Skip to main content
Go Back to LUNA Academy

CompTIA Security Plus+

Course Code: DDL-0006

FREE ACCESS

  •   Access to course content
  •   No access to labs
  •   Certificate not included

PAID ACCESS

  •   Access to course content
  •   Access to all course labs
  •   Blockchain Enabled Certificate and Badges

SCHEDULES

  • SCHEDULE A - September 5-9,2022, Monday-Friday, 7am-4pm
  • SCHEDULE B - October 17-21,2022, Monday-Friday, 6am-3pm

ABOUT THIS COURSE

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

CompTIA Security+ validates core knowledge required of any cybersecurity role, and emphasises vendor-neutral, hands-on practical skills. This will ensure the security professional is better prepared to problem solve a wider variety of today’s complex issues faced by organisations, such as improving baseline security readiness and incident response by applying best practices for preventing and addressing the latest attacks, threats, and vulnerabilities.

This five-day instructor-led training course will help you prepare for the CompTIA Security+ (SY0-601) exam.

OBJECTIVES

On successful course completion, students will be able to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
  • Identify, analyse, and respond to security events and incidents

RECOMMENDED FOR

  • Security Administrator
  • Systems Administrator
  • Helpdesk Manager / Analyst
  • Security Analyst
  • Network / Cloud Engineer
  • IT Auditors
  • Security Engineer
  • IT Project Manager
  • Security Officer
  • Information Security Manager
  • DevOps / Software Developer
  • Security Architect

PREREQUISITES

Students should have basic Microsoft Windows user skills and a fundamental understanding of computer and networking concepts.

CompTIA A+ and Network+ are also recommended but not required.

MEET THE INSTRUCTORS

  • ADRIAN SMITH

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    Since completing his B.Sc. in Computer Science, Adrian has compiled over 30 years’ IT experience. During his time as a Technical Trainer at DDLS, Adrian has worked across Microsoft, Google Cloud & AWS product sets.

  • DAVID VAN GEMERT

  • SENIOR TECHNICAL TRAINER


    PROFILE SUMMARY

    David is a Technical Trainer for DDLS for Microsoft Infrastructure and Security Training, CompTIA A+, Network+ and Security+ delivering Training and Consulting in Australia and New Zealand.

  • ITVINDER MANKOO

  • PROCESS TRAINER


    PROFILE SUMMARY

    He is a highly experienced and passionate facilitator with a wealth of ‘real-world’ experience which she uses to bring to life her training courses. She is an entertaining trainer and without exception, students excel, enjoy, and learn in an environment that is supportive, educational, and fun.

  • JOHN ANG

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    An experienced Infrastructure, Security, Consulting and Project Management in Information Technology. With more than 20 years in the IT industry, recently led the Infrastructure and Security projects for one of the largest conglomerates in the country. Highly skilled in Microsoft, Symantec, CyberArk, Qualys, SolarWinds, and IT Security Policies and Procedures.

  • LOUIS CREMEN

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    Graduated B of Computer Science at University of Wollongong in 2009. Started his own software company making mobile and web apps for other companies (CommBank, RBA, Army, Government, Enterprises). Contracted to create courses to train developers how to write apps for companies (DDLS, AUC) and then as a university lecturer (UOW).

  • MICHAEL MANASAN

  • SENIOR TECHNICAL TRAINER


    PROFILE SUMMARY

    Michael is a versatile individual with a passion for technology, be it open or closed source. He is interested in infrastructure, messaging, database, and development technologies as well as management processes. Michael is continually upgrading his skillset as well as adding new skills that fancies his interest.

  • TERRY GRIFFIN

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    Terry is a technology specialist and brings to the classroom his extensive experience and knowledge which he uses to keep his courses interesting to the attendees. He is known as a Microsoft, VMware, and Citrix evangelist, and brings that enthusiasm to the classroom.

  COURSE OUTLINE


  • Module 1: Attacks, Threats and Vulnerabilities
    • Compare and contrast different types of social engineering techniques
    • Analyse potential indicators to determine the type of attack
    • Explain different threat actors, vectors, and intelligence sources
    • Explain security concerns associated with various types of vulnerabilities
    • ESummarise techniques used in security assessments
    • Explain techniques used in penetration testing

  • Module 2: Architecture and Design
    • Explain importance of security concepts in an enterprise environment
    • Summarise virtualisation and cloud computing concepts
    • Summarise secure application development, deployment, and automation concepts
    • Summarise authentication and authorisation design concepts
    • Given a scenario, implement cybersecurity resilience
    • Explain the security implications of embedded and specialised systems
    • Explain the importance of physical security controls
    • Summarise the basics of cryptographic concepts

  • Module 3: Implementation
    • Given a scenario, implement secure protocols
    • Given a scenario, implement host or application security solutions
    • Given a scenario, implement secure network designs
    • Given a scenario, install and configure wireless security settings
    • Given a scenario, implement secure mobile solutions
    • Given a scenario, apply cybersecurity solutions to the cloud
    • Given a scenario, implement identity and account management controls
    • Given a scenario, implement authentication and authorisation solutions
    • Given a scenario, implement public key infrastructure

  • Module 4: Operations and Incident Response
    • Given a scenario, use appropriate tool to assess organisational security
    • Summarise importance of policies, processes, and procedures for incident response
    • Given an incident, utilise appropriate data sources to support investigations
    • Given an incident, apply mitigation techniques or controls to secure an environment
    • Explain key aspects of digital forensics

  • Module 5: Governance, Risk and Compliance
    • Compare and contrast various types of controls
    • Explain importance of applicable regulations, standards, or frameworks that impact organisational security posture
    • Explain importance of policies to organisational security
    • Summarise risk management processes and concepts
    • Explain privacy and sensitive data concepts in relation to security

Enroll
LUNA TECHNOLOGIES INC. 2022. All rights reserved.