Security+ Certification Boot Camp Outline
Our courses are boosted with Training Camp’s exam prep methodology so your course content will always be up-to-date with the most current version of the exam. The following topics are general guidelines for the content. In order to better reflect the contents of the exam and for clarity purposes, the outline below may change at any time without notice.
Threats, Attacks and Vulnerabilities
– Given a scenario, analyze indicators of compromise and determine the type of malware.
– Compare and contrast types of attacks.
– Explain threat actor types and attributes.
– Explain penetration testing concepts.
– Explain vulnerability scanning concepts.
– Explain the impact associated with types of vulnerabilities.
Technologies and Tools
– Install and configure network components, both hardware and software-based, to support organizational security.
– Given a scenario, use appropriate software tools to assess the security posture of an organization.
– Given a scenario, troubleshoot common security issues.
– Given a scenario, analyze and interpret output from security technologies.
– Given a scenario, deploy mobile devices securely.
– Given a scenario, implement secure protocols.
Architecture and Design
– Explain use cases and purpose for frameworks, best practices and secure configuration guides.
– Given a scenario, implement secure network architecture concepts.
– Given a scenario, implement secure systems design.
– Explain the importance of secure staging deployment concepts.
– Explain the security implications of embedded systems.
– Summarize secure application development and deployment concepts.
– Summarize cloud and virtualization concepts.
– Explain how resiliency and automation strategies reduce risk.
– Explain the importance of physical security controls.
Identity and Access Management
– Compare and contrast identity and access management concepts.
– Given a scenario, install and configure identity and access services.
– Given a scenario, implement identity and access management controls.
– Given a scenario, differentiate common account management practices.
– Explain the importance of policies, plans and procedures related to organizational security.
– Summarize business impact analysis concepts.
– Explain risk management processes and concepts.
– Given a scenario, follow incident response procedures.
– Summarize basic concepts of forensics.
– Explain disaster recovery and continuity of operations concepts.
– Compare and contrast various types of controls.
– Given a scenario, carry out data security and privacy practices.
Cryptography and PKI
– Compare and contrast basic concepts of cryptography.
– Explain cryptography algorithms and their basic characteristics.
– Given a scenario, install and configure wireless security settings.
– Given a scenario, implement public key infrastructure.
Is Security+ certification right for me?
CompTIA Security+ is a globally trusted, vendor-neutral certification that demonstrates competency in network security, compliance and operational security, threats and vulnerabilities, application, data and host security, access control and identity management, as well as cryptography. The skills covered in Security+ have become a baseline for all cybersecurity jobs and the new version has been updated to reflect how cybersecurity jobs are becoming more specialized, like security analytics. Prior to attending this training program, you should have some basic network knowledge, and 6+ months hands-on experience in the lab or field.
About the exam
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.