CompTIA Security + (SYO - 601)

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Instructor: M. ZEESHAN MOTIWALA
Last updated Thu, 09-Jun-2022
+ View more
Course overview

Course Description

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Cybersecurity attacks continue to grow. Increasingly, more job roles are tasked with baseline security readiness and response to address today’s threats. Updates to Security+ reflect skills relevant to these job roles and prepare candidates to be more proactive in preventing the next attack. To combat these emerging threats, IT Pros must be able to:

  • Help identify attacks and vulnerabilities to mitigate them before they infiltrate IS
  • Understand secure virtualization, secure application deployment, and automation concepts
  • Identify and implement the best protocols and encryption
  • Understand the importance of compliance

Certificate

On successful completion of the course participants will be awarded participation certificate from DigiPAKISTAN. Also prepare for International Exam.

Duration & Frequency

Total Duration of the course is 3 months

What will i learn?

  • You will learn the knowledge and gain the confidence to pass the CompTIA Security+ Certification exam
  • Your new skills and the CompTIA Security+ Certification will help you land a network tech job or get that raise or advancement you are seeking.
  • Learning and understanding computer security, their functions, and their components
  • Performing basic security configurations
Requirements
  • Basic computer knowledge
  • Basic Internet skills and adequate connection
  • Beginner networking background
Curriculum for this course
CompTIA Security+ Introduction
  • Introduction
Threat Intelligence and Security Assessment
  • Security Roles and Controls (Part I)
  • Security Roles and Controls (Part II)
  • Threat Actors and Threat Intelligence (Part I)
  • Threat Actors and Threat Intelligence (Part II)
  • Network Reconnaissance Tools (Part I)
  • Network Reconnaissance Tools (Part II)
  • Security Concerns with Vulnerability Types (Part I)
  • Security Concerns with Vulnerability Types (Part II)
  • Penetration Testing Concepts
  • Social Engineering and Malware (Part I)
  • Social Engineering and Malware (Part II)
Cryptography and IAM
  • Basic Cryptographic Concepts (Part I)
  • Basic Cryptographic Concepts (Part II)
  • Cryptographic Use Cases and Weaknesses (Part I)
  • Cryptographic Use Cases and Weaknesses (Part II)
  • Implementing Public Key Infrastructure (Part I)
  • Implementing Public Key Infrastructure (Part II)
  • Implementing Authentication Controls (Part I)
  • Implementing Authentication Controls (Part II)
  • Implementing Authentication Controls (Part III)
  • Implementing Identity and Account Management Controls (Part I)
  • Implementing Identity and Account Management Controls (Part II)
  • Implementing Identity and Account Management Controls (Part III)
Protecting Network Infrastructure
  • Implementing Secure Network Designs (Part I)
  • Implementing Secure Network Designs (Part II)
  • Implementing Secure Network Designs (Part III)
  • Implementing Secure Network Designs (Part IV)
  • Implementing Secure Network Designs (Part V)
  • Implementing Secure Network Designs LAB
  • Implementing Network Security Appliances (Part I)
  • Implementing Network Security Appliances (Part II)
  • Implementing Network Security Appliances (Part III)
  • Implementing Secure Network Protocols (Part I)
  • Implementing Secure Network Protocols (Part II)
  • Implementing Secure Network Protocols (Part III)
  • Implementing Host Security Solutions (Part I)
  • Implementing Host Security Solutions (Part II)
  • Implementing Host Security Solutions (Part III)
Protecting Applications and Cloud Services
  • Implementing Secure Mobile Solutions (Part I)
  • Implementing Secure Mobile Solutions (Part II)
  • Summarizing Secure Application Concepts (Part I)
  • Summarizing Secure Application Concepts (Part II)
  • Summarizing Secure Application Concepts (Part III)
  • Summarizing Secure Application Concepts (Part IV)
  • Summarizing Secure Application Concepts (Part V)
  • Summarizing Secure Application Concepts (Part VI)
  • Implementing Secure Cloud Solutions (Part I)
  • Implementing Secure Cloud Solutions (Part II)
+ View more
Other related courses
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
About instructor

M. ZEESHAN MOTIWALA

Manager HRBP (Technology) at PTCL.Official

Show full biography

Mr. Muhammad Zeeshan Motiwala is a well eminent HR Professional and carries vast management and leadership experience spanning over 10 years. Currently he is working as Manager HRBP Technology at PTCL. Muhammad Zeeshan has a versatile corporate experience in different sectors like Retail, Construction, Entertainment, Food Services, Health care & Telecommunication.

Zeeshan Motiwala has served prominent organizations in leadership capacities in the function of Human Resources, Organization Development, and Project Management & ERP Implementation. He has also worked as Leading Recruiter & Compensation Specialist at Bahria Town Karachi (Bahria International Hospital, Cinegold Cinema, & Bahria Adventure Land). He has also worked with companies like Zellbury, Yunus Textile Mills Limited & Aman Foundation. As far as education is concerned, Zeeshan holds MBA degree in Human Resources. He has been honored with International Certification of Human Resource Business Professional from HRCI (USA). He has also completed certificate course on SAP (HCM) from IBA and SAP E Academy from Abacus Consulting Services. Other certification courses includes Big Data, MS Excel Advance Skills, Project Management, SPSS, Performance Management, Dashboard Reporting, and People Analytics from Prestigious Digital Certification Bodies like LinkedIn, Harvard Manage Mentor and Skillsoft.

Zeeshan Motiwala has conducted numerous Trainings/ Workshop for students/ graduates of Universities/ Institutes on topics of Personal Branding, Mock Interviews, Resume Makeover, Networking for Jobs, Effectively Using LinkedIn Application, MS Office etc. He has also trained 200+ corporate employees on MS Excel Advance Skills.

Includes:
  • Verified Certificate
  • Internship Opportunity
  • Career Development