CompTIA Security+

Tijdsduur
Locatie
Op locatie
Startdatum en plaats

CompTIA Security+

Train IT Now B.V.
Logo van Train IT Now B.V.

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen
placeNieuwegein
2 mrt. 2026 tot 6 mrt. 2026
placeVirtueel
2 mrt. 2026 tot 6 mrt. 2026
placeApeldoorn
20 apr. 2026 tot 24 apr. 2026
placeVirtueel
20 apr. 2026 tot 24 apr. 2026
placeNieuwegein
1 jun. 2026 tot 5 jun. 2026
placeVirtueel
1 jun. 2026 tot 5 jun. 2026
placeEindhoven
29 jun. 2026 tot 3 jul. 2026
placeVirtueel
17 aug. 2026 tot 21 aug. 2026
placeNieuwegein
14 sep. 2026 tot 18 sep. 2026
placeVirtueel
14 sep. 2026 tot 18 sep. 2026
placeVirtueel
26 okt. 2026 tot 30 okt. 2026
placeZoetermeer
26 okt. 2026 tot 30 okt. 2026
placeApeldoorn
11 dec. 2026 tot 15 dec. 2026
placeVirtueel
11 dec. 2026 tot 15 dec. 2026
Beschrijving

Verdiep je in cyberbeveiliging en word met de officiële CompTIA Security+ training een onmisbare schakel in ieder beveiligingsteam!

The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam. The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

Content

General Security Concepts 12%


* Compare and contrast various types of security controls.
* Summ…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Verdiep je in cyberbeveiliging en word met de officiële CompTIA Security+ training een onmisbare schakel in ieder beveiligingsteam!

The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam. The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

Content

General Security Concepts 12%


* Compare and contrast various types of security controls.
* Summarize fundamental security concepts.
* Explain the importance of change management processes and the impact to security.
* Explain the importance of using appropriate cryptographic solutions.Threats, Vulnerabilities & Mitigations 22%


* Compare and contrast common threat actors and motivations.
* Explain common threat vectors and attack surfaces.
* Explain various types of vulnerabilities.
* Given a scenario, analyze indicators of malicious activity.
* Explain the purpose of mitigation techniques used to secure the enterprise.Security Architecture 18%


* Compare and contrast security implications of different architecture models.
* Given a scenario, apply security principles to secure enterprise infrastructure.
* Compare and contrast concepts and strategies to protect data.
* Explain the importance of resilience and recovery in security architecture.Security Operations 28%


* Given a scenario, apply common security techniques to computing resources.
* Explain the security implications of proper hardware, software, and data asset management.
* Explain various activities associated with vulnerability management.
* Explain security alerting and monitoring concepts and tools.
* Given a scenario, modify Enterprise capabilities to enhance security.
* Given a scenario, implement and maintain identity and access management.
* Explain the importance of automation and orchestration related to secure operations.
* Explain appropriate incident response activities.
* Given a scenario, use data sources to support an investigation.Security Program Management & Oversight 20%


* Summarize elements of effective security governance.
* Explain elements of the risk management process.
* Explain the processes associated with third-party risk assessment and management.
* Summarize elements of effective security compliance.
* Explain types and purposes of audits and assessments.
* Given a scenario, implement security awareness practices.

Blijf op de hoogte van nieuwe ervaringen
Er zijn nog geen ervaringen.
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.