Course Description
CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security.
A candidate’s initial security certification should be CompTIA Security+. It offers the foundational knowledge needed for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity positions. Best practices in hands-on troubleshooting are incorporated into Security+, ensuring that candidates have the practical security problem-solving abilities necessary to:
Assessing an enterprise’s security posture and recommending and implementing relevant security solutions
Hybrid environments, such as cloud, mobile, and IoT, must be monitored and secured.
Operate with a thorough understanding of all applicable laws and rules, including governance, risk, and compliance principles.
Security events and incidents must be identified, analyzed, and responded to.
Exam Description
The CompTIA Security+ test verifies that the applicant has the knowledge and abilities needed to assess an organization’s security posture and recommend and implement relevant security solutions. Identify, analyze, and respond to security events and occurrences in hybrid environments, such as cloud, mobile, and IoT; follow appropriate laws and regulations, such as governance, risk, and compliance principles; and monitor and safeguard hybrid environments, such as cloud, mobile, and IoT. Evaluate the security posture of an organization and suggest and install appropriate security solutions.
- Monitoring and securing hybrid settings such as cloud, mobile, and IoT
- Operate following applicable laws and policies, including governance, risk, and compliance standards.
- Security events and incidents must be identified, analyzed, and responded to.
Program Objectives
1.0 Threats, Attacks, and Vulnerabilities
2.0 Technologies and Tools
3.0 Architecture and Design
4.0 Identity and Access Management
5.0 Risk Management
6.0 Cryptography and PKI
Prerequisites
- No required prerequisites for Security+ certification
- Recommended: CompTIA Network+ Certification and 2 years of technical networking experience with an emphasis on security, or equivalent knowledge, is recommended.
Exam Details
Number of Questions: 90 questions
Type of Questions: Multiple-choice and performance-based
Length of Test: 90 Minutes
Passing Score: 750 (on a scale of 100-900)
Course Features
- Lectures 41
- Quizzes 0
- Duration 30 hours
- Skill level All levels
- Language English
- Students 394
- Assessments Yes
Curriculum
- 5 Sections
- 41 Lessons
- 365 Days
- 1.0 Threats, Attacks, and Vulnerabilities7
- 1.0Compare and contrast different types of social engineering techniques11 Minutes
- 1.1Given a scenario, analyze potential indicators to determine the type of attack.83 Minutes
- 1.2Given a scenario, analyze potential indicators to determine the type of attack and application attacks.52 Minutes
- 1.3Explain different threat actors, vectors, and intelligence sources.42 Minutes
- 1.4Explain the security concerns associated with various types of vulnerabilities.33 Minutes
- 1.5Summarize the techniques used in security assessments.29 Minutes
- 1.6Explain the techniques used in penetration testing.60 Minutes
- 2.0 Architecture and Design8
- 2.0Explain the importance of security concepts in an enterprise environment.60 Minutes
- 2.1Summarize virtualization and cloud computing concepts75 Minutes
- 2.2Summarize secure application development, deployment, and automation concepts.61 Minutes
- 2.3Summarize authentication and authorization design concepts34 Minutes
- 2.4Given a scenario, implement cybersecurity resilience.54 Minutes
- 2.5Explain the security implications of embedded and specialized systems45 Minutes
- 2.6Explain the importance of physical security controls.46 Minutes
- 2.7Summarize the basics of cryptographic concepts49 Minutes
- 3.0 Implementation11
- 3.0Given a scenario, implement secure protocols52 Minutes
- 3.1Given a scenario, implement host or application security solutions53 Minutes
- 3.2Given a scenario, implement secure network designs Part-158 Minutes
- 3.3Given a scenario, implement secure network designs Part-221 Minutes
- 3.4Given a scenario, install and configure wireless security settings.53 Minutes
- 3.5Given a scenario, implement secure mobile solutions Part-138 Minutes
- 3.6Given a scenario, implement secure mobile solutions Part-220 Minutes
- 3.7Given a scenario, apply cybersecurity solutions to the cloud.37 Minutes
- 3.8Given a scenario, implement identity and account management controls.23 Minutes
- 3.9Given a scenario, implement authentication and authorization solutions.53 Minutes
- 3.10Given a scenario, implement public key infrastructure.35 Minutes
- 4.0 Operations and Incident Response10
- 4.0Given a scenario, use the appropriate tool to assess organizational security Part-115 Minutes
- 4.1Given a scenario, use the appropriate tool to assess organizational security Part-247 Minutes
- 4.2Given a scenario, use the appropriate tool to assess organizational security Part-350 Minutes
- 4.3Given a scenario, use the appropriate tool to assess organizational security Part-413 Minutes
- 4.4Summarize the importance of policies, processes, and procedures for incident response Part-121 Minutes
- 4.5Summarize the importance of policies, processes, and procedures for incident response Part-226 Minutes
- 4.6Given an incident, utilize appropriate data sources to support an investigation Part-150 Minutes
- 4.7Given an incident, utilize appropriate data sources to support an investigation Part-25 Minutes
- 4.8Given an incident, apply mitigation techniques or controls to secure an environment.20 Minutes
- 4.9Explain the key aspects of digital forensics.43 Minutes
- 5.0 Governance, Risk, and Compliance5
- 5.0Compare and contrast various types of controls.13 Minutes
- 5.1Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.36 Minutes
- 5.2Explain the importance of policies to organizational security.22 Minutes
- 5.3Summarize risk management processes and concepts37 Minutes
- 5.4Explain privacy and sensitive data concepts in relation to security.38 Minutes




