CompTIA Security+ Course + Exam
CompTIA Security+ Certification
The latest CompTIA Security+ certification course aims to train information technology students with adequate skills and knowledge required to network security issues and efficiently tackle them. Being vendor-neutral, this CompTIA certification course imparts broad knowledge to develop expertise in security-related matters and risk management.
The updated CompTIA Security+ exam SY0-501 is recognised all over the globe for validation of basic-level of security skills and knowledge. It has been widely used by organisations, security professionals/analysts and penetration testers.
After completing CompTIA Security+ course and certification, students can demonstrate a high level of competency in the following areas:
- Network Security
- Threats and vulnerabilities
- Compliance and operational security
- Application, data and host security
- Cryptography
- Access control and identity management
This course is a key requirement for the following jobs:
- Security Architect
- Security Engineer
- Security Consultant/Specialist
- Information Assurance Technician
- Security Administrator
Basic computer security and networking knowledge
Candidates can achieve this certification by passing following Security+ exam.
- SY0-501
The certification exam cost if included in your course can be registered and attempted within 3 months of course/module completion at Logitrain training centre on weekdays during normal business hours (excludes public holidays)
CompTIA Security+ Study Guide
- Network security
- Compliance and operational security
- Threats and vulnerabilities
- Application, data and host security
- Access control and identity management
- Cryptography
This course is likely to add to the employment related skills of the participants. The skills developed are likely to be used in the course of being an employee or working in a business.
- Candidates working in the IT Security area
- IT security support staff
- Differentiating among various systems security threats
- Explaining the security risks pertaining to system hardware and peripherals
- Implementing OS hardening practices and procedures to achieve security
- Carrying out the appropriate procedures to establish application security
- Implementing security applications
- Explaining the purpose and application of virtualization technology
- Differentiating between the different ports and protocols, their respective threats
- Distinguishing between network design elements and components
- Determining the appropriate use of network security tools to facilitate network security
- Applying the appropriate network tools to facilitate network security
- Explaining the vulnerabilities and mitigation strategies associated with network devices
- Explaining the vulnerabilities and mitigation strategies associated with various transmission media
- Explaining the vulnerabilities and implement mitigation strategies associated with wireless networking
- Identifying and applying industry best practices for access control methods
- Explaining common access control models and the differences between each
- Organizing users and computers into appropriate security groups and roles
- Applying appropriate security controls to file and print resources
- Comparing and implement logical access control methods
- Summarizing the various authentication models and identify the components of each
- Deploying various authentication models and identify the components of each
- Explaining the difference between identification and authentication (identity proofing)
- Explaining and applying physical access security methods
- Conducting risk assessments and implementing risk mitigation
- Carrying out vulnerability assessments using common tools
- Explaining the use of penetration testing versus vulnerability scanning
- Using monitoring tools on systems and networks and detecting security-related anomalies
- Comparing various types of monitoring methodologies
- Executing proper logging procedures and evaluating the results
- Conducting periodic audits of system security settings
- Explaining general cryptography concepts
- Explaining basic hashing concepts and mapping various algorithms to appropriate applications
- Explaining basic encryption concepts and mapping various algorithms to appropriate applications
- Explaining and implementing protocols
- Explaining core concepts of public key cryptography
- Implementing PKI and certificate management
- Explaining redundancy planning and its components
- Implementing disaster recovery procedures
- Differentiating between and executing appropriate incident response procedures
- Identifying and explaining applicable legislation and organizational policies
- Explaining the importance of environmental controls
- Explaining the concept of how to reduce the risks of social engineering
Includes Official Exam Fee
Take the certification exam within 3 months of course / module completion
100% Money Back Guarantee
Training fee is fully refundable if you are not satisfied with the training
Includes Course Material
Course material in hardcopy is included for you to keep for reference and support
Includes Practise Questions
Practise questions are included to assist you in preparing for the official exam
Highly Skilled Trainers
Our trainers are highly skilled with expertise and extensive hands-on experience
Price Beat Guarantee
Relax, we will beat competitor’s advertised price. Our course has no extra costs
Location | Type | Duration | Price | Dates | |
---|---|---|---|---|---|
Location | Type | Duration | Price | Dates |
Accreditations
OUR SATISFIED CUSTOMERS
Approachable and knowledgeable; comfortable surroundings. Logitrain does make IT training easier |
I recently followed the ITIL Foundation course at Logitrain. The training, materials and facilities were excellent and I would not hesitate to train with Logitrain again.
Thanks for a great week! Really enjoyed and feel I picked up a lot. Great Trainer! Will definitely look at further studies here.
Well-presented and able to convey immense knowledge to class. All queries were responded to promptly.
Excellent teaching method, easy to understand.
Logitrain provided a valuable insight into ITIL and enabled me to excel and advance my knowledge through a simple and well organised series of sessions.
Great place to study for certification, knowledgeable persons, excellent customer service. Ready to answer queries on the spot, very helpful.
The trainer was very patient and gave everybody the opportunity to participate.
The trainer explained everything very well. Logitrain was very helpful for me in getting a better overall understanding of CCNA. I previously had studied it 2 years earlier but required revision