CompTIA Security+ Course
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
"Course Description
This CompTIA Security+ course offers invaluable preparation for the latest CompTIA security Exam SY0-501.
Students will learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this course helps you consolidate your knowledge base in preparation for the Security+ exam.
We use real life examples to illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application.
This CompTIA security+ course covers security concerns from both a professional setting and on a personal level. Topics are covered from a ground up perspective to ensure inexperienced students have a clear understanding of the course content. We expand beyond the scope of the CompTIA certification exam SY0-501 objectives to allow for real life application.
This course has been designed to align with the latest version of the CompTIA security exam.
Master essential security technologies, tools, and tasks
Understand how Security+ concepts are applied in the real world
Test your knowledge along the way with practice questions
To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyse and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you're ready to take the first step toward a rewarding IT security career, this CompTIA Security+ course is ideal for a thorough exam preparation.
Entry Requirements
it is recommended that you earn the CompTIA Network+ certification before studying the CompTIA Security+ course.
Bulk discounts
"
Important information
Price for Emagister users:
Facilities
Location
Start date
Start date
About this course
"Who Is This Course For?
This course is aimed at individuals and teams looking to learn more about IT security and prepare for the latest CompTIA security Exam SY0-501.
Our online course is a cost-effective and successful approach for many individuals and teams. It provides a flexible learning method, allowing candidates to schedule learning at a time that suits them and fits in with other commitments; ideal for those who find it difficult to take time away from their workplace. It also allows candidates to work at their own pace, and revisit sections of the course as often as needed, leading to a fuller understanding of all the topics covered.
In addition, there are none of the high costs of travel and accommodation associated with courses at an external venue."
"Requirements
Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.
For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player."
Reviews
Subjects
- Risk
- Access
- Networking
- Risk Management
- Testing
- Network
- Algorithms
- Design
- Systems
- IT risk
- Application Development
- Network Training
- Wireless
- Architecture Design
Course programme
Course Outline
Course Outline
Module 1 - Threats, Attacks, and Vulnerabilities
- 1.1 Introduction
- 1.2 Types Of Malware - Part 1
- 1.3 Types Of Malware - Part 2
- 1.4 Types Of Attacks - Part 1
- 1.5 Types Of Attacks - Part 2
- 1.6 Types Of Attacks - Part 3
- 1.7 Types Of Attacks - Part 4
- 1.8 Types Of Attacks - Part 5
- 1.9 Threat Actors - Part 1
- 1.10 Threat Actors - Part 2
- 1.11 Penetration Testing And Vulnerability Scanning - Part 1
- 1.12 Penetration Testing And Vulnerability Scanning - Part 2
- 1.13 Impact Of Vulnerabilities - Part 1
- 1.14 Impact Of Vulnerabilities - Part 2
Module 2 - Technologies and Tools
- 2.1 Networking Hardware And Software - Part 1
- 2.2 Networking Hardware And Software - Part 2
- 2.3 Networking Hardware And Software - Part 3
- 2.4 Networking Hardware And Software - Part 4
- 2.5 Networking Hardware And Software - Part 5
- 2.6 Networking Hardware And Software - Part 6
- 2.7 Security Assessment - Part 1
- 2.8 Security Assessment - Part 2
- 2.9 Troubleshooting Issues - Part 1
- 2.10 Troubleshooting Issues - Part 2
- 2.11 Securing Mobile Devices - Part 1
- 2.12 Securing Mobile Devices - Part 2
- 2.13 Securing Mobile Devices - Part 3
- 2.14 Securing Mobile Devices - Part 4
- 2.15 Secure Protocols - Part 1
- 2.16 Secure Protocols - Part 2
Module 3 - Architecture and Design
- 3.1 Secure Network Architecture - Part 1
- 3.2 Secure Network Architecture - Part 2
- 3.3 Secure System Designs - Part 1
- 3.4 Secure System Designs - Part 2
- 3.5 Secure Staging Deployment Concepts
- 3.6 Embedded Systems - Part 1
- 3.7 Embedded Systems - Part 2
- 3.8 Application Development And Deployment - Part 1
- 3.9 Application Development And Deployment - Part 2
- 3.10 Application Development And Deployment - Part 3
- 3.11 Physical Security Controls - Part 1
- 3.12 Physical Security Controls - Part 2
- 3.13 Physical Security Controls - Part 3
- 3.14 Cloud Virtualization - Part 1
- 3.15 Cloud Virtualization - Part 2
Module 4 - Identity and Access Management
- 4.1 Identity And Access Management - Part 1
- 4.2 Identity And Access Management - Part 2
- 4.3 Identity And Access Services - Part 1
- 4.4 Identity And Access Services - Part 2
