• Technical IT

    Solutions delivered throughout the UK
  • Business Applications

    Solutions delivered throughout the UK
  • Professional Best Practice

    Solutions delivered throughout the UK
  • Professional Development

    Solutions delivered throughout the UK

CompTIA Security+ Certification (2011 Objectives) Glasgow

  • Price £1,645.00
  • Duration 5 day(s)
All major credit cards accepted


Course Objective: You will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Target Student: This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks and familiarity with other operating systems, such as Mac OS® X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security Certification examination; or use Security as the foundation for advanced security certifications or career roles.

Certification: The CompTIA® Security ® (Exam SY0-301) course is designed to help you prepare for the SY0-301 exam. Attending this course and using this student guide will help you prepare for certification. You should also refer to the exam objectives to see how they map to the course content.


•Basic Windows skills and a fundamental understanding of computer and networking concepts are required.
•CompTIA A and Network certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following QA courses:
•CompTIA® A ® Certification: 2009 Exam Objectives (Windows® 7)
•CompTIA® Network ® Certification (2009 Objectives)


Upon successful completion of this course, students will be able to:

•Identify the fundamental concepts of computer security.
•Identify security threats and vulnerabilities.
•Examine network security.
•Manage application, data, and host security.
•Identify access control and account management security measures.
•Manage certificates.
•Identify compliance and operational security measures.
•Manage risk.
•Manage security incidents.
•Develop a BCP and DRP.

Course Content

Lesson 1: Security Fundamentals

•Topic 1A: The Information Security Cycle
•Topic 1B: Information Security Controls
•Topic 1C: Authentication Methods
•Topic 1D: Cryptography Fundamentals
•Topic 1E: Security Policy Fundamentals
Lesson 2: Security Threats and Vulnerabilities

•Topic 2A: Social Engineering
•Topic 2B: Physical Threats and Vulnerabilities
•Topic 2C: Network-Based Threats
•Topic 2D: Wireless Threats and Vulnerabilities
•Topic 2E: Software-Based Threats
Lesson 3: Network Security

•Topic 3A: Network Devices and Technologies
•Topic 3B: Network Design Elements and Components
•Topic 3C: Implement Networking Protocols
•Topic 3D: Apply Network Security Administration Principles
•Topic 3E: Secure Wireless Traffic
Lesson 4: Managing Application, Data, and Host Security

•Topic 4A: Establish Device/Host Security
•Topic 4B: Application Security
•Topic 4C: Data Security
•Topic 4D: Mobile Security
Lesson 5: Access Control, Authentication, and Account Management

•Topic 5A: Access Control and Authentication Services
•Topic 5B: Implement Account Management Security Controls
Lesson 6: Managing Certificates

•Topic 6A: Install a CA Hierarchy
•Topic 6B: Enroll Certificates
•Topic 6C: Secure Network Traffic by Using Certificates
•Topic 6D: Renew Certificates
•Topic 6E: Revoke Certificates
•Topic 6F: Back Up and Restore Certificates and Private Keys
Lesson 7: Compliance and Operational Security

•Topic 7A: Physical Security
•Topic 7B: Legal Compliance
•Topic 7C: Security Awareness and Training
Lesson 8: Risk Management

•Topic 8A: Risk Analysis
•Topic 8B: Implement Vulnerability Assessment Tools and Techniques
•Topic 8C: Scan for Vulnerabilities
•Topic 8D: Mitigation and Deterrent Techniques
Lesson 9: Managing Security Incidents

•Topic 9A: Respond to Security Incidents
•Topic 9B: Recover from a Security Incident
Lesson 10: Business Continuity and Disaster Recovery Planning

•Topic 10A: Business Continuity
•Topic 10B: Plan for Disaster Recovery
•Topic 10C: Execute DRPs and Procedures
Appendix A: Mapping Course Content to the CompTIA® Security ® (Exam SY0-301) Objectives

Make Enquiry

Course Enquiry

Book Now

Course Enquiry

Find your local training centre

Address516-519 Baltic Chambers
50 Wellington Street
G2 6HJ
Phone01423 534630