CompTIA Security+ Courses

CompTIA Security+ Courses in Cape Town

2KO Africa is a professional training company, delivering cutting edge programs in the IT space and in selected business applications. Our training is offered online, live online and also by instructor led classes. 2KO Africa's business courses are available world-wide, many of them leading to European Certification, enabling 2KO students the opportunity to study courses online world-wide, to ensure the CompTIA Security+ training.

The CompTIA Security+ course is intended to assist you in preparing for the SY0 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.



Module 1: Security Fundamentals
Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals

Module 2: Security Threats and Vulnerabilities
Social Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats

Module 3: Network Security

Network Devices and Technologies

Network Design Elements and Components

Implement Networking Protocols

Apply Network Security Administration Principles

Secure Wireless Traffic


Module 4: Managing Application, Data and Host Security

Establish Device/Host Security

Application Security

Data Security

Mobile Security


Module 5: Access Control, Authentication, and Account Management

Access Control and Authentication Services

Implement Account Management Security Controls


Module 6: Managing Certificates

Install a Certificate Authority (CA) Hierarchy

Enroll Certificates

Secure Network Traffic by Using Certificates

Renew Certificates

Revoke Certificates

Back Up and Restore Certificates and Private Keys

Restore Certificates and Private Keys


Module 7: Compliance and Operational Security

Physical Security

Legal Compliance

Security Awareness and Training


Module 8: Risk Management

Risk Analysis

Implement Vulnerability Assessment Tools and Techniques

Scan for Vulnerabilities

Mitigation and Deterrent Techniques


Module 9: Managing Security Incidents

Respond to Security Incidents

Recover from a Security Incident


Module 10: Business Continuity and Disaster Recovery Planning

Business Continuity

Plan for Disaster Recovery

Execute Disaster Recovery Plans and Procedure