By alternating between theoretical concepts, practical approaches, and official CompTIA labs, you will learn how to detect and analyze threats, manage security incidents, protect systems and networks, apply the fundamentals of cryptography, and implement rigorous authentication and access control policies.
Objectives of the training
By the end of the course, you will be ready to take the Security+ exam and proactively address cybersecurity challenges in your organization.Targeted audience
This training is aimed directly at people working or aiming for technical roles in cybersecurity. It is particularly suited to: system and network administrators, information security analysts, penetration testers (pentesters) at the start of their careers, IT security consultants, cybersecurity engineers or specialists, IT auditors (junior auditors), and professionals wishing to enhance their technical profile with a globally recognized certification.Prerequisite
There are no mandatory prerequisites for taking the CompTIA Security+ (SY0-701) certification exam. However, it is recommended that you have at least two years of experience in IT administration, with a focus on security. Holding a CompTIA Network+ certification (or equivalent knowledge) is an advantage, as it covers topics relevant to Security+.Trainers
Benefits for Participants
Apply practical IT security skills
Strengthen your position in the job market
Understanding legal and regulatory compliance requirements
Strengthen their fundamental cybersecurity foundations
Course architecture
What is Security+ certification?
Security+ certification is considered the minimum level of certification for all IT security positions beyond the entry level. This course provides the basic knowledge required to pass the exam and the skills needed to enter an intermediate-level security position.
The training is designed around the five major areas assessed in the official CompTIA Security+ exam (SY0-701). Each module is covered through a combination of lectures, case studies, practical exercises, and interactive labs (official CompTIA labs).
Domain 1: General Security Concepts
This first domain helps you master the fundamental pillars of cybersecurity to better understand security roles, information security objectives, and technological foundations.
- Compare security roles and security controls
- Summarize basic cryptographic concepts
- Implement public key infrastructure (PKI)
- Explain the concepts of confidentiality and data protection (CIA principle: confidentiality, integrity, availability)
- Explain AAA (authentication, authorization, auditing)
- Describe Zero Trust security models and deception technologies (honeypots, etc.)
- Present change management principles (document technical changes and versions)
- Introduce the use of emerging technologies (digital signatures, blockchain)
Domain 2: Threats, vulnerabilities, and mitigation techniques
Or how to decode attack mechanisms, understand intrusion vectors, and deploy initial risk reduction measures.
- Explain threat actors (source, type) and threat intelligence
- Identify social engineering (phishing) and malware
- Perform security assessments
- Analyze attack vectors (voice, email, applications, supply chains)
- Explain vulnerabilities specific to software, OS, web applications, supply chains, and virtualization
- Classify network, application, physical, password, and cryptographic attacks
- Implement mitigation techniques (network segmentation, secure configuration, patches, system hardening)
Domain 3: Secure Architecture and Design
In this step, you will learn how to design comprehensive, secure IT environments that take into account physical, virtual, and cloud architectures.
- Implement secure network designs (segmentation, VLAN, DMZ, etc.)
- Implement network security equipment (firewalls, proxies, etc.)
- Implement secure network protocols (SSL/TLS, SSH, IPsec)
- Implement secure cloud solutions (SaaS, PaaS, Iaas)
- Summarize secure application concepts.
- Compare architecture models (on-premises, cloud, IoT, OT, cloud computing, IaC).
- Apply security principles to infrastructure (availability, redundancy, backup, business continuity).
- Explain data classification, data lifecycle, and appropriate protection techniques.
- Assess the resilience of an IT environment (diversity, fault tolerance, recovery site).
Domain 4: Security Operations and Response
This module supports you in managing day-to-day security activities, monitoring IT systems, and taking rapid action in the event of an incident.
- Implement host security solutions
- Implement secure mobile solutions
- Implement identity and account management controls
- Implement authentication controls
- Develop an incident response plan
- Explain digital forensics
- Configure and monitor security tools (firewall, DLP, EDR/XDR, NAC, DNS filtering)
- Apply secure baseline policies, OS and application hardening
- Effectively use event logs, data sources, and SIEM
- Explain automation processes (scripting, orchestration)
- Develop incident management procedures including root cause analysis
- Understand the vulnerability lifecycle: detection, resolution, communication
- Explain asset management practices (hardware, data, software)
Domain 5: Governance, risk management, and compliance
Finally, cybersecurity must be integrated into the organization's overall strategy by promoting compliance with standards, laws, and internal policies.
- Summarize risk management concepts (analysis, tolerance, register, strategy)
- Explain physical security (barriers, surveillance, physical access)
- Implement a robust cybersecurity plan
- Explain the roles, responsibilities, and principles of security governance (frameworks, policies, procedures)
- Present third-party security practices (supplier evaluation, agreements, monitoring)
- Understand organizational compliance (internal audit/certification, local and international legal obligations, GDPR, Law 25)
- Define user awareness posture (anti-phishing training, recognition of suspicious behavior)
Training Notes
Participants must schedule their exam with an authorized center. The exam voucher is not included.
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote