Have any questions? info@rmg-sa.com +966112385335
  • Knowledge Center
    • Cyber Security Risk Management
    • Risk Management
    • Risk Management for the C-Suite
  • Who We Are
  • Contact
images
  • Home
  • Technical Training
    Courses By Topics
    • Networking
    • Programming
    • Cybersecurity
    • Operating Systems
    • Cloud Computing
    • Data Center
    • IT Service management
    • IT Goverannce
    • Enterprice Architecture
    • Business Analysis
    • Digital Marketing
    Courses By Vendor & Certification
    • Microsoft Training
    • Oracle Training
    • Cisco Training
    • CompTIA Training
    • IBM Training
    • ITIL® Training
    • AXEOLS Training
    • COBIT® Training
    • Vmware
    • Agile Training
    • Scrum Training
    • TOGAF® Training
    • DASA DevOps Training
  • Business Training
    • Project management
    • Quality management
    • Leardership & Management Skills
  • Consultancy Services
    • IT Consultancy
    • Business Consultancy
  • Examination
  • You are here:
  • Home
  • Technical Training
  • CompTIA Training
  • CompTIA Security+

CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
Why is it different?
• No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
• More choose Security+ for DoD 8570 compliance than any other certification.
• Security+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
• The new Security+ certification covers the Junior IT Auditor/Penetration Tester job role, in addition to the previous job roles for Systems Administrator, Network Administrator, and Security Administrator.

  • Objectives
  • Outline
  • Audience
  • Duration
• Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
• Understand the principles of organizational security and the elements of effective security policies.
• Know the technologies and uses of cryptographic standards and products.
• Install and configure network- and host-based security technologies.
• Describe how wireless and remote access security is enforced.
• Describe the standards and products used to enforce security on web and communications technologies.
• Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
• Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
1 - Security Fundamentals
• Information Security Cycle
• Information Security Controls
• Authentication Methods
• Cryptography Fundamentals
• Security Policy Fundamentals

2 - Identifying Security Threats and Vulnerabilities
• Social Engineering
• Malware
• Physical Threats and Vulnerabilities
• Software-Based Threats
• Network-Based Threats
• Wireless Threats and Vulnerabilities
• Physical Threats and Vulnerabilities

3 - Managing Data, Application, and Host Security
• Manage Data Security
• Manage Application Security
• Manage Device and Host Security
• Manage Mobile Security

4 - Implementing Network Security
• Configure Security Parameters on Network Devices and Technologies
• Network Design Elements and Components
• Implement Networking Protocols and Services
• Apply Secure Network Administration Principles
• Secure Wireless Traffic

5 - Implementing Access Control, Authentication, and Account Management
• Access Control and Authentication Services
• Implement Account Management Security Controls

6 - Managing Certificates
• Install a Certificate Authority (CA) Hierarchy
• Enroll Certificates
• Secure Network Traffic by Using Certificates
• Renew Certificates
• Revoke Certificates
• Back Up and Restore Certificates and Private Keys
• Restore Certificates and Private Keys

7 - Implementing Compliance and Operational Security
• Physical Security
• Legal Compliance
• Security Awareness and Training
• Integrate Systems and Data with Third Parties

8 - Risk Management
• Risk Analysis
• Implement Vulnerability Assessment Tools and Techniques
• Scan for Vulnerabilities
• Mitigation and Deterrent Techniques

9 - Troubleshooting and Managing Security Incidents
• Respond to Security Incidents
• Recover from a Security Incident

10 - Business Continuity and Disaster Recovery Planning
• Business Continuity
• Plan for Disaster Recovery
• Execute Disaster Recovery Plans and Procedures
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
5 Days
  • A+
  • CompTIA Cloud+
  • CompTIA Linux+
  • CompTIA Security+
  • Network+
  • Server+
Have any questions? info@rmg-sa.com +966112385335 Rihanna Almlqa boulevard -First Floor-Office No. 53
rmg-logo

RMG, a leading Saudi System integrator, offers superior products and services that enable organizations to keep pace with the evolving changes in today's competitive business environment

  • Home
  • Technical Training
  • Knowledge Center
  • Business Training
  • Who We Are
  • Examination
  • Contact
  • Consultancy Services

Please enter an email field You should enter a valid mail address

Copyright © 2025 RMG. All rights reserved.