CompTIA Security+ (ComSec)
            
                
                    Specialized training, CompTIA
                
                    This course delivers practical knowledge and hands-on skills to prepare for an internationally recognized security certification. It confirms core IT security competencies, helps launch a cyber career, and emphasizes threat analysis and system protection.
The training is rich in hands-on labs and real scenarios, aligns with ISO 17024 standards and is recognized by the US Department of Defense. It's offered online in  English, with US-time schedules; the certification exam is optional and sold separately.
                
                
                
                
                    Location, current course term
                    
                
                
                
                
                
                
                        
                    
               
 
                
                
                    The course:
               
                Hide detail
               
                
                    
                        
                            - 
                                Day 1
                                
                                    - 
                                        Course objectives and structure
- 
                                        Security concepts
- 
                                        Security controls
- 
                                        Threat actors
- 
                                        Attack surface
- 
                                        Social engineering
- 
                                        Cryptographic algorithms
- 
                                        Public Key Infrastructure (PKI)
- 
                                        Cryptographic solutions
                            - 
                                Day 2
                                
                                    - 
                                        Authentication
- 
                                        Authorization
- 
                                        Identity management
- 
                                        Enterprise network architecture
- 
                                        Network security devices
- 
                                        Secure communications
- 
                                        Cloud infrastructure
- 
                                        Embedded systems and zero trust architecture
- 
                                        Asset management
- 
                                        Redundancy strategies
- 
                                        Physical security
                            - 
                                Day 3
                                
                                    - 
                                        Device and operating system vulnerabilities
- 
                                        Application and cloud vulnerabilities
- 
                                        Vulnerability discovery methods
- 
                                        Vulnerability analysis and remediation
- 
                                        Network security baselines
- 
                                        Enhancing network security capabilities
- 
                                        Endpoint security implementation
- 
                                        Improving mobile device security
- 
                                        Application protocol security baselines
- 
                                        Cloud and web application security concepts
                            - 
                                Day 4
                                
                                    - 
                                        Incident response
- 
                                        Digital forensics
- 
                                        Data sources
- 
                                        Alerting and monitoring tools
- 
                                        Malware indicators
- 
                                        Physical and network attack indicators
- 
                                        Application attack indicators
                            - 
                                Day 5
                                
                                    - 
                                        Policies, standards and procedures
- 
                                        Change management
- 
                                        Automation and orchestration
- 
                                        Risk management processes and concepts
- 
                                        Supplier management concepts
- 
                                        Audits and assessments
- 
                                        Data classification and compliance
- 
                                        Personnel security policies
- 
                                        Course summary
                    - 
                        Assumed knowledge:
- 
                        CompTIA Network+ and two years of IT administration experience with security focus
- 
                        Recommended previous course:
- 
                        CompTIA Network+ (ComNet)
- 
                        Schedule:
- 
                        5 days (9:00 AM  - 5:00 PM )
- 
                        Course price:
- 
                        1 295.00 € (1 566.95 € incl. 21% VAT)
- 
                        Language:
-