CompTIA Security+ Intensive Tutoring(CT02-Security+)
CORSE OVERVIEW
The CompTIA Security+ (SY0-701) certification exam will verify the successful candidate has the knowledge and skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
- Monitor and secure hybrid environments, including cloud, mobile, and Internet of Things (IoT).
- Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance.
- Identify, analyze, and respond to security events and incidents.
Course Objective
This intensive course is designed to thoroughly prepare the students for upcoming exams by focusing on key topics essential for success. Through targeted instruction and practice, students will gain a deep understanding of the exam material, develop effective study strategies, and hone their test-taking skills.
PREREQUISITES
CompTIA Network+ and two years of experience working in a security/ systems administrator job role.

Phone
|
Phone
|
---|---|
Product
|
Comptia
|
Code
|
CT02-Security+(T)
|
Duration
|
3 Days
|
Price (baht)
|
39,000
|
About the course
COURSE OUTLINE
Module 1: Network Security
- Implement security configuration parameters on network devices and other technologies.
- Given a scenario, use secure network administration principles.
- Explain network design elements and components.
- Given a scenario, implement common protocols and services.
- Given a scenario, troubleshoot security issues related to wireless networking.
Module 2: Compliance and Operational Security
- Explain the importance of risk related concepts.
- Summarize the security implications of integrating systems and data with third parties.
- Given a scenario, implement appropriate risk mitigation strategies.
- Given a scenario, implement basic forensic procedures.
- Summarize common incident response procedures.
- Explain the importance of security related awareness and training.
- Compare and contrast physical security and environmental controls.
- Summarize risk management best practices.
- Given a scenario, select the appropriate control to meet the goals of security.
Module 3: Threats and Vulnerabilities
- Explain types of malware
- Summarize various types of attacks.
- Summarize social engineering attacks and the associated effectiveness with each attack.
- Explain types of wireless attacks.
- Explain types of application attacks.
- Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
- Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
- Explain the proper use of penetration testing versus vulnerability scanning.
Module 4: Application, Data and Host Security
- Explain the importance of application security controls and techniques.
- Summarize mobile security concepts and technologies.
- Given a scenario, select the appropriate solution to establish host security.
- Implement the appropriate controls to ensure data security.
- Compare and contrast alternative methods to mitigate security risks in static environments.
Module 5: Access Control and Identity Management
- Compare and contrast the function and purpose of authentication services.
- Given a scenario, select the appropriate authentication, authorization or access control.
- Install and configure security controls when performing account management, based on best practices.
Module 6: Cryptography
- Given a scenario, utilize general cryptography concepts.
- Compliance and Operational Security
- Threats and Vulnerabilities
Register for Training
Schedule
Start Date | End Date | Duration (days) | Price | Register | Course | Code | Product |
---|