
CompTIA
CompTIA Security+
Categories: Online
CompTIA Security+
Categories: Online
- Overview
- Course Outline
- Association
Course Methodology
This course offers instructor-led training that includes e-books, e-labs, assessments, and exam vouchers.
Course Objectives
Upon completing this course, participants will be able to:
- Compare and contrast security controls, protocols, and network monitoring tools.
- Demonstrate the importance of resilience and recovery in security architecture.
- Monitor network activity to detect, mitigate, and address threats.
- Identify common vulnerabilities, threat vectors, and attack surfaces.
- Apply basic data center, cloud, and virtual security concepts.
- Summarize key elements of effective security compliance.
- Implement security awareness practices.
Target Audience
CompTIA Security+ certification is designed for an early-career IT Professional looking to open the door to a career in cybersecurity.
Target Competencies
- Security Concepts
- Threat Actors
- Cryptographic Solutions
- Identity and Access Management
- Enterprise Network Architecture
- Cloud Network Architecture
- Resiliency and Site Security
- Vulnerability Management
- Network Security Capabilities
- Endpoint Security
- Application Security
- Incident Response and Monitoring
- Security Governance
- Risk Management
- Data Protection
Introduction
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn.
The comprehensive training program has 16 modules:
Module 1: Summarize Fundamental Security Concepts
- 1A: Security Concepts
- 1B: Security Controls
Module 2: Compare Threat Types
- 2A: Threat Actors
- 2B: Attack Surfaces
- 2C: Social Engineering
Module 3: Explain Cryptographic Solutions
- 3A: Cryptographic Algorithms
- 3B: Public Key Infrastructure
- 3C: Cryptographic Solutions
Module 4: Implement Identity and Access Management
- 4A: Authentication
- 4B: Authorization
- 4C: Identity Management
Module 5: Secure Enterprise Network Architecture
- 5A: Enterprise Network Architecture
- 5B: Network Security Appliances
- 5C: Secure Communications
Module 6: Secure Cloud Network Architecture
- 6A: Cloud Infrastructure
- 6B: Embedded Systems and Zero Trust Architecture
Module 7: Explain Resiliency and Site Security Concepts
- 7A: Asset Management
- 7B: Redundancy Strategies
- 7C: Physical Security
Module 8: Explain Vulnerability Management
- 8A: Device and OS Vulnerabilities
- 8B: Application and Cloud Vulnerabilities
- 8C: Vulnerability Identification Methods
- 8D: Vulnerability Analysis and Remediation
Module 9: Evaluate Network Security Capabilities
- 9A: Network Security Baselines
- 9B: Network Security Capability Enhancement
Module 10: Assess Endpoint Security Capabilities
- 10A: Implement Endpoint Security
- 10B: Mobile Device Hardening
Module 11: Enhance Application Security Capabilities
- 11A: Application Protocol Security Baselines
- 11B: Cloud and Web Application Security Concepts
Module 12: Explain Incident Response and Monitoring Concepts
- 12A: Incident Response
- 12B: Digital Forensics
- 12C: Data Sources
- 12D: Alerting and Monitoring Tools
Module 13: Analyze Indicators of Malicious Activity
- 13A: Malware Attack Indicators
- 13B: Physical and Network Attack Indicators
- 13C: Application Attack Indicators
Module 14: Summarize Security Governance Concepts
- 14A: Policies, Standards, and Procedures
- 14B: Change Management
- 14C: Automation and Orchestration
Module 15: Explain Risk Management Processes
- 15A: Risk Management Processes and Concepts
- 15B: Vendor Management Concepts
- 15C: Audits and Assessments
Module 16: Summarize Data Protection and Compliance Concepts
- 16A: Data Classification and Compliance
- 16B: Personnel Policies
The Computing Technology Industry Association, commonly known as CompTIA, is an American non-profit trade association specializing in professional certifications for the information technology (IT) industry. Blue Ocean Corporation offers prestigious CompTIA certifications empowering IT professionals to excel in a digitally connected world.
