CompTIA® Security+ (SY0-701) CertPREP Course

Course Description

The CompTIA® Security+ (SY0-701) CertPREP Course offers a comprehensive approach to mastering essential security concepts, controls, and cryptographic solutions. Divided into six major parts, the course covers general security concepts, threats and vulnerabilities, security architecture, operations, program management, and final preparation tasks. Through a blend of detailed lessons, exam preparation tasks, and hands-on labs, learners will build a strong foundation in cybersecurity. Whether it’s understanding cryptography, threat actors, or mitigating enterprise risks, this course provides the necessary tools to pass the Security+ certification exam and enhance career prospects in the field of IT security.

Start your journey to becoming CompTIA Security+ certified today! Enroll now and gain the skills to safeguard digital environments.

N300,000

Course Fee

Course Outline

Part I: General Security Concepts
  • Introduction (10 Questions)
  • Control Categories
  • Control Types
  • Exam Preparation Tasks (10 Questions)
  • Labs
  • Introduction (10 Questions)
  • Confidentiality, Integrity, and Availability (CIA)
  • Non-repudiation
  • Authentication, Authorization, and Accounting (AAA)
  • Gap Analysis
  • Zero Trust
  • Physical Security
  • Deception and Disruption Technology
  • Exam Preparation Tasks (10 Questions)
  • Labs
  • Introduction (10 Questions)
  • Business Processes Impacting Security Operations
  • Technical Implications
  • Documentation
  • Version Control
  • Exam Preparation Tasks (10 Questions)
  • Introduction (17 Questions)
  • Public Key Infrastructure (PKI)
  • Encryption
  • Transport/Communication
  • Symmetric Versus Asymmetric Encryption
  • Key Exchange
  • Algorithms
  • Key Length
  • Tools
  • Trusted Platform Module
  • Hardware Security Module
  • Key Management System
  • Secure Enclave
  • Obfuscation
  • Steganography
  • Hashing
  • Salting
  • Digital Signatures
  • Key Stretching
  • Blockchain
  • Open Public Ledger
  • Certificates
  • Exam Preparation Tasks (10 Questions)
  • Labs
Part II: Threats, Vulnerabilities, and Mitigations
  • Introduction (10 Questions)
  • Threat Actors
  • Attributes of Actors
  • Motivations
  • War
  • Exam Preparation Tasks (10 Questions)
  • Introduction (10 Questions)
  • Message-Based
  • Image-Based
  • File-Based
  • Voice Call
  • Removable Device
  • Vulnerable Software
  • Unsupported Systems and Applications
  • Unsecure Networks
  • Open Service Ports
  • Default Credentials
  • Supply Chain
  • Human Vectors/Social Engineering
  • Exam Preparation Tasks (10 Questions)
  • Labs (1 Question)
  • Introduction (10 Questions)
  • Application
  • Operating System (OS)-Based
  • Web-Based
  • Hardware Security Module
  • Virtualization
  • Cloud Specific
  • Supply Chain
  • Cryptographic
  • Misconfiguration
  • Mobile Device
  • Zero-Day Vulnerabilities
  • Exam Preparation Tasks (10 Questions)
  • Labs (1 Question)
  • Introduction (9 Questions)
  • Malware Attacks
  • Physical Attacks
  • Network Attacks
  • Application Attacks
  • Cryptographic Attacks
  • Password Attacks
  • Indicators
  • Exam Preparation Tasks (8 Questions)
  • Labs (1 Question)
  • Introduction (13 Questions)
  • Segmentation
  • Access Control
  • Isolation
  • Patching
  • Encryption
  • Monitoring
  • Least Privilege
  • Configuration Enforcement
  • Decommissioning
  • Hardening Techniques
  • Exam Preparation Tasks (6 Questions)
  • Labs (1 Question)
Part III: Security Architecture
  • Introduction (9 Questions)
  • Architecture and Infrastructure Concepts
  • Considerations
  • Exam Preparation Tasks (6 Questions)
  • Introduction (9 Questions)
  • Infrastructure Considerations
  • Secure Communication/Access
  • Selection of Effective Controls
  • Exam Preparation Tasks (9 Questions)
  • Labs
  • Introduction (10 Questions)
  • Data Types
  • Data Classifications
  • General Data Considerations
  • Methods to Secure Data
  • Exam Preparation Tasks (10 Questions)
  • Introduction (10 Questions)
  • High Availability
  • Site Considerations
  • Platform Diversity
  • Multi-Cloud System
  • Continuity of Operations
  • Capacity Planning
  • Testing
  • Backups
