Overview
Course Inclusions
Who Should Attend?
Security Administrator | IT Auditor | Security Consultant | Security Engineer | IT Project Manager | Cybersecurity Specialist | Penetration Tester | Security Operations Center (SOC) Analyst | Information Security Analyst | Cybersecurity Analyst | Help Desk Manager/Analyst | Infrastructure Engineer/Manager
Learning Outcomes
By the end of this course, you will be able to:
Security Program Management & Oversight
Better Reflect Reporting & Communication Skills
In-house Training
CompTIA Security+ Certification Course
Session details
- Equip yourself with essential exam skills
- Hands-on training customised to meet your business needs
- Award winning trainers
No previous experience necessary
Key Sessions
- Identifying different types of cybersecurity threats and attacks, such as viruses, malware, phishing, social engineering, and advanced persistent threats (APTs)
- Understanding the techniques used for exploiting vulnerabilities in systems and networks, including common attack vectors
- Analysing potential indicators of compromise and determining the types of malware and their impact on systems
- Utilising security technologies and tools such as firewalls, VPNs, IDS/IPS, and encryption to protect network and information systems
- Implementing secure network architecture concepts and systems design to mitigate risks and vulnerabilities
- Applying security configurations to network, application, and endpoint devices
- Applying fundamental principles of security architecture and design to develop secure information systems and networks
- Understanding the importance of security frameworks, policies, and best practices in establishing a secure organisational environment
- Incorporating cloud, virtualisation, and mobile security considerations into organisational security planning
- Managing identity and access control mechanisms to ensure the confidentiality, integrity, and availability of information
- Implementing effective authentication, authorisation, and accounting practices to safeguard against unauthorised access
- Understanding biometric systems, multifactor authentication, and the principles of least privilege and need-to-know access
- Identifying and analysing risks to organisational security and applying appropriate risk management strategies
- Understanding compliance regulations, legal requirements, and privacy laws that impact organisational security policies and procedures
- Developing and implementing policies and procedures for data security, incident response, and disaster recovery
- Understanding the principles of cryptography and its applications in securing data in transit, at rest, and in use
- Understanding cryptographic algorithms, key management practices, and common cryptographic attacks
- Applying digital signatures, hashing algorithms, and steganography for data integrity and authentication
Meet Your Facilitator
CompTIA Certified Expert Speakers
More details coming soon
Get in touch today to find out more about this course.
Customised in-house options available for teams
Interested in any of our online trainings?
You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.
Can't see what you need?
Download our training catalogue to review all available topics