Africa & Middle East

10.00 A.M - 10.00 P.M

Call us

CompTIA Security Plus Certification

Course Objectives

  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Manage data, application, and host security.
  • Implement network security.
  • Identify and implement access control and account management security measures.
  • Manage certificates.
  • Identify and implement compliance and operational security measures.
  • Manage risk.
  • Troubleshoot and manage security incidents.
  • Plan for business continuity and disaster recovery.

Course Outline

  1. Lesson 1: Security Fundamentals
    1. Topic A: The Information Security Cycle
    2. Topic B: Information Security Controls
    3. Topic C: Authentication Methods
    4. Topic D: Cryptography Fundamentals
    5. Topic E: Security Policy Fundamentals
  2. Lesson 2: Identifying Security Threats and Vulnerabilities
    1. Topic A: Social Engineering
    2. Topic B: Malware
    3. Topic C: Software-Based Threats
    4. Topic D: Network-Based Threats
    5. Topic E: Wireless Threats and Vulnerabilities
    6. Topic F: Physical Threats and Vulnerabilities
  3. Lesson 3: Managing Data, Application, and Host Security
    1. Topic A: Manage Data Security
    2. Topic B: Manage Application Security
    3. Topic C: Manage Device and Host Security
    4. Topic D: Manage Mobile Security
  4. Lesson 4: Implementing Network Security
    1. Topic A: Configure Security Parameters on Network Devices and Technologies
    2. Topic B: Network Design Elements and Components
    3. Topic C: Implement Networking Protocols and Services
    4. Topic D: Apply Secure Network Administration Principles
    5. Topic E: Secure Wireless Traffic
  5. Lesson 5: Implementing Access Control, Authentication, and Account Management
    1. Topic A: Access Control and Authentication Services
    2. Topic B: Implement Account Management Security Controls
  6. Lesson 6: Managing Certificates
    1. Topic A: Install a CA Hierarchy
    2. Topic B: Enroll Certificates
    3. Topic C: Secure Network Traffic by Using Certificates
    4. Topic D: Renew Certificates
    5. Topic E: Back Up and Restore Certificates and Private Keys
    6. Topic F: Revoke Certificates
  7. Lesson 7: Implementing Compliance and Operational Security
    1. Topic A: Physical Security
    2. Topic B: Legal Compliance
    3. Topic C: Security Awareness and Training
    4. Topic D: Integrate Systems and Data with Third Parties
  8. Lesson 8: Risk Management
    1. Topic A: Risk Analysis
    2. Topic B: Implement Vulnerability Assessment Tools and Techniques
    3. Topic C: Scan for Vulnerabilities
    4. Topic D: Mitigation and Deterrent Techniques
  9. Lesson 9: Troubleshooting and Managing Security Incidents
    1. Topic A: Respond to Security Incidents
    2. Topic B: Recover from a Security Incident
  10. Lesson 10: Business Continuity and Disaster Recovery Planning
    1. Topic A: Business Continuity
    2. Topic B: Plan for Disaster Recovery
    3. Topic C: Execute DRPs and Procedures


Sum the simple Operation :
8 + 6 =