Get Security+ Certified with Confidence
Expert-Led Training Designed for Exam Success
Obtaining CompTIA Security+ certification validates your experience and skill in information security. Security+ Certification has emerged as the key certification for experienced security professionals. Security+ certified professionals are information assurance professionals who are responsible for defining the architecture, design, management and controls that ensure organizational security. Being Security+ Certified means you are an authority on critical security topics including risk management, application development, cloud computing and mobile security. It was the first certification in the field of information security to meet the stringent requirements of International Organization for Standardization and International Electrotechnical Commission (ISO/IEC) 17024 standards. Corporations are demanding experienced information security professionals with the certifications to prove it to protect their information and assets.
Knowledge Transfer
Exam Pass Guarantee
Expert Guidance
Why take a Security Plus Boot Camp?
Our intense Bootcamp gives you the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.
Who should attend a Security+ Training Class?
CompTIA Security+ is an excellent entry point for a career in information security. The latest version, SY0-701, expands coverage of cybersecurity threats, risk management, and IoT threats. Attendees should have 2-3 years networking experience to fully meet Comptia Guidelines.
The Security+ Training exam is tough.
We are with you every step of the way.
No matter what you may read, the truth is that there is no easy path when it comes to Security+ exam readiness. Most students need 3-6 weeks of study before they’re ready to sit for the exam. What’s true of most, of course, isn’t true for all: some applicants will fall onto either side of that average, and a full 50% will never sit for the exam at all.
- Application assistance
- Readiness roadmap
- Post Class support
- Complete study resource
What you’ll learn
- Detect types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
- Implement secure network architecture concepts and systems design
- Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
- Install and configure identity and access services, as well as management controls
- Implement and summarize risk management best practices and the business impact
- Install and configure wireless security settings and implement public key infrastructure
What’s included
- 5 days instructor-led training
- Security+ study guide
- Exam Voucher
- Practice Test
- Labs for hands-on learning
Security+ Certification Course Syllabus
CompTIA Security+ Boot Camp – Comprehensive 5-Day Curriculum
Day 1: Security Fundamentals
Morning Session (9am-12pm)
Security Concepts and Principles (2 hours)
- CIA Triad in Depth
- Confidentiality: Access controls, encryption, steganography
- Integrity: Hashing, digital signatures, certificates
- Availability: Redundancy, fault tolerance, disaster recovery
- Extended models: Non-repudiation, authenticity, accountability
- Security Controls Classification
- Administrative controls: Policies, standards, procedures
- Technical controls: Authentication, encryption, firewalls
- Physical controls: Badges, locks, biometrics
- Control categories: Preventive, detective, corrective, compensating
- Control implementation: Mandatory, discretionary, role-based
- Defense in Depth Strategies
- Layered security approach implementation
- Network segmentation principles
- Asset classification and protection requirements
- Risk-based security control application
- Security zones and boundaries implementation
Threat Actor Types and Attributes (1 hour)
- Nation-state Actors
- Characteristics and motivations
- Advanced Persistent Threats (APTs)
- Notable examples and attack patterns
- Attribution challenges
- Organized Crime
- Financial motivation patterns
- Ransomware-as-a-Service operations
- Dark web marketplaces and services
- Monetization techniques
- Hacktivists and Insider Threats
- Hacktivist motivations and techniques
- Types of insider threats (malicious, negligent, compromised)
- Insider threat indicators
- Privilege misuse patterns
- Social engineering vulnerability
Afternoon Session (1pm-5pm)
Hands-on Lab: Security Control Implementation (2 hours)
- Lab 1: Access Control Configuration
- Implementing RBAC on a Windows Server
- Configuring file and share permissions
- Setting up user account restrictions
- Documenting control effectiveness
- Lab 2: Security Baseline Implementation
- Applying security templates
- Implementing group policies
- Configuring audit policies
- Analyzing security configurations
Malware Analysis and Classification (2 hours)
- Viruses, Worms, and Trojans
- Infection vectors and propagation methods
- Payload analysis and behavior patterns
- Detection techniques and evasion methods
- Case studies of significant outbreaks
- Ransomware Attack Patterns
- Infection chain analysis
- Data encryption techniques
- Command and control communications
- Extortion strategies and payment mechanisms
- Prevention and recovery strategies
- Fileless Malware Techniques
- Memory-resident execution methods
- PowerShell and scripting attacks
- Living-off-the-land techniques
- Detection challenges and solutions
- Advanced behavioral analysis
Day 2: Network Security and Architecture
Morning Session (9am-12pm)
Network Architecture Security (2 hours)
- Secure Network Design Principles
- Defense in depth implementation
- Network segmentation strategies
- DMZ architecture and implementation
- Zero trust network principles
- Micro-segmentation techniques
- Secure Protocols and Services
- Protocol security analysis (HTTP, FTP, SMTP, etc.)