  • Power
  • Exam Preparation Tasks (5 Questions)
Part IV: Security Operations
  • Introduction (10 Questions)
  • Secure Baselines
  • Hardening Targets
  • Wireless Devices
  • Mobile Solutions
  • Connection Methods
  • Wireless Security Settings
  • Application Security
  • Sandboxing
  • Monitoring
  • Exam Preparation Tasks (8 Questions)
  • Introduction (6 Questions)
  • Acquisition/Procurement Process
  • Assignment/Accounting
  • Monitoring/Asset Tracking
  • Disposal/Decommissioning
  • Exam Preparation Tasks (4 Questions)
  • Introduction (10 Questions)
  • Identification Methods
  • Analysis
  • Vulnerability Response and Remediation
  • Validation of Remediation
  • Reporting
  • Exam Preparation Tasks (6 Questions)
  • Labs (1 Question)
  • Introduction (6 Questions)
  • Monitoring and Computing Resources
  • Activities
  • Tools
  • Exam Preparation Tasks (5 Questions)
  • Introduction (12 Questions)
  • Firewall
  • IDS/IPS
  • Web Filter
  • Operating System Security
  • Implementation of Secure Protocols
  • DNS Filtering
  • Email Security
  • File Integrity Monitoring
  • DLP
  • Network Access Control (NAC)
  • Endpoint Detection and Response (EDR)/Extended Detection and Response (XDR)
  • User Behavior Analytics
  • Exam Preparation Tasks (6 Questions)
  • Labs
Part V: Security Program Management and Oversight
  • Introduction (12 Questions)
  • Provisioning/De-provisioning User Accounts
  • Permission Assignments and Implications
  • Identity Proofing
  • Federation
  • Single Sign-On (SSO)
  • Interoperability
  • Attestation
  • Access Controls
  • Multifactor Authentication (MFA)
  • Password Concepts
  • Privileged Access Management Tools
  • Exam Preparation Tasks (6 Questions)
  • Labs
  • Introduction (10 Questions)
  • Use Cases of Automation and Scripting
  • Benefits
  • Other Considerations
  • Exam Preparation Tasks (6 Questions)
  • Introduction (10 Questions)
  • Process
  • Training
  • Testing
  • Root Cause Analysis
  • Threat Hunting
  • Digital Forensics
  • Exam Preparation Tasks (6 Questions)
  • Labs
  • Introduction (7 Questions)
  • Log Data
  • Data Sources
  • Exam Preparation Tasks (6 Questions)
  • Labs
Part VI: Final Preparation
  • Introduction (8 Questions)
  • Guidelines
  • Policies
  • Standards
  • Procedures
  • External Considerations
  • Monitoring and Revision
  • Types of Governance Structures
  • Roles and Responsibilities for Systems and Data
  • Exam Preparation Tasks (6 Questions)
  • Introduction (10 Questions)
  • Risk Identification
  • Risk Assessment
  • Risk Analysis
  • Risk Register
  • Risk Tolerance
  • Risk Appetite
  • Risk Management Strategies
  • Risk Reporting
  • Business Impact Analysis
  • Exam Preparation Tasks (6 Questions
  • Introduction (7 Questions)
  • Vendor Assessment
  • Agreement Types
  • Vendor Monitoring
  • Questionnaires
  • Rules of Engagement
  • Exam Preparation Tasks (6 Questions)
  • Introduction (10 Questions)
  • Compliance Reporting
  • Consequences of Non-compliance
  • Compliance Monitoring
  • Attestation and Acknowledgment
  • Privacy
  • Exam Preparation Tasks (6 Questions)
  • Introduction (7 Questions)
  • Attestation
  • Internal
  • External
  • Penetration Testing
  • Exam Preparation Tasks (4 Questions)
  • Introduction (6 Questions)
  • Phishing
  • Anomalous Behavior Recognition
  • User Guidance and Training
  • Reporting and Monitoring
  • Development
  • Execution
  • Exam Preparation Tasks (4 Questions)

Course Delivery

Choose your path to success:
  • Self-Paced Virtual Study: Learn at your own pace with 24/7 access to course materials, videos, and labs, giving you complete control over your learning schedule.

  • Tutor-Led Physical/Hybrid Classes: Combine in-person and online learning with expert-led sessions, offering real-time guidance and hands-on labs in a flexible, hybrid format.

  • Tutor-Led Virtual Sessions: Participate in fully virtual, interactive classes led by certified instructors, designed to provide live feedback, support, and collaboration.

Explore other Training Courses

Get Instant Access to the "Tech Career Blueprint" eBook!

Discover the proven path to a successful tech career. Enter your details below to get the FREE comprehensive guide.

Name