- Overview
Course Methodology
This course offers instructor-led training that includes e-books, e-labs, assessments, and exam vouchers.
Course Objectives
Upon completing this course, participants will be able to:
- Compare and contrast security controls, protocols, and network monitoring tools.
- Demonstrate the importance of resilience and recovery in security architecture.
- Monitor network activity to detect, mitigate, and address threats.
- Identify common vulnerabilities, threat vectors, and attack surfaces.
- Apply basic data center, cloud, and virtual security concepts.
- Summarize key elements of effective security compliance.
- Implement security awareness practices.
Target Audience
CompTIA Security+ certification is designed for an early-career IT Professional looking to open the door to a career in cybersecurity.
Target Competencies
- Security Concepts
- Threat Actors
- Cryptographic Solutions
- Identity and Access Management
- Enterprise Network Architecture
- Cloud Network Architecture
- Resiliency and Site Security
- Vulnerability Management
- Network Security Capabilities
- Endpoint Security
- Application Security
- Incident Response and Monitoring
- Security Governance
- Risk Management
- Data Protection
- Course Outline
Introduction
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn.
The comprehensive training program has 16 modules:
Module 1: Summarize Fundamental Security Concepts
- 1A: Security Concepts
- 1B: Security Controls
Module 2: Compare Threat Types
- 2A: Threat Actors
- 2B: Attack Surfaces
- 2C: Social Engineering
Module 3: Explain Cryptographic Solutions
- 3A: Cryptographic Algorithms
- 3B: Public Key Infrastructure
- 3C: Cryptographic Solutions
Module 4: Implement Identity and Access Management
- 4A: Authentication
- 4B: Authorization
- 4C: Identity Management
Module 5: Secure Enterprise Network Architecture
- 5A: Enterprise Network Architecture
- 5B: Network Security Appliances
- 5C: Secure Communications
Module 6: Secure Cloud Network Architecture
- 6A: Cloud Infrastructure
- 6B: Embedded Systems and Zero Trust Architecture
Module 7: Explain Resiliency and Site Security Concepts
- 7A: Asset Management
- 7B: Redundancy Strategies
- 7C: Physical Security
Module 8: Explain Vulnerability Management
- 8A: Device and OS Vulnerabilities
- 8B: Application and Cloud Vulnerabilities
- 8C: Vulnerability Identification Methods
- 8D: Vulnerability Analysis and Remediation
Module 9: Evaluate Network Security Capabilities
- 9A: Network Security Baselines
- 9B: Network Security Capability Enhancement
Module 10: Assess Endpoint Security Capabilities
- 10A: Implement Endpoint Security
- 10B: Mobile Device Hardening
Module 11: Enhance Application Security Capabilities
- 11A: Application Protocol Security Baselines
- 11B: Cloud and Web Application Security Concepts
Module 12: Explain Incident Response and Monitoring Concepts
- 12A: Incident Response
- 12B: Digital Forensics
- 12C: Data Sources
- 12D: Alerting and Monitoring Tools
Module 13: Analyze Indicators of Malicious Activity
- 13A: Malware Attack Indicators
- 13B: Physical and Network Attack Indicators
- 13C: Application Attack Indicators
Module 14: Summarize Security Governance Concepts
- 14A: Policies, Standards, and Procedures
- 14B: Change Management
- 14C: Automation and Orchestration
Module 15: Explain Risk Management Processes
- 15A: Risk Management Processes and Concepts
- 15B: Vendor Management Concepts
- 15C: Audits and Assessments
Module 16: Summarize Data Protection and Compliance Concepts
- 16A: Data Classification and Compliance
- 16B: Personnel Policies
- Association
The Computing Technology Industry Association, commonly known as CompTIA, is an American non-profit trade association specializing in professional certifications for the information technology (IT) industry. Blue Ocean Corporation offers prestigious CompTIA certifications empowering IT professionals to excel in a digitally connected world.