Course overview
Recommended by seasoned professionals, the CompTIA Security+ certification makes you a competitive candidate for highly sought cybersecurity roles.
This course is designed to help you master the basics of system security, network infrastructure, access control, and organisational security.
By completing this course, you will be prepared to take the CompTIA Security+ certification exam, which is considered a global standard for validating cybersecurity skills.
Job outcomes
- IA technician
- Security consultant
- Information security analyst
- Forensic analyst
Recognition
Study method
- Online
- Blended
- In-class
Duration study load
30 hours, over 112 videos. This is a self-paced online course that can be completed at your convenience. The average learner completes the Security+ course in 3-6 months.
Course features
- 100% Job Guarantee: We’re so confident we can help you reach your goals that if we don’t land you a job within 12 months, we’ll give you your money back.
- Real Qualifications: We don’t do a ‘Certificate of Completion’ Our programmes only include courses that lead to industry-recognised qualifications from accredited providers.
- 1-to-1 Tutor Support: Just like a teacher in a classroom, have an expert answer all your queries whenever you need.
- Self-Paced Learning: Find it hard to balance learning and work? Don’t worry! With our program, you can work at your own pace whenever you like
- Beginner Friendly: You can start from scratch with all our programmes, which include a specially picked mix of courses to take you from beginner to expert.
- Exams Included: Exams are stressful enough! Let us handle the hard work for you— your exam fees and registrations are part of your programme cost.
- All-in-One Package: Build your skills with us, earn your qualifications with us, and land your job with us. Have everything you need in one streamlined programme backed by experts.
Professional recognition
Accredited by CompTIA
Who's it for?
This course is ideal for individuals looking to specialize in the cybersecurity field who are looking to build critical skills and advance their careers in this industry. This is not suitable for beginners in IT.
What makes us different?
Compared to traditional online platforms, we look at professional learning from every angle.
- Industry-Led Courses: Learn from recognised experts who are active in your industry and understand the real-world demands you will face. Our experts devise our courses themselves, to ensure they deliver the most relevant and up-to-date curriculum for popular qualifications in your industry
- Focus on Flexibility: No more rigid schedules. Our pre-recorded courses let you learn at your own pace, whenever and wherever it suits you. Our career paths also provide a wealth of varied learning materials, so you can approach learning from all sides.
- No Career-Breaking Costs: Education is a serious financial commitment, and we want everyone to have access to quality training. That’s why we offer cost-effective options without compromising on value. By providing a carefully curated, accessible service, we are able to keep prices down on training.
- Going Beyond the Certificate: We don’t just hand you a certificate and move on. Square Skills provides career support, progression advice, exam discounts and opportunities to put your skills to the test on real-world projects, giving you a clear edge in the job market.
