NovelVista logo

CompTIA Security+ Training & Certification

Trusted by 1000s of global organizations, NovelVista is the leading Accredited Training Organization (ATO) to conduct CompTIA Security+ Training & Certification Course.

  • Industry Expert Trainers
  • Online learning session
  • Accredited Trainer
  • Exam fee included
View Schedule
📞18002122003
Google4.9 Ratings onReviews
9000+ Professionals Enrolled

CompTIA Security+ Course Overview

CompTIA Security+ training and certification is aimed towards delivering the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ training subsumes best practices in hands-on trouble-shooting to make sure that security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ are enlightened about how to address security incidents and not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. CompTIA Security+ training also helps you in gaining skills you’ll be needing to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, and laws.
Accredited By
Accreditation Logo

What You Will Get?

Study Material

Mock Exams

16+ hours of live training

Exam registration assistance

Case studies soft copy

Official courseware from CompTIA

Learning Outcome

After the completion of the course, the participants would be able to:

How to plan and implement Cyber Security in your organization.
Making a business plan according to security guidelines.
IT Security roles and responsibilities.
Best industry practices.
Designing the right implementation strategy
Real-Time Case Studies.

Course Curriculum

Chapter 01 - Risk Management+

  • Introduction
  • The CIA of Security Threat Actors What is Risk Managing Risk
  • Using Guides for Risk Assessment Security Controls
  • Interesting Security Controls Defense in Depth
  • IT Security Governance Security Policies Frameworks
  • Quantitative Risk Calculations Business Impact Analysis Organizing Data
  • Security Training
  • Third-Party Agreements

Chapter 02 - Cryptography+

  • Cryptography Basics Cryptographic Methods Symmetric Cryptosystems Symmetric Block Modes RSA Cryptosystems
  • Diffie-Hellman PGP GPG
  • Hashing HMAC
  • Steganography Certificates and Trust Public Key Infrastructure Cryptographic Attacks
  • Identification Authorization Concepts Access Control List Password Security Linux File Permissions
  • Windows File Permissions User Account Management AAA
  • Authentication Methods Single Sign-On

Chapter 03 - Identity and Access Management+

  • Identification
  • Authorization Concepts
  • Access Control List
  • Password Security
  • Linux File Permissions
  • Windows File Permissions
  • User Account Management
  • AAA
  • Authentication Methods
  • Single Sign-On

Chapter 04 - Tools of the Trade+

  • OS Utilities
  • OS Utility ipconfig
  • Network Scanners
  • Protocol Analyzers
  • SNMP
  • Logs

Chapter 05 - Securing Individual Systems+

  • Denial of Service
  • Host Threats
  • Man in the Middle
  • System Resiliency
  • RAID
  • NAS and SAN
  • Physical Hardening
  • RFI, EMI, and ESD
  • Host Hardening
  • Data and System Security
  • Disk Encryption
  • Hardware Firmware Security
  • Secure OS Types
  • Securing Peripherals
  • Malware
  • Analyzing Output
  • IDS and IPS
  • Automation Strategies
  • Data Destruction

Chapter 06 - The Basic LAN+

  • LAN Review
  • Network Topologies Review
  • Network Zone Review
  • Network Access Controls
  • The Network Firewall
  • Proxy Servers Honeypots
  • Virtual Private Networks IPSec
  • NIDS NIPS SIEM

Chapter 07 - Beyond the Basic LAN+

  • Wireless Review
  • Living in Open Networks
  • Vulnerabilities with Wireless Access Points
  • Cracking WEP
  • Cracking WPA
  • Cracking WPS
  • Wireless Hardening
  • Wireless Access Points
  • Virtualization Basics
  • Virtual Security Containers
  • IaaS PaaS SaaS
  • Deployment Models Static Hosts
  • Mobile Connectivity
  • Deploying Mobile Devices
  • Mobile Enforcement
  • Mobile Device Management
  • Physical Controls
  • HVAC
  • Fire Suppression

Chapter 08 - Secure+

  • Secure Applications and Protocols Network Models
  • Know Your Protocols
  • TCP IP Know Your Protocols
  • Applications Transport
  • Layer Security
  • Internet Service Hardening
  • Protecting Your Servers
  • Secure Code Development
  • Secure Deployment Concepts
  • Code Quality and Testing

Chapter 09 - Testing Your Infrastructure+

  • Vulnerability Scanning Tools
  • Vulnerability Scanning Assessment
  • Social Engineering Principles
  • Social Engineering Attacks
  • Attacking Web Sites
  • Attacking Applications
  • Exploiting a Target
  • Vulnerability Impact

Chapter 10 - Dealing with Incidents+

  • Incident Response
  • Digital Forensics
  • Contingency
  • Planning Backups