CompTIA Security+ (SF)
Course Code:
TGS-2022016933
Duration:
5 Days
Delivery Mode:
Online
Start Date:
23-09-24
End Date:
27-09-24
Fees:
$2725.00

(Before Funding)

This 5-day course provides an excellent introduction to the security field and serves as a better entry point than jumping straight into an advanced security program. With Security+, participants will build a solid foundation of knowledge that they can build upon, helping them advance their careers in the months and years to come.

Course Outline

Lesson 1: Comparing Security Roles and Security Controls
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
Lesson 2: Explaining Threat Actors and Threat Intelligence
  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
Lesson 3: Performing Security Assessments
  • Assess organizational security using network reconnaissance tools
  • Explain security concerns related to general vulnerability types
  • Summarize vulnerability scanning techniques
  • Explain penetration testing concepts
Lesson 4: Identifying Social Engineering and Malware
  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-Based Attacks
Lesson 5: Summarizing Basic Cryptographic Concepts
  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
Lesson 6: Implementing Public Key Infrastructure
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
Lesson 7: Implementing Authentication Controls
  • Summarize Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarize Biometric Authentication Concepts
Lesson 8: Implementing Identity and Account Management Controls
  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
Lesson 9: Implementing Secure Network Designs
  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
Lesson 10: Implementing Network Security Appliances
  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
Lesson 11: Implementing Secure Network Protocols
  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocol
Lesson 12: Implementing Host-Security Solutions
  • Implement Secure Firmware
  • Implement Endpoint Security
  • Explain Embedded System Security Implications
Lesson 13: Implementing Secure Mobile Solutions
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
Lesson 14: Summarizing Secure Application Concepts
  • Analyze Indicators of Application Attacks
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
Lesson 15: Implementing Secure Cloud Solutions
  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
Lesson 16: Explaining Data Privacy and Protection Concepts
  • Explain Data Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
Lesson 17: Performing Incident Response
  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
Lesson 18: Explaining Digital Forensics
  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
Lesson 19: Summarizing Risk Management Concepts
  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
Lesson 20: Implementing Cybersecurity Resilience
  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resilience Strategies
Lesson 21: Explaining Physical Security
  • Explain the Importance of Physical Site Security Controls
  • Explain the Importance of Physical Host Security Controls

Course Fee (inclusive of 9% GST)

Criteria Individual Company Sponsored (Non-SME) Company Sponsored (SME)
Full Course Fee
$2725.00
SG Citizens aged 21 – 39 years old / PRs above 21 years old
$1475.00
$1475.00
$975.00
SG Citizens age 40 years old and above
$975.00
$975.00
$975.00
Course Prerequisite
  Demographics:
  • Age: Minimum 18 years old
Education:
  • Minimum: GCE ‘O’ Levels
  • Language: Workplace Literacy and Numeracy Level 5 (WPLN: Speaking, Writing, Listening, Reading, and Numeracy at ESS Level 5 or equivalent to Upper Secondary Level of English and Mathematics).
Technical Skills and Knowledge:  Some of prior experience and knowledge in:
  • Basic Microsoft Windows and Linux Administrator
  • Implement fundamental networking appliances and IP addressing concepts
Important Notes
All Trainees must take note of the following:
  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking: a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session. b. The QR Code is only accessible on: • Morning Session: between 9.00 am to 1.00 pm. • Afternoon Session: between 2.00 pm to 6.00 pm. c. Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.
The course completion requirements for this course as follow:
  1. Attended at least 75% of the course.
  2. Declared as competent during the assessments.
Who Should Attend?
This course is for those who want to pursue a career as Tier II IT Support Technician, IT Support Manager, Business Analyst, Cybersecurity Manager, Software Developer, and Systems Administrator.

Why ITEL?

  • Diverse Range of IT Courses

    We offer a diverse range of IT courses tailored to student needs. Our curriculum covers foundational to advanced topics, ensuring comprehensive learning. We stay updated with industry trends to deliver relevant courses.

  • Skilled & Experienced Instructors

    We are proud to have a team of highly skilled and experienced instructors. Our instructors are industry professionals with in-depth knowledge and expertise across various IT domains.

  • Practical & Hands-on Exercises

    Our courses feature hands-on exercises, projects, and simulations to build practical skills. Students gain confidence by applying knowledge to real-world scenarios.

Course Enquiry for CompTIA Security+ (SF)

"*" indicates required fields

I want to find out more about:
Consent*
Newsletter Subscription
This field is for validation purposes and should be left unchanged.