CompTIA Security+

eLearning course leading to certification from CompTIA

Students have 12 months to work at their own pace, and can start at any time of year.

Certified
Leads to Industry certification.

Self-paced course
Online self-paced course.

Flexible
Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

CompTIA Security+

€295

or 3 interest-free payments with Klarna Logo

Course Details

CompTIA Security+ course is a global certification providing the skills necessary to perform core security functions and pursue an IT security career.

In this CompTIA Security+ course, you will learn how to explain threat actors and threat intelligence, compare security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. You will also gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.

IT security is an ever-growing field, and its importance is recognised universally throughout the industry. This CompTIA Security+ course will cover security concerns from both a professional setting and on a personal level. This gives students who do not plan to apply their certificate in the immediate future the benefit of keeping up to date on the latest security practices and techniques that they can follow to keep themselves secure in a digital world. Each module in this course is designed to align with the official objectives of this certification and expand past the scope of the certification to allow for real-life application. They give the student some real-life examples of various attacks or security practices that they can both apply in real life or use to further their understanding of a course objective.

This comprehensive eLearning course prepares students for the Security+ Certification from CompTIA. The course is completed online, at your own time, at a location that suits you. You progress through the course materials and complete the online lessons and tests. The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT.
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance.

This CompTIA Security+ Course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • FlashCards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this CompTIA Security+ Course?
  • Information Security Analysts: The CompTIA IT Security course is an excellent choice for individuals aiming to become Information Security Analysts. According to the U.S. Bureau of Labor Statistics, the employment of information security analysts is projected to grow by 33% from 2020 to 2030, which is much faster than the average for all occupations. This course equips them with the skills and knowledge to protect an organisation’s data and information systems from cyber threats.
  • Network Security Administrators: Network security administrators play a pivotal role in maintaining the security of an organisation’s network infrastructure. With the increasing frequency and complexity of cyberattacks, the demand for skilled network security professionals is on the rise. The CompTIA IT Security course provides essential training for this role.
  • Cybersecurity Consultants: Cybersecurity consultants are in high demand as businesses seek expertise to assess and improve their security posture. According to Cybersecurity Ventures, the global cybersecurity market is expected to reach $345.4 billion by 2026. Professionals who complete the CompTIA IT Security course are well-prepared to offer consultancy services in this rapidly growing field.
  • Security Architects: Security architects are responsible for designing and implementing security systems for organisations. As per the (ISC)² Cybersecurity Workforce Study, there is a global shortage of cybersecurity professionals, with millions of unfilled positions. Completing the CompTIA IT Security course can open doors for individuals aspiring to become security architects.
  • IT Managers: IT managers are increasingly expected to have a deep understanding of cybersecurity to protect their organizations from threats. A survey by PwC revealed that 55% of organisations expect to increase their cybersecurity budgets, highlighting the growing emphasis on cybersecurity in IT management. This course equips IT managers with the necessary security knowledge to lead their teams effectively.
Entry Requirements / Prerequisites

How CMIT eLearning Works…

Play
Topics covered in this CompTIA Security+ Course
Module 1: Information Security Roles Security Control and Framework Types
  • Information Security Roles
  • Security Control and Framework Types
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Threat Actor Types and Attack Vectors
  • Threat Intelligence Sources
Module 3: Organisational Security, Network Reconnaissance, General Vulnerability
  • Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • General Vulnerability Types
  • Vulnerability Scanning Techniques
  • Penetration Testing Concepts
Module 4: Social Engineering, Indicators of Malware Attacks
  • Social Engineering Techniques
  • Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
Module 5: Cryptography
  • Cryptographic Ciphers
  • Cryptographic Modes of Operation
  • Cryptographic Use Cases and Weaknesses
  • Other Cryptographic Technologies
Module 6: Certificates and PKI
  • Certificates and Certificate Authorities
  • PKI Management
  • Implementing a PKI Demo
Module 7: Authentication
  • Authentication Design Concepts
  • Knowledge-based Authentication
  • Password Cracker Demo
  • Authentication Technologies
  • Biometric Authentication Concepts
Module 8: Identity and Accounts, Authorisation, Personnel Polices
  • Identity and Account Types
  • Account Policies
  • Account Types and Policies Demo
  • Authorisation Solutions
  • Importance of Personnel Policies
Module 9: Network Design and Hardware (Part 1)
  • Secure Network Designs
  • Secure Switching and Routing
  • Types of Network Attacks Demo
  • Secure Wireless Infrastructure
  • Load Balancers
Module 10: Network Hardware (Part 2)
  • Firewalls and Proxy Servers
  • Network Security Monitoring
  • Use if SIEM
Module 11: Network Protocols
  • Secure Network Operations Protocols
  • Secure Application Protocols
  • Secure Remote Access Protocols
Module 12: Endpoint Security
  • Secure Firmware
  • Endpoint Security
  • Endpoint Protection Demo
  • Embedded Systems Security Implications
Module 13: Mobile Devices
  • Mobile Devise Management
  • Secure Mobile Devise Connections
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
  • Indicators of Application Attack
  • Indicators of Web Application Attacks
  • Secure Coding Practices
  • Secure Script Environments
  • Deployment and Automation Concepts
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualisation
  • Secure Cloud and Virtualisation Services
  • Cloud Security Solutions
  • Infrastructure as Code Concepts
Module 16: Privacy and Data Protection
  • Privacy and Data Protection Concepts
  • Privacy and Data Protection Controls
Module 17: Incident Response
  • Incident Response Procedures
  • Appropriate Data Sources for Incident Response
  • Mitigation Controls
Module 18: Forensics
  • Digital Forensic Documentation
  • Digital Forensic Evidence Acquisition
Module 19: Risk Management and Business Impact Analysis
  • Risk Management Processes and Concepts
  • Business Impact Analysis Concepts
Module 20: Redundancy and Backup Strategies
  • Redundancy Strategies
  • Backup Strategies
  • Cybersecurity Resiliency Strategies
Module 21: Physical Security
  • Physical Site Controls
  • Physical Host Security Controls
Practice exams
  • Sample exams that will help you prepare for the CompTIA Security+ exam.
Assessment
  • Once you successfully pass the programme(s), you will be able to download a CMIT Digital Certificate of Completion. This can be accessed via the Progress Reports section located on the top right side of your eLearning platform.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. More information on exams can be found on the CMIT exam page.
Technical Requirements
  • Broadband internet connection of at least 10Mbps.
  • Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
  • Operating System – PC (Windows 7 or later), Mac or Android.
Accreditation
  • Following successful completion of the exams, you will receive CompTIA certification.
  • More information can be found on the CMIT Accreditation Details page.

Request Prospectus

Complete the form below to request a prospectus.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in

Student Reviews of this course

4.8
4.8 out of 5 stars (based on 6 reviews)
Excellent83%
Very good17%
Average0%
Poor0%
Terrible0%

Found it very helpful. some very useful definitions/examples i previously had no idea of. All modules were well explained in detail.

May 18, 2020

Found it very helpful. some very useful definitions/examples i previously had no idea of. All modules were well explained in detail.

Student May 2020
Verified

Very good. Easy to understand.

April 5, 2018

Very good. Easy to understand.

Student April 2018
Verified

I enjoyed doing this course and learned a lot from it. I look forward to do others too.

July 10, 2017

I enjoyed doing this course and learned a lot from it. I look forward to do others too.

Student July 2017
Verified

The course is very good and practice examples with virtual machines are very good.

April 10, 2017

The course is very good and practice examples with virtual machines are very good.

Student April 2017
Verified

I have done previous course with CMIT and I found it extremely easy to follow the instructions given.

April 10, 2017

I have done previous course with CMIT and I found it extremely easy to follow the instructions given.

Student April 2017
Verified

I choose CMIT because it is easy to get up and going to start the course and I really like CMIT it stood out from the crowd. I think the course was brilliant and learned a lot.

October 10, 2016

I choose CMIT because it is easy to get up and going to start the course and I really like CMIT it stood out from the crowd. I think the course was brilliant and learned a lot.

Student October 2016
Verified

Request A Prospectus

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in
College of Management and IT (CMIT)
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Click here to view our Privacy Policy