CompTIA Security+ | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CompTIA Security+


Format What’s this?
Starting From
RM 3500.00
  1. 5 Day with 08 hours per day
  1. Mon 08 Nov 09:00 - Fri 12 Nov 17:00
  1. HRDF SBL Claimable
  2. Certificate of Attendance available
  1. 5 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.
Request more information

Inquiry for: Myself    My Company

By providing your contact details, you agree to our Privacy Policy




Thank You

Our learning consultant will get back to you in 1 business day

CompTIA Security+


The Official CompTIA Security+ Student Guide (SY0-601) has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated to validate coverage of the CompTIA Security+ (SY0-601) exam objectives, The Official CompTIA Security+ Student Guide teaches the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.


This program will be conducted with interactive lectures, PowerPoint presentation, discussions, and practical exercise.

Expand All


Module 1: Comparing Security Roles and Controls

• Topic 1A: Compare and Contrast Information Security Roles

• Topic 1B: Compare and Contrast Security Control and Framework

Module 2: Explaining Threat Actors and Threat Intelligence

• Topic 2A: Explain Threat Actor Types and Attack

Module 3: Performing Security Assessments

• Topic 3A: Assess Organizational Security with Network Reconnaissance Tools

• Topic 3B: Explain Security Concerns with General Vulnerability Types

• Topic 3C: Summarize Vulnerability Scanning Techniques

• Topic 3D: Explain Penetration Testing

Module 4: Identifying Social Engineering and Malware

• Topic 4A: Compare and Contrast Social Engineering Techniques

• Topic 4B: Analyze Indicators of Malware-Based

Module 5: Summarizing Basic Cryptographic Concepts

• Topic 5A: Compare and Contrast Cryptographic Ciphers

• Topic 5B: Summarize Cryptographic Modes of Operation

• Topic 5C: Summarize Cryptographic Use Cases and Weaknesses

• Topic 5D: Summarize Other Cryptographic

Module 6: Implementing Public Key Infrastructure

• Topic 6A: Implement Certificates and Certificate Authorities

• Topic 6B: Implement PKI.

Module 7: Implementing Authentication Controls

• Topic 7A: Summarize Authentication Design Concepts

• Topic 7B: Implement Knowledge-Based Authentication

• Topic 7C: Implement Authentication Technologies

• Topic 7D: Summarize Biometrics Authentication Concepts

Module 8: Implementing Identity and Account Management Controls

• Topic 8A: Implement Identity and Account Types

• Exam objectives covered:

o Topic 8B: Implement Account Policies

o Topic 8C: Implement Authorization Solutions

o Topic 8D: Explain the Importance of Personnel Policies

Module 9: Implementing Secure Network Designs

• Topic 9A: Implement Secure Network Designs

• Topic 9B: Implement Secure Switching and Routing

• Topic 9C: Implement Secure Wireless Infrastructure

• Topic 9D: Implement Load Balancers

Module 10: Implementing Network Security Appliances

• Topic 10A: Implement Firewalls and Proxy Servers

• Topic 10B: Implement Network Security Monitoring

• Topic 10C: Summarize the Use of SIEM

Module 11: Implementing Secure Network Protocols

• Topic 11A: Implement Secure Network Operations Protocols

• Topic 11B: Implement Secure Application Protocols

• Topic 11C: Implement Secure Remote Access Protocols

Module 12: Implementing Host Security Solutions

• Topic 12A: Implement Secure Firmware

• Topic 12B: Implement Endpoint Security

• Topic 12C: Explain Embedded System Security Implications

Module 13: Implementing Secure Mobile Solutions

• Topic 13A: Implement Mobile Device Management

• Topic 13B: Implement Secure Mobile Device Connections

Module 14: Summarizing Secure Application Concepts

• Topic 14A: Analyze Indicators of Application Attacks

• Topic 14B: Analyze Indicators of Web Application Attacks

• Topic 14C: Summarize Secure Coding Practices

• Topic 14D: Implement Secure Script Environments

• Topic 14E: Summarize Deployment and Automation Concepts

Module 15: Implementing Secure Cloud Solutions

• Topic 15A: Summarize Secure Cloud and Virtualization Services

• Topic 15B: Apply Cloud Security Solutions

• Topic 15C: Summarize Infrastructure as Code Concepts

Module 16: Explaining Data Privacy and Protection Concepts

• Topic 16A: Explain Privacy and Data Sensitivity Concepts

• Topic 16B: Explain Privacy and Data Protection Controls

Module 17: Performing Incident Response

• Topic 17A: Summarize Incident Response Procedures

• Topic 17B: Utilize Appropriate Data Sources for Incident Response

• Topic 17C: Apply Mitigation Controls

Module 18: Explaining Digital Forensics

• Topic 18A: Explain Key Aspects of Digital Forensics Documentation

• Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

Module 19: Summarizing Risk Management Concepts
Module 20: Implementing Cybersecurity Resilience

• Topic 20A: Implement Redundancy Strategies

• Topic 20B: Implement Backup Strategies

• Topic 20C: Implement Cybersecurity Resiliency Strategies

Module 21: Explaining Physical Security

• Topic 21A: Explain the Importance of Physical Site Security Controls

• Topic 21B: Explain the Importance of Physical Host Security Controls

Mohd Adam Kane

Mohd Adam Kane

Started training in early 1997 after returning from Singapore and have been actively participating in IT projects and consultation while conducting freelance training. He was a Senior Trainer with Info Trek focus on Unified Communications, Messaging Infrastructure, Network Infrastructure Management and Microsoft Server Systems.He brings to the classroom for all to share his many years of experience in project roll out and consultancy such as Operating System Migration, Messaging Infrastructure Deployment & Migration, System Center Deployment, Data Center Planning & Management, Identity Management, Unified Communication Implementation, Disaster Recovery, Fibre Network Implementation, High Availability Deployment and Network Management. Read More

Faisal Mahmood

Faisal Mahmood

Faisal holds a M.B.A (Marketing), American International College Labore, MIT (3rd Semester) in Virtual University Lahore and B.COM in Punjab University Lahore. He is a Cisco and networking professional with broad experience in managing IT services, training, and end-user support. Read More

Ravendran s/o Subramaniam

Ravendran s/o Subramaniam

Ravendran Subramaniam has been involved in Cisco Network since 2002, doing setup Cisco router and switch network setup for companies. He freelances for various training centers such as Info Trek, Slanix Computer Base, Redynamics, Global Knowledge and many others. Read More

K L Ramasankara Rao

K L Ramasankara Rao

A highly competent and experienced systems and security implementation specialist and instructor with experience of system and security administration. Possessing a proven ability to impart the necessary knowledge and skills to IT professionals necessary for them to manage the day-to-day running of an IT department and its business IT systems. Extensive knowledge of monitoring and controlling data security within guidelines to ensure compliance and report on possible improvements. Well mannered, articulate and able to act as point of contact for colleagues and external clients. As a CCIE in Data Center, managing of data center networks are through software defined networks (SD-WAN) and through Implementing Cisco Network Programmability. Read More

Course Reviews

No Remarks


0 Ratings