fbpx
info@managementedgeltd.com 09-291-7877 Mon - Fri 8:00 AM - 5:00 PM

CompTIA Security+

Security+

Training Calendar

April 2024
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  

Course Overview

CompTIA Security+® design for professionals which their job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ (2011 Edition) Certification examination (exam number SY0-301). In this course, you will build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.
The Security+ Certification offering is designed for the individual interested in obtaining CompTIA’s vendor-neutral, industry-standard, entry-level IT Security credential, in order to pursue or advance a career as a computer security professional, or enhance any IT career role that has security implications. The Security+ course of study is also appropriate as a prerequisite to the CISSP or other advanced course of study.
Security+ Certification Prep is the first course in the Certificate in Information & Network Security program.

  • Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure.
  • Design, develop, test and evaluate secure software.
  • Develop policies and procedures to manage enterprise security risks.
  • Evaluate and communicate the human role in security systems with an emphasis on ethics, social engineering vulnerabilities and training.
  • Interpret and forensically investigate security incidents.

Basic Windows skills and fundamental understanding of computer and networking concepts are required. CompTIA A+ and/or Network+ certification or equivalent knowledge, and some practical industry experience in networking are strongly recommended.

Cyber security insurance underwriters and product developers at insurance companies, large enterprises, and municipalities. Risk managers, auditors and analysts. Cyber security product vendors. Government, military, cyber security and law enforcement agencies, and IT procurement specialists.

  • Mitigating threats
  • Cryptography
  • Authentication
  • User- and role-based security
  • Peripheral security
  • Public key infrastructure
  • Application and messaging security Ports and protocols
  • Network security
  • Wireless security