Certificate from Great Learning
Upon successfully completing the Bootcamp, learners will receive a certificate of completion from Great Learning.
Build techniques to attempt CompTIA Security+ Certificate Examination
Comprehensive Curriculum
5-6 Hours
Weekly Learning Commitment
2
Mock Exams
The curriculum has been developed by distinguished faculty from Great Learning meet the evolving needs of the Cyber world. Learners will be taught using a combination of learning methods. These include bite-sized lecture videos, Instructor-led online classes with special emphasis on strategies needed to take a strong attempt at the CompTIA Security+ Certificate Examination.
- Differentiate between the types of security controls and their implementation
- Grasp the fundamental concepts of cybersecurity
- Understand change management processes and its impact on security
- Develop the ability to implement appropriate cryptographic solutions
- Types of Cybersecurity Controls
- CIA (Confidentiality, Integrity, and Availability) Triad
- Authentication, Authorization, and Accounting (AAA)
- Zero Trust
- Change management concepts
- Cryptography
- Blockchain
- Digital Signatures and certificates
- Evaluate common threat actors and their motivation
- Understand different types of threat actors, attack vectors and attack surfaces
- Recognize the security concerns associated with various types of vulnerabilities
- Learn to analyze indicators of malicious activities
- Assimilate mitigation techniques used to secure the enterprise.
- Types and attributes of Threat actors
- Attack Surfaces - Human Vectors, Unsecure Networks, Supply Chain vectors and Unsupported systems/applications
- Types of vulnerabilities
- Attacks on Application & Network
- Malware-based attacks
- Physical attacks
- Cryptographic attacks
- Mitigation Strategies
- Delve into the implications of different architecture models in the context of cybersecurity.
- Learn to apply security principles for securing enterprise infrastructure
- Understand data protection strategies
- Discover the importance of recovery and resilience in security architecture.
- Security implication of Cloud architecture, Network Infrastructure, Virtualization and Industrial COntrol Systems (ICS)
- Security Considerations in different architecture models
- Selection of effective controls
- Types and classification of data
- Methods to secure data
- Continuity of Operations
- Backups
- High availability
- Learn to apply common security techniques to computing resources
- Delve into the security implications of proper hardware, software, and data asset management.
- Explore vulnerability management activities
- Understand the usage of alerting and monitoring security technologies
- Discover techniques to modify security policies to enhance security
- Comprehend the techniques to implement and maintain identity and access management
- Grasp the importance of automation and orchestration related to secure operations
- Learn about implementing incident response activities
- Understand the usage of data sources to support an investigation
- Methods to Identify Vulnerabilities
- Vulnerability response and remediation
- Monitoring computing resources
- Cybersecurity tools and technologies - Firewall, IDS (Intrusion Detection System), IPS (Intrusion Prevention System), Email Security, Security Information And Event Management (SIEM), Data Loss Prevention (DLP)
- Identity access management
- Multifactor authentication
- Use cases of automation and scripting
- Incident response activities
- Event Logs and Data Sources
- Understand the measures required for effective security governance
- Learn about the elements of cybersecurity risk management
- Recognize the processes associated with third-party risk assessment and management.
- Understand the elements of effective security compliance
- Delve into the types and purposes of audits and assessments.
- Learn to implement security awareness practices
- Guidelines, Policies, Standards, and Procedures
- Risk Identification and Assessment
- Risk Management Strategies
- Third-party risk assessment and management
- Compliance Monitoring and reporting
- Internal and External Audits
- Security awareness practices.
Orientation
In this first week of the program you will receive access to the learning platform. Getting to know each other will be the highlight of this week. Great Learning’s team will help you get on board with the program.
Pre-Work (Optional)
For professionals seeking a career in cyber security, we have a special course to fortify the fundamentals of cyber security solutions. With a strong foundation, your learning journey in cyber security culminating in the CompTIA Security+ certification will be more streamlined.
Module 1: General Security Concepts
Key Takeaways
Topics
Module 2: Threats, Vulnerabilities, and Mitigations
Key Takeaways
Topics
Module 3: Security Architecture
Key Takeaways
Topics
Module 4: Security Operations
Key Takeaways
Topics
Module 5: Security Program Management and Oversight
Key Takeaways
Topics
Fees and Application Details
Program Fees:
1,800 USD
Benefits of learning with us
- 6-weeks online Bootcamp
- Online learning with personalized mentorship
- Instructor-led live classes
- Live doubt clearing with industry experts
- Certificate of completion from Great Learning
- Mind Maps to help you remember concepts
- Free Exam Voucher
Upcoming Application Deadline
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
Deadline: 18th Nov 2024
Reach out to us
We hope you had a good experience with us. If you haven’t received a satisfactory response to your queries or have any other issue to address, please email us at
help@mygreatlearning.comBatch Start Dates
Online
To be announced
(Limited seats available)