CompTIA Security+ Training

Venue: Online with live instructor

Overview: The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Instructor: Our instructor is a distinguished cybersecurity trainer, author, technology conference speaker, practitioner, technical editor, blogger, and practice exam designer in the technology industry. He has over 20 years of IT/security experience with the following certifications:

CISSP, CISM, CEH, CASP+, CySA+, CND, CFR, CEI, Security+, MCT, MCCT, MCSE, MCITP, MCSA, MCTS, MCP, A+, Network+, Cloud+, Cloud Essentials, SMSP, Healthcare IT technician.

Price: Special introductory price of $2475

> See upcoming courses

  • No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
  • More choose Security+ for DoD 8570 compliance than any other certification.
  • Security+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
  • The new Security+ certification covers the Junior IT Auditor/Penetration Tester job role, in addition to the previous job roles for Systems Administrator, Network Administrator, and Security Administrator.

There are no required prerequisites to take CompTIA Security+.  However, students should have basic Windows user skills and a fundamental understanding of computer and networking concepts.

CompTIA A+ and Network+ certifications, or equivalent knowledge, and at least 6 months experience in networking support/IT administration are strongly recommended.

Threats, Attacks and Vulnerabilities
  • Given a scenario, analyze indicators of compromise and determine the type of malware.
  • Compare and contrast types of attacks.
  • Explain threat actor types and attributes.
  • Explain penetration testing concepts.
  • Explain vulnerability scanning concepts.
  • Explain the impact associated with types of vulnerabilities.
Technologies and Tools
  • Install and configure network components, both hardware and software-based, to support organizational security.
  • Given a scenario, use appropriate software tools to assess the security posture of an organization.
  • Given a scenario, troubleshoot common security issues.
  • Given a scenario, analyze and interpret output from security technologies.
  • Given a scenario, deploy mobile devices securely.
  • Given a scenario, implement secure protocols.
Architecture and Design
  • Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • Given a scenario, implement secure network architecture concepts.
  • Given a scenario, implement secure systems design.
  • Explain the importance of secure staging deployment concepts.
  • Explain the security implications of embedded systems.
  • Summarize secure application development and deployment concepts.
  • Summarize cloud and virtualization concepts.
  • Explain how resiliency and automation strategies reduce risk.
  • Explain the importance of physical security controls.
Identity and Access Management
  • Compare and contrast identity and access management concepts.
  • Given a scenario, install and configure identity and access services.
  • Given a scenario, implement identity and access management controls.
  • Given a scenario, differentiate common account management practices.
Risk Management
  • Explain the importance of policies, plans and procedures related to organizational security.
  • Summarize business impact analysis concepts.
  • Explain risk management processes and concepts.
  • Given a scenario, follow incident response procedures.
  • Summarize basic concepts of forensics.
  • Explain disaster recovery and continuity of operations concepts.
  • Compare and contrast various types of controls.
  • Given a scenario, carry out data security and privacy practices.
Cryptography and PKI
  • Compare and contrast basic concepts of cryptography.
  • Explain cryptography algorithms and their basic characteristics.
  • Given a scenario, install and configure wireless security settings.
  • Given a scenario, implement public key infrastructure.

Those who complete Security+ training and certification qualify for the following or similar jobs:

  • Systems Administrator
  • Network Administrator
  • Security Administrator
  • Junior IT Auditor/Penetration Tester
  • Security Specialist
  • Security Consultant
  • Security Engineer
Network Administrator national median salary range: $92,000 – $155,000

Included Course Materials

JMark Services, known for its specialized Intelligence training, uses only the best quality materials to train our students. Our offering includes 12-month online access to the entire set of content:

✓ CertMaster Learn Product Set

✓ Full Learning Plan with Strength/Weakness Assessments, Lesson Guide, Performance-based Questions, Practice Tests, 945 Flash Cards, Game Center, Full Resource Center

✓ Comprehensive Online Lab Exercises

✓ CertMaster Practice Exams

✓ CompTIA Security + Test Voucher

What Skills Will You Learn?

Threats, Attacks & Vulnerabilities

Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts

Technologies & Tools

Install, configure, and deploy network components while assessing and troubleshooting issues

Architecture & Design

Implement secure network architecture concepts and systems design for ultimate system stability and performance

Identity & Access Management

Install and configure identity and access services, as well as management controls

Risk Management

Implement and summarize risk management best practices and the business impact

Cryptography & PKI

Install and configure wireless security settings and implement public key infrastructure

Upcoming Courses

There are currently no courses scheduled. Check back for the latest information.

Contact Us