Security+ Bookcover.jpg
CompTIA Training

CompTIA Security+



    5 days in classroom or virtual


The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.


     Expert Instructor lead training

     Accredited course material

     Study guide to assist with exam preparation

     Access to Certmaster

    Examination fees included*

    Pass for sure commitment*


The CompTIA Security + Consist of Training from all 6 Domains

Domain 1.0 – Network Security

    Implement security configuration parameters on network devices and other technologies

    Given a scenario, use secure network administration principles

    Explain network design elements and components

    Given a scenario. Implement common protocols and services

    Given a scenario, troubleshoot security issues related to wireless networking

Domain 2.0 – Compliance and Operational Security

    Explain the importance of risk related concepts

    Summarize the security implications of integrating systems and data with third parties

    Given a scenario, implement appropriate risk mitigation strategies

    Given a scenario, implement basic forensic procedures

    Summarize common incident response procedures

    Explain the importance of security related awareness and training

    Compare and contrast physical security and environmental controls

    Summarize risk management best practices

    Given a scenario, select the appropriate control to meet the goals of security

Domain 3.0 – Threats and Vulnerabilities

    Explain types of malware

    Summarize various types of attacks

    Summarize social engineering attacks and associated effectiveness with each attack

    Explain types of wireless attacks

    Explain types of application attacks

    Analyze a scenario and select the appropriate type of mitigation and deterrent techniques

    Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities

    Explain the proper use of penetration testing versus vulnerability planning

Domain 4.0 – Application, Data and Host Security

    Explain the importance of security controls and techniques

    Summarize mobility security concepts and technologies

    Given a scenario, select the appropriate solution to establish host security

    Implement the appropriate controls to ensure data security

    Compare and contrast alternative methods to mitigate security risk in static environments

Domain 5.0 – Access Control and Identity Management

    Compare and contrast the function and purpose of authentication services

    Given a scenario, select the appropriate authentication, authorization or access control

    Install and configure security controls when performing account management, based on best practices

Domain 6.0 – Cryptography

    Given a scenario, utilize general cryptography concepts

    Given a scenario, use appropriate cryptographic methods

    Given a scenario, use appropriate PKI, certificate management and associated components


    Help desk staff

    IT security professionals

    Networking technicians

    Desktop support technicians

    Storage technicians

    Students looking to gain a better understanding of networks

    Managers with IT


    There are no specific prerequisites

    Basic understanding of computers and networking is preferred

    2 years or more of IT administration with a focus on security experience is an advantage

    Day to day technical information security experience

    Broad knowledge of security concerns and implementation

Delivery Model:
Add To Cart
Security+ Bookcover.jpg