A Native American-Owned Company

CompTIA Security+ Training

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Venue: Synchronous virtual. After registering you will be provided a link.

Price: $1900/person (group discounts negotiable)

Includes 40-hour course and exam voucher with guaranteed pass*.

*JMark Services guarantees students will pass the certification exam or the cost of the course will be refunded. Student must have obtained a 90% or above on practice exam administered during course in order to qualify for guarantee.

> See upcoming courses

  • No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
  • More choose Security+ for DoD 8570 compliance than any other certification.
  • Security+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
  • The new Security+ certification covers the Junior IT Auditor/Penetration Tester job role, in addition to the previous job roles for Systems Administrator, Network Administrator, and Security Administrator.

There are no required prerequisites to take CompTIA Security+.  However, students should have basic Windows user skills and a fundamental understanding of computer and networking concepts.

CompTIA A+ and Network+ certifications, or equivalent knowledge, and at least 6 months experience in networking support/IT administration are strongly recommended.

Threats, Attacks and Vulnerabilities
  • Given a scenario, analyze indicators of compromise and determine the type of malware.
  • Compare and contrast types of attacks.
  • Explain threat actor types and attributes.
  • Explain penetration testing concepts.
  • Explain vulnerability scanning concepts.
  • Explain the impact associated with types of vulnerabilities.
Technologies and Tools
  • Install and configure network components, both hardware and software-based, to support organizational security.
  • Given a scenario, use appropriate software tools to assess the security posture of an organization.
  • Given a scenario, troubleshoot common security issues.
  • Given a scenario, analyze and interpret output from security technologies.
  • Given a scenario, deploy mobile devices securely.
  • Given a scenario, implement secure protocols.
Architecture and Design
  • Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • Given a scenario, implement secure network architecture concepts.
  • Given a scenario, implement secure systems design.
  • Explain the importance of secure staging deployment concepts.
  • Explain the security implications of embedded systems.
  • Summarize secure application development and deployment concepts.
  • Summarize cloud and virtualization concepts.
  • Explain how resiliency and automation strategies reduce risk.
  • Explain the importance of physical security controls.
Identity and Access Management
  • Compare and contrast identity and access management concepts.
  • Given a scenario, install and configure identity and access services.
  • Given a scenario, implement identity and access management controls.
  • Given a scenario, differentiate common account management practices.
Risk Management
  • Explain the importance of policies, plans and procedures related to organizational security.
  • Summarize business impact analysis concepts.
  • Explain risk management processes and concepts.
  • Given a scenario, follow incident response procedures.
  • Summarize basic concepts of forensics.
  • Explain disaster recovery and continuity of operations concepts.
  • Compare and contrast various types of controls.
  • Given a scenario, carry out data security and privacy practices.
Cryptography and PKI
  • Compare and contrast basic concepts of cryptography.
  • Explain cryptography algorithms and their basic characteristics.
  • Given a scenario, install and configure wireless security settings.
  • Given a scenario, implement public key infrastructure.

Those who complete Security+ training and certification qualify for the following or similar jobs:

  • Systems Administrator
  • Network Administrator
  • Security Administrator
  • Junior IT Auditor/Penetration Tester
  • Security Specialist
  • Security Consultant
  • Security Engineer
Network Administrator national median salary range: $92,000 – $155,000

What Skills Will You Learn?

Threats, Attacks & Vulnerabilities

Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts

Technologies & Tools

Install, configure, and deploy network components while assessing and troubleshooting issues

Architecture & Design

Implement secure network architecture concepts and systems design for ultimate system stability and performance

Identity & Access Management

Install and configure identity and access services, as well as management controls

Risk Management

Implement and summarize risk management best practices and the business impact

Cryptography & PKI

Install and configure wireless security settings and implement public key infrastructure

Upcoming Courses

There are no upcoming courses. Please check back for updates.


Contact Andre Hinton.