Call +65 6100 0613 Email: enquiry@tertiaryinfotech.com

Enhance Your Employability with Certified Skills and Courses in Singapore - WSQ , IBF-STS, Skills Certification

CompTIA Security+ Exam Prep

In a world where data breaches and cyber threats are increasingly prevalent, building a solid foundation in IT security has never been more critical. Our CompTIA Security+ Exam Prep Training course is designed to equip you with the knowledge and tools necessary to excel in today's digital landscape. From understanding the principles of network security to mastering risk management, our course curriculum covers a broad spectrum of topics to help you emerge as a skilled professional in the field. Moreover, it brings you one step closer to being a certified expert, boosting your credentials and opening doors to numerous opportunities in the IT sector.

Whether you are kickstarting your career or seeking to upgrade your existing skills, this course offers a comprehensive approach to learning. It encompasses an array of modules that delve into the intricacies of IT security, offering a hands-on experience to reinforce your learning. The content is structured in a manner that fosters an easy understanding, ensuring that you are well-prepared to tackle the Security+ exam. Furthermore, our training emphasizes real-world scenarios and current security challenges, enabling you to apply your knowledge effectively in practical situations. Enroll today and set the stage for a rewarding career in IT security.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Disclaimer

Note that we are not affiliated with CompTIA. To get the official certification, please register your certification exam at Pearson Vue Test Center.

Certification Exam at Pearson Vue

Once you are prepared for the exam, you can register for the certification here. We are Authorised Pearson Vue Testing Center. You can take the certification exam at our test center. Note that the course fee does not include the certification exam fee.

Funding and Grant Applications

No funding is available for this course

Course Code: C628

Course Booking

The course fee listed below is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

$1,500.00 (GST-exclusive)
$1,635.00 (GST-inclusive)

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

.LU1 Key Security Risks and Problems

Topic 1: Comparing Security Roles and Security Controls 

  • • Compare and contrast information security roles
  • • Compare and contrast security control and framework types

Topic 2: Explaining Threat Actors and Threat Intelligence 

  • • Explain threat actor types and attack vectors
  • • Explain threat intelligence sources

Topic 3: Performing Security Assessments 

  • • Assess organizational security with network reconnaissance tools
  • • Explain security concerns with general vulnerability types
  • • Summarize vulnerability scanning techniques
  • • Explain penetration testing concepts

Topic 4: Identifying Social Engineering and Malware 

  • • Compare and contrast social engineering techniques
  • • Analyze indicators of malware-based attacks

Topic 5: Summarizing Basic Cryptographic Concepts 

  • • Compare and contrast cryptographic ciphers
  • • Summarize cryptographic modes of operation
  • • Summarize cryptographic use cases and weaknesses
  • • Summarize other cryptographic technologies

LU2 Design Security System

Topic 6: Implementing Public Key Infrastructure 

  • • Implement certificates and certificate authorities
  • • Implement PKI management

Topic 7: Implementing Authentication Controls 

  • • Summarize authentication design concepts
  • • Implement knowledge-based authentication
  • • Implement authentication technologies
  • • Summarize biometrics authentication concepts

Topic 8: Implementing Identity and Account Management Controls 

  • • Implement identity and account types
  • • Implement account policies
  • • Implement authorization solutions
  • • Explain the importance of personnel policies

Topic 9: Implementing Secure Network Designs 

  • • Implement secure network designs
  • • Implement secure routing and switching
  • • Implement secure wireless infrastructure
  • • Implement load balancers

LU3 Define Security Specifications

Topic 10: Implementing Network Security Appliances 

  • • Implement firewalls and proxy servers
  • • Implement network security monitoring
  • • Summarize the use of SIEM

Topic 11: Implementing Secure Network Protocols 

  • • Implement secure network operations protocols
  • • Implement secure application protocols
  • • Implement secure remote access protocols

Topic 12: Implementing Host Security Solutions 

  • • Implement secure firmware
  • • Implement endpoint security
  • • Explain embedded system security implications

Topic 13: Implementing Secure Mobile Solutions 

  • • Implement mobile device management
  • • Implement secure mobile device connections

LU4 Security System Components

Topic 14: Summarizing Secure Application Concepts 

  • • Analyze indicators of application attacks
  • • Analyze indicators of web application attacks
  • • Summarize secure coding practices
  • • Implement secure script environments
  • • Summarize deployment and automation concepts