- Secure alternatives (HTTPS, SFTP, FTPS, etc.)
- TLS implementation and configuration
- Certificate validation and management
- Protocol vulnerability mitigation
- Network Components Security
- Router and switch hardening
- Firewall deployment strategies
- IDS/IPS placement and configuration
- Load balancer security
- Proxy server implementation
Wireless Network Security (1 hour)
- Wireless Encryption Standards
- WEP, WPA, WPA2, and WPA3 comparison
- Enterprise vs. Personal mode implementation
- Encryption algorithm strengths and weaknesses
- Key management and distribution
- Wireless Attack Vectors
- Evil twin attacks
- Rogue access points
- Deauthentication attacks
- KRACK and other protocol vulnerabilities
- Jamming and interference
- Secure Wireless Implementation
- Site surveys and coverage planning
- 802.1X and RADIUS integration
- Captive portal security
- Guest network isolation
- Wireless IDS deployment
Afternoon Session (1pm-5pm)
Hands-on Lab: Network Security Implementation (2 hours)
- Lab 3: Firewall Configuration
- Implementing rule bases on hardware/software firewalls
- Configuring application layer filtering
- Testing and validating rule effectiveness
- Analyzing firewall logs
- Lab 4: Wireless Security Setup
- Configuring WPA2/WPA3 Enterprise
- Implementing 802.1X authentication
- Setting up RADIUS integration
- Testing secure wireless connections
Security Device Configuration (2 hours)
- Firewall Technologies
- Stateful vs. stateless inspection
- Next-generation firewall features
- Web application firewall configuration
- Firewall rule optimization
- High availability implementation
- Intrusion Detection/Prevention
- Signature-based detection configuration
- Anomaly-based detection tuning
- False positive management
- Alert prioritization
- IDS/IPS placement strategies
- SIEM Implementation
- Log collection and aggregation
- Correlation rule development
- Alert configuration
- Dashboard creation
- Incident response integration
Day 3: Identity and Access Management
Morning Session (9am-12pm)
Authentication Technologies (2 hours)
- Authentication Factors
- Something you know (passwords, PINs)
- Something you have (smart cards, tokens)
- Something you are (biometrics)
- Somewhere you are (geolocation)
- Something you do (behavioral biometrics)
- Multi-factor Authentication Implementation
- MFA deployment strategies
- Push notifications vs. OTP
- Hardware token integration
- Biometric authentication implementation
- Risk-based authentication
- Single Sign-On and Federation
- SAML implementation
- OAuth and OpenID Connect
- JWT token security
- Cross-domain authentication
- Trust relationships
Access Control Models (1 hour)
- Discretionary Access Control (DAC)
- Implementation techniques
- Ownership and delegation
- Permission inheritance
- DAC limitations
- Mandatory Access Control (MAC)
- Security labels and classifications
- SELinux implementation
- Rule-based access control
- MAC in high-security environments
- Role-Based Access Control (RBAC)
- Role engineering principles
- Role hierarchy design
- Separation of duties implementation
- Role lifecycle management
- Least privilege implementation
Afternoon Session (1pm-5pm)
Hands-on Lab: Identity Management (2 hours)
- Lab 5: Active Directory Security
- Implementing Group Policy Objects
- Setting up fine-grained password policies
- Configuring account lockout policies
- Implementing privileged access management
- Lab 6: MFA Implementation
- Configuring multi-factor authentication
- Testing various authentication factors
- Implementing application integration
- Troubleshooting authentication issues
