Cyber Security Pathway
- Certification: CompTIA Security+
- Duration: 16 Weeks
- Delivery Model: Live Online Evening Classes - 1 Class per Week
- Cost: Interest Free payment plans available - Exam Licence Included
- Live Practical Labs Included
- Guaranteed Job Interview on Completion
4.2
/
5
in partnership with
What will you learn?
- Security controls: comparing technical, preventive, managerial, deterrent, operational, detective, physical, corrective, compensating, and directive controls.
- Fundamental concepts: summarizing confidentiality, integrity, and availability (CIA); non-repudiation; authentication, authorization, and accounting (AAA); zero trust; and deception/disruption technology.
- Change management: explaining business processes, technical implications, documentation, and version control.
- Cryptographic solutions: using public key infrastructure (PKI), encryption, obfuscation, hashing, digital signatures, and blockchain
- Threat actors and motivations: comparing nation-states, unskilled attackers, hacktivists, insider threats, organized crime, shadow IT, and motivations like data exfiltration, espionage, and financial gain.
- Threat vectors and attack surfaces: explaining message-based, unsecure networks, social engineering, file-based, voice call, supply chain, and vulnerable software vectors.
- Vulnerabilities: explaining application, hardware, mobile device, virtualization, operating system (OS)-based, cloud-specific, web-based, and supply chain vulnerabilities.
- Malicious activity: analyzing malware attacks, password attacks, application attacks, physical attacks, network attacks, and cryptographic attacks.
- Mitigation techniques: using segmentation, access control, configuration enforcement, hardening, isolation, and patching.
- Architecture models: comparing on-premises, cloud, virtualization, Internet of Things (IoT), industrial control systems (ICS), and infrastructure as code (IaC).
- Enterprise infrastructure: applying security principles to infrastructure considerations, control selection, and secure communication/access.
- Data protection: comparing data types, securing methods, general considerations, and classifications.
- Resilience and recovery: explaining high availability, site considerations, testing, power, platform diversity, backups, and continuity of operations
- Computing resources: applying secure baselines, mobile solutions, hardening, wireless security, application security, sandboxing, and monitoring.
- Asset management: explaining acquisition, disposal, assignment, and monitoring/tracking of hardware, software, and data assets.
- Vulnerability management: identifying, analyzing, remediating, validating, and reporting vulnerabilities.
- Alerting and monitoring: explaining monitoring tools and computing resource activities.
- Enterprise security: modifying firewalls, IDS/IPS, DNS filtering, DLP (data loss prevention), NAC (network access control), and EDR/XDR (endpoint/extended detection and response).
- Identity and access management: implementing provisioning, SSO (single sign-on), MFA (multifactor authentication), and privileged access tools.
- Automation and orchestration: explaining automation use cases, scripting benefits, and considerations.
- Incident response: implementing processes, training, testing, root cause analysis, threat hunting, and digital forensics.
- Data sources: using log data and other sources to support investigations.
- Security governance: summarizing guidelines, policies, standards, procedures, external considerations, monitoring, governance structures, and roles/responsibilities.
- Risk management: explaining risk identification, assessment, analysis, register, tolerance, appetite, strategies, reporting, and business impact analysis (BIA).
- Third-party risk: managing vendor assessment, selection, agreements, monitoring, questionnaires, and rules of engagement.
- Security compliance: summarizing compliance reporting, consequences of non-compliance, monitoring, and privacy.
- Audits and assessments: explaining attestation, internal/external audits, and penetration testing.
- Security awareness: implementing phishing training, anomalous behavior recognition, user guidance, reporting, and monitoring.
Our tutors are all industry leading professionals with extensive experience in their field. Our tutors continue to operate and lead in their industries which keeps our curriculum and course content up to date and aligned with employers expectations. You will also have access to our online learning platform , where you can contact your tutor directly between sessions.
All of our courses include accredited qualifications. We are authorised partners of CompTIA, AWS, Microsoft and the Chartered Institute of Marketing (CIM). To enhance your learning experience, we have also partnered with a specialist, industry leading Penetration Testing company; North Green Security.
Our team has a combined 30+ years of experience recruiting into the IT & Tech sector, with a sharp focus on early careers. Our network of employers and reputation in the industry enables us to guarantee an interview for everyone that completes their course and passes their exam. You will have full transparency over the recruitment process and the interview and job role will be specific to your skills and experience.
We strive to make our courses as accessible as possible. We have a range of part time, online delivery models to suit your current career and responsibilities. Whilst it's important for us to complete your qualification and fire up your career change as quickly as possible, we also want to fit in with your current schedule.
Our interest free, flexible payment plans are designed to make your career change as seamless as possible. If you don't want to pay in full, you can spread the cost over 3, 6, 9 or 12 interest free installments. There are no deposits, finance agreement or credit checks.