Montreal College of Information Technology
Collège des technologies de l’information de Montréal English flagEN FlagFR

CERTIFICATES

CompTIA Security+ Certification Training
OVERVIEW

Our CompTIA Security+ certification training prepares you for the official CompTIA Security+ exam and covers all the practical aspects you will encounter during the exam. With this training, you will learn the fundamental skills to install and configure cybersecurity controls, incident response, and risk mitigation by the end of this training, alongside learning about different types of threats, attacks, and vulnerabilities. You will also learn about architecture and design alongside core concepts such as identity and risk, in addition to access management and cryptography.

  • 9 February 2024
  • 36 hours
  • Contact the Advisor
  • Talk to an Advisor

Schedule: Monday, Wednesday, Friday - 6pm - 9pm

KEY FEATURES

  • CompTIA Security+ Certification Training

    Get trained by industry Experts

    Our courses are delivered by professionals with years of experience having learned first-hand the best, in-demand techniques, concepts, and latest tools.
  • CompTIA Security+ Certification Training

    Official Certification curriculum

    Our curriculum is kept up to date with the latest official Certification syllabus and making you getting ready to take the exam.
  • CompTIA Security+ Certification Training

    Tax Credit

    Claim up to 25% of tuition fees and education tax credit.
  • CompTIA Security+ Certification Training

    Discount on Certification Voucher

    Upto 50 percent discount voucher will be provided.
  • CompTIA Security+ Certification Training

    24/7 Lab access

    Our students have access to their labs and course materials at any hour of the day to maximize their learning potential and guarantee success.

COURSE OUTLINE

CompTIA Security+ Certification Training

This module explores the various types of the threats in the systems, identify a scenario analyze indicators of compromise and determine the type of malware like Trojan, Spyware, Compare and contrast types of attacks like social engineering, application/service attacks, wireless attacks, cryptographic attacks.

This module various concepts related to threat actor types and attributes like types of actors, attributes of actors, use of open source intelligence, penetration testing concepts, vulnerability scanning concepts and the impact associated with types of vulnerabilities.

This module helps you to Install and configure network components, both hardwareand software-based, to support organizational security like firewall, VPN concentrator, NIPS, Router, Switch, Proxy, Load Balancer, Access point, SIEM, DLP, NAC, Bridge and use appropriate software tools to assess the security posture of an organization like  Exploitation frameworks and Data sanitization tools.

This module provids information about troubleshoot common security issues like Logs and events anomalies, Certificate issues, Asset management, analyze and interpret output from security technologies, deploy mobile devices securely like connection methods, mobile device management concpets, enforcement and monitoring, deployment models and implement secure protocols and identifying their use cases.

This module explores the use cases and purpose for frameworks, best practices and secure configuration guides like industry-standard frameworks and reference architectures, Bechmarks/secure configuraion guides and defense-in-depth/layered security, implement secure network architecture concepts like Zones/topologies, Segregation/segmentation/isolation,  Tunneling/VPN, • Security device/technology placement and secure systems design like Hardware/firmware security, Operating systems and Peripherals.

This module provides you the importance of secure staging deployment concepts like sandboxing, various environments, secure baseline, integrity measurement, security implications of embedded systems like SCADA/ICS, Smart Devices/IOT, HVAC, SoC, RTOS, Printers/MFDs, camera Systems. Secure application development and deployment concepts like Development life-cycle models, Secure DevOps, Version control and change management, Provisioning and deprovisioning, Secure coding techniques and Code quality and testing and finally cloud and virtualization concepts.

This module explains how resiliency and automation strategies reduce risk like Automation/scripting, Templates, Master image, Non-persistence, Elasticity, Scalability and the importance of physical security controls like Signs, fencing/gate/cage, Security guards, Alarms, Safe, Secure cabinets/enclosures, Protected distribution/Protected cabling, Airgap, Mantrap and Faraday cage.

This module make you to Compare and contrast identity and access management concepts like Identification, authentication,
 authorization and accounting (AAA), Multifactor authentication, install and configure identity and access services like LDAP, Kerberos, TACACS+, CHAP, PAP, implement identity and access management controls like Aceess Control Models, Physical access control, Biometric factors, Tokens, Certificate-based authentication and  differentiate common account management practices like account types, general Concepts and Account Policy enforcement.
 

This module provides the idea about the policies, plans and procedures related to organizational security like Standard operating procedure, Agreement types, Personnel management , General security policies and business impact analysis concepts like RTO/RPO, MTBF, MTTR, Mission-essential functions, Identification of critical systems, Single point of failure and risk management processes and concepts like threat assessment, risk assessment and change management.

This module makes you familiar with the incident response procedures like Incident response plan, Incident response process and concepts of forensics like Order of volatility, Chain of custody, Legal hold, Data acquisition, Preservation, Recovery, Strategic  and continuity of operation concepts like Recovery sites, Order of restoration, Backup concepts, Geographic considerations, Continuity of operation planning and various types of controls and carrying out data security and privacy practices like Data destruction and media sanitization, Data roles and data retention.

This module helps you to Compare and contrast basic concepts of cryptography like Symmetric algorithms, Modes of operation, Asymmetric algorithms, Hashing, Salt, IV, nonce, Elliptic curve, Weak/deprecated algorithms, Key exchange, Digital signatures, Diffusion, Confusion , Collision, common use cases and cryptography algorithms and their basic characteristics like Symmetric algorithms like AES, DES, 3DES, RC4, Cipher modes, Asymmetric algorithms like RSA, DSA, Diffie-Hellman, Hashing algorithms like MD5, SHA and Key stretching algorithms, Obfuscation.

This module makes you to install and configure wireless security settings like Cryptographic protocols like WPA, WPA2, CCMP, TKIP, Authentication Protocols and Methods and Implementing public key infrastructure like components, concpets, types of certificates and certificate formats.

SKILLS ACQUIRED

WHO SHOULD APPLY?

Career starters who are interested in vendor-neutral IT certifications in the industry. CompTIA (The Computing Technology Industry Association) is the leading provider of vendor free solutions.
Information technology professionals in need of CompTIA's certification exams for computing support, networking, security, open-source (Linux) development, cloud and mobility.
Academic achievers who have just finished university or college and would like to enter the field of IT to augment their credentials with additional certifications.
Students who are enrolled into a Computer Science program at a College or University level would be a good fit for this certification course.

Eligibility and Requirements

Learners need to possess an undergraduate degree or a high school diploma. No need of any professional experience is required as this is a basic course.

 

Prerequisite

There are no prerequistes for this course.

Official CompTIA Security+ exam.

 

Upon completing this cerification course you will:

  • Receive an industry-recognized certificate from MCIT.
  •  
  • Be prepared for the official Exam CompTIA Security+ exam.

CALENDAR

— F.A.Q —

Definitely. Please feel free to contact our office, we will be more than happy to work with you to meet your training needs.
All of our exceptionally skilled instructors have a decent experience of training and industry experience and are AW certified in the respective field. Each of them through a rigorous selection procedure that included profile screening, technical examination, and a training demo. 
Yes, there are vouchers to take the official exam.
Upon completion of the certification course classes you will be provided with an MCIT certificate.