Course Information
FeeSee particular events - prices exclude VAT
Duration5 Day(s)
Delivery MethodInstructor-led
Scheduled Dates
  • 03/07/2017 Central Sheffield 5 Day(s) £1195
Referral Fee£50 Amazon Voucher! - refer a friend or colleague
Related LinksN/A
Security+ Course Sheffield Leeds Yorkshire Book Your Course Now!

Rezound provide official SECP Security+ training for Sheffield, London, Leeds, Manchester, Yorkshire and at your site in the UK.

Course Details


CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT.

The Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-401 exam.

CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The CompTIA Security+ objectives reflect the subject areas covered which resulted from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an information security professional with ideally two years of experience.

Related Certifications and Examinations

There can be many combinations for how a course's content maps to the various examinations and related certifications.

We have listed as many of the primary ones as possible and continually update our database - please contact us for further information.

Related Examinations

Related Certifications


The audience for the CompTIA Security+ includes professionals who require core understanding in the field of networking and related security and includes the roles of:

  • Security Engineer
  • Security Consultant
  • Network Administrator
  • IA Technician or Manager

At Course Completion

After completing this course, students will be able to:

  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography
  • 12%


Before attending this course, students should ideally have:

  • A minimum of two years of experience in IT administration with a focus on security though this is not essential.


The student kit includes a comprehensive workbook and other necessary materials for this class.

Course Outline

Module 1 Network Security

This module introduces the concepts of Network Security and skills to implement the technologies.

Lessons and Activities

  • Implement security configuration parameters on network devices and other technologies
  • Given a scenario, use secure network administration principles
  • Explain network design elements and components
  • Given a scenario, implement common protocols and services
  • Given a scenario, troubleshoot security issues related to wireless networking

Module 2: Compliance and Operational Security

This module introduces the concepts of compliance and operational security.

Lessons and Activities

  • Learn the importance of risk related concepts
  • Learn the security implications of integrating systems and data with third parties
  • Given a scenario, implement appropriate risk mitigation strategies
  • Given a scenario, implement basic forensic procedures
  • Learn common incident response procedures
  • Explain the importance of security related awareness and training
  • Compare and contrast physical security and environmental controls
  • Summarize risk management best practices
  • Given a scenario, select the appropriate control to meet the goals of security

Module 3: Threats and Vulnerabilities

This module introduces the concepts of security threats and vulnerabilities and strategies to mitigate the risks.

Lessons and Activities

  • Learn the different types of malware
  • Learn various types of attacks
  • Understand social engineering attacks and the associated effectiveness with each attack
  • Learn the types of wireless attacks
  • Learn the types of application attacks
  • Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
  • Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
  • Learn the proper use of penetration testing versus vulnerability scanning

Module 4: Application, Data and Host Security

This module introduces application security controls and related techniques.

Lessons and Activities

  • Learn the importance of application security controls and techniques
  • Learn mobile security concepts and technologies
  • Given a scenario, select the appropriate solution to establish host security
  • Implement the appropriate controls to ensure data security
  • Compare and contrast alternative methods to mitigate security risks in static environments

Module 5: Access Control and Identity Management

This module introduces the concepts of access control and identity management and the techniques used to implement them.

Lessons and Activities

  • Compare and contrast the function and purpose of authentication services
  • Given a scenario, select the appropriate authentication, authorization or access control
  • Install and configure security controls when performing account management, based on best practices

Module 6: Cryptography

This module introduces the concepts related to cryptography and the real world techniques to implement them.

Lessons and Activities

  • Given a scenario, utilize general cryptography concepts
  • Given a scenario, use appropriate cryptographic methods
  • Given a scenario, use appropriate PKI, certificate management and associated components

Copyright © + Design: Rezound Limited | CompTIA Security+ Training Sheffield, Leeds, Manchester,Yorkshire, London