Course Description
CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security.
A candidate’s initial security certification should be CompTIA Security+. It offers the foundational knowledge needed for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity positions. Best practices in hands-on troubleshooting are incorporated into Security+, ensuring that candidates have the practical security problem-solving abilities necessary to:
Assessing an enterprise’s security posture and recommending and implementing relevant security solutions
Hybrid environments, such as cloud, mobile, and IoT, must be monitored and secured.
Operate with a thorough understanding of all applicable laws and rules, including governance, risk, and compliance principles.
Security events and incidents must be identified, analyzed, and responded to.
Exam Description
The CompTIA Security+ test verifies that the applicant has the knowledge and abilities needed to assess an organization’s security posture and recommend and implement relevant security solutions. Identify, analyze, and respond to security events and occurrences in hybrid environments, such as cloud, mobile, and IoT; follow appropriate laws and regulations, such as governance, risk, and compliance principles; and monitor and safeguard hybrid environments, such as cloud, mobile, and IoT. Evaluate the security posture of an organization and suggest and install appropriate security solutions.
- Monitoring and securing hybrid settings such as cloud, mobile, and IoT
- Operate following applicable laws and policies, including governance, risk, and compliance standards.
- Security events and incidents must be identified, analyzed, and responded to.
Program Objectives
1.0 Threats, Attacks, and Vulnerabilities
2.0 Technologies and Tools
3.0 Architecture and Design
4.0 Identity and Access Management
5.0 Risk Management
6.0 Cryptography and PKI
Prerequisites
- No required prerequisites for Security+ certification
- Recommended: CompTIA Network+ Certification and 2 years of technical networking experience with an emphasis on security, or equivalent knowledge, is recommended.
Exam Details
Number of Questions: 90 questions
Type of Questions: Multiple-choice and performance-based
Length of Test: 90 Minutes
Passing Score: 750 (on a scale of 100-900)
Course Features
- Lectures 41
- Quizzes 0
- Duration 30 hours
- Skill level All levels
- Language English
- Students 357
- Certificate Yes
- Assessments Yes
Curriculum
- 5 Sections
- 41 Lessons
- 10 Weeks
- 1.0 Threats, Attacks, and Vulnerabilities7
- 1.1Compare and contrast different types of social engineering techniques11 Minutes
- 1.2Given a scenario, analyze potential indicators to determine the type of attack and application attacks.52 Minutes
- 1.3Given a scenario, analyze potential indicators to determine the type of attack.83 Minutes
- 1.4Explain different threat actors, vectors, and intelligence sources.42 Minutes
- 1.5Explain the security concerns associated with various types of vulnerabilities.33 Minutes
- 1.6Summarize the techniques used in security assessments.29 Minutes
- 1.7Explain the techniques used in penetration testing.60 Minutes
- 2.0 Architecture and Design8
- 2.1Explain the importance of security concepts in an enterprise environment.60 Minutes
- 2.2Summarize virtualization and cloud computing concepts75 Minutes
- 2.3Summarize secure application development, deployment, and automation concepts.61 Minutes
- 2.4Summarize authentication and authorization design concepts34 Minutes
- 2.5Given a scenario, implement cybersecurity resilience.54 Minutes
- 2.6Explain the security implications of embedded and specialized systems45 Minutes
- 2.7Explain the importance of physical security controls.46 Minutes
- 2.8Summarize the basics of cryptographic concepts49 Minutes
- 3.0 Implementation11
- 3.1Given a scenario, implement secure protocols52 Minutes
- 3.2Given a scenario, implement host or application security solutions53 Minutes
- 3.3Given a scenario, implement secure network designs Part-158 Minutes
- 3.4Given a scenario, install and configure wireless security settings.53 Minutes
- 3.5Given a scenario, implement secure mobile solutions Part-138 Minutes
- 3.6Given a scenario, implement secure mobile solutions Part-220 Minutes
- 3.7Given a scenario, apply cybersecurity solutions to the cloud.37 Minutes
- 3.8Given a scenario, implement identity and account management controls.23 Minutes
- 3.9Given a scenario, implement authentication and authorization solutions.53 Minutes
- 3.10Given a scenario, implement secure network designs Part-221 Minutes
- 3.11Given a scenario, implement public key infrastructure.35 Minutes
- 4.0 Operations and Incident Response10
- 4.1Given a scenario, use the appropriate tool to assess organizational security Part-115 Minutes
- 4.2Given a scenario, use the appropriate tool to assess organizational security Part-247 Minutes
- 4.3Given a scenario, use the appropriate tool to assess organizational security Part-350 Minutes
- 4.4Given a scenario, use the appropriate tool to assess organizational security Part-413 Minutes
- 4.5Summarize the importance of policies, processes, and procedures for incident response Part-121 Minutes
- 4.6Summarize the importance of policies, processes, and procedures for incident response Part-226 Minutes
- 4.7Given an incident, utilize appropriate data sources to support an investigation Part-150 Minutes
- 4.8Given an incident, utilize appropriate data sources to support an investigation Part-25 Minutes
- 4.9Given an incident, apply mitigation techniques or controls to secure an environment.20 Minutes
- 4.10Explain the key aspects of digital forensics.43 Minutes
- 5.0 Governance, Risk, and Compliance5
- 5.1Compare and contrast various types of controls.13 Minutes
- 5.2Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.36 Minutes
- 5.3Explain the importance of policies to organizational security.22 Minutes
- 5.4Summarize risk management processes and concepts37 Minutes
- 5.5Explain privacy and sensitive data concepts in relation to security.38 Minutes