BRAND NEW: Our Two-Day Certified PM² Foundation Is Now Available. Book Your Places For £899 + VAT! Learn more

Please Note: You can book this course and hold it in credit until you have decided on a specific course date. Alternatively, please view our other course dates

The CompTIA Security+ will verify that you have the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions, monitor and secure hybrid environments, including cloud, mobile, and IoT, operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyse, and respond to security events and incidents.

After completing our CompTIA Security+ training course, you should be able to:

  • Compare security roles and security controls
  • Explain threat actors and threat intelligence
  • Perform security assessments and identify social engineering attacks and malware types
  • Summarise basic cryptographic concepts and implement public key infrastructure
  • Implement authentication controls
  • Implement identity and account management controls
  • Implement secure network designs, network security appliances, and secure network protocols
  • Implement host, embedded/Internet of Things, and mobile security solutions
  • Implement secure cloud solutions
  • Explain data privacy and protection concepts
  • Perform incident response and digital forensics
  • Summarise risk management concepts and implement cybersecurity resilience
  • Explain physical security

Comparing Security Roles and Security Controls

  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types

Explaining Threat Actors and Threat Intelligence

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources

Performing Security Assessments

  • Assess Organisational Security with Network
  • Reconnaissance Tools
  • Explain Security Concerns with General Vulnerability Types
  • Summarise Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts

Identifying Social Engineering and Malware

  • Compare and Contrast Social Engineering Techniques
  • Analyse Indicators of Malware-Based Attacks

Summarising Basic Cryptographic Concepts

  • Compare and Contrast Cryptographic Ciphers
  • Summarise Cryptographic Modes of Operation
  • Summarise Cryptographic Use Cases and Weaknesses
  • Summarise Other Cryptographic Technologies

Implementing Public Key Infrastructure

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management

Implementing Authentication Controls

  • Summarise Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarise Biometrics Authentication Concepts

Implementing Identity and Account Management Controls

  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorisation Solutions
  • Explain the Importance of Personnel Policies

Implementing Secure Network Designs

  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers

Implementing Network Security Appliances

  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM

Implementing Secure Network Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols

Implementing Host Security Solutions

  • Implement Secure Firmware
  • Implement Endpoint Security
  • Explain Embedded System Security Implications

Implementing Secure Mobile Solutions

  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections

Summarising Secure Application Concepts

  • Analyse Indicators of Application Attacks
  • Analyse Indicators of Web Application Attacks
  • Summarise Secure Coding Practices
  • Implement Secure Script Environments
  • Summarise Deployment and Automation Concepts

Implementing Secure Cloud Solutions

  • Summarise Secure Cloud and Virtualisation Services
  • Apply Cloud Security Solutions
  • Summarise Infrastructure as Code Concepts

Explaining Data Privacy and Protection Concepts

  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls

Performing Incident Response

  • Summarise Incident Response Procedures
  • Utilise Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls

Explaining Digital Forensics

  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition

Summarising Risk Management Concepts

  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts

Implementing Cybersecurity Resilience

  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies

Explaining Physical Security

  • Explain the Importance of Physical Site Security Controls
  • Explain the Importance of Physical Host Security Controls

Labs

  • 01: Assisted Lab: Exploring the Lab Environment
  • 02: Assisted Lab: Scanning and Identifying Network Nodes
  • 03: Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
  • 04: Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan
  • 05: Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor
  • 06: Applied Lab: Performing Network Reconnaissance and Vulnerability Scanning
  • 07: Assisted Lab: Managing the Life Cycle of a Certificate
  • 08: Assisted Lab: Managing Certificates with OpenSSL
  • 09: Assisted Lab: Auditing Passwords with a Password Cracking Utility
  • 10: Assisted Lab: Managing Centralized Authentication
  • 11: Assisted Lab: Managing Access Controls in Windows Server
  • 12: Assisted Lab: Configuring a System for Auditing Policies
  • 13: Assisted Lab: Managing Access Controls in Linux
  • 14: Applied Lab: Configuring Identity and Access Management Controls
  • 15: Assisted Lab: Implementing a Secure Network Design
  • 16: Assisted Lab: Configuring a Firewall
  • 17: Assisted Lab: Configuring an Intrusion Detection System
  • 18: Assisted Lab: Implementing Secure Network Addressing Services
  • 19: Assisted Lab: Implementing a Virtual Private Network
  • 20: Assisted Lab: Implementing a Secure SSH Server
  • 21: Assisted Lab: Implementing Endpoint Protection
  • 22: Applied Lab: Securing the Network Infrastructure
  • 23: Assisted Lab: Identifying Application Attack Indicators
  • 24: Assisted Lab: Identifying a Browser Attack
  • 25: Assisted Lab: Implementing PowerShell Security
  • 26: Assisted Lab: Identifying Malicious Code

Our CompTIA Security+ training course is suitable for those whose job responsibilities include securing network services, devices, and data confidentiality/privacy in your organisation.

Our CompTIA Security+ training course includes the following:

  • Full Course Materials
  • CompTIA Security+ Exam Preparation

You should meet the following prerequisites:

  • Basic Windows and Linux administrator skills
  • The ability to implement fundamental networking appliances and IP addressing concepts
  • Six to nine months' experience in networking, including configuring security parameters, are strongly recommended.
  • CompTIA Network+ Certificate

There is no recommended reading with our CompTIA Security+ training course.

The following examinations are NOT included in our CompTIA Security+ training course:

  • SY0-601 Exam - CompTIA Security+
Proctored Exam
CompTIA Security+ Certificate

Our five-day CompTIA Network+ training course will validate your knowledge and skills to troubleshoot, configure and manage common wired and wireless network.

The CompTIA Security+ certification demonstrates your knowledge of industry-wide information assurance topics, like systems security, network infrastructure, access control, assessments and audits, cryptography, and organisational security.

FAQS

Our CompTIA Security+ training course is delivered over five days.

INFORMATION

CompTIA Security+ Course Dates

Course date
Course Date

Course location
Location

Now only £2595 + VAT

1

Why Choose Us?

We Are Here To Help You Pass

All of our trainers have achieved exceptionally high delegate pass rates for accredited examinations for all our courses. We also offer complimentary pre and post-course support for any questions you may have.

We Are Flexible

We try and be as flexible as we can and accommodate your needs. We can swap delegates at any time with no charge. We can also create bespoke content should this be required.

We Are The Specialists

We specialise in IT Service and Project Management. All of our Trainers and Consultants have considerable years of hands-on experience in IT Service / Project Management, working across a wide number of industry sectors.

We Are Professionals

Our training, sales and admin staff are all professional, helpful, friendly and approachable. We believe in providing excellent customer service. You will always have a dedicated friendly Account Manager