CompTIA Security+ Certification Training

CompTIA Security+ Certification Training

  4.8 out of 5 - Read Testimonials
Course Length:
Delivery Methods:
Course Topics
  •  Identify the fundamental components of information security.
  •  Analyze risk.
  •  Identify various threats to information security.
  •  Conduct security assessments to detect vulnerabilities.
  •  Implement security for hosts and software.
  •  Implement security for networks.
  •  Manage identity and access.
  •  Implement cryptographic solutions in the organization.
  •  Implement security at the operational level.
  •  Address security incidents.
  •  Ensure the continuity of business operations in the event of an incident.
Available Delivery Methods
  Public Class
Public expert-led online training from the convenience of your home, office or anywhere with an internet connection. Guaranteed to run .
  Private Class
Private classes are delivered for groups at your offices or a location of your choice.
Course Overview

This CompTIA Security+ training class will build on students' knowledge of and professional experience with security fundamentals, networks, and organizational security. Students will obtain the skills required to implement basic security services on any type of computer network and prepare candidates to take the CompTIA Security+ certification exam (Exam SY0-501).

CompTIA Authorized Partner

Webucator is a CompTIA Authorized Partner. Our CompTIA courses use CompTIA-approved learning materials and are delivered by CompTIA-certified instructors.

Course Outline
  1. Comparing and Contrasting Attacks
    1. Compare and Contrast Information Security Roles
    2. Explain Threat Actor Types
    3. Compare and Contrast Social Engineering Attack Types
    4. Determine Malware Types
  2. Comparing and Contrasting Security Controls
    1. Compare and Contrast Security Control and Framework Types
    2. Follow Incident Response Procedures
  3. Assessing Security Posture with Software Tools
    1. Explain Penetration Testing Concepts
    2. Assess Security Posture with Topology Discovery Software Tools
    3. Assess Security Posture with Fingerprinting and Sniffing Software Tools
    4. Assess Security Posture with Vulnerability Scanning Software Tools
  4. Explaining Basic Cryptography Concepts
    1. Compare and Contrast Basic Concepts of Cryptography
    2. Explain Hashing and Symmetric Cryptographic Algorithms
    3. Explain Asymmetric Cryptographic Algorithms
  5. Implementing a Public Key Infrastructure
    1. Implement Certificates and Certificate Authorities
    2. Implement PKI Management
  6. Implementing Identity and Access Management Controls
    1. Compare and Contrast Identity and Authentication Concepts
    2. Install and Configure Authentication Protocols
    3. Implement Multifactor Authentication
  7. Managing Access Services and Accounts
    1. Install and Configure Authorization and Directory Services
    2. Implement Access Management Controls
    3. Differentiate Account Management Practices
    4. Implement Account Auditing and Recertification
  8. Implementing a Secure Network Architecture
    1. Implement Secure Network Architecture Concepts
    2. Install and Configure a Secure Switching Infrastructure
    3. Install and Configure Network Access Control
    4. Install and Configure a Secure Routing and NAT Infrastructure
  9. Installing and Configuring Security Appliances
    1. Install and Configure Firewalls and Proxies
    2. Install and Configure Load Balancers
    3. Install and Configure Intrusion Detection/Prevention Systems
    4. Install and Configure Data Loss Prevention (DLP) Systems
    5. Install and Configure Logging and SIEM Systems
  10. Installing and Configuring Wireless and Physical Access Security
    1. Install and Configure a Wireless Infrastructure
    2. Install and Configure Wireless Security Settings
    3. Explain the Importance of Physical Security Controls
  11. Deploying Secure Host, Mobile, and Embedded Systems
    1. Implement Secure Hardware Systems Design
    2. Implement Secure Host Systems Design
    3. Implement Secure Mobile Device Systems Design
    4. Implement Secure Embedded Systems Design
  12. Implementing Secure Network Access Protocols
    1. Implement Secure Network Operations Protocols
    2. Implement Secure Remote Access Protocols
    3. Implement Secure Remote Administration Protocols
  13. Implementing Secure Network Applications
    1. Implement Secure Web Services
    2. Implement Secure Communications Services
    3. Summarize Secure Virtualization Infrastructure
    4. Summarize Secure Cloud Services
  14. Explaining Risk Management and Disaster Recovery Concepts
    1. Explain Risk Management Processes and Concepts
    2. Explain Resiliency and Automation Strategies
    3. Explain Disaster Recovery and Continuity of Operation Concepts
    4. Summarize Basic Concepts of Forensics
  15. Summarizing Secure Application Development Concepts
    1. Explain the Impact of Vulnerability Types
    2. Summarize Secure Application Development Concepts
  16. Explaining Organizational Security Concepts
    1. Explain the Importance of Security Policies
    2. Implement Data Security and Privacy Practices
    3. Explain the Importance of Personnel Management
Class Materials

Each student in our Live Online and our Onsite classes receives a comprehensive set of materials, including course notes and all the class examples.

Class Prerequisites

Experience in the following is required for this CompTIA class:

  • Basic Windows skills
  • Fundamental understanding of computer and networking concepts.
  Register for a Live Class
$2,590.00
Please select a class.
  Request a Private Class
  • Private Class for your Team
  • Online or On-location
  • Customizable
  • Expert Instructors
Request Pricing