The CompTIA Security+ course provides students with the basic knowledge and skills necessary to become an IT security professional. This course is designed to fully prepare students to sit for and pass the CompTIA Security+ certification exam. Students will gain the knowledge and skills necessary to identify risk and participate in risk mitigation activities as well as provide infrastructure, application, operational and information security. They will also acquire the knowledge necessary to apply security controls to maintain confidentiality, integrity and availability, as well as how to identify appropriate technologies and products. Finally, students will gain an awareness of applicable policies, laws and regulations with regard to IT security. Prospective job roles for successful candidates include security engineer, security architect, security assurance technician, security consultant/specialist, systems administrator, network administrator and security administrator. CompTIA N+ certification plus 2 years of technical networking experience with a focus on security is recommended for success on the exam.
Computer Technology Industry Association (CompTIA) S+ training designates knowledgeable professionals in the field of IT security. As an international, vendor-neutral credential, CompTIA S+ certification ensures successful students gain competency in network security, compliance and operational security, common/possible threats and vulnerabilities, application, data and host security, access control and identity management as well as cryptography. Earning CompTIA S+ Certification signifies to employers that candidates will apply their knowledge of security concepts, tools and procedures to prevent security breaches, react accordingly to any security incidents and anticipate further security risks in order to effectively guard against them. Many well-known companies, government contractors and government agencies employ CompTIA S+ certified staff in order to ensure the quality of their work and CompTIA S+ is also one of the options for certifications required by the US Department of Defense for both military personnel and contractors engaged in information security activities.
At the conclusion of this program, students will be able to:
Describe common risks, vulnerabilities and controls
Explain the triple constraint of information security
Analyze and differentiate between types of malware and attacks
Identify risks for common system hardware and peripherals
Describe principles of software, data and host security
Implement OS hardening procedures
Identify common types of programming attacks
Implement secure browsing practices
Describe security vulnerabilities unique to virtualized environments
Explain the purpose and vulnerabilities of common network devices
Identify and secure common ports and protocols
Describe security concerns unique to cloud computing environments
Identify IDS and IPS solutions for host and network defense
Describe the differences between identification, authentication and authorization in Access Control
Identify various methods for access authentication
Implement logical access control methods
Distinguish between discretionary, mandatory, rule-based and role-based access control implementations
Identify various types of risk management strategies (transfer, accept, mitigate, eliminate)
Distinguish between management, technical and operational controls
Calculate risk using subjective and objective measures
Implement compliance audits for common security controls
Explain the difference between penetration testing and vulnerability scanning
Distinguish between symmetric and asymmetric forms of encryption
Explain the use of public-key/private-key pairs to encrypt and decrypt a secure message
Identify common security protocols (SSH, SSL, IPSec)
Explain basic hashing concepts
Distinguish between types of tickets, keys and certificate authorities in a PKI
Distinguish between business continuity and disaster recovery objectives and timeframes
Implement common backup rotation cycles
Identify various types of redundant hardware and backup sites
Recognize various types of environmental control solutions
Identify RAID configurations for common availability and redundancy requirements
Analyze and distinguish between forms of social engineering
Describe the principles of operational security
Identify common personnel security policies
Describe data reminisce and secure disposal practices
Explain common CIRT roles and responsibilities
Use Microsoft Office
What are my payment options?
Click the Financing link at the top of this page for financing information.
What is difference between a certificate and a certification?
By successfully completing a course through one of our college or university partners the student is awarded a Certificate of Completion from the institution. If there is a state or national exam that the course is preparing a student for, the proper certifying body will be indicated and that association will proctor and award any type of certification. This is the student’s responsibility, although ECA is here to help guide our students in the right direction.
Does this course translate in to college credit?
Through our college and university partners, ECA offers non-credit certificate programs.
How long do access to my complete my course?
Access will begin on your start date and end on your end date unless otherwise specified. If you are falling behind in your course please contact an Education Consultant to talk about your options.
When are the course start dates?
The course start dates are determined by the student due to open-enrollment.
Is the Certification exam included in the course?
The certification exam is not included in the cost of the course unless otherwise specified in the course education and training plan.