Speak to an advisor602-266-6630

CompTIA Security+ Certification

Security+ is government approved
CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Security+ is globally recognized
CompTIA Security+ is a globally recognized credential with certified professionals working in over 147 countries throughout the world.

Security+ provides substantial earnings potential
According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers earn over $86,000 per year.

Security+ is industry supported
Security+ is developed and maintained by leading IT experts. Content for the exams stems from a combination of industry-wide survey feedback and contributions from our team of subject matter experts. Learn more about the people behind the CompTIA Security+ Advisory Committee.

speak to an advisor
Add To Cart

About this Course

Students will acquire skills to successfully pass the CompTIA Security+ exam.  CSI will train students using CompTIA’s approved curriculum, combining essential and lab on the days of training scheduled per week.  Students will use an industry recognized textbook combined with hands-on instruction.  Students will have a full understanding of computer security, wired and wireless along with non-PC wireless devices.

Completion Requirements: 96 hours of training and passing final exam with an 80% or better.

Course Syllabus

Security+ Course Outline

Orientation: Going over the manual, Setting Students Expectations, Classroom Setup, Support

Chapter 1: Mitigating threats: System Maintenance, Application Security, Physical Security, Malware, Social Engineering

Chapter 2: Cryptograph: Symmetric Cryptography, Public Key Cryptograph

Chapter 3: Authentication: Authentication Factors and Requirements, Authentication Systems and Vulnerabilities

Chapter 4: User – and role-based security: Baseline Security Policies, Resource Access

Chapter 5: Peripheral Security: File and Disk Encryption, Peripheral and Component Security, Mobile Device Security

Chapter 6: Public Key Infrastructure: Public Key Cryptography, Implementing, Public Key Infrastructure, Web Server Security with PKI

Chapter 7: Application and Message Security: Application Security, Email Security, Social Networking and Messaging

Chapter 8: Ports and Protocols: TCP/IP Basics, Protocol-Based Attacks

Chapter 9: Network Security: Network Device, Secure Network Topologies, Secure Networking, Virtualization and Cloud Computing

Chapter 10: Wireless Security: Wireless Network Security, Mobile Device Security

Chapter 11: Remote Access Security: Remote Access, Virtual Private Networking

Chapter 12: Vulnerability Testing and Monitoring: Risk and Vulnerability Assessment, Auditing and Logging, Intrusion Detection and Prevention Systems, Incident Response

Chapter 13: Organizational Security: Organizational Policies, Education and Training, Disposal and Destruction

Chapter 14: Business Continuity: Business Continuity Planning, Disaster Recovery, Environment Controls

Review for Exam and Final Exam


Lecture and Lab time is scheduled on a weekly basis.

Weekly assessments must be passed with an 80% or better or must be retaken immediately following results.