Comptia Security+

Why Us

  • Best Quality of Training
  • Perfect Learning Environment
  • Continuous Support till achieving Qualifications
  • Experience, qualified and Trained Instructors
  • Fully equipped Labs with all physical devices
  • Guaranteed Best price from any other training provider
  • Payment in Installation options
  • Special discount on future courses
  • Special discount for group booking
  • Flexible timing (week days, weekend and Evenings)

What is included

  • Instructor Led Classroom Training
  • Video Recording of class lecture
  • Complete hands-on training
  • Books, Course Material
  • Mock Exams
  • 100 % passing guarantee or Free Re-training

£500

Other Training Packages:

Comptia (Sec) + Comptia (A+)
in just £1000
Comptia(Sec) + CCNA (RS)
in just £1000
CCNA(RS) + CCNA (Sec)
in just £1000

Course Insight

The Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-401 exam.

While there is no required prerequisite, Network+ certification is recommended before taking the Security+ exam. CompTIA is an ANSI accredited Certifier – 0731. The CompTIA Security+

Career Prospect

Computer Hardware Engineer, Second line support, Computer technician, System Engineer, System Analyst.

Learning Facilities

We have immaculate learning facilities with state of art technology, fully equipped with high specs latest servers, workstations and software.

General Facilities

We also provide Free Wifi Internet, Refreshment, Water, Tea and Coffee Facilities.

Topics Covered

Mitigating threats

  • System maintenance
  • Application security
  • Physical security
  • Malware
  • Social engineering

Cryptography

  • Symmetric cryptography
  • Public key cryptography

Authentication

  • Authentication factors and requirements
  • Authentication systems
  • Authentication system vulnerabilities

User- and role-based security

  • Baseline security policies
  • Resource access

Peripheral security

  • File and disk encryption
  • Peripheral and component security
  • Mobile device security

Public key infrastructure

  • Public key cryptography
  • Implementing public key infrastructure
  • Web server security with PKI

Application and messaging security

  • Application security
  • E-mail security
  • Social networking and messaging

Ports and protocols

  • TCP/IP basics
  • Protocol-based attacks

Network security

  • Network devices
  • Secure network topologies
  • Secure networking
  • Virtualization and cloud computing

Wireless security

  • Wireless network security
  • Mobile device security

Remote access security

  • Remote access
  • Virtual private networks

Vulnerability testing and monitoring

  • Risk and vulnerability assessment
  • Auditing and logging
  • Intrusion detection and prevention systems
  • Incident response

Organizational security

  • Organizational policies
  • Education and training
  • Disposal and destruction

Business continuity

  • Business continuity planning
  • Disaster recovery
  • Environmental controls

Skills Gained

  • Systems Security
  • Network Infrastructure
  • Access Control
  • Assessments and Audits
  • Cryptography
  • Organizational Security
Start Date Timing Days Duration
Enquire Flexible Mon to Sun 40 hours