ComPTIA Security+ is a vendor-neutral certification course that covers the organizations of information security across number of technology platforms. The course covers industry-wide concepts including cryptography, authentication, communication security, access control, external attack, infrastructure security and organization and operational security. The demand for skilled security professionals is growing significantly. The technology community identifies this course as the perfect way to validate your knowledge of information security. The recommended pre-requisite to join Certificate in IT Security course is to have basic knowledge of Computer Networking.


Those who have work experience of Hardware and Networking and is interested to learn about Vendor-neutral Networking security.


The recommended pre-requisite to join Certificate in IT Security course is to have prior knowledge of Computer Networking.


PartTime : 60 Days (2 hrs./day)

FullTime : 30 Days ( 4 hrs./day)

Course Outline:

Mitigating threats:

  • System maintenance.
  • Application security.
  • Physical security.
  • Malware.
  • Social engineering.

CUser- and role-based security:

  • Baseline security policies.
  • Resource access.
  • Peripheral security.

CApplication and messaging security:

  • Application security.
  • E-mail security.
  • Social networking and messaging.

CSecure networking:

  • Virtualization and cloud computing.
  • Wireless security.
  • Wireless network security.
  • Mobile device security.

COrganizational security:

  • Organizational policies.
  • Education and training.
  • Disposal and destruction.


  • Symmetric cryptography.
  • Public key cryptography.

CFile and disk encryption:

  • Peripheral and component security.
  • Mobile device security.

CPorts and protocols:

  • TCP/IP basics.
  • Protocol-based attacks.

CRemote access security:

  • Remote access.
  • Virtual private networks.
  • Vulnerability testing and monitoring.
  • Risk and vulnerability assessment.

CBusiness continuity:

  • Business continuity planning.
  • Disaster recovery.
  • Environmental controls.


  • Authentication factors and requirements.
  • Authentication systems.
  • Authentication system vulnerabilities.

CPublic key infrastructure:

  • Public key cryptography.
  • Implementing public key infrastructure.
  • Web server security with PKI.

CNetwork security:

  • Network devices.
  • Secure network topologies.

CAuditing and logging:

  • Intrusion detection and prevention systems.
  • Incident response.