About the CompTIA Security+ course

The CompTIA Security+ certification is a widely recognized credential in the IT industry that validates an individual’s skills in securing networks, systems, and devices. This certification covers the fundamentals of network security, compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography, and application, data, and host security.

Course objectives:

In this course, delegates will describe the major networking technologies and systems of modern networks, and configure, manage, and troubleshoot modern networks. In addition, delegates will be able to:

  • Assess attacks, threats and vulnerabilities

  • Identify various threats to information security

  • Conduct security assessments to detect vulnerabilities

  • Implement secure cloud solutions

  • Implement security for hosts and software

  • Implement security for networks

  • Implement cryptographic solutions in the organization

  • Implement security at the operational level

  • Ensure the continuity of business operations in the event of an incident

  • Explain data privacy and protection concepts

Associated certifications and exam:

This course will prepare delegates to write the CompTIA Security+ SY0-601 exam. Successfully passing this exam will result in the attainment of the CompTIA Security+ certification.


Before attending this course delegates should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. Additionally, delegates should have:

  • Either attended the CompTIA Network+ course, or have equivalent knowledge or;

  • Have a minimum of two years of technical networking experience, with an emphasis on security

5 Days



  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Assess Organisational Security with Network Reconnaissance Tools
  • Explain Security Concerns with General Vulnerability Types
  • Summarise Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Compare and Contrast Social Engineering Techniques
  • Analyse Indicators of Malware-Based Attacks
  • ompare and Contrast Cryptographic Ciphers
  • Summarise Cryptographic Modes of Operation
  • Summarise Cryptographic Use Cases and Weaknesses
  • Summarise Other Cryptographic Technologies
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Summarise Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarise Biometrics Authentication Concepts
  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorisation Solutions
  • Explain the Importance of Personnel Policies
  • Implement Secure Network Designs
  • Implement Secure Switching & Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
  • Implement Firewalls and Proxy Servers Implement Network Security Monitoring
  • Summarise the Use of SIEM
  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Firmware
  • Implement Endpoint Security
  • Explain Embedded System Security Implications
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections

Download Course Outlines