The CompTIA Security+ certification training will enable learners to gain knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; operate with an awareness of applicable policies, laws, and regulations. Upon successfully validating their skills by passing the certification exam learners will be able to perform these tasks to support the principles of confidentiality, integrity, and availability.
CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. Once you obtain your Security+ you automatically have the CE designation required in the DoD Directive 8570.01 manual and going forward must comply with the CE program requirement of completing 50 CEUs in three years to maintain the credential. Security+ is also compliant with government regulations under the Federal Information Security Management Act (FISMA).
According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers earn over $86,000 per year.
- Comprehend Risk identification and mitigation
- Provide operational, information, application and infrastructure level security
- Secure the network to maintain availability, integrity and confidentiality of critical information
- Operate within a set of rules, policies and regulations wherever applicable
The course is ideal for professionals in the role of a
- Systems Administrator
- Network Administrator
- Security Administrator
- Junior IT Auditor/Penetration Tester
1.2 LAN Security
1.5 Transport Layer Security
1.8 Advanced IDS
1.9 Advanced Perimeter Security
2.1 Principles of Security
2.2 Risk Management
2.3 Physical Security
2.4 Environmental Security
2.5 Data Classification
2.6 Operational Security
2.7 Incident Response
2.8 Change Management
2.9 Disaster Recovery
3.3 DNS Security
3.4 Social Engineering
3.5 Wireless Attacks
3.6 Advanced Wireless Security
3.7 Cross Site Scripting-XSS Attacks
3.8 Buffer Overflows
3.9 Security Testing Tools
3.10 Security Information and Event Management
3.11 Platform Hardening and Baselining
3.13 Vulnerability Assessment and Pen Testing
4.1 Application Design Flaws and Bugs
4.2 Mobile Security and Device Management
4.3 Key Management
4.4 Virtualization and Cloud Security
4.5 Securing Storage and Storage Platforms
4.6 Information Lifecycle Management
4.7 Hacking IoT
4.8 Securing the Power Grid
5.1 Access Controls
5.3 Single Sign On
5.4 Identity Federation
5.5 Id Governance
6.2 Advanced Cryptography
6.3 Message Authentication Codes
6.4 Crypto Algorithms
6.5 A Note On Salting
6.6 Public Key Infrastructure
6.7 PKI Management
We offer course completion certificate after you successfully complete the training program.
Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.
Please raise a request via our Help and Support portal to have your issue resolved.
There are no reviews yet.