CompTIA Security+ Courses

CompTIA Security+ Courses in Cape Town

 

2KO International Group provides IT & business training courses for learners of all levels, and is also a top-rated, certified supplier of online IT courses, enabling 2KO students the opportunity to study courses online world-wide, to ensure the CompTIA Security+ training.

Overview
The CompTIA Security+ course is intended to assist you in preparing for the SY0 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

 

Module 1: Security Fundamentals
Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals

 
Module 2: Security Threats and Vulnerabilities
Social Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats
 

Module 3: Network Security

Network Devices and Technologies

Network Design Elements and Components

Implement Networking Protocols

Apply Network Security Administration Principles

Secure Wireless Traffic

 

Module 4: Managing Application, Data and Host Security

Establish Device/Host Security

Application Security

Data Security

Mobile Security

 

Module 5: Access Control, Authentication, and Account Management

Access Control and Authentication Services

Implement Account Management Security Controls

 

Module 6: Managing Certificates

Install a Certificate Authority (CA) Hierarchy

Enroll Certificates

Secure Network Traffic by Using Certificates

Renew Certificates

Revoke Certificates

Back Up and Restore Certificates and Private Keys

Restore Certificates and Private Keys

 

Module 7: Compliance and Operational Security

Physical Security

Legal Compliance

Security Awareness and Training

 

Module 8: Risk Management

Risk Analysis

Implement Vulnerability Assessment Tools and Techniques

Scan for Vulnerabilities

Mitigation and Deterrent Techniques

 

Module 9: Managing Security Incidents

Respond to Security Incidents

Recover from a Security Incident

 

Module 10: Business Continuity and Disaster Recovery Planning

Business Continuity

Plan for Disaster Recovery

Execute Disaster Recovery Plans and Procedure