We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers


CompTIA Security+

Group Training + View more dates & times


Accelerated 5-Day Training Course (Enter EARLY10 for 10% off!)

In the Accelerated 5-Day CompTIA Security+ Certification Course, you will build on your knowledge and professional experience with CompTIA certification fundamentals, networks, and organizational CompTIA security training as you acquire the specific skills required to implement basic security services on any type of computer network. The course prepares students for CompTIA Security+ exam and includes an exam voucher.

Extended 10-Day Training Course (Enter EARLY250 for $250 Off!)

We are now offering an Extended 10-Day course option! Gain a deeper understanding of the course concepts and increase your preparedness for the exam at the end of the course by choosing the longer course.

How Our CompTIA Security+ Training Benefits You:

  • It will prepare you for the CompTIA Security+ (Exam SY0-601) Certification examination
  • The CompTIA certification also provides you with the demonstrable skills required in today’s job market
  • You will acquire the cyber security certification and skill set to perform duties for any security-related professional role
  • This CompTIA certification class meets the requirements for IAT Level 2 and IAM Level 1 in the DoD Directive 8570

CompTIA Security+ Certification Prerequisites

CompTIA A+ and Network+ certifications, or equivalent knowledge / experience.

Who Should Enroll In Security+ Certification Training?

The Extended 10-Day CompTIA Security+ Training Course is ideal for individuals who are new to the field of networking or have limited prior knowledge and want additional time to grasp the foundational concepts. The Accelerated 5-Day option is great for individuals with some previous exposure to concepts in cybersecurity.

The CompTIA Security+ course provides the required skills to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. These roles greatly benefit:

  • Systems Administrators
  • Network Administrators
  • Security Administrators
  • Specialists
  • Engineers


Accelerated 5-Day Training Course (Enter EARLY10 for 10% off!)

Extended 10-Day Training Course (Enter EARLY250 for $250 Off!)

CompTIA Security+ Certification & Training Resources

Course Outline

CompTIA Security+ (SY0-601) Course Outline


Lesson 1: Comparing Security Roles and Security Controls

  • Topic A: Compare and Contrast Information Security Roles
  • Topic B: Compare and Contrast Security Control and Framework Types


Lesson 2: Explaining Threat Actors and Threat Intelligence

  • Topic A: Explain Threat Actor Types and Attack Vectors
  • Topic B: Explain Threat Intelligence Sources


Lesson 3: Performing Security Assessments

  • Topic A: Assess Organizational Security with Network Reconnaissance Tools
  • Topic B: Explain Security Concerns with General Vulnerability Types
  • Topic C: Summarize Vulnerability Scanning Techniques
  • Topic D: Explain Penetration Testing Concepts


Lesson 4: Identifying Social Engineering and Malware

  • Topic A: Compare and Contrast Social Engineering Techniques
  • Topic B: Analyze Indicators of Malware-Based Attacks


Lesson 5: Summarizing Basic Cryptographic Concepts

  • Topic A: Compare and Contrast Cryptographic Ciphers
  • Topic B: Summarize Cryptographic Modes of Operation
  • Topic C: Summarize Cryptographic Use Cases and Weaknesses
  • Topic D: Summarize Other Cryptographic Technologies


Lesson 6: Implementing Public Key Infrastructure

  • Topic A: Implement Certificates and Certificate Authorities
  • Topic B: Implement PKI Management


Lesson 7: Implementing Authentication Controls

  • Topic A: Summarize Authentication Design Concepts
  • Topic B: Implement Knowledge-Based Authentication
  • Topic C: Implement Authentication Technologies
  • Topic D: Summarize Biometrics Authentication Concepts


Lesson 8: Implementing Identity and Account Management Controls

  • Topic A: Implement Identity and Account Types
  • Topic B: Implement Account Policies
  • Topic C: Implement Authorization Solutions
  • Topic D: Explain the Importance of Personnel Policies


Lesson 9: Implementing Secure Network Designs

  • Topic A: Implement Secure Network Designs
  • Topic B: Implement Secure Switching and Routing
  • Topic C: Implement Secure Wireless Infrastructure
  • Topic D: Implement Load Balancers


Lesson 10: Implementing Network Security Appliances

  • Topic A: Implement Firewalls and Proxy Servers
  • Topic B: Implement Network Security Monitoring
  • Topic C: Summarize the Use of SIEM


Lesson 11: Implementing Secure Network Protocols

  • Topic A: Implement Secure Network Operations Protocols
  • Topic B: Implement Secure Application Protocols
  • Topic C: Implement Secure Remote Access Protocols


Lesson 12: Implementing Host Security Solutions

  • Topic A: Implement Secure Firmware
  • Topic B: Implement Endpoint Security
  • Topic C: Explain Embedded System Security Implications


Lesson 13: Implementing Secure Mobile Solutions

  • Topic A: Implement Mobile Device Management
  • Topic B: Implement Secure Mobile Device Connections


Lesson 14: Summarizing Secure Application Concepts

  • Topic A: Analyze Indicators of Application Attacks
  • Topic B: Analyze Indicators of Web Application Attacks
  • Topic C: Summarize Secure Coding Practices
  • Topic D: Implement Secure Script Environments
  • Topic E: Summarize Deployment and Automation Concepts


Lesson 15: Implementing Secure Cloud Solutions

  • Topic A: Summarize Secure Cloud and Virtualization Services
  • Topic B: Apply Cloud Security Solutions
  • Topic C: Summarize Infrastructure as Code Concepts


Lesson 16: Explaining Data Privacy and Protection Concepts

  • Topic A: Explain Privacy and Data Sensitivity Concepts
  • Topic B: Explain Privacy and Data Protection Controls


Lesson 17: Performing Incident Response

  • Topic A: Summarize Incident Response Procedures
  • Topic B: Utilize Appropriate Data Sources for Incident Response
  • Topic C: Apply Mitigation Controls


Lesson 18: Explaining Digital Forensics

  • Topic A: Explain Key Aspects of Digital Forensics Documentation
  • Topic B: Explain Key Aspects of Digital Forensics Evidence Acquisition


Lesson 19: Summarizing Risk Management Concepts

  • Topic A: Explain Risk Management Processes and Concepts
  • Topic B: Explain Business Impact Analysis Concepts


Lesson 20: Implementing Cybersecurity Resilience

  • Topic A: Implement Redundancy Strategies
  • Topic B: Implement Backup Strategies
  • Topic C: Implement Cybersecurity Resiliency Strategies


Lesson 21: Explaining Physical Security

  • Topic A: Explain the Importance of Physical Site Security Controls
  • Topic B: Explain the Importance of Physical Host Security Controls
Is there a discount available for current students?

UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Online courses are excluded from this offer.

What is the cancellation and refund policy?

Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.

Contact Us