College of Management and IT (CMIT)

CompTIA Security+

Leads to Industry certification.

Self-paced course
Online self-paced course.

Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

CompTIA Security+


Course Details

CompTIA Security+ course is a global certification providing the skills necessary to perform core security functions and pursue an IT security career.

In this CompTIA Security+ course, you will learn how to explain threat actors and threat intelligence, compare security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. You will also gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.

IT security is an ever-growing field, and its importance is recognised universally throughout the industry. This CompTIA Security+ course will cover security concerns from both a professional setting and on a personal level. This gives students who do not plan to apply their certificate in the immediate future the benefit of keeping up to date on the latest security practices and techniques that they can follow to keep themselves secure in a digital world. Each module in this course is designed to align with the official objectives of this certification and expand past the scope of the certification to allow for real-life application. They give the student some real-life examples of various attacks or security practices that they can both apply in real life or use to further their understanding of a course objective.

This comprehensive eLearning course prepares students for the Security+ Certification from CompTIA. The course is completed online, at your own time, at a location that suits you. You progress through the course materials and complete the online lessons and tests. The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT.
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance.

This CompTIA Security+ Course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • FlashCards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this CompTIA Security+ Course?
  • Information Security Analysts: The CompTIA IT Security course is an excellent choice for individuals aiming to become Information Security Analysts. According to the U.S. Bureau of Labor Statistics, the employment of information security analysts is projected to grow by 33% from 2020 to 2030, which is much faster than the average for all occupations. This course equips them with the skills and knowledge to protect an organization’s data and information systems from cyber threats.
  • Network Security Administrators: Network security administrators play a pivotal role in maintaining the security of an organization’s network infrastructure. With the increasing frequency and complexity of cyberattacks, the demand for skilled network security professionals is on the rise. The CompTIA IT Security course provides essential training for this role.
  • Cybersecurity Consultants: Cybersecurity consultants are in high demand as businesses seek expertise to assess and improve their security posture. According to Cybersecurity Ventures, the global cybersecurity market is expected to reach $345.4 billion by 2026. Professionals who complete the CompTIA IT Security course are well-prepared to offer consultancy services in this rapidly growing field.
  • Security Architects: Security architects are responsible for designing and implementing security systems for organizations. As per the (ISC)² Cybersecurity Workforce Study, there is a global shortage of cybersecurity professionals, with millions of unfilled positions. Completing the CompTIA IT Security course can open doors for individuals aspiring to become security architects.
  • IT Managers: IT managers are increasingly expected to have a deep understanding of cybersecurity to protect their organizations from threats. A survey by PwC revealed that 55% of organizations expect to increase their cybersecurity budgets, highlighting the growing emphasis on cybersecurity in IT management. This course equips IT managers with the necessary security knowledge to lead their teams effectively.
Entry Requirements / Prerequisites
  • None. It is however recommended that students have CompTIA Network+ and two years of experience in IT administration with a security focus or equivalent knowledge.
  • For technical requirements required to access CMIT eLearning click here>
  • For more details on the suitability of this course click here>

How CMIT eLearning Works…

Topics covered in this CompTIA Security+ Course
Module 1: Information Security Roles Security Control and Framework Types
  • Information Security Roles
  • Security Control and Framework Types
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Threat Actor Types and Attack Vectors
  • Threat Intelligence Sources
Module 3: Organisational Security, Network Reconnaissance, General Vulnerability
  • Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • General Vulnerability Types
  • Vulnerability Scanning Techniques
  • Penetration Testing Concepts
Module 4: Social Engineering, Indicators of Malware Attacks
  • Social Engineering Techniques
  • Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
Module 5: Cryptography
  • Cryptographic Ciphers
  • Cryptographic Modes of Operation
  • Cryptographic Use Cases and Weaknesses
  • Other Cryptographic Technologies
Module 6: Certificates and PKI
  • Certificates and Certificate Authorities
  • PKI Management
  • Implementing a PKI Demo
Module 7: Authentication
  • Authentication Design Concepts
  • Knowledge-based Authentication
  • Password Cracker Demo
  • Authentication Technologies
  • Biometric Authentication Concepts
Module 8: Identity and Accounts, Authorisation, Personnel Polices
  • Identity and Account Types
  • Account Policies
  • Account Types and Policies Demo
  • Authorisation Solutions
  • Importance of Personnel Policies
Module 9: Network Design and Hardware (Part 1)
  • Secure Network Designs
  • Secure Switching and Routing
  • Types of Network Attacks Demo
  • Secure Wireless Infrastructure
  • Load Balancers
Module 10: Network Hardware (Part 2)
  • Firewalls and Proxy Servers
  • Network Security Monitoring
  • Use if SIEM
Module 11: Network Protocols
  • Secure Network Operations Protocols
  • Secure Application Protocols
  • Secure Remote Access Protocols
Module 12: Endpoint Security
  • Secure Firmware
  • Endpoint Security
  • Endpoint Protection Demo
  • Embedded Systems Security Implications
Module 13: Mobile Devices
  • Mobile Devise Management
  • Secure Mobile Devise Connections
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
  • Indicators of Application Attack
  • Indicators of Web Application Attacks
  • Secure Coding Practices
  • Secure Script Environments
  • Deployment and Automation Concepts
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualisation
  • Secure Cloud and Virtualisation Services
  • Cloud Security Solutions
  • Infrastructure as Code Concepts
Module 16: Privacy and Data Protection
  • Privacy and Data Protection Concepts
  • Privacy and Data Protection Controls
Module 17: Incident Response
  • Incident Response Procedures
  • Appropriate Data Sources for Incident Response
  • Mitigation Controls
Module 18: Forensics
  • Digital Forensic Documentation
  • Digital Forensic Evidence Acquisition
Module 19: Risk Management and Business Impact Analysis
  • Risk Management Processes and Concepts
  • Business Impact Analysis Concepts
Module 20: Redundancy and Backup Strategies
  • Redundancy Strategies
  • Backup Strategies
  • Cybersecurity Resiliency Strategies
Module 21: Physical Security
  • Physical Site Controls
  • Physical Host Security Controls
Practice exams
  • Sample exams that will help you prepare for the CompTIA Security+ exam.
  • Once you successfully pass the programme(s), you will be able to download a CMIT Digital Certificate of Completion. This can be accessed via the Progress Reports section located on the top right side of your eLearning platform.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. Click here for exam information.
Technical Requirements
  • Broadband internet connection of at least 10Mbps.
  • Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
  • Operating System – PC (Windows 7 or later), Mac or Android.

Request Prospectus

Complete the form below to request a prospectus.

Opt in
This field is for validation purposes and should be left unchanged.

Student Reviews
of this course

{{ reviewsOverall }} / 5 Users (7 votes)
What students say... Leave yo