CompTIA Security+ Certification Prep Course (AA-Sec+-Prep)


Course Description

Our Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam (SY0-701). Objective coverage is marked throughout the course. Exam voucher included.

What is Security+ Certification?

The Security+ certification is considered to be the minimum level of certification for all IT security positions beyond entry-level. This course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.

Course Outline

  • Lesson 1: Summarize Fundamental Security Concepts
  • Lesson 2: Compare Threat Types
  • Lesson 3: Explain Cryptographic Solutions
  • Lesson 4: Implement Identity and Access Management
  • Lesson 5: Secure Enterprise Network Architecture
  • Lesson 6: Secure Cloud Network Architecture
  • Lesson 7: Explain Resiliency and Site Security Concepts
  • Lesson 8: Explain Vulnerability Management
  • Lesson 9: Evaluate Network Security Capabilities
  • Lesson 10: Assess Endpoint Security Capabilities
  • Lesson 11: Enhance Application Security Capabilities
  • Lesson 12: Explain Incident Response and Monitoring Concepts
  • Lesson 13: Analyze Indicators of Malicious Activity
  • Lesson 14: Summarize Security Governance Concepts
  • Lesson 15: Explain Risk Management Processes
  • Lesson 16: Summarize Data Protection and Compliance Concepts

Course Objectives

  • Knowledge and skills to understand to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance
  • Identify, analyze, and respond to security events and incidents, and prepare candidates to take the CompTIA Security+ certification exam.

Course Prerequisites

  • This course assumes basic knowledge of using and maintaining individual workstations.
  • Attendees should be CompTIA A+ certified (or have equivalent experience) and CompTIA Network+ certified (or have equivalent experience) with 2-3 years networking experience.

Course Information

Length: 5 day

Format: Lecture and Lab

Delivery Method: n/a

Max. Capacity: 16



Schedule

Contact Us

UPCOMING COURSES
Date
Geography & Location
Days
Cost
CLC
GTR
Dec 09, 2024 - 5 day(s)
Dec 09, 2024
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Dec 16, 2024 - 5 day(s)
Dec 16, 2024
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Jan 06, 2025 - 5 day(s)
Jan 06, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Jan 13, 2025 - 5 day(s)
Jan 13, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Feb 03, 2025 - 5 day(s)
Feb 03, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Feb 10, 2025 - 5 day(s)
Feb 10, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Feb 24, 2025 - 5 day(s)
Feb 24, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Mar 24, 2025 - 5 day(s)
Mar 24, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Mar 31, 2025 - 5 day(s)
Mar 31, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Apr 07, 2025 - 5 day(s)
Apr 07, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD
Apr 21, 2025 - 5 day(s)
Apr 21, 2025
AMER
Remote-EST
AMER, Remote-EST
5
$2970 USD
$2970 USD

Do you have more questions? We're delighted to assist you!

1-877-797-2799
info@firefly.cloud

Labs

  • Assisted Lab: Exploring the Lab Environment
  • Assisted Lab: Perform System Configuration Gap Analysis
  • Assisted Lab: Configuring Examples of Security Control Types
  • Assisted Lab: Finding Open Service Ports
  • Assisted Lab: Using SET to Perform Social Engineering
  • Applied Lab: Using Storage Encryption
  • Assisted Lab: Using Hashing and Salting
  • Assisted Lab: Managing Password Security
  • Assisted Lab: Managing Permissions
  • Assisted Lab: Setting up Remote Access
  • Assisted Lab: Using TLS Tunneling
  • Assisted Lab: Using Containers
  • Assisted Lab: Using Virtualization
  • Assisted Lab: Implement Backups
  • Assisted Lab: Performing Drive Sanitization
  • Assisted Lab: Exploiting and Detecting SQLi
  • Assisted Lab: Working with Threat Feeds
  • Assisted Lab: Performing Vulnerability Scans
  • Assisted Lab: Understanding Security Baselines
  • Applied Lab: Implementing a Firewall
  • Assisted Lab: Using Group Policy
  • Applied Lab: Hardening
  • Assisted Lab: Performing DNS Filtering
  • Assisted Lab: Configuring System Monitoring
  • Applied Lab: Incident Response: Detection
  • Applied Lab: Performing Digital Forensics
  • Assisted Lab: Performing Root Cause Analysis
  • Assisted Lab: Detecting and Responding to Malware
  • Assisted Lab: Understanding On-Path Attacks
  • Adaptive Lab: Using a Playbook
  • Assisted Lab: Implementing Allow Lists and Deny Lists
  • Assisted Lab: Performing Reconnaissance
  • Assisted Lab: Performing Penetration Testing
  • Assisted Lab: Training and Awareness through Simulation
  • Capstone Lab: Discovering Anomalous Behavior
  • Assisted Lab: Use Cases of Automation and Scripting
  • Applied Lab: Using Network Sniffers


Who Should Attend

  • Network Administrators
  • Cybersecurity Associates
  • IT personnel interested in pursuing a career in cybersecurity