CompTIA CyberSecurity Certification Training

Get training from experts

Contact Us

SY0-701

CompTIA Security+
Formats:  Asynchronous
Blended
Online
Onsite
Part-time
Level: Beginner
Prerequisistes:  
Recommended Knowledge
Familiarity with networking concepts
Basic understanding of computer hardware, software and operating systems
CompTIA A+
CompTIA N+

Formats: We offer our training content in a flexible format to suit your needs. Contact Us if you wish to know if we can accommodate your unique requirements.

Level: We are happy to customise course content to suit your skill level and learning goals. Contact us for a customised learning path.

CompTIA Security+ SY0-701

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to install and configure systems, secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques.

A student who successfully completes this course can participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

Course Objectives

Threats, Attacks, and Vulnerabilities

  • Given a scenario, analyze indicators of compromise and determine the type of malware
  • Compare and contrast types of attacks.
  • Explain threat actor types and attributes.
  • Explain penetration testing concepts
  • Explain vulnerability scanning concepts
  • Explain the impact associated with types of vulnerabilities

Technologies and Tools

  • Install and configure network components, both hardware- and software-based, to support organizational security
  • Given a scenario, use appropriate software tools to assess the security posture of an organization
  • Given a scenario, troubleshoot common security issues
  • Given a scenario, analyze and interpret output from security technologies
  • Given a scenario, deploy mobile devices securely
  • Given a scenario, implement secure protocols

Architecture and Design

  • Explain use cases and purpose for frameworks, best practices and secure configuration guides
  • Given a scenario, implement secure network architecture concepts
  • Given a scenario, implement secure systems design
  • Explain the importance of secure staging deployment concepts
  • Explain the security implications of embedded systems
  • Summarize secure application development and deployment concepts
  • Summarize cloud and virtualization concepts
  • Explain how resiliency and automation strategies reduce risk
  • Explain the importance of physical security controls

Identity and Access Management

  • Compare and contrast identity and access management concepts
  • Given a scenario, install and configure identity and access services
  • Given a scenario, implement identity and access management controls
  • Given a scenario, differentiate common account management practices
  • Risk Management
  • Explain the importance of policies, plans, and procedures related to organizational security
  • Summarize business impact analysis concepts
  • Explain risk management processes and concepts
  • Given a scenario, follow incident response procedures
  • Summarize basic concepts of forensics
  • Explain disaster recovery and continuity of operation concepts
  • Compare and contrast various types of controls
  • Given a scenario, carry out data security and privacy practices
 

Cryptography and PKI

  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics
  • Given a scenario, install and configure wireless security settings
  • Given a scenario, implement public key infrastructure

Contact Us

Please contact us for any queries via phone or our contact form. We will be happy to answer your questions.

3 Appian Place,373 Kent Ave
Ferndale,
2194 South Africa
Tel: +2711-781 8014 (Johannesburg)
  +2721-020-0111 (Cape Town)
ZA

Contact Form

contactform.caption

Contact Form