CompTIA Security+ Certification Training
Course Overview
Launch a career in cyber security through our comprehensive training program under CompTIA. Learn to secure networks, applications, and devices and manage computer environments with a thorough knowledge of existing laws and policies.
Aligned to the CompTIA Security+ SY0-701 exam, you'll gain all the necessary training you need to certify your newfound security skills for this highly-demanded job market.
Gain the certified vendor-neutral security skills necessary for mitigating cyber security risks, implementing security protocols, and analysing applications or devices under the globally-recognised CompTIA framework. Build practical skills in incident response, cryptography, vulnerability scanning, and more - helping you carve out career pathways towards IT security engineering, security analysis, and network architecture. By the end of the course, you'll have built the knowledge required to pursue and pass the CompTIA Security+ SY0-701 certification exam, helping establish yourself as a verified cyber security expert.
Who is this course for?
Course Modules
This short course delves into all the fundamentals of cyber security, including threat/vulnerability assessment and management; penetration testing; risk mitigation; incident response, and compliance. Students will also build practical skills in implementing effective device, network, and cloud-based security solutions, as well as a basic knowledge of concepts such as cryptography and digital forensics. Taught by CompTIA-certified trainers through highly interactive online classes, you'll gain the job-ready, hands-on training required to enter the cyber security industry and land in-demand opportunities.
- Introduction to Security Concepts
- CIA
- Non-Repudiation
- AAA (Authentication, Authorization, and Accounting)
- Gap Analysis
- Zero Trust Architecture and Defense in Depth
- Physical Security
- Deceptive Technology
- Types of Security Controls
- Importance of Change Management Processes and the Impact to Security
- Introduction to Cryptography
- Cryptography around Us
- Cryptography Fundamentals
- Steganography
- Masking, Obfuscation and Tokenization
- Symmetric and Asymmetric Cryptography
- Hashing Process
- Digital Signature Process
- Public Key Infrastructure
- Key Management
- Block Chain and Open Ledger
- Threat Actors
- Attributes of Actors
- Intent or Motivation
- Attack Vectors
- Common Threat Vectors and Attack Surfaces
- Assisted Practice: Enhancing Server Security
- Indicators, Indicators of Compromise and Indicators of Attack
- Assisted Practice: Investigating DoS and MITM Attacks Using Wireshark
- Malware Attack
- Assisted Practice: Analyzing Malware Reports Using VirusTotal
- Physical Attack
- Network Attack
- Cryptographic Attacks
- Password Attacks
- Application Attacks
- Mitigation Techniques to Secure the Enterprise
- Assisted Practice: Implementing Public Key Infrastructure
- Assisted Practice: Generating a Web Server Certificate
- Security Implications of Different Architecture Models
- Security Principles to Secure Enterprise Infrastructure
- Firewall Categories
- Unified Threat Management (UTM)
- Next-Generation Firewall (NGF)
- Web Application Firewall
- Proxy Server
- Intrusion Detection and Prevention System
- Virtual Private Network
- Network Access Control
- Concepts and Strategies to Protect Data
- Privacy Regulations
- Data Protection Controls
- Data Classification
- Business Continuity Planning
- High Availability
- Site Consideration
- Backups
- Power
- Cloud Data Replications
- Testing
- Platform Diversity
- Multicloud
- Capacity Management
- Establishing Baselines
- Hardening of Devices
- Wireless Technologies
- Mobile Management and Security
- Application Security
- Sandboxing
- Monitoring
- Security Implications of Proper Hardware, Software, and Data Asset Management
- Vulnerability Assessment
- System and Process Audit
- Assisted Practice: Scanning Local VM Using Nessus
- Assisted Practice: Scanning Local VM Using Nessus Security Alerting and Monitoring Concepts and Tools
- Modifying Enterprise capabilities to Enhance Security
- Web Application Firewall
- Intrusion Detection and Prevention System
- OSI, TCP/IP and Protocols
- Web Filtering Technologies
- Operating System Security
- Email Security
- Antivirus, Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR)
- Secure Protocols
- Assisted Practice: Configuring Proton VPN
- Assisted Practice: Implementing Network Segmentation and VLANs
- Implementing and Maintaining Identity and Access Management
- Multi-Factor Authentication (MFA)
- Assisted Practice: Implementing Multi-Factor Authentication (MFA)
- Type 1 Authentication: Password
- Type 2 Authentication: Tokens
- Type 3 Authentication: Biometric
- Passwordless Authentication
- Authorization and Accounting
- Federation Identity Management
- Federation Identity Management Standards
- Single Sign On
- Privilege Access Management
- Implementing and Managing Authorization Mechanisms
- Manage the Identity and Access Provisioning Lifecycle
- Assisted Practice: Installing Active Directory and Creating a User
- Assisted Practice: Configuring Logon Hours in Active Directory
- Importance of Automation and Orchestration Related to Secure Operations
- Incident Response Activities
- Digital Forensics
- Use of Data Sources to Support Investigations
- Assisted Practice: Using Event Viewer to Implement Logging and Forensic Analysis
- Assisted Practice: Implementing encryption solutions for data at rest using AESCrypt
- Assisted Practice: Using ROHOS Disk Encryption
- Security Policy, Standards, Procedures, and Guidelines
- Different types of Policies
- Standards
- Procedures
- Guidelines
- External Factors
- Monitoring and Revision
- Roles and Responsibilities for Systems and Data
- Governance
- Elements of the Risk Management Process
- Third-Party Risk Assessment and Management
- Vendor Assessment
- Vendor Selection
- Agreement Types
- Vendor Monitoring, Questionnaires and Rules of Engagement
- Summarize Elements of Effective Security Compliance.
