- Differentiate between the types of security controls and their implementation
- Grasp the fundamental concepts of cybersecurity
- Understand change management processes and its impact on security
- Develop the ability to implement appropriate cryptographic solutions
Quick Facts
particular | details | ||||
---|---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Learning efforts
5-6 Hours Per Week
|
Course and certificate fees
Fees information
₹ 80,000
The fees for course CompTIA Security Plus Bootcamp is -
Head | Amount |
Programme fees | Rs. 80,000 + GST |
certificate availability
Yes
certificate providing authority
Great Learning
The syllabus
Orientation
Pre-Work (Optional)
Module 1: General Security Concepts
Module 2: Threats, Vulnerabilities, and Mitigations
- Evaluate common threat actors and their motivation
- Understand different types of threat actors, attack vectors and attack surfaces
- Recognize the security concerns associated with various types of vulnerabilities
- Learn to analyze indicators of malicious activities
- Assimilate mitigation techniques used to secure the enterprise.
Module 3: Security Architecture
- Delve into the implications of different architecture models in the context of cybersecurity.
- Learn to apply security principles for securing enterprise infrastructure
- Understand data protection strategies
- Discover the importance of recovery and resilience in security architecture.
Module 4: Security Operations
- Learn to apply common security techniques to computing resources
- Delve into the security implications of proper hardware, software, and data asset management.
- Explore vulnerability management activities
- Understand the usage of alerting and monitoring security technologies
- Discover techniques to modify security policies to enhance security
- Comprehend the techniques to implement and maintain identity and access management
- Grasp the importance of automation and orchestration related to secure operations
- Learn about implementing incident response activities
- Understand the usage of data sources to support an investigation
Module 5: Security Program Management and Oversight
- Understand the measures required for effective security governance
- Learn about the elements of cybersecurity risk management
- Recognize the processes associated with third-party risk assessment and management.
- Understand the elements of effective security compliance
- Delve into the types and purposes of audits and assessments.
- Learn to implement security awareness practices
Instructors
Articles
Popular Articles
prev
next
Latest Articles
prev
next