Training & Certifications


The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations.

CompTIA Security+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives.


At the end of the program, the participants will be able to :

  • Identify risk and participate in risk mitigation activities
  • Provide infrastructure, application, operational and information security
  • Apply security controls to maintain confidentiality, integrity and availability
  • Identify appropriate technologies and products
  • Operate with an awareness of applicable policies, laws, and regulations

The CompTIA Security+ Certification is aimed for IT security professionals.


This program is 5 days of intensive training class.


It is recommended for CompTIA Security+ candidates to have the following:

  • A minimum of 2 years’ experience in IT administration with a focus on security
  • Day to day technical information security experience
  • Broad knowledge of security concerns and implementation

At the end of the program, the participants will be assessed with 90 minutes of CompTIA Security+ Exam.


CompTIA Security+ Certification will be awarded upon successfully passing the exam from CompTIA.


  1. Security function and purpose of network devices and technologies
  2. Apply and implement secure network administration principles
  3. Distinguish and differentiate network design elements and componentss
  4. Implement and use common protocols
  5. Identify commonly used default network ports
  6. Implement wireless network in a secure manner
  1. Risk related concepts
  2. Risk mitigation strategies
  3. Incident response procedures
  4. Importance of security related awareness and training
  5. Compare and contrast aspects of business continuity
  6. Impact and proper use of environmental controls
  7. Disaster recovery plans and procedures
  8. Concepts of confidentiality, integrity and availability (CIA)
  1. Analyze and differentiate among types of malware
  2. Analyze and differentiate among types of attacks
  3. Analyze and differentiate among types of social engineering attacks
  4. Analyze and differentiate among types of wireless attacks
  5. Analyze and differentiate among types of application attacks
  6. Analyze and differentiate among types of mitigation and deterrent techniques
  7. Implement assessment tools and techniques to discover security threats and vulnerabilities
  8. Proper use of penetration testing versus vulnerability scanning within the realm of vulnerability assessments
  1. Importance of application security
  2. Establish host security
  3. Importance of data security
  1. Function and purpose of authentication services
  2. Fundamental concepts and best practices related to authentication, authorization and access control
  3. Implement appropriate security controls when performing account management
  1. General cryptography concepts
  2. Use and apply appropriate cryptographic tools and products
  3. Core concepts of public key infrastructure
  4. Implement PKI, certificate management and associated components

Scroll to Top