CompTIA Security+

CompTIA Security+ Course + Exam

CompTIA Security+ Certification

Logitrain is an authorized CompTIA training partner
Logitrain is a CompTIA authorized partner

The CompTIA Security+ Training enables IT professionals to understand security related issues. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe. Security plus demonstrates competency in:

  • Network Security
  • Threats and vulnerabilities
  • Compliance and operational security
  • Application, data and host security
  • Cryptography
  • Access control and identity management
  • Authorised CompTIA Training
  • Expert trainers: imparting real world experience
  • Small class size: increased instructor interaction
  • Authorised test centre: exams taken at our premises
  • Logitrain offices easily accessible via public transport

Basic Computer Knowledge

Candidates can achieve this certification by passing following exam(s).

  • SY0-401

The certification exam if included in your course can be registered and attempted within 3 months of course/module completion at Logitrain training centre on weekdays during normal business hours (excludes public holidays)

CompTIA Security+ Study Guide Authorized Courseware: Exam SY0-401



Image of the book CompTIA Networking+ Study Guide, this is included with the training course at Logitrain

(Course material provided is shown above)

  • Systems Security
  • Network Infrastructure
  • Access Control
  • Assessments and Audits
  • Cryptography
  • Organizational Security
  • University students
  • Helpdesk operators
  • Candidates entering IT job market
  • First-level network support staff
  • Differentiate among various systems security threats
  • Explain the security risks pertaining to system hardware and peripherals
  • Implement OS hardening practices and procedures to achieve security
  • Carry out the appropriate procedures to establish application security
  • Implement security applications
  • Explain the purpose and application of virtualization technology
  • Differentiate between the different ports and protocols, their respective threats
  • Distinguish between network design elements and components
  • Determine the appropriate use of network security tools to facilitate network security
  • Apply the appropriate network tools to facilitate network security
  • Explain the vulnerabilities and mitigations associated with network devices
  • Explain the vulnerabilities and mitigations associated with various transmission media
  • Explain the vulnerabilities and implement mitigations associated with wireless networking
  • Identify and apply industry best practices for access control methods
  • Explain common access control models and the differences between each
  • Organize users and computers into appropriate security groups and roles
  • Apply appropriate security controls to file and print resources
  • Compare and implement logical access control methods
  • Summarize the various authentication models and identify the components of each
  • Deploy various authentication models and identify the components of each
  • Explain the difference between identification and authentication (identity proofing)
  • Explain and apply physical access security methods
  • Conduct risk assessments and implement risk mitigation
  • Carry out vulnerability assessments using common tools
  • Explain the use of penetration testing versus vulnerability scanning
  • Use monitoring tools on systems and networks and detect security-related anomalies
  • Compare and contrast various types of monitoring methodologies
  • Execute proper logging procedures and evaluate the results
  • Conduct periodic audits of system security settings
  • Explain general cryptography concepts
  • Explain basic hashing concepts and map various algorithms to appropriate applications
  • Explain basic encryption concepts and map various algorithms to appropriate applications
  • Explain and implement protocols
  • Explain core concepts of public key cryptography
  • Implement PKI and certificate management
  • Explain redundancy planning and its components
  • Implement disaster recovery procedures
  • Differentiate between and execute appropriate incident response procedures
  • Identify and explain applicable legislation and organizational policies
  • Explain the importance of environmental controls
  • Explain the concept of and how to reduce the risks of social engineering

Includes 100% Pass Guarantee

Walk away with the certification. Included in full-time courses. Click here for more Info

Includes Career Counselling

Career Counselling is an integral part of job hunting, it is included with this course

Includes Trainer & Lab Support

6 month support with full-time courses, 3 month support with part-time courses

Includes Official Exam Fee

Take the certification exam within 3 months of course / module completion

Includes Mock & Test Questions

Unlimited mock tests in full-time; 1 mock test in part-time to boost your confidence

Includes Books & Meals

Course material in hardcopy included for you to keep. Full-time courses include meals

Includes Course Retake

Sit through the entire course again to clear any doubts. Included in full-time courses

Authorized VUE Test Center

Take the official vendor certification exam at the Logitrain training center

Upgrade Your Course Benefits

Add Pass Guarantee, extra support, retake in part-time course with a full-time fee

Our Price Beat Guarantee

We will beat competitor’s advertised price. Our course has no extra costs

Our Flexible Training Options

Attend classroom courses weekdays, weeknights, weekends or join from anywhere

Delivering Training Since 2004

There is no substitute for experience, we have trained 3000+ students. Train with the best