- Consequences of Noncompliance
- Compliance Monitoring
- Privacy
- Types and Purposes of Audits and Assessments
- Phishing
- Anomalous Behavior Recognition
- User Guidance and Training
- Reporting and Monitoring
Payment Options
All amounts are in AUD. Prices includes GST. Talk to an Upskilled Consultant to know more. Call 1300 009 924. Terms & Conditions Apply.
Show off your achievements
Earn your CompTIA Security+ Certification
Digital certificates are the new way for Upskilled and Simplilearn graduates to offer proof of their hard earned knowledge or skill set.
Additionally, upon completion of the entire short course, you will earn a certificate demonstrating your competence and actionable expertise as an experienced certified CompTIA Security+ professional.
Differentiate Yourself
Set yourself apart from the competition by certifying your demonstrable expertise to your employers.
This is your ticket to get your foot through the door and proof that you have verified CompTIA+ cyber security skills in real world environments, making you job ready as a full-fledged expert.
Share your achievement
You worked for it, you earned it! Share your achievement loud and proud! Talk about your CompTIA Security+ certification on LinkedIn, Twitter, Facebook. Add it to your CV to stand out and showcase to your employers.
FAQs
An Online Bootcamp is an intensive and accelerated learning program made up of a collection of self-paced eLearning components and live online classes that students are required to attend.
The Online Bootcamp program curriculum contain a combination of specifically chosen courses and career-critical skills that are aligned to a job role.
A Short Course on the other hand are shorter courses that is designed to target developing a specific skillset or topic. They generally are much quicker to complete than Bootcamp Programs.
IT security specialists are responsible for protecting the data of organisations and of the individuals involved (these including employees, clients, customers, and other stakeholders). They manage access to networks, accounts, and devices; and regularly assess IT environments for any existing or potential security problems. Identifying such issues may be done through methods such as vulnerability scanning, penetration testing/ethical hacking, cryptography, and threat analysis. With cyber crimes on the rise, these professionals earn a generous average salary of $107K AUD in Australia (according to Indeed).
With a CompTIA Security+ certification, you could build the fundamental skills necessary to pursue entry-level opportunities in this growing industry. Through best security practices under their globally-renowned framework, you'll equip yourself with the basics for effectively securing IT environments while verifying your skills as an industry professional.
The Computing Technology Industry Association (also known as "CompTIA") is an internationally-recognised tech association that issues professional certifications for specialised roles in IT - including areas of cloud computing, networking, and cyber security. A leading body in the field, the organisation currently issues vendor-neutral certificates in over 120 countries, with over 2.5 million certifications now awarded since their establishment. Certified members range from up-and-coming innovators and SMEs to established Fortune 500 leaders.
Having a CompTIA certification under your belt can thus bolster your career in cyber security, helping grant your expertise the industry credibility it deserves.
Not only will you build a thorough knowledge of cyber security basics, but this course also prepares you for certification under CompTIA. The content is aligned to the CompTIA Security+ SYO-601 examination, which certifies you as a CompTIA security professional when passed.
The CompTIA Security+ SYO-601 exam is comprised of 90 questions and is graded on a scale of 100-900, with 750 being the passing score. The examination will take place over the span of 90 minutes. Those who fail their first attempt can immediately attempt the exam for a second time, though a waiting period of 14 days applies between a failed second attempt and a third attempt.
Your certification is valid for three years from the date of passing your exam. There are no specific pre-requisites to undertake this exam, though students are recommended to have at least two years of experience in IT administration (with a focus on security) and a CompTIA Network+ certification.
Those who undertake this course will receive a free exam voucher. Your voucher is valid for one (1) year from the date of purchasing your course. If you do not book your exam within a year of purchase, you will need to buy another per its actual price.
With cyber crimes rising by the year, cyber security professionals are in higher demand than ever. In fact, government statistics report that the Australia needs at least 17,000 more workers in the IT security field by 2026, in order to bridge the growing skills gap. There's therefore never been a better time to forge a career path as a cyber security professional, and with the credibility of a CompTIA Security+ certification, you'll effectively boost your chances in the job market. You'll learn the ins and outs of network security and architecture, along with the in-demand tools and technologies for setting best security practices, protocols, and incident response procedures.
Not only will training for a CompTIA certification arm you with the necessary expertise to succeed in the security field, it also verifies your skills under a reputable, globally-recognised framework. This grants you the competitive edge required to stand out amongst your peers and gain the attention of potential employers.
Security certifications under CompTIA are also known for attracting large salaries, with the qualification drawing an average of $84k AUD per year in Australia (according to Payscale).
Undertaking this CompTIA Security+ training course is a valuable stepping stone for those looking to enter the cyber security field for the first time, or seeking to advance their current security careers. You'll gain a deeper insight into the critical knowledge areas required of any cyber security professional, these including common threats/vulnerabilities, network architecture, solution implementation, compliance, and incident response. Additionally, you'll be training under globally-recognised standards, helping you stand out in the job market among potential employers.
Upon completion of your course, you will have built the skills to pursue CompTIA Security+ certification, further verifying your skills in the industry as a credible security professional.
Best of all, our online training delivery allows you to easily and flexibly train at a time, place, and pace that suits you best - granting you a learning experience best tailored to your needs and work-life balance.
With the industry relevant knowledge and skills you gain from our CompTIA Security+ Certification Training short course, you are eligible to apply for in-demand jobs including:
- Cyber security engineer
- Network architect
- IT security analyst
- System administrator
- Systems engineer
- IT manager
Upskill to stay ahead of the curve.
Speak with an Upskilled Education Consultant to gain insightful guidance on identifying the ideal course for your career path and future aspirations.