Course Outline - Please see below

Included in the course

  •  A course attendance certificate
  •  Tea and Biscuits during breaks
  • Lunch
  •  A notepad and pen
  •  A manual and datafiles

Course Code: SecurityPlus
Duration: 5.0 Day

In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.

Study Methods available for this course;

   Classroom Training    Onsite Training
   Mentored Learning   Correspondence
   Virtual Classroom Training    Part Time Training


Study Method:
Course Code:
Course Description:
No of Students:
Course Content

Lesson 1: Security Fundamentals
   Topic A: The Information Security Cycle
   Topic B: Information Security Controls
   Topic C: Authentication Methods
   Topic D: Cryptography Fundamentals
   Topic E: Security Policy Fundamentals

Lesson 2: Identifying Security Threats and Vulnerabilities
   Topic A: Social Engineering
   Topic B: Malware
   Topic C: Software-Based Threats
   Topic D: Network-Based Threats
   Topic E: Wireless Threats and Vulnerabilities
   Topic F: Physical Threats and Vulnerabilities

Lesson 3: Managing Data, Application, and Host Security
   Topic A: Manage Data Security
   Topic B: Manage Application Security
   Topic C: Manage Device and Host Security
   Topic D: Manage Mobile Security

Lesson 4: Implementing Network Security
   Topic A: Configure Security Parameters on Network Devices and Technologies
   Topic B: Network Design Elements and Components
   Topic C: Implement Networking Protocols and Services
   Topic D: Apply Secure Network Administration Principles
   Topic E: Secure Wireless Traffic

Lesson 5: Implementing Access Control, Authentication, and Account Management
   Topic A: Access Control and Authentication Services
   Topic B: Implement Account Management Security Controls

Lesson 6: Managing Certificates
   Topic A: Install a CA Hierarchy
   Topic B: Enroll Certificates
   Topic C: Secure Network Traffic by Using Certificates
   Topic D: Renew Certificates
   Topic E: Back Up and Restore Certificates and Private Keys
   Topic F: Revoke Certificates

Lesson 7: Implementing Compliance and Operational Security
   Topic A: Physical Security
   Topic B: Legal Compliance
   Topic C: Security Awareness and Training
   Topic D: Integrate Systems and Data with Third Parties

Lesson 8: Risk Management
   Topic A: Risk Analysis
   Topic B: Implement Vulnerability Assessment Tools and Techniques
   Topic C: Scan for Vulnerabilities
   Topic D: Mitigation and Deterrent Techniques

Lesson 9: Troubleshooting and Managing Security Incidents
   Topic A: Respond to Security Incidents
   Topic B: Recover from a Security Incident

Lesson 10: Business Continuity and Disaster Recovery Planning
   Topic A: Business Continuity
   Topic B: Plan for Disaster Recovery
   Topic C: Execute DRPs and Procedures

Target Student

Contact Information



Call Us
082 495 7483

Live Help

Live Help

Subscribe to our mailing list

* indicates required