Converse, TX



CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. The certification emphasizes the practical and hands-on ability to both identify and address security threats, attacks, and vulnerabilities. CompTIA Security+ is a globally trusted, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.



1-Identifying Security Fundamentals 

•Identify Information Security Concepts

•Identify Basic Security Controls

•Identify Basic Authentication and Authorization Concepts

•Identify Basic Cryptography Concepts

2-Analyzing Risk 

•Analyze Organizational Risk

•Analyze the Business Impact of Risk

3-Identifying Security Threats 

•Identify Types of Attackers

•Identify Social Engineering Attacks

•Identify Malware

•Identify Software-Based Threats

•Identify Network-Based Threats

•Identify Wireless Threats

•Identify Physical Threats

4-Conducting Security Assessments 

•Identify Vulnerabilities

•Assess Vulnerabilities

•Implement Penetration Testing

5-Implementing Host and Software Security   

•Implement Host Security

•Implement Cloud and Virtualization Security

•Implement Mobile Device Security

•Incorporate Security in the Software Development Lifecycle

6-Implementing Network Security  

•Configure Network Security Technologies

•Secure Network Design Elements

•Implement Secure Networking Protocols and Services

•Secure Wireless Traffic

 7-Managing Identity and Access 

•Implement Identity and Access Management

•Configure Directory Services

•Configure Access Services

•Manage Accounts

8-Implementing Cryptography 

•Identify Advanced Cryptography Concepts

•Select Cryptographic Algorithms

•Configure a Public Key Infrastructure

•Enroll Certificates

•Back Up and Restore Certificates and Private Keys

•Revoke Certificates

9-Implementing Operational Security 

•Evaluate Security Frameworks and Guidelines

•Incorporate Documentation in Operational Security

•Implement Security Strategies

•Manage Data Security Processes

•Implement Physical Controls

10-Addressing Security Issues 

•Troubleshoot Common Security Issues

•Respond to Security Incidents

•Investigate Security Incidents

11-Ensuring Business Continuity  

•Select Business Continuity and Disaster Recovery Processes

•Develop a Business Continuity Plan