Responsive menu button

About This Course

The CompTIA Security+ certification is an internationally recognised industry-standard qualification for anyone in an IT role, held by more than half a million people worldwide.

This online course will teach you the most important foundational principles for securing a network and managing risk. It will also cover access control, identity management and cryptography, as well as the selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. This vendor-neutral certification will also raise your understanding of security concerns associated with cloud computing, BYOD (bring your own device) and SCADA (supervisory control and data acquisition).

Duration: March to August
Participants: 25
Certification: CompTIA Security+ SY0-701

Learning Outcomes

  • Identify and mitigate cybersecurity risks
  • Secure networks, applications, and data
  • Monitor and respond to security threats
  • Apply best practices for cybersecurity management

Who Should Attend

This course is aimed at those seeking to establish or advance their career in cybersecurity. Students should have a fundamental understanding of networks and security.

Course Syllabus

Module 1: General Security Concepts

  • Compare and contrast various types of security controls.
  • Summarize fundamental security concepts
  • Explain the importance of change management processes and the impact to security.
  • Explain the importance of using appropriate cryptographic solutions.

Module 2: Threats, Vulnerabilities and Mitigations

  • Compare and contrast common threat actors and motivations.
  • Explain common threat vectors and attack surfaces.
  • Explain various types of vulnerabilities.
  • Given a scenario, analyze indicators of malicious activity.
  • Explain the purpose of mitigation techniques used to secure the enterprise.

Module 3: Security Architecture

  • Compare and contrast security implications of different architecture models.
  • Given a scenario, apply security principles to secure enterprise infrastructure.
  • Compare and contrast concepts and strategies to protect data.
  • Explain the importance of resilience and recovery in security architecture.
  • Explain the importance of physical security controls.

Module 4: Security Operations

  • Given a scenario, apply common security techniques to computing resources.
  • Explain the security implications of proper hardware, software, and data asset management.
  • Explain various activities associated with vulnerability management.
  • Explain security alerting and monitoring concepts and tools.
  • Given a scenario, modify enterprise capabilities to enhance security.
  • Given a scenario, implement and maintain identity and access management.
  • Explain the importance of automation and orchestration related to secure operations.
  • Explain appropriate incident response activities.
  • Given a scenario, use data sources to support an investigation.

Module 5: Security Program Management and Oversight

  • Summarize elements of effective security governance.
  • Explain the elements of the risk management process.
  • Explain the processes associated with third-party risk assessment and management.
  • Summarize elements of effective security compliance.
  • Explain types and purposes of audits and assessments.
  • Given a scenario, implement security awareness practices.
© 2025 Future In Tech