CompTIA Security+ (new version)

Course Details

CompTIA Security+ course is a global certification providing the skills necessary to perform core security functions and pursue an IT security career.

In this CompTIA Security+ course, you will learn how to explain threat actors and threat intelligence, compare security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. You will also gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.

IT security is an ever-growing field, and its importance is recognised universally throughout the industry. This CompTIA Security+ course will cover security concerns from both a professional setting and on a personal level. This gives students who do not plan to apply their certificate in the immediate future the benefit of keeping up to date on the latest security practices and techniques that they can follow to keep themselves secure in a digital world. Each module in this course is designed to align with the official objectives of this certification and expand past the scope of the certification to allow for real-life application. They give the student some real-life examples of various attacks or security practices that they can both apply in real life or use to further their understanding of a course objective.

This comprehensive eLearning course prepares students for the Security+ Certification from CompTIA. The course is completed online, at your own time, at a location that suits you. You progress through the course materials and complete the online lessons and tests. The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT.
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance.

This CompTIA Security+ Course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • FlashCards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this CompTIA Security+ Course?
  • IT Managers, IT Security personnel, Programmers and Developers, IT Security Managers.
  • People considering a career in IT Security Management.
Entry Requirements / Prerequisites
  • None. It is however recommended that students have CompTIA Network+ and two years of experience in IT administration with a security focus or equivalent knowledge.
  • For technical requirements required to access CMIT eLearning click here>
  • For more details on the suitability of this course click here>
How CMIT eLearning Works…

Topics covered in this CompTIA Security+ Course

Module 1: Information Security Roles Security Control and Framework Types

  • Information Security Roles
  • Security Control and Framework Types

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  • Threat Actor Types and Attack Vectors
  • Threat Intelligence Sources

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability

  • Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • General Vulnerability Types
  • Vulnerability Scanning Techniques
  • Penetration Testing Concepts

Module 4: Social Engineering, Indicators of Malware Attacks

  • Social Engineering Techniques
  • Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo

Module 5: Cryptography

  • Cryptographic Ciphers
  • Cryptographic Modes of Operation
  • Cryptographic Use Cases and Weaknesses
  • Other Cryptographic Technologies

Module 6: Certificates and PKI

  • Certificates and Certificate Authorities
  • PKI Management
  • Implementing a PKI Demo

Module 7: Authentication

  • Authentication Design Concepts
  • Knowledge-based Authentication
  • Password Cracker Demo
  • Authentication Technologies
  • Biometric Authentication Concepts

Module 8: Identity and Accounts, Authorization, Personnel Polices

  • Identity and Account Types
  • Account Policies
  • Account Types and Policies Demo
  • Authorisation Solutions
  • Importance of Personnel Policies

Module 9: Network Design and Hardware (Part 1)

  • Secure Network Designs
  • Secure Switching and Routing
  • Types of Network Attacks Demo
  • Secure Wireless Infrastructure
  • Load Balancers

Module 10: Network Hardware (Part 2)

  • Firewalls and Proxy Servers
  • Network Security Monitoring
  • Use if SIEM

Module 11: Network Protocols

  • Secure Network Operations Protocols
  • Secure Application Protocols
  • Secure Remote Access Protocols

Module 12: Endpoint Security

  • Secure Firmware
  • Endpoint Security
  • Endpoint Protection Demo
  • Embedded Systems Security Implications

Module 13: Mobile Devices

  • Mobile Devise Management
  • Secure Mobile Devise Connections

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  • Indicators of Application Attack
  • Indicators of Web Application Attacks
  • Secure Coding Practices
  • Secure Script Environments
  • Deployment and Automation Concepts

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

  • Secure Cloud and Virtualisation Services
  • Cloud Security Solutions
  • Infrastructure as Code Concepts

Module 16: Privacy and Data Protection

  • Privacy and Data Protection Concepts
  • Privacy and Data Protection Controls

Module 17: Incident Response

  • Incident Response Procedures
  • Appropriate Data Sources for Incident Response
  • Mitigation Controls

Module 18: Forensics

  • Digital Forensic Documentation
  • Digital Forensic Evidence Acquisition

Module 19: Risk Management and Business Impact Analysis

  • Risk Management Processes and Concepts
  • Business Impact Analysis Concepts

Module 20: Redundancy and Backup Strategies

  • Redundancy Strategies
  • Backup Strategies
  • Cybersecurity Resiliency Strategies

Module 21: Physical Security

  • Physical Site Controls
  • Physical Host Security Controls

Practice exams

  • Sample exams that will help you prepare for the CompTIA Security+ exam.
  • Once you successfully pass the programme, you will receive a Diploma in IT Security from CMIT.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. Click here for exam information.
Technical Requirements
  • Broadband internet connection of at least 10Mbps.
  • Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
  • Operating System – PC (Windows 7 or later), Mac or Android.
Student Reviews of this Course
{{ reviewsOverall }} / 5 Users (7 votes)
What students say... Leave your rating
Order by:

Be the first to leave a review.

{{{review.rating_comment | nl2br}}}

Show more
{{ pageNumber+1 }}
Leave your rating