Help Icon


Course Title
CompTIA™ Security+ Certification Training (Voucher Included)


Gain the skills you need to be a security professional and prepare yourself to take the CompTIA™ Security+ certification exam as you master the basics of system security, network infrastructure, access control and organizational security. Become proficient in basic security concepts such as attacks and mitigation, security applications, risk assessment, disaster recovery and incident response, cloud computing, mobile devices, BYOD and SCADA, in addition to vulnerability assessment.

At least two years of technical networking experience with an emphasis on security and the CompTIA™ Network+ certification are recommended. After completing the program, you're encouraged to set up your own exam dates and times at a testing center close to you. An exam voucher is included in the cost of tuition.


By the end of this program, you'll be able to perform the following:

  • Incident Response
  • Network Design Security
  • Risk Calculations
  • Penetration Testing
  • Risk Management
  • Mobile Device, Host, and Data Security
  • Account management


Additionally, you will be able to implement the following:

  • Network Device Security
  • Wireless Security
  • Strategies to Reduce Risk
  • Physical and Environment Security
  • Static Environment Security
  • Authentication Services and Protocols
  • Secure Authentication Methods
  • Authorization Models
  • Security for Protocols and Ports

Lastly, you will be able to understand and implement the following:

  • Techniques to Raise Security Awareness
  • Mitigating Malware
  • Discovery Tools
  • Application Security Controls and Techniques
  • Attack Types
  • The Correct Controls for CIA
  • Cryptography Concepts and Protocols
  • 3rd Party Integration in Risk
  • Computer Forensics
  • Social Engineering Reduction
  • PKI
  • Security Administrative Principles
  • Secure Protocols and Ports
  • Control Types


  1. Network Security
  2. Compliance and Operational Security
  3. Threats and Vulnerabilities
  4. Data and Host Security, Access Control and Identity Management
  5. Cryptography

Method of Instruction



Class participation