- 4.5 Management Controls - Part 1
- 4.6 Management Controls - Part 2
- 4.7 Account Management Practices - Part 1
- 4.8 Account Management Practices - Part 2
- 4.9 Account Management Practices - Part 3
Module 5 - Risk Management
- 5.1 Organizational Security - Part 1
- 5.2 Organizational Security - Part 2
- 5.3 Business Impact Analysis Concepts - Part 1
- 5.4 Business Impact Analysis Concepts - Part 2
- 5.5 Risk Management - Part 1
- 5.6 Risk Management - Part 2
- 5.7 Incident Response Procedures - Part 1
- 5.8 Incident Response Procedures - Part 2
- 5.9 Forensics - Part 1
- 5.10 Forensics - Part 2
- 5.11 Disaster Recovery - Part 1
- 5.12 Disaster Recovery - Part 2
- 5.13 Types Of Control - Part 1
- 5.14 Types Of Control - Part 2
- 5.15 Data Security And Privacy Practices - Part 1
- 5.16 Data Security And Privacy Practices - Part 2
Module 6 - Cryptography and PKI
- 6.1 Cryptographic Basics - Part 1
- 6.2 Cryptographic Basics - Part 2
- 6.3 Cryptographic Basics - Part 3
- 6.4 Cryptographic Algorithms - Part 1
- 6.5 Cryptographic Algorithms - Part 2
- 6.6 Wireless Security - Part 1
- 6.7 Wireless Security - Part 2
- 6.8 Implementing PKI - Part 1
- 6.9 Implementing PKI - Part 2
- 6.10 Implementing PKI - Part 3
- 6.11 Conclusion
Module 1 - Threats, Attacks, and Vulnerabilities
Module 1 - Threats, Attacks, and Vulnerabilities
- 1.1 Introduction
- 1.2 Types Of Malware - Part 1
- 1.3 Types Of Malware - Part 2
- 1.4 Types Of Attacks - Part 1
- 1.5 Types Of Attacks - Part 2
- 1.6 Types Of Attacks - Part 3
- 1.7 Types Of Attacks - Part 4
- 1.8 Types Of Attacks - Part 5
- 1.9 Threat Actors - Part 1
- 1.10 Threat Actors - Part 2
- 1.11 Penetration Testing And Vulnerability Scanning - Part 1
- 1.12 Penetration Testing And Vulnerability Scanning - Part 2
- 1.13 Impact Of Vulnerabilities - Part 1
- 1.14 Impact Of Vulnerabilities - Part 2
Module 2 - Technologies and Tools
Module 2 - Technologies and Tools
- 2.1 Networking Hardware And Software - Part 1
- 2.2 Networking Hardware And Software - Part 2
- 2.3 Networking Hardware And Software - Part 3
- 2.4 Networking Hardware And Software - Part 4
- 2.5 Networking Hardware And Software - Part 5
- 2.6 Networking Hardware And Software - Part 6
- 2.7 Security Assessment - Part 1
- 2.8 Security Assessment - Part 2
- 2.9 Troubleshooting Issues - Part 1
- 2.10 Troubleshooting Issues - Part 2
- 2.11 Securing Mobile Devices - Part 1
- 2.12 Securing Mobile Devices - Part 2
- 2.13 Securing Mobile Devices - Part 3
- 2.14 Securing Mobile Devices - Part 4
- 2.15 Secure Protocols - Part 1
- 2.16 Secure Protocols - Part 2
Module 3 - Architecture and Design
Module 3 - Architecture and Design
- 3.1 Secure Network Architecture - Part 1
- 3.2 Secure Network Architecture - Part 2
- 3.3 Secure System Designs - Part 1
- 3.4 Secure System Designs - Part 2
- 3.5 Secure Staging Deployment Concepts
- 3.6 Embedded Systems - Part 1
- 3.7 Embedded Systems - Part 2
- 3.8 Application Development And Deployment - Part 1
- 3.9 Application Development And Deployment - Part 2
- 3.10 Application Development And Deployment - Part 3
- 3.11 Physical Security Controls - Part 1
- 3.12 Physical Security Controls - Part 2
- 3.13 Physical Security Controls - Part 3
- 3.14 Cloud Virtualization - Part 1
- 3.15 Cloud Virtualization - Part 2
Module 4 - Identity and Access Management
Module 4 - Identity and Access Management
- 4.1 Identity And Access Management - Part 1
- 4.2 Identity And Access Management - Part 2
- 4.3 Identity And Access Services - Part 1
- 4.4 Identity And Access Services - Part 2
- 4.5 Management Controls - Part 1
- 4.6 Management Controls - Part 2
- 4.7 Account Management Practices - Part 1
- 4.8 Account Management Practices - Part 2
- 4.9 Account Management Practices - Part 3
Module 5 - Risk Management
Module 5 - Risk Management
- 5.1 Organizational Security - Part 1
- 5.2 Organizational Security - Part 2
- 5.3 Business Impact Analysis Concepts - Part 1
- 5.4 Business Impact Analysis Concepts - Part 2
- 5.5 Risk Management - Part 1
- 5.6 Risk Management - Part 2
- 5.7 Incident Response Procedures - Part 1
- 5.8 Incident Response Procedures - Part 2
- 5.9 Forensics - Part 1
- 5.10 Forensics - Part 2
- 5.11 Disaster Recovery - Part 1
- 5.12 Disaster Recovery - Part 2
- 5.13 Types Of Control - Part 1
- 5.14 Types Of Control - Part 2
- 5.15 Data Security And Privacy Practices - Part 1
- 5.16 Data Security And Privacy Practices - Part 2
Module 6 - Cryptography and PKI
Module 6 - Cryptography and PKI
- 6.1 Cryptographic Basics - Part 1
- 6.2 Cryptographic Basics - Part 2
- 6.3 Cryptographic Basics - Part 3
- 6.4 Cryptographic Algorithms - Part 1
- 6.5 Cryptographic Algorithms - Part 2
- 6.6 Wireless Security - Part 1
- 6.7 Wireless Security - Part 2
- 6.8 Implementing PKI - Part 1
- 6.9 Implementing PKI - Part 2
- 6.10 Implementing PKI - Part 3
- 6.11 Conclusion
"
CompTIA Security+ Course