2
  • 5.5 Risk Management - Part 1
  • 5.6 Risk Management - Part 2
  • 5.7 Incident Response Procedures - Part 1
  • 5.8 Incident Response Procedures - Part 2
  • 5.9 Forensics - Part 1
  • 5.10 Forensics - Part 2
  • 5.11 Disaster Recovery - Part 1
  • 5.12 Disaster Recovery - Part 2
  • 5.13 Types Of Control - Part 1
  • 5.14 Types Of Control - Part 2
  • 5.15 Data Security And Privacy Practices - Part 1
  • 5.16 Data Security And Privacy Practices - Part 2

Module 6 - Cryptography and PKI

  • 6.1 Cryptographic Basics - Part 1
  • 6.2 Cryptographic Basics - Part 2
  • 6.3 Cryptographic Basics - Part 3
  • 6.4 Cryptographic Algorithms - Part 1
  • 6.5 Cryptographic Algorithms - Part 2
  • 6.6 Wireless Security - Part 1
  • 6.7 Wireless Security - Part 2
  • 6.8 Implementing PKI - Part 1
  • 6.9 Implementing PKI - Part 2
  • 6.10 Implementing PKI - Part 3
  • 6.11 Conclusion


Module 1 - Threats, Attacks, and Vulnerabilities


Module 1 - Threats, Attacks, and Vulnerabilities
  • 1.1 Introduction
  • 1.2 Types Of Malware - Part 1
  • 1.3 Types Of Malware - Part 2
  • 1.4 Types Of Attacks - Part 1
  • 1.5 Types Of Attacks - Part 2
  • 1.6 Types Of Attacks - Part 3
  • 1.7 Types Of Attacks - Part 4
  • 1.8 Types Of Attacks - Part 5
  • 1.9 Threat Actors - Part 1
  • 1.10 Threat Actors - Part 2
  • 1.11 Penetration Testing And Vulnerability Scanning - Part 1
  • 1.12 Penetration Testing And Vulnerability Scanning - Part 2
  • 1.13 Impact Of Vulnerabilities - Part 1
  • 1.14 Impact Of Vulnerabilities - Part 2

  • 1.1 Introduction

  • 1.2 Types Of Malware - Part 1

  • 1.3 Types Of Malware - Part 2

  • 1.4 Types Of Attacks - Part 1

  • 1.5 Types Of Attacks - Part 2

  • 1.6 Types Of Attacks - Part 3

  • 1.7 Types Of Attacks - Part 4

  • 1.8 Types Of Attacks - Part 5

  • 1.9 Threat Actors - Part 1

  • 1.10 Threat Actors - Part 2

  • 1.11 Penetration Testing And Vulnerability Scanning - Part 1

  • 1.12 Penetration Testing And Vulnerability Scanning - Part 2

  • 1.13 Impact Of Vulnerabilities - Part 1

  • 1.14 Impact Of Vulnerabilities - Part 2

  • Module 2 - Technologies and Tools


    Module 2 - Technologies and Tools
    • 2.1 Networking Hardware And Software - Part 1
    • 2.2 Networking Hardware And Software - Part 2
    • 2.3 Networking Hardware And Software - Part 3
    • 2.4 Networking Hardware And Software - Part 4
    • 2.5 Networking Hardware And Software - Part 5
    • 2.6 Networking Hardware And Software - Part 6
    • 2.7 Security Assessment - Part 1
    • 2.8 Security Assessment - Part 2
    • 2.9 Troubleshooting Issues - Part 1
    • 2.10 Troubleshooting Issues - Part 2
    • 2.11 Securing Mobile Devices - Part 1
    • 2.12 Securing Mobile Devices - Part 2
    • 2.13 Securing Mobile Devices - Part 3
    • 2.14 Securing Mobile Devices - Part 4
    • 2.15 Secure Protocols - Part 1
    • 2.16 Secure Protocols - Part 2

  • 2.1 Networking Hardware And Software - Part 1

  • 2.2 Networking Hardware And Software - Part 2

  • 2.3 Networking Hardware And Software - Part 3

  • 2.4 Networking Hardware And Software - Part 4

  • 2.5 Networking Hardware And Software - Part 5

  • 2.6 Networking Hardware And Software - Part 6

  • 2.7 Security Assessment - Part 1

  • 2.8 Security Assessment - Part 2

  • 2.9 Troubleshooting Issues - Part 1

  • 2.10 Troubleshooting Issues - Part 2

  • 2.11 Securing Mobile Devices - Part 1

  • 2.12 Securing Mobile Devices - Part 2

  • 2.13 Securing Mobile Devices - Part 3

  • 2.14 Securing Mobile Devices - Part 4

  • 2.15 Secure Protocols - Part 1

  • 2.16 Secure Protocols - Part 2

  • Module 3 - Architecture and Design


    Module 3 - Architecture and Design
    • 3.1 Secure Network Architecture - Part 1
    • 3.2 Secure Network Architecture - Part 2
    • 3.3 Secure System Designs - Part 1
    • 3.4 Secure System Designs - Part 2
    • 3.5 Secure Staging Deployment Concepts
    • 3.6 Embedded Systems - Part 1
    • 3.7 Embedded Systems - Part 2
    • 3.8 Application Development And Deployment - Part 1
    • 3.9 Application Development And Deployment - Part 2
    • 3.10 Application Development And Deployment - Part 3
    • 3.11 Physical Security Controls - Part 1
    • 3.12 Physical Security Controls - Part 2
    • 3.13 Physical Security Controls - Part 3
    • 3.14 Cloud Virtualization - Part 1
    • 3.15 Cloud Virtualization - Part 2

