Security+ Boot Camp

Five Days • Instructor-led

The Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam (SY0-601). Objective coverage is marked throughout the course.

Our Security+ courseware has received the CompTIA Approved Quality Content (CAQC) validation, assuring that all test objectives are covered in the training material.

Exams Included:

  • SY0-601

At CompTIA Training Course Completion

In the Security+ Certification Prep Course, you will learn to:

  • Proactively implement sound security protocols to mitigate security risks
  • Quickly respond to security issues
  • Retroactively identify where security breaches may have occurred
  • Design a network, on-site or in the cloud, with security in mind

Prerequisites

This course assumes basic knowledge of using and maintaining individual workstations.

Attendees should be CompTIA A+ certified (or have equivalent experience) and CompTIA Network+ certified (or have equivalent experience) with 2-3 years networking experience.

Course Outline

Chapter 1: Security Fundamentals

  • Module A: Security concepts
  • Module B: Risk management
  • Module C: Vulnerability assessment

Chapter 2: Understanding attacks

  • Module A: Understanding attackers
  • Module B: Social engineering
  • Module C: Malware
  • Module D: Network attacks
  • Module E: Application attacks

Chapter 3: Cryptography

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure

Chapter 4: Network fundamentals

  • Module A: Network components
  • Module B: Network addressing
  • Module C: Network ports and applications

Chapter 5: Securing networks

  • Module A: Network security components
  • Module B: Transport encryption
  • Module C: Hardening networks
  • Module D: Monitoring and detection

Chapter 6: Securing hosts and data

  • Module A: Securing hosts
  • Module B: Securing data
  • Module C: Mobile device security

Chapter 7: Securing network services

  • Module A: Securing applications
  • Module B: Virtual and cloud systems

Chapter 8: Authentication

  • Module A: Authentication factors
  • Module B: Authentication protocols

Chapter 9: Access control

  • Module A: Access control principles
  • Module B: Account management

Chapter 10: Organizational security

  • Module A: Security policies
  • Module B: User training
  • Module C: Physical security and safety

Chapter 11: Disaster planning and recovery

  • Module A: Business continuity
  • Module B: Fault tolerance and recovery
  • Module C: Incident response