
CompTIA Security+ (Plus) Certification Training
Program Highlights
In the ever-evolving cybersecurity landscape, the latest version of the CompTIA Security+ (SY0-701) training course from InfosecTrain is your gateway to mastering the core skills necessary to secure data and information systems in the digital age. With a focus on the latest threats, automation, zero trust principles, IoT security, risk management, and more, this course equips participants to pass the Security+ SY0-701 exam on their first attempt.
- 40-Hour LIVE Instructor-led Training
- CompTIA Authorized Partner
- Practical Training on Latest Tools
- Highly Interactive and Dynamic Sessions
- 98% Exam Pass Rate
- Learn from Certified Trainers
- Career Guidance and Mentorship
- Post Training Support
- Access to Recorded Sessions
Curriculum
- 5 Sections
- 22 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Domain 1: General Security Concepts (12%)4
- Domain 2: Threats, Vulnerabilities, and Mitigations (22%)5
- 2.12.1 Compare and contrast common threat actors and motivations
- 2.22.2 Explain common threat vectors and attack surfaces
- 2.32.3 Explain various types of vulnerabilities
- 2.42.4 Given a scenario, analyze indicators of malicious activity
- 2.52.5 Explain the purpose of mitigation techniques used to secure the enterprise
- Domain 3: Security Architecture (18%)4
- 3.13.1 Compare and contrast security implications of different architecture models
- 3.23.2 Given a scenario, apply security principles to secure enterprise infrastructure
- 3.33.3 Compare and contrast concepts and strategies to protect data
- 3.43.4 Explain the importance of resilience and recovery in security architecture
- Domain 4: Security Operations (28%)9
- 4.14.1 Given a scenario, apply common security techniques to computing resources
- 4.24.2 Explain the security implications of proper hardware, software, and data asset management
- 4.34.3 Explain various activities associated with vulnerability management
- 4.44.4 Explain security alerting and monitoring concepts and tools
- 4.54.5 Given a scenario, modify enterprise capabilities to enhance security
- 4.64.6 Given a scenario, implement and maintain identity and access management
- 4.74.7 Explain the importance of automation and orchestration related to secure operations
- 4.84.8 Explain appropriate incident response activities
- 4.94.9 Given a scenario, use data sources to support an investigation
- Domain 5: Security Program Management and Oversight (20%)0