Topic 15: Implementing Secure Cloud Solutions 

  • • Summarize secure cloud and virtualization services
  • • Apply cloud security solutions
  • • Summarize infrastructure as code concepts

Topic 16: Explaining Data Privacy and Protection Concepts 

  • • Explain privacy and data sensitivity concepts
  • • Explain privacy and data protection controls

LU5 Security Assurance

Topic 17: Performing Incident Response 

  • • Summarize incident response procedures
  • • Utilize appropriate data sources for incident response
  • • Apply mitigation controls

Topic 18: Explaining Digital Forensics 

  • • Explain key aspects of digital forensics documentation
  • • Explain key aspects of digital forensics evidence acquisition

Topic 19: Summarizing Risk Management Concepts 

  • • Explain risk management processes and concepts
  • • Explain business impact analysis concepts

Topic 20: Implementing Cybersecurity Resilience 

  • • Implement redundancy strategies
  • • Implement backup strategies
  • • Implement cybersecurity resiliency strategies

Topic 21: Explaining Physical Security 

  • • Explain the importance of physical site security controls
  • • Explain the importance of physical host security controls

Course Info

Promotion Code

Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target Age Group: 18-65 years old

Minimum Software/Hardware Requirement

Software:

TBD

Hardware: Window or Mac Laptops

Job Roles

  • Information Security Analyst
  • Network Administrator
  • Systems Administrator
  • IT Manager
  • Security Consultant
  • Cybersecurity Analyst
  • IT Auditor
  • Security Engineer
  • Network Engineer
  • Help Desk Technician
  • Security Specialist
  • IT Project Manager
  • Security Administrator
  • Risk Analyst
  • Compliance Analyst

Trainers

Peter Cheong :  I am a ACLP certied trainer. Specialise In IT related knowlege and conduct IT Training which Include Microsoft Window Server Technology (Wintel) and Linux - Centos/Red Hat. Comptia ,ITIL , Motorola Solution Trunking System and Cisco Networking. I was worked in Motorola Solutions Conduct Motorola Astro 25 Trunking System For Police Force Malaysia (RMPnet),Taiwan Navy, Indonesia METRO POLDA (Police Force). After that I Join As IT Group Manager For W-Group which include 17 subsidiaries Companies in Real Estate Developer,Plantation, Building Management Services ,Contruction and also Fiber Opti Service Provider in Sabah,Malaysia.

Truman Ng: I am a ACLP certified trainer. With In-depth and diversified experiences from Project Management DevOps, Blockchain, Project Management, Education, IT and even Numerology, I am passionate to meet good people and generate new ideas, in pursuit of realization of better world!

Customer Reviews (6)

will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 12/20/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Provide and share more codes on fun projects, a soft copy PDF of slides or at least a coloured version (Posted on 7/18/2019)
Good and indepth Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Well planned (Posted on 12/31/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 11/28/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
May be start the course at 9am and end at 6pm to give more time for practice and answering questions. It was a bit rush.

The trainer is very dedicated and patient one. (Posted on 4/18/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Maybe better to make it into 2 days short course (Posted on 4/18/2018)

Write Your Own Review

You're reviewing: CompTIA Security+ Exam Prep

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha
    Attention: Captcha is case sensitive.

You May Be Interested In These Courses

WSQ - Microsoft Azure Data Fundamentals (DP-900)

WSQ - Microsoft Azure Data Fundamentals (DP-900)

5 Review(s)
$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

109 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - Network Securities for Beginners

WSQ - Network Securities for Beginners

18 Review(s)
$688.00 (GST-exclusive)
$749.92 (GST-inclusive)
WSQ - Agile Software Development with Scrum and DevOps

WSQ - Agile Software Development with Scrum and DevOps

1 Review(s)
$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Microsoft Azure Fundamentals (AZ-900)

WSQ - Microsoft Azure Fundamentals (AZ-900)

$800.00 (GST-exclusive)
$872.00 (GST-inclusive)
WSQ - Cisco Certified Network Associate (CCNA)

WSQ - Cisco Certified Network Associate (CCNA)

2 Review(s)
$2,500.00 (GST-exclusive)
$2,725.00 (GST-inclusive)