Identity and Access Management Implementation (2 hours)
- Account Management
- User provisioning/de-provisioning
- Privileged account management
- Service account security
- Shared account policies
- Account recertification processes
- Directory Services Security
- Active Directory security hardening
- LDAP security implementation
- Directory replication security
- Schema security
- Administrative delegation
- Cloud Identity Management
- Azure AD/Entra ID implementation
- AWS IAM configuration
- Google Cloud IAM
- Cross-cloud identity federation
- Cloud privilege management
Day 4: Risk Management and Compliance
Morning Session (9am-12pm)
Risk Management Fundamentals (2 hours)
- Risk Assessment Methodologies
- Quantitative vs. qualitative analysis
- Threat modeling techniques (STRIDE, DREAD)
- Vulnerability scoring (CVSS)
- Asset valuation methodologies
- Risk calculation and prioritization
- Risk Treatment Options
- Accept, transfer, mitigate, avoid
- Cost-benefit analysis for controls
- Residual risk evaluation
- Risk treatment plans
- Risk ownership and accountability
- Business Impact Analysis
- Critical function identification
- Recovery time objectives (RTO)
- Recovery point objectives (RPO)
- Business continuity planning
- Disaster recovery strategy
Vulnerability Management (1 hour)
- Vulnerability Assessment Process
- Scanning methodology
- Authenticated vs. unauthenticated scanning
- Scan frequency determination
- Coverage and scope planning
- False positive management
- Penetration Testing
- Methodology and frameworks (OSSTMM, PTES)
- Rules of engagement
- Reconnaissance techniques
- Exploitation and post-exploitation
- Reporting and remediation
- Vulnerability Management Program
- Vulnerability prioritization
- Patch management process
- Remediation tracking
- Exception management
- Continuous monitoring
Afternoon Session (1pm-5pm)
Hands-on Lab: Risk Assessment (2 hours)
- Lab 7: Vulnerability Scanning
- Configuring vulnerability scanners
- Running comprehensive scans
- Analyzing scan results
- Prioritizing vulnerabilities
- Creating remediation plans
- Lab 8: Risk Assessment
- Asset inventory and valuation
- Threat identification
- Vulnerability analysis
- Risk scoring and prioritization
- Control recommendation development
Compliance and Governance (2 hours)
- Regulatory Frameworks
- GDPR requirements
- HIPAA security rule
- PCI DSS compliance
- FISMA/NIST framework
- ISO 27001 implementation
- Security Policies and Procedures
- Policy framework development
- Acceptable use policies
- Security awareness programs
- Incident response procedures
- Policy compliance monitoring
- Security Controls Assessment
- Control testing methodologies
- Evidence collection
- Control effectiveness evaluation
- Gap analysis techniques
- Control optimization
Day 5: Cryptography and Incident Response
Morning Session (9am-12pm)
Cryptography Fundamentals (2 hours)
- Cryptographic Concepts
- Symmetric vs. asymmetric encryption
- Hashing algorithms and applications
- Digital signatures implementation
- Key management principles
- Cryptographic attacks and defenses
- Public Key Infrastructure
- Certificate authorities
- Certificate lifecycle management
- Certificate validation
- CRL and OCSP implementation
- PKI deployment models
- Cryptographic Implementations
- Transport Layer Security (TLS)
- IPsec VPN configuration
- SSH secure implementation
- Disk encryption technologies
- Cryptographic hardware (HSMs, TPMs)
Incident Response (1 hour)
- Incident Response Process
- Preparation phase
- Identification techniques
- Containment strategies
- Eradication methods
- Recovery procedures
- Lessons learned process
