CompTIA Security+ | IT Security Training Course
BIT Training
Establish the core knowledge required for any cybersecurity role, providing a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions. Monitor and secure hybrid environments, including cloud, mobile, and IoT, Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance. Identify, analyze, and respond to security events and incidents.
What Delegates Will Learn
Compare security roles and security controls
Explain threat actors and threat intelligence
Perform security assessments and identify social engineering attacks and malware types
Summarize basic cryptographic concepts and implement public key infrastructure
Implement authentication controls
Implement identity and account management controls
Implement secure network designs, network security appliances, and secure network protocols
Implement host, embedded/Internet of Things, and mobile security solutions
Implement secure cloud solutions
Explain data privacy and protection concepts
Perform incident response and digital forensics
Summarize risk management concepts and implement cybersecurity resilience
Explain physical security
Module Outline
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
Who Should Attend
Security Administrator, Systems Administrator, Helpdesk Manager / Analyst, Network / Cloud Engineer, Security Engineer / Analyst, DevOps / Software Developer, IT Auditors & IT Project Manager
What Delegates Will Learn
Compare security roles and security controls
Explain threat actors and threat intelligence
Perform security assessments and identify social engineering attacks and malware types
Summarize basic cryptographic concepts and implement public key infrastructure
Implement authentication controls
Implement identity and account management controls
Implement secure network designs, network security appliances, and secure network protocols
Implement host, embedded/Internet of Things, and mobile security solutions
Implement secure cloud solutions
Explain data privacy and protection concepts
Perform incident response and digital forensics
Summarize risk management concepts and implement cybersecurity resilience
Explain physical security
Module Outline
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
Who Should Attend
Security Administrator, Systems Administrator, Helpdesk Manager / Analyst, Network / Cloud Engineer, Security Engineer / Analyst, DevOps / Software Developer, IT Auditors & IT Project Manager
Subject area(s)
Cyber
Cyber
Course level
Intermediate
Intermediate
Course format
Online (self-paced)
Online (self-paced)
Share "CompTIA Security+ | IT Security Training Course"
Share on Facebook Share on Twitter Share on WhatsApp Share by email