  • 3.1 Secure Network Architecture - Part 1

  • 3.2 Secure Network Architecture - Part 2

  • 3.3 Secure System Designs - Part 1

  • 3.4 Secure System Designs - Part 2

  • 3.5 Secure Staging Deployment Concepts

  • 3.6 Embedded Systems - Part 1

  • 3.7 Embedded Systems - Part 2

  • 3.8 Application Development And Deployment - Part 1

  • 3.9 Application Development And Deployment - Part 2

  • 3.10 Application Development And Deployment - Part 3

  • 3.11 Physical Security Controls - Part 1

  • 3.12 Physical Security Controls - Part 2

  • 3.13 Physical Security Controls - Part 3

  • 3.14 Cloud Virtualization - Part 1

  • 3.15 Cloud Virtualization - Part 2

  • Module 4 - Identity and Access Management


    Module 4 - Identity and Access Management
    • 4.1 Identity And Access Management - Part 1
    • 4.2 Identity And Access Management - Part 2
    • 4.3 Identity And Access Services - Part 1
    • 4.4 Identity And Access Services - Part 2
    • 4.5 Management Controls - Part 1
    • 4.6 Management Controls - Part 2
    • 4.7 Account Management Practices - Part 1
    • 4.8 Account Management Practices - Part 2
    • 4.9 Account Management Practices - Part 3

  • 4.1 Identity And Access Management - Part 1

  • 4.2 Identity And Access Management - Part 2

  • 4.3 Identity And Access Services - Part 1

  • 4.4 Identity And Access Services - Part 2

  • 4.5 Management Controls - Part 1

  • 4.6 Management Controls - Part 2

  • 4.7 Account Management Practices - Part 1

  • 4.8 Account Management Practices - Part 2

  • 4.9 Account Management Practices - Part 3

  • Module 5 - Risk Management


    Module 5 - Risk Management
    • 5.1 Organizational Security - Part 1
    • 5.2 Organizational Security - Part 2
    • 5.3 Business Impact Analysis Concepts - Part 1
    • 5.4 Business Impact Analysis Concepts - Part 2
    • 5.5 Risk Management - Part 1
    • 5.6 Risk Management - Part 2
    • 5.7 Incident Response Procedures - Part 1
    • 5.8 Incident Response Procedures - Part 2
    • 5.9 Forensics - Part 1
    • 5.10 Forensics - Part 2
    • 5.11 Disaster Recovery - Part 1
    • 5.12 Disaster Recovery - Part 2
    • 5.13 Types Of Control - Part 1
    • 5.14 Types Of Control - Part 2
    • 5.15 Data Security And Privacy Practices - Part 1
    • 5.16 Data Security And Privacy Practices - Part 2

  • 5.1 Organizational Security - Part 1

  • 5.2 Organizational Security - Part 2

  • 5.3 Business Impact Analysis Concepts - Part 1

  • 5.4 Business Impact Analysis Concepts - Part 2

  • 5.5 Risk Management - Part 1

  • 5.6 Risk Management - Part 2

  • 5.7 Incident Response Procedures - Part 1

  • 5.8 Incident Response Procedures - Part 2

  • 5.9 Forensics - Part 1

  • 5.10 Forensics - Part 2

  • 5.11 Disaster Recovery - Part 1

  • 5.12 Disaster Recovery - Part 2

  • 5.13 Types Of Control - Part 1

  • 5.14 Types Of Control - Part 2

  • 5.15 Data Security And Privacy Practices - Part 1

  • 5.16 Data Security And Privacy Practices - Part 2

  • Module 6 - Cryptography and PKI


    Module 6 - Cryptography and PKI
    • 6.1 Cryptographic Basics - Part 1
    • 6.2 Cryptographic Basics - Part 2
    • 6.3 Cryptographic Basics - Part 3
    • 6.4 Cryptographic Algorithms - Part 1
    • 6.5 Cryptographic Algorithms - Part 2
    • 6.6 Wireless Security - Part 1
    • 6.7 Wireless Security - Part 2
    • 6.8 Implementing PKI - Part 1
    • 6.9 Implementing PKI - Part 2
    • 6.10 Implementing PKI - Part 3
    • 6.11 Conclusion

  • 6.1 Cryptographic Basics - Part 1

  • 6.2 Cryptographic Basics - Part 2

  • 6.3 Cryptographic Basics - Part 3

  • 6.4 Cryptographic Algorithms - Part 1

  • 6.5 Cryptographic Algorithms - Part 2

  • 6.6 Wireless Security - Part 1

  • 6.7 Wireless Security - Part 2

  • 6.8 Implementing PKI - Part 1

  • 6.9 Implementing PKI - Part 2

  • 6.10 Implementing PKI - Part 3

  • 6.11 Conclusion

  • "

    Call the centre

    CompTIA Security+ Course

    Special Emagister price

    £ 195 £ 395 VAT inc.