Login / Register

IT Security

CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Advances in computer technology have created an acute need for people to help mon... Show More
Course Prerequisites:
CompTIA A+ and Network+
Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

10 Days

Course Content

Lesson 1: Security Fundamentals
Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals

Lesson 2: Security Threats and Vulnerabilities
Social Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats

Lesson 3: Network Security
Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols
Apply Network Security Administration Principles
Secure Wireless Traffic

Lesson 4: Managing Application, Data and Host Security
Establish Device/Host Security
Application Security
Data Security
Mobile Security

Lesson 5: Access Control, Authentication, and Account Management
Access Control and Authentication Services
Implement Account Management Security Controls

Lesson 6: Managing Certificates
Install a Certificate Authority (CA) Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew Certificates
Revoke Certificates
Back Up and Restore Certificates and Private Keys
Restore Certificates and Private Keys

Lesson 7: Compliance and Operational Security
Physical Security
Legal Compliance
Security Awareness and Training

Lesson 8: Risk Management
Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques

Lesson 9: Managing Security Incidents
Respond to Security Incidents
Recover from a Security Incident

Lesson 10: Business Continuity and Disaster Recovery Planning
Business Continuity
Plan for Disaster Recovery
Execute Disaster Recovery Plans and Procedures

Hacking Secrets and Solutions
Footprinting, scanning and enumeration
Hacking windows & UNIX
Remote connectivity and VoIP hacking
Network devices, wireless hacking, firewalls
Hacking code, web hacking and hacking the internet user

CTU Training Solutions , Updated: July 14th, 2017

Share with friends

Request a Quote

Your Name

Your Surname

Contact Number

Your Email


Which campus would you like to study at?

Your job title

Will your training be sponsored?


The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
0861 100 395
[email protected]


Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:

Contact Number:

Choose a campus