Security + Certification Prep

Course Overview

This Security + Certification Preparation course prepares you for the CompTIA Security+ certification, focusing on essential security concepts, tools, and procedures. Gain hands-on experience with network security, compliance, operational security, threats and vulnerabilities, and cryptography.

25 Modules

8 Weeks


  • Course overview
  • Exam prerequisites and structure

  • Principles of information security
  • Core cybersecurity roles and responsibilities

  • Types of security threats
  • Case studies of recent security breaches

  • Basics of cryptographic theory
  • Common cryptographic algorithms

  • Key management and distribution
  • Real-world applications of encryption

  • Components of PKI
  • Implementing PKI solutions

  • Designing secure networks
  • Network segmentation and isolation strategies

  • Secure configuration of network devices
  • Protocol security implications

  • Security in wireless networking
  • Preventative measures against wireless threats

  • Setting up and securing VPNs
  • Best practices for remote access security

  • Various authentication techniques and their security implications
  • Multi-factor authentication (MFA)

  • Understanding DAC, MAC, and RBAC
  • Implementing effective access controls

  • Solutions for identity management and integration
  • Best practices for identity as a service (IDaaS)

  • Secure software development lifecycle (SDLC)
  • Mitigating common software vulnerabilities

  • Data protection strategies
  • Regulations impacting data security

  • Common coding pitfalls and how to avoid them
  • Security-focused code review practices

  • Techniques for securing database systems
  • Encrypting data at rest and in transit

  • Methods for conducting risk assessments
  • Risk analysis tools and techniques

  • Developing and implementing risk mitigation plans
  • Case studies on effective risk management

  • Overview of key IT security laws and standards
  • Compliance management

  • Designing and implementing an incident response plan
  • Simulation of incident response scenarios

  • SOC roles, responsibilities, and structure
  • Key performance indicators for SOC effectiveness

  • Overview of security tools (SIEM, IDS/IPS, etc.)
  • Evaluating and selecting security technologies

  • Implementing a threat intelligence program
  • Techniques for proactive vulnerability management

  • Developing a security awareness training program
  • Engaging different audiences with security training

Illustration of a woman with a suitcase, accompanied by a notice that Yellow Tail Tech serves and enrolls only US residents