CompTIA Security+ Certification Training
Video training course for the brand new version of the CompTIA Security+ SY0-601 and SY0-701 exam.
CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
Through a combination of lectures, hands-on labs, and practice exams, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities.
CompTIA Security+ Roles
The exam syllabus covers a broad range of topics equipping you to work in a number of roles. You can progress onto more advanced IT certifications such as the CompTIA PenTest+, Certified Ethical Hacker, Linux Security Administrator, Wireless Security Professional, or an Advanced Security Practitioner.
Typical Security+ roles include:
- Cybersecurity support
- Network security engineer
- Security specialist
- Security analyst
- Security helpdesk
CompTIA Security+ Exam Pass
Nick used our CompTIA Security+ training course to pass his exam on the first try. Most students take two or three attempts to pass the Sec+ exam ($370 per attempt).
Passing the Security+ exam requires at least three months of study. You need to master the theory but also complete many hands-on labs so you really understand the software and protocols.
Passing the Security Plus certification provides the perfect starting point for a career in IT security including Cyber Ops operations, security support, wireless security engineer, or security analyst.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.
Jay is CCIE 59340 and is a seasoned Solution Network Architect/Engineer with 15 years of total experience in IT service management, operations, system integration, network engineering, and enterprise architecture. He obtained a Cisco CCIE Data Center certification and holds a Bachelor's degree in Electronics and Communications Engineering.
He currently lives in the Philippines..
- Over 16 hours of video training
- Instructor guided labs
- End-of-module exams
- End-of-course certificate
- Access to members-only forum
- Exam vendor – N/A
- Prerequisites – None
- Recommended – Network+
|General Security Concepts
|Control Categories and Types
|Deception and Disruption
|Business Processes on Security Operation
|Public Key Infrastructure (PKI)
|Threats, Vulnerabilities, and Mitigations
|Threat Actors, Vectors and Intelligent Sources
|Types of Attacks
|Indicators of Compromise
|Security Concepts in Enterprise Environments
|Virtualization and Cloud Computing
|Securing Enterprise Infrastructure
|Strategies to Protect Data
|Resiliency and Recovery in Security Architecture
|Security Implications of Embedded and Specialized Systems
|Host and Application Security Solutions
|Wireless Security Settings
|Secure Mobile Solutions
|Hardware, Software and Data Asset Management
|Vulnerability Management Activities
|Security Alerting and Monitoring
|Enterprise Capabilities for Security Enhancement
|Authentication and Authorization Design
|Automation and Orchestration in Security Operations
|Incident Response Activities
|Security Program Management and Oversight
|Audits and Attestation
|Cisco Packet Tracer Tour
|Implementing Common Network Services
|Enable Local and Server Based AAA Authentication
|Implement IPSEC Site-to-Site VPN
|Configure Firewall Settings
|Lab Preparation (Vmware Workstation, Windows and Kali Linux VM installation)
|Cyber Attack Lab - Force High CPU and Memory on a Windows Machine
|Cyber Attack Lab - Creating Standalone Payloads in Kali Linux
|Social Engineering - Performing Reconnaissance