CompTIA Security+ | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CompTIA Security+

  • Public Class Icon
    Public Class
    • HRDF SBL Claimable
    • Lunch & refreshment provided
    • Certificate of Attendance available
    Starting From
    RM 3500.00
    5 Days
  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    5 Days

Course Details

Expand All

Upon completion of this program, participants should be able to:

  • Understand the security settings
  • Know how to encrypt and decrypt files
  • Know how to restore registry
  • Configure internet content access
  • Use P2P networks securely

IT Professional

A and network or equivalent knowledge, and six to nine month experience in Networking, including experience configuring and managing TCP/IP.

This program will be conducted with interactive lectures, PowerPoint presentation, discussions and practical exercise


Expand All
  • Identify social engineering attacks
  • Classify software attacks
  • Identify hardware attacks
  • Harden base operating systems
  • Harden directory services
  • Harden DHCP servers
  • Harden network file and print servers

  • Harden internet work connection devices
  • Harden DNS and BIND servers
  • Harden web servers
  • Harden FTP servers
  • Harden Network News Transport Protocol (NNTP) servers
  • Harden email servers
  • Harden conferencing and messaging servers
  • Secure Network Traffic Using IP Security(IPSec)
  • Secure wireless traffic
  • Secure client internet access
  • Secure the remote access channel
  • Install a Certificate Authority (CA) hierarchy
  • Harden a Certificate Authority
  • Back up Certificate Authorities
  • Restore a Certificate Authority
  • Enroll certificates for entities
  • Secure network traffic using certificates
  • Renew certificates
  • Revoke certificates
  • Back up certificates and private keys
  • Restore certificates and private keys
  • Enforce corporate security policy compliance
  • Enforce legal compliance
  • Enforce physical security compliance
  • Educate users
  • Scan for vulnerabilities
  • Monitor for intruders
  • Set up a Honeypot
  • Respond to security Incidents


See All


based on 11 ratings reviews