CompTIA Security+ Course Outline

Important CompTIA Security+ Training Course Information

Week 1: Threats, Attacks, and Vulnerabilities

  • Compare and contrast different types of social engineering techniques.
  • Given a scenario, analyze potential indicators
  • to determine the type of attack.
  • Given a scenario, analyze potential indicators
  • associated with application attacks.
  • Given a scenario, analyze potential indicators
  • associated with network attacks.
  • Explain different threat actors, vectors, and intelligence sources.
  • Explain the security concerns associated with
  • various types of vulnerabilities.
  • Summarize the techniques used in security assessments.
  • Explain the techniques used in penetration testing.

 

Week 2: Architecture and Design

  • Explain the importance of security concepts in an enterprise environment.
  • Summarize virtualization and cloud computing concepts.
  • Summarize secure application development, deployment, and automation concepts.
  • Summarize authentication and authorization design concepts.
  • Given a scenario, implement cybersecurity resilience.
  • Explain the security implications of embedded and specialized systems.
  • Explain the importance of physical security controls.
  • Summarize the basics of cryptographic concepts.

 

Week 3: Implementation

  • Given a scenario, implement secure protocols.
  • Given a scenario, implement host or application security solutions.
  • Given a scenario, implement secure network designs.
  • Given a scenario, install and configure wireless security settings.
  • Given a scenario, implement secure mobile solutions.
  • Given a scenario, apply cybersecurity solutions to the cloud.
  • Given a scenario, implement identity and account management controls.
  • Given a scenario, implement authentication and authorization solutions.
  • Given a scenario, implement public key infrastructure.

 

Week 4: Operations and Incident Response

  • Given a scenario, use the appropriate tool to
  • assess organizational security.
  • Summarize the importance of policies, processes,
  • and procedures for incident response.
  • Given an incident, utilize appropriate data
  • sources to support an investigation.
  • Given an incident, apply mitigation techniques
  • or controls to secure an environment.
  • Explain the key aspects of digital forensics.

 

Week 5: Governance, Risk, and Compliance

  • Compare and contrast various types of controls.
  • Explain the importance of applicable regulations, standards, or
  • frameworks that impact organizational security posture.
  • Explain the importance of policies to organizational security.
  • Summarize risk management processes and concepts.
  • Explain privacy and sensitive data concepts in relation to security.