Certificate from Great Learning
Upon successfully completing the Bootcamp, learners will receive a certificate of completion from Great Learning.
Build techniques to attempt CompTIA Security+ Certificate Examination
Comprehensive Curriculum
5-6 Hours
Weekly Learning Commitment
2
Mock Exams
The curriculum has been developed by distinguished faculty from Great Learning meet the evolving needs of the Cyber world. Learners will be taught using a combination of learning methods. These include bite-sized lecture videos, Instructor-led online classes with special emphasis on strategies needed to take a strong attempt at the CompTIA Security+ Certificate Examination.
- Compare and contrast different types of social engineering techniques
- Given a scenario, analyze potential indicators to determine the type of attack
- Given a scenario, analyze potential indicators associated with application attacks
- Given a scenario, analyze potential indicators associated with network attacks
- Explain different threat actors, vectors, and intelligence sources
- Explain the security concerns associated with various types of vulnerabilities
- Summarize the techniques used in security assessments
- Explain the techniques used in penetration testing
- Types of social engineering techniques
- Indicators of attacks on applications and networks
- Threat actors, vectors, and intelligence sources
- Security concerns associated with various types of vulnerabilities
- Techniques used in security assessments
- Techniques used in penetration testing
- Explain the importance of security concepts in an enterprise environment
- Summarize virtualization and cloud computing concepts
- Summarize secure application development, deployment, and automation concepts
- Summarize authentication and authorization design concepts
- Given a scenario, implement cybersecurity resilience
- Explain the security implications of embedded and specialized systems
- Explain the importance of physical security controls
- Summarize the basics of cryptographic concepts
- Basics of cryptography
- Security in an enterprise environment
- Virtualization and cloud computing
- Secure application development, deployment, and automation
- Authentication and authorization design
- Implementing cybersecurity resilience
- Security implications of embedded and specialized systems
- Physical security controls
- Given a scenario, implement secure protocols
- Given a scenario, implement host or application security solutions
- Given a scenario, implement secure network designs
- Given a scenario, install and configure wireless security settings
- Given a scenario, implement secure mobile solutions
- Given a scenario, apply cybersecurity solutions to the cloud
- Given a scenario, implement identity and account management controls
- Given a scenario, implement authentication and authorization solutions
- Given a scenario, implement public key infrastructure
- Implementing secure protocols
- Implementing host or application security solutions
- Implementing secure network designs
- Install and configure wireless security settings
- Implementing secure mobile solutions
- Cybersecurity solutions for the cloud
- Implementing identity and account management controls
- Implementing authentication and authorization solutions
- Implementing public key infrastructure
- Given a scenario, use the appropriate tool to assess organizational security
- Summarize the importance of policies, processes, and procedures for incident response
- Given an incident, utilize appropriate data sources to support an investigation
- Given an incident, apply mitigation techniques or controls to secure an environment
- Explain the key aspects of digital forensics
- Tools for assessing organizational security
- Policies, processes, and procedures for incident response
- Data sources for an investigation
- Applying mitigation techniques and controls
- Digital forensics
- Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
- Explain the importance of policies to organizational security
- Summarize risk management processes and concepts
- Explain privacy and sensitive data concepts in relation to security
- Types of controls
- Regulations, standards, and frameworks
- Policies for organizational security
- Risk management processes
- Data privacy and sensitive data
Orientation
In this first week of the program you will receive access to the learning platform. Getting to know each other will be the highlight of this week. Great Learning’s team will help you get on board with the program.
Pre-Work (Optional)
For professionals seeking a career in cyber security, we have a special course to fortify the fundamentals of cyber security solutions. With a strong foundation, your learning journey in cyber security culminating in the CompTIA Security+ certification will be more streamlined.
Module 1: Attacks, Threats, and Vulnerabilities
Key Takeaways
Topics
Module 2: Architecture and Design
Key Takeaways
Topics
Module 3: Implementation
Key Takeaways
Topics
Module 4: Operations and Incident Response
Key Takeaways
Topics
Module 5: Governance Risk & Compliance
Key Takeaways
Topics
Fees and Application Details
Program Fees:
1,800 USD
Benefits of learning with us
- 6-weeks online Bootcamp
- Online learning with personalized mentorship
- Instructor-led live classes
- Live doubt clearing with industry experts
- Certificate of completion from Great Learning
- Mind Maps to help you remember concepts
- Free Exam Voucher
Upcoming Application Deadline
Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.
Deadline: 11th Mar 2024
Reach out to us
We hope you had a good experience with us. If you haven’t received a satisfactory response to your queries or have any other issue to address, please email us at
help@mygreatlearning.comBatch Start Dates
Online
To be announced
(Limited seats available)
Still Have Questions?
Contact Us
Please fill in the form and a program advisor will reach out to you. You can also reach out to us at
+1 512-212-4186
Download Brochure
Check out the program and fee details in our brochure
Thanks for your interest!
An advisor will be reaching out to you soon.