- Digital Forensics
- Evidence collection and preservation
- Chain of custody documentation
- Forensic imaging techniques
- Memory analysis
- Timeline reconstruction
- Incident Response Tools
- SIEM integration
- Forensic toolkit utilization
- Network capture analysis
- Endpoint detection and response
- Threat intelligence integration
Afternoon Session (1pm-5pm)
Hands-on Lab: Security Incident Handling (2 hours)
- Lab 9: Cryptographic Implementation
- Configuring certificate services
- Implementing disk encryption
- Setting up secure communications
- Testing cryptographic implementations
- Lab 10: Incident Response Simulation
- Detecting security incidents
- Following incident response procedures
- Containing and investigating incidents
- Documenting incident response actions
- Creating after-action reports
Exam Preparation and Review (2 hours)
- Domain Review
- Comprehensive review of all six Security+ domains
- Addressing knowledge gaps
- Clarification of complex concepts
- Real-world application discussion
- Test-Taking Strategies
- Performance-based question approach
- Time management techniques
- Elimination strategies for multiple-choice
- Question interpretation skills
- Stress management
- Final Practice Examination
- 50-question practice test
- Question review and explanation
- Score analysis and feedback
- Final study plan development
- Post-course support options
Post-Course Resources
Study Materials
- CompTIA Security+ Study Guide (PDF and physical copy)
- 100+ flashcards covering key terms and concepts
- 3 complete practice exams with explanations
- Quick reference guides for all Security+ domains
Online Support
- 30 days access to instructor office hours
- Private discussion forum access
- Additional lab environment access
- Weekly review webinars
- One-on-one tutoring session (1 hour)
Exam Preparation
- Exam voucher with test scheduling assistance
- Exam objectives mapping document
- Personalized study plan based on practice test results
- Performance-based question simulator
- Test center information and preparation tips
Interested in an Online Class?
We offer online training delivered live by an expert instructor via webinar. All of our online certification courses offer the same curriculum as our face to face classes, but from the comfort and convenience of your home.
We Love Our Customers
See What Our Students Have to Say
Nate was a great instructor and really made the material accessible. The boot camp provided a ton of information, but was not overwhelming. I definitely feel well prepared for the exam after this course
Our Instructor kept us focused on the most important aspects of the program. He was very adept at helping students through the more complex techniques of the processes. I’m very pleased that I chose this course.
Why Choose Us for Your Security+ Boot Camp Training?
When choosing a training provider for your Security Plus Boot Camp, please consider, not all Security+ courses are the same. The quality of instruction in Security+ exam prep courses can vary significantly. Many courses do not fully prepare you for the exam, instead offering you a roadmap of what you need to learn on your own. When investing in your career you should never sacrifice quality for cost. If you review the key decision factors, we believe you will find Certification Academy provides the best value. We blend proven learning concepts with simple memorization techniques to make sure you are able to keep the vast amount of information we cover organized and memorable. Our Security+ Prep Boot Camp is an accelerated, guaranteed path to achieving your Security+ certification.
