CompTIA Security+

CompTIA Security+ Course + Exam

CompTIA Security+ Certification

Logitrain is an authorized CompTIA training partner
Logitrain is a CompTIA authorized partner

The latest CompTIA Security+ certification course aims to train information technology students with adequate skills and knowledge required to network security issues and tackle them in an efficient way. Being vendor neutral , this CompTIA certification course imparts broad knowledge to develop expertise in security-related issues and risk management.

The updated CompTIA Security+ exam SY0-501 is recognised all over the globe for validation of basic-level of security skills and knowledge. It has been widely used by organisations, security professionals/analysts and penetration testers.

After completing CompTIA Security+ course and certification, students can demonstrate high level of competency in the following areas:

  • Network Security
  • Threats and vulnerabilities
  • Compliance and operational security
  • Application, data and host security
  • Cryptography
  • Access control and identity management

This course is a key requirement for the following jobs:

  • Security Architect
  • Security Engineer
  • Security Consultant/Specialist
  • Information Assurance Technician
  • Security Administrator

Basic computer security and networking knowledge

Candidates can achieve this certification by passing following Security+ exam.

  • SY0-501

The certification exam cost if included in your course can be registered and attempted within 3 months of course/module completion at Logitrain training centre on weekdays during normal business hours (excludes public holidays)

CompTIA Security+ Study Guide

 

  • Network security
  • Compliance and operational security
  • Threats and vulnerabilities
  • Application, data and host security
  • Access control and identity management
  • Cryptography
  • Candidates working in the IT Security area
  • IT security support staff
  • Differentiating among various systems security threats
  • Explaining the security risks pertaining to system hardware and peripherals
  • Implementing OS hardening practices and procedures to achieve security
  • Carrying out the appropriate procedures to establish application security
  • Implementing security applications
  • Explaining the purpose and application of virtualization technology
  • Differentiating between the different ports and protocols, their respective threats
  • Distinguishing between network design elements and components
  • Determining the appropriate use of network security tools to facilitate network security
  • Applying the appropriate network tools to facilitate network security
  • Explaining the vulnerabilities and mitigation strategies associated with network devices
  • Explaining the vulnerabilities and mitigation strategies associated with various transmission media
  • Explaining the vulnerabilities and implement mitigation strategies associated with wireless networking
  • Identifying and applying industry best practices for access control methods
  • Explaining common access control models and the differences between each
  • Organizing users and computers into appropriate security groups and roles
  • Applying appropriate security controls to file and print resources
  • Comparing and implement logical access control methods
  • Summarizing the various authentication models and identify the components of each
  • Deploying various authentication models and identify the components of each
  • Explaining the difference between identification and authentication (identity proofing)
  • Explaining and applying physical access security methods
  • Conducting risk assessments and implementing risk mitigation
  • Carrying out vulnerability assessments using common tools
  • Explaining the use of penetration testing versus vulnerability scanning
  • Using monitoring tools on systems and networks and detecting security-related anomalies
  • Comparing various types of monitoring methodologies
  • Executing proper logging procedures and evaluating the results
  • Conducting periodic audits of system security settings
  • Explaining general cryptography concepts
  • Explaining basic hashing concepts and mapping various algorithms to appropriate applications
  • Explaining basic encryption concepts and mapping various algorithms to appropriate applications
  • Explaining and implementing protocols
  • Explaining core concepts of public key cryptography
  • Implementing PKI and certificate management
  • Explaining redundancy planning and its components
  • Implementing disaster recovery procedures
  • Differentiating between and executing appropriate incident response procedures
  • Identifying and explaining applicable legislation and organizational policies
  • Explaining the importance of environmental controls
  • Explaining the concept of how to reduce the risks of social engineering

Learn More

  • This field is for validation purposes and should be left unchanged.
What is included with the CompTIA Security Course?

Includes $364 Exam Fee

Take the certification exam within 3 months of course / module completion

Price Beat Guarantee

Relax, we will beat competitor’s advertised price. Our course has no extra costs

Includes Books & Meals

Course material in hardcopy included for you to keep. Full-time courses include meals

Includes Mock & Test Questions

Mock tests included in full-time courses for 3 months from course completion

Includes Course Retake

Sit through the entire course again to clear any doubts. Included in full-time courses

Authorized Test Center

Take the official vendor certification exam at the Logitrain training center

DATES, LOCATIONS & PRICES

Logitrain Live Online Training Banner

LocationTypeDurationPriceDates
LocationTypeDurationPriceDates

Accreditations

OUR SATISFIED CUSTOMERS

Learn More

  • This field is for validation purposes and should be left unchanged.