Skip to main Content

E-Learning: Security+ Complete Bundle with Voucher Plus Retake Assurance (SECPLUSCOMBDLEVP)

  • Price: £793.00
  • Code: SECPLUSCOMBDLEVP
  • Days Access: 365 days

£793.00

excl. VAT

Add to Cart Add to Cart

Description

Top

Prepare for your CompTIA Security+ (V7) certification exam with access to the Security+ Complete Bundle with Voucher Plus Retake Assurance. This guided, comprehensive learning solution combines CompTIA learning products, engaging instructional videos, and live instructional support into a unified course experience to provide you with the knowledge, exam prep tools, and confidence you need to succeed.

What's included:

    Voucher Plus Retake Assurance

    Single, integrated course delivered through Canvas Learning Management System with:

    • CertMaster Learn+Labs
    • CertMaster Practice
    • OnDemand Services

*All included products must be redeemed within 12 months of purchase.

Further Information

Top

CompTIA Security+ is the first early career cybersecurity certification a candidate should earn. It equips cybersecurity professionals with the foundational security skills necessary to safeguard networks, detect threats, and secure data through performance-based questions—helping them open the door to a cybersecurity career and become a trusted defender of digital environments.

  • Required exam: SY0-701
  • Number of questions: Maximum of 90
  • Types of questions: Multiple-choice and performance-based
  • Length of test: 90 minutes
  • Recommended experience: A minimum of 2 years of experience in IT administration with a focus on security, hands-on experience with technical information security, and broad knowledge of security concepts

Objectives

Top

After completing this course you should be able to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
  • Monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT),  and operational technology.
  • Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance.
  • Identify, analyze, and respond to security events and incidents.

 

Content

Top

General Security Concepts 12%

  • Compare and contrast various types of security controls.
  • Summarize fundamental security concepts.
  • Explain the importance of change management processes and the impact to security.
  • Explain the importance of using appropriate cryptographic solutions.

Threats, Vulnerabilities & Mitigations 22%

  • Compare and contrast common threat actors and motivations.
  • Explain common threat vectors and attack surfaces.
  • Explain various types of vulnerabilities.
  • Given a scenario, analyze indicators of malicious activity.
  • Explain the purpose of mitigation techniques used to secure the enterprise.

Security Architecture 18%

  • Compare and contrast security implications of different architecture models.
  • Given a scenario, apply security principles to secure enterprise infrastructure.
  • Compare and contrast concepts and strategies to protect data.
  • Explain the importance of resilience and recovery in security architecture.

Security Operations 28%

  • Given a scenario, apply common security techniques to computing resources.
  • Explain the security implications of proper hardware, software, and data asset management.
  • Explain various activities associated with vulnerability management.
  • Explain security alerting and monitoring concepts and tools.
  • Given a scenario, modify Enterprise capabilities to enhance security.
  • Given a scenario, implement and maintain identity and access management.
  • Explain the importance of automation and orchestration related to secure operations.
  • Explain appropriate incident response activities.
  • Given a scenario, use data sources to support an investigation.

Security Program Management & Oversight 20%

  • Summarize elements of effective security governance.
  • Explain elements of the risk management process.
  • Explain the processes associated with third-party risk assessment and management.
  • Summarize elements of effective security compliance.
  • Explain types and purposes of audits and assessments.
  • Given a scenario, implement security awareness practices.

Pre-requisites

Top

It is recommended that you have the following pre-requisites:

  • Networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux.