Boost logo
Language
course | CompTIA Security+

We turn your development needs and aspirations into powerful digital solutions that drive growth

IT-1028 | CompTIA Security+

Course Sector : Information Technology

Duration
Date from
Date to Course Venue Course fees Book a course
5 Days2025-05-192025-05-23Dubai$4,250 Book now
5 Days2025-07-282025-08-01Cape Town$4,950 Book now
5 Days2025-12-222025-12-26Abu Dhabi$4,250 Book now
5 Days2025-10-202025-10-24Dubai$4,250 Book now

Course Introduction

This CompTIA Server+ training course is designed to provide participants with the fundamental knowledge necessary to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam (SY0-501). This course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.

 

Course objective

  • Proactively implement sound security protocols to mitigate security risks
  • Quickly respond to security issues
  • Retroactively identify where security breaches may have occurred
  • Design a network, on-site or in the cloud, with security in mind

Course Outline | Day 01

Chapter 1: Security Fundamentals
Module A: Security concepts
  •        Module B: Risk management
  •        Module C: Vulnerability assessment

Chapter 2: Understanding attacks

  •       Module A: Understanding attackers
  •         Module B: Social engineering
  •         Module C: Malware
  •         Module D: Network attacks
  •         Module E: Application attacks

Chapter 3: Cryptography

  •       Module A: Cryptography concepts
  •     Module B: Public key infrastructure


Chapter 4: Network fundamentals

  •        Module A: Network components
  •         Module B: Network addressing
  •         Module C: Network ports and applications

Course Outline | Day 02

Chapter 5: Securing networks

  •    Module A: Network security components
  •         Module B: Transport encryption
  •         Module C: Hardening networks
  •         Module D: Monitoring and detection


Chapter 6: Securing hosts and data

  •         Module A: Securing hosts
  •         Module B: Securing data
  •         Module C: Mobile device security

Chapter 7: Securing network services

  •         Module A: Securing applications
  •         Module B: Virtual and cloud systems


Chapter 8: Authentication

  •       Module A: Authentication factors
  •       Module B: Authentication protocols

Course Outline | Day 03

Chapter 9: Access control

  •         Module A: Access control principles
  •       Module B: Account management


Chapter 10: Organizational security

  • Module A: Security policies
  •        Module B: User training
  •         Module C: Physical security and safety

Chapter 11: Disaster planning and recovery

  •      Module A: Business continuity
  •        Module B: Fault tolerance and recovery
  •         Module C: Incident response
  • LABS

Chapter 1: Understanding Attacks

  •         Examining Phishing Attacks
  •         Examining Malware
  •         Probing a Site
  •         Simulating a DOS Attack
  •         Cracking Passwords
  •         Simulating an Eavesdropping Attack
  •         Exploring Application Vulnerabilities
  •         Examining SQL Injection Attacks
  •         Examining Client-side Attacks

Course Outline | Day 04

Chapter 2: Cryptography

  •       Symmetric Encryption
  •         Asymmetric Encryption
  •         Creating File Hashes
  •         Installing a Certificate Authority

Chapter 3: Network Fundamentals

  • Using TCP/IP Tools

Chapter 4: Securing the Network

  • Configuring a Firewall
  •         Examining Website Certificates
  •        Securing a WAP
  •       Viewing Event Logs
  •       Scanning the Network

Chapter 5: Securing Hosts and Data

  •         Enabling BitLocker

Course Outline | Day 05

Chapter 6: Securing Network Services

  •         Finding Vulnerable Code


Chapter 7: Authentication

  •       Installing a RADIUS Server
  •         Examining Active Directory
Chapter 8: Access Control

 

  •       Managing NTFS Permissions
  •         Managing Active Directory Objects
  •       Using Group Policy Objects
  •         Creating a Security Template

Chapter 9: Disaster planning and recovery

  •         Using Windows Server Backup
Course Certificates
BOOST Logo

BOOST’s Professional Attendance Certificate “BPAC”

BPAC is always given to the delegates after completing the training course,and depends on their attendance of the program at a rate of no less than 80%,besides their active participation and engagement during the program sessions.

Request a Quote
Follow us
facebook iconinstagram iconlinkedIn icontwitter icon
BOOST Logo

Since 2001, we have been pioneering the training field in the Middle East, helping individuals, teams, and organizations reach their full potential with integrated solutions.

left

🔗 Quick Links

Boost Abroad logoSparks logo

Sister Companies to Boost Consulting and Training

Training Image 1Training Image 2Training Image 3Training Image 4Training Image 5Training Image 6

We believe in progress for everyone.

We helped more than 10,000 clients over 20 countries on 4 continents in boosting their knowledge, skills, and careers.

Copy rights

Boost Training And Consulting All Copyrights Reserved 2025