Subjects
- Introduction to the Course
- Fundamental Security Concepts
- Zero Trust
- Deception and Disruption
- ACTIVITY – Testing a Honeypot
- Security Controls
- Change Management and Security
- Cryptography Basics
- ACTIVITY – Examining Symmetric Encryption
- Asymmetric Encryption
- ACTIVITY – Exploring Asymmetric Encryption
- Hashing
- ACTIVITY – Verifying Integrity with Hashing
- Digital Certificates
- Public Key Infrastructure
- Data and Keys
- Crypto Implementations
- Blockchain
- Non-Cryptographic Data Protection
- Threat Actors and Motivations
- Threat Vectors
- ACTIVITY – O.MG Cable Baiting
- Social Engineering
- Operating System Vulnerabilities and Attacks
- Application Vulnerabilities and Attacks
- ACTIVITY – Performing a Buffer Overflow
- Web-based Vulnerabilities and Attacks
- ACTIVITY – Abusing Unsanitized Input
- ACTIVITY – Grabbing Passwords with SQL Injection
- ACTIVITY – Swiping a Token with XSS
- Other Vulnerabilities
- Common Malicious Activity Indicators
- Insider Threat Indicators
- Social Engineering Indicators
- ACTIVITY – Capturing Credentials through Social Engineering
- Malware Activity Indicators
- Operating System Attack Indicators
- Application Attack Indicators
- ACTIVITY – Recognizing Directory Traversal
- Physical Attack Indicators
- ACTIVITY – Quickly Cloning an RFID Badge
- Network Attack Indicators
- ACTIVITY – Crashing a Target with DoS
- Cryptographic Attack Indicators
- Password Attack Indicators
- ACTIVITY – Password Cracking
- Network Segmentation
- Access Control
- Enterprise Device Hardening
- Network Segmentation
- ACTIVITY – Segmenting a Network
- High Availability
- Virtualisation
- ACTIVITY – Deploying Docker Containers
- Cloud
- Serverless Computing
- IoT
- ICS SCADA
- ACTIVITY – Operating a SCADA System
- RTOS and Embedded Systems
- Reducing the Attack Surface
- Firewalls
- IDS IPS.mp4
- Secure Communications – Access
- Port Security
- SD-WAN and SASE
- Data Classifications
- Protecting Data Types
- Data Considerations
- Redundancy
- Alternate Sites
- Multiple Platforms
- Business Continuity
- Secure Baselines
- Attack Surface Reduction
- Wireless Installation
- Wireless Security Settings
- Mobile Solutions
- ACTIVITY – Pwning a Mobile Device
- Application Security Management
- Asset Management
- Vulnerability Management
- Monitoring Activities
- Monitoring Tools
- ACTIVITY – Scanning a Network for Vulnerabilities
- Firewall Configuration
- ACTIVITY – Configuring Firewall Rules
- Intrusion Detection Configuration
- Web Traffic Filtering
- Operating System Policy
- ACTIVITY – Examining Windows Group Policy
- Network Service Security
- Data Loss Protection
- ACTIVITY – Checking File Integrity
- Network Access Control
- ACTIVITY – Require Multifactor Authentication
- Identity Management
- Access Management
- ACTIVITY – Implementing Access Control
- Security Automation
- Incident Response
- Digital Forensics
- Elements of Effective Security Governance
- Elements of the Risk Management Process
- Third-Party Risk Assessment and Management
- ACTIVITY – Analyzing the Solar Winds Supply Chain Failure
- Effective Security Compliance
- Audits and Assessments
- ACTIVITY – Conducting OSINT
- ACTIVITY – Performing Active Reconnaissance
- Security Awareness Practices
- Course Outro
About Square Skills
At Square Skills, we’re passionate about professional development. We believe that everyone deserves access to quality learning opportunities.
That’s why we’ve created an innovative online platform designed to empower you to excel in your chosen field.
Whether you’re interested in IT, project management, or other high-demand areas, we’re here to support your career goals and help you build a successful future.
Our Mission
At Square Skills, our mission is simple: empower professionals worldwide. After building a wealth of experience in the UK’s online learning sector over many years, we’re now taking our expertise global. We are committed to providing accessible, high-quality training that transforms careers on an international scale.
What Makes Us Different
Compared to traditional online platforms, we look at professional learning from every angle.
- By Professionals, For Professionals: Learn from recognized experts who are active in your industry. Our experts design courses themselves, ensuring the most relevant and up-to-date curricula for popular qualifications.
- Focus on Flexibility: Say goodbye to rigid schedules. Our pre-recorded courses allow you to learn at your own pace, anytime, anywhere. Our career paths offer diverse learning materials, allowing you to explore from all sides.
- No Career-Breaking Costs: We believe quality training should be accessible to all. Our cost-effective options maintain educational value without breaking the bank. Our carefully curated service keeps prices reasonable.
- Going Beyond the Certificate: We don’t stop at certificates of completion. Square Skills provides career support, progression advice, exam discounts, and real-world project opportunities, so you gain a competitive edge in the job market.