Our Proven 5-Step Exam Preparation Methodology:
1. Pre-Assessment • Comprehensive diagnostic test identifying your strengths and weaknesses • Personalized study plan based on assessment results • Topic prioritization aligned with current exam objectives
2. Focused Learning Modules • Topic-specific training aligned with the six Security+ domains • Case studies demonstrating real-world application • Knowledge checks validating comprehension
3. Hands-On Application • 12+ hands-on labs simulating real security scenarios • Performance-based question practice • Technical implementation of security concepts
4. Exam Simulation • 3 full-length practice exams mirroring actual test conditions • Question-by-question review sessions • Timed practice to build test-taking stamina
5. Final Preparation • Last-day review of challenging concepts • Test-taking strategies specific to CompTIA exams • Post-course study plan for the days leading to your exam
Here are a few more key reasons to join our class:
Blank
Experience
Thought Leadership
Proven Results
Rated 4.85/5 based on 1465 reviews
Firm Course Dates
100% Money Back Pass Guarantee
Upcoming Security+ Boot Camp Schedule
State | City | Location | Dates | Price | Status |
---|---|---|---|---|---|
Central Time | Live - Online | Remote - From Anywhere | Jun 2nd - Jun 6th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Jun 23rd - Jun 27th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Jul 21st - Jul 25th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Aug 18th - Aug 22nd | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Sep 15th - Sep 19th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Oct 20th - Oct 24th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Nov 10th - Nov 14th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Dec 8th - Dec 12th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Jan 5th - Jan 9th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Feb 2nd - Feb 6th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Mar 2nd - Mar 6th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Mar 30th - Apr 3rd | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Apr 27th - May 1st | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | May 25th - May 29th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Jun 22nd - Jun 26th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Jul 20th - Jul 24th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Aug 17th - Aug 21st | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Sep 14th - Sep 18th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Oct 12th - Oct 16th | $1,995 | |
Central Time | Live - Online | Remote - From Anywhere | Nov 9th - Nov 13th | $1,995 |
Benefits of Attending a Security+ Boot Camp
- Achieve Your Goal
- Retain More Information
- Stay Focused
- Connect Real World Experience
- Have Dedicated Support
It doesn’t matter what you’re preparing for; one thing is always true: it’s easier to plan it than to do it. When you spend your days making crucial decisions, your well-laid plans often fall victim to diminished self-discipline by nightfall. Sure, you know you should be studying, but that knowledge doesn’t make it any easier to summon the motivation to do it night after night. An accelerated in-person Security+ Certification Boot Camp takes the temptation to postpone test prep off of the table and, instead, gives you space to immerse yourself in the materials. Our courses are designed to remove the distractions of your everyday life so you can fully focus your time and attention on the coursework and be exam-ready in less time than if you’d studied on your own
Our 5 day Security+ Boot Camp gives you more than mere exposure to the fundamentals and concepts on the test. It provides a focused educational experience with a rigorous schedule. Throughout the course, you’ll talk through the concepts and situations with your instructor and peers so you can ground your learning and recall it when you need it.
Interacting with an expert instructor who can translate concepts into practical terms helps to ensure you grasp the content and lets you test your understanding. Studying with a group of your peers in a classroom environment can also help build and maintain your motivation for the exam. It’s easy to get distracted and lose focus when you’re alone at your desk with a book. Studying with others who share your goals can help keep you accountable and sustain or stimulate determination.
Your years of practical experience are the most valuable thing you bring to your role. Without them, you wouldn’t be qualified to sit for the Security+ exam in the first place. Distilling what you know from doing into the foundations and principles on the Security+ exam, however, can challenge even the most experienced project managers. Your Security+ Training Instructor will help you connect your experience to the exam materials, putting what you’ve learned on the job into context so you can apply it on the exam.
Your Security+ Certified trainer is an expert project manager with in depth understanding of the training materials but also in exam readiness. Every student who enrolls in and completes the Certification Academy Security+ Boot Camp receives one-on-one guidance from their trainer and an individualized learning plan based on their current proficiency and progress towards their education requirements.
One Last Note…
We stand behind our course and methodology. We want you to take the Security+ certification exam with the confidence and assurance that your investment in our Security+ Boot Camp has paid off. Deciding to enroll in a 5 Day Security+ Boot Camp class isn’t a decision you should make without having all of the information. If you can’t find the answers to your questions here, send us an email or give us a call. Our team is always happy to answer questions or provide additional information, whether you’re a student of ours or not.