Tech Training Ticked
Select a Language
0
CompTIA Security+ (One-To-One Online)

CompTIA Security+ (One-To-One Online)

About This Course

Five days of live one-to-one training for the CompTIA Security+ qualification, plus a voucher for the exam.

We will contact you within 24 hours of enrolment to arrange convenient training dates for you - can be five consecutive days of spaced out over a longer period. Earliest start will be two weeks after enrolment to allow for tutor planning.


CompTIA Security+ is the premier global certification that establishes the essential skills required for core security functions and a career in IT security. It showcases professionals' capabilities in securing networks, applications, and devices, ensuring data integrity, confidentiality and availability. CompTIA Security+ focuses on practical, hands-on skills to tackle real-world challenges. As the most widely recognised credential, it is invaluable for advancing in the dynamic field of cybersecurity.



Security+ (V7) exam objectives summary

General security concepts (12%)

  • Security controls: comparing technical, preventive, managerial, deterrent, operational, detective, physical, corrective, compensating, and directive controls.
  • Fundamental concepts: summarizing confidentiality, integrity, and availability (CIA); non-repudiation; authentication, authorization, and accounting (AAA); zero trust; and deception/disruption technology.
  • Change management: explaining business processes, technical implications, documentation, and version control.
  • Cryptographic solutions: using public key infrastructure (PKI), encryption, obfuscation, hashing, digital signatures, and blockchain.


Threats, vulnerabilities, and mitigations (22%)

  • Threat actors and motivations: comparing nation-states, unskilled attackers, hacktivists, insider threats, organized crime, shadow IT, and motivations like data exfiltration, espionage, and financial gain.
  • Threat vectors and attack surfaces: explaining message-based, unsecure networks, social engineering, file-based, voice call, supply chain, and vulnerable software vectors.
  • Vulnerabilities: explaining application, hardware, mobile device, virtualization, operating system (OS)-based, cloud-specific, web-based, and supply chain vulnerabilities.
  • Malicious activity: analyzing malware attacks, password attacks, application attacks, physical attacks, network attacks, and cryptographic attacks.
  • Mitigation techniques: using segmentation, access control, configuration enforcement, hardening, isolation, and patching.

Security architecture (18%)

  • Architecture models: comparing on-premises, cloud, virtualization, Internet of Things (IoT), industrial control systems (ICS), and infrastructure as code (IaC).
  • Enterprise infrastructure: applying security principles to infrastructure considerations, control selection, and secure communication/access.
  • Data protection: comparing data types, securing methods, general considerations, and classifications.
  • Resilience and recovery: explaining high availability, site considerations, testing, power, platform diversity, backups, and continuity of operations

Security operations (28%)

  • Computing resources: applying secure baselines, mobile solutions, hardening, wireless security, application security, sandboxing, and monitoring.
  • Asset management: explaining acquisition, disposal, assignment, and monitoring/tracking of hardware, software, and data assets.
  • Vulnerability management: identifying, analyzing, remediating, validating, and reporting vulnerabilities.
  • Alerting and monitoring: explaining monitoring tools and computing resource activities.
  • Enterprise security: modifying firewalls, IDS/IPS, DNS filtering, DLP (data loss prevention), NAC (network access control), and EDR/XDR (endpoint/extended detection and response).
  • Identity and access management: implementing provisioning, SSO (single sign-on), MFA (multifactor authentication), and privileged access tools.
  • Automation and orchestration: explaining automation use cases, scripting benefits, and considerations.
  • Incident response: implementing processes, training, testing, root cause analysis, threat hunting, and digital forensics.
  • Data sources: using log data and other sources to support investigations.


Security program management and oversight (20%)

  • Security governance: summarizing guidelines, policies, standards, procedures, external considerations, monitoring, governance structures, and roles/responsibilities.
  • Risk management: explaining risk identification, assessment, analysis, register, tolerance, appetite, strategies, reporting, and business impact analysis (BIA).
  • Third-party risk: managing vendor assessment, selection, agreements, monitoring, questionnaires, and rules of engagement.
  • Security compliance: summarizing compliance reporting, consequences of non-compliance, monitoring, and privacy.
  • Audits and assessments: explaining attestation, internal/external audits, and penetration testing.
  • Security awareness: implementing phishing training, anomalous behavior recognition, user guidance, reporting, and monitoring.
Curriculum Overview

This course includes 0 modules, 0 lessons, and 0 hours of materials.

Certificates
1 Parts
Course Certificate
Course Certificate
If you pass all the lessons in this course, you will receive this certificate.
Type Course Certificate
Reply to Comment
Comments Approval

Your comment will be visible after admin approval.

0
0 Reviews
Content Quality (0)
Instructor Skills (0)
Value for Money (0)
Support Quality (0)
Reply to Review
Submit Reply

Your reply to this review will be visible to all users.

CompTIA Security+ (One-To-One Online)
£1,795

This Course Includes

Official Certificate
Instructor Support

Send Course as Gift

Send as a gift to friends
CompTIA Security+ (One-To-One Online)
You are viewing
CompTIA Security+ (One-To-One Online)