CompTIA Security+ Courses
CompTIA Security+ Courses in Cape Town
2KO Africa training centers deliver computer courses for certification, with enrollments open for full-time classes or internet-based online courses,
enabling 2KO students the opportunity to study courses online
world-wide, to ensure the CompTIA Security+ training.
Overview
The CompTIA Security+ course is intended to assist you in preparing
for the SY0 exam. Students will implement and monitor security on
networks, applications, and operating systems, and respond to
security breaches. This course is targeted toward an Information
Technology (IT) professional who has networking and administrative
skills in Windows-based TCP/IP networks and familiarity with other
operating systems, such as OS X, Unix, or Linux, and who wants to
further a career in IT by acquiring a foundational knowledge of
security topics; prepare for the CompTIA Security+ Certification
examination; or use Security+ as the foundation for advanced
security certifications or career roles.
Module 1: Security Fundamentals
Information
Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals
Module 2: Security Threats and Vulnerabilities
Social
Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats
Module 3: Network Security
Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols
Apply Network Security Administration Principles
Secure Wireless Traffic
Module 4: Managing Application, Data and Host Security
Establish Device/Host Security
Application Security
Data Security
Mobile Security
Module 5: Access Control, Authentication, and Account Management
Access Control and Authentication Services
Implement Account Management Security Controls
Module 6: Managing Certificates
Install a Certificate Authority (CA) Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew Certificates
Revoke Certificates
Back Up and Restore Certificates and Private Keys
Restore Certificates and Private Keys
Module 7: Compliance and Operational Security
Physical Security
Legal Compliance
Security Awareness and Training
Module 8: Risk Management
Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques
Module 9: Managing Security Incidents
Respond to Security Incidents
Recover from a Security Incident
Module 10: Business Continuity and Disaster Recovery Planning
Business Continuity
Plan for Disaster Recovery
Execute Disaster Recovery Plans and Procedure