CompTIA Security+ Course Details

  • Security Fundamentals
  • Threat Management and Cybersecurity Resources
  • Threats and Attacks on Endpoints
  • Endpoint and Application Development Security
  • Cryptography
  • Public Key Infrastructure and Cryptographic Protocols
  • Mobile, Embedded, and Specialized Device Security
  • Networking Threats, Assessments, and Defenses
  • Network Security Appliances and Technologies
  • Cloud and Virtualization Security
  • Network Threats, Assessments, and Defenses
  • Authentication
  • Incident Preparation, Response, and Investigation
  • Cybersecurity Resilience
  • Risk Management and Data Privacy
  • Preparing for the Certificate Exam

CompTIA Security+ Certification Exam Details

EXAM OBJECTIVES (DOMAINS)PERCENTAGE OF EXAMINATION
General Security Concepts 12%
Threats, Vulnerabilities & Mitigations 22%
Security Architecture 18%
Security Operations 28%
Security Program Management & Oversight 20%

TOTAL: 100%

General Security Concepts 12%

  • Compare and contrast various types of security controls.
  • Summarise fundamental security concepts.
  • Explain the importance of change management processes and the impact to security.
  • Explain the importance of using appropriate cryptographic solutions.

Threats, Vulnerabilities & Mitigations 22%

  • Compare and contrast common threat actors and motivations.
  • Explain common threat vectors and attack surfaces.
  • Explain various types of vulnerabilities.
  • Given a scenario, analyse indicators of malicious activity.
  • Explain the purpose of mitigation techniques used to secure the enterprise.

Security Architecture 18%

  • Compare and contrast security implications of different architecture models.
  • Given a scenario, apply security principles to secure enterprise infrastructure.
  • Compare and contrast concepts and strategies to protect data.
  • Explain the importance of resilience and recovery in security architecture.

Security Operations 28%

  • Given a scenario, apply common security techniques to computing resources.
  • Explain the security implications of proper hardware, software, and data asset management.
  • Explain various activities associated with vulnerability management.
  • Explain security alerting and monitoring concepts and tools.
  • Given a scenario, modify Enterprise capabilities to enhance security.
  • Given a scenario, implement and maintain identity and access management.
  • Explain the importance of automation and orchestration related to secure operations.
  • Explain appropriate incident response activities.
  • Given a scenario, use data sources to support an investigation.

Security Program Management & Oversight 20%

  • Summarize elements of effective security governance.
  • Explain elements of the risk management process.
  • Explain the processes associated with third-party risk assessment and management.
  • Summarise elements of effective security compliance.
  • Explain types and purposes of audits and assessments.
  • Given a scenario, implement security awareness practices.