Course Overview

    In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination.

Course Outline

1. Identifying security fundamentals

2. Analyzing risk

3. Identifying security threats

4. Conducting security assessments

5. Implementing host and software security

6. Implementing network security

7. Managing identity and access

8. Implementing cryptography

9. Implementing operational security

10. Addressing security incidents

11. Ensuring business continuity

Course Outcomes

In this course, you will implement information security across a variety of different contexts. You will:


• Identify the fundamental components of information security.

• Analyze risk.

• Identify various threats to information security.

• Conduct security assessments to detect vulnerabilities.

• Implement security for hosts and software.

• Implement security for networks.

• Manage identity and access.

• Implement cryptographic solutions in the organization.

• Implement security at the operational level.

• Address security incidents.

• Ensure the continuity of business operations in the event of an incident.

Audience profiles

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification

examination; or using Security+ as the foundation for advanced security certifications or career roles.


• CompTIA Network+ Certification

• Using Microsoft Windows 10

SecureWay advises and supports businesses with a global service package designed to meet their IT security needs. SecureWay is a company specialized in cybersecurity and information security to offer a full range of services in the security field such as :
• Cybersecurity.
• Secure Infrastructure.
• Red Teaming Services (RTS).
• Governance, Risk & Compliance (GRC).
• Awareness & Training.

Our team members are extremely trained and experienced with past exposure in the corporate world as distinguished professionals.

Read More

Contact Us