CompTIA Security+ Certification Training

Class available live online

This 5-day course provides the fundamentals of information security and will prepare you for the CompTIA Security+ exam. Focused on hands-on practical skills, it ensures you’re prepared to problem solve a wide variety of cybersecurity issues. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8570.01-M requirements. Expect next-gen virtual training, white glove service, and truly expert instructors.

5 Day Course
Exam Voucher Included
Practice Exam Questions
40 PDUs
Award-Winning Instructors
Industry-Leading Courseware

HOW OUR LIVE VIRTUAL TRAINING WORKS

CompTIA Security+ Training Course

Our CompTIA Security+ course provides the core knowledge required of any cybersecurity role, providing a springboard to next-level cybersecurity jobs. The class will emphasize both theoretical and practical skills needed to identify security threats, attacks, and vulnerabilities. Exam voucher, practice exams, and additional online labs included.

Key Features of Security+ Training Exam Voucher Included

Exam Voucher Included

5 Days of Virtual Training
Practice Security+ Exam
Award-Winning Instructors
Accredited Training Organization

UPCOMING COURSES

Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

CompTIA Security+ Course

Live Virtual Class
May 1 - May 5, 2023 . 5 days
9:00 am - 5:00 pm

$2395


Early Registration

CompTIA Security+ Course

Live Virtual Class
July 24 - July 28, 2023 . 5 days
9:00 am - 5:00 pm

$2395


Early Registration

CompTIA Security+ Course

Live Virtual Class
October 2 - October 6, 2023 . 5 days
9:00 am - 5:00 pm

$2395


Early Registration

Your Security+ Instructors

Need training for a group?

FREQUENTLY ASKED QUESTIONS

This course explores foundational IT security concepts such as network security, organizational security, data, and host security, threats and vulnerabilities, compliance, access and identity control, and cryptography. You can find detailed information on the curriculum and exam objectives in our syllabus section below. We’ll also make sure you are completely prepared to pass the Security+ certification exam so you can walk away with this key IT security credential.

Yes. You will receive an official CompTIA certification exam voucher. This is included in the cost of our training course. From there, you will be able to sign up for your preferred testing date and location.

Security+ is usually a great starting point for IT professionals who have ~2 years of experience in general IT and some security knowledge exposure. However, it is also a great course for anyone who wants to learn more about information security, anyone preparing for the CompTIA Security+ certification exam (SY0-501), aspiring information security analysts, or anyone whose current position includes information security-related responsibilities.

No, but we do highly recommend you have baseline skills around computer networking basics and system support.

Security+ is, by far, one of the most respected foundational CompTIA certifications in the industry. By earning this designation, you are setting yourself up for a successful cybersecurity career. Check out this blog post for details on how Security+ fits into the current InfoSec landscape.

This is a 5-day live online training course.

You’ll receive a copy of the classroom presentation material, a course workbook, practice Security+ exam questions, and several useful training exercises. You will also receive a voucher to take the CompTIA Security+ exam at an authorized testing center.

Short answer: Yes. Security+ certification will qualify you for IAT Level 2 and IAM Level 1. If you’re looking for more detail on DoD 8570 and the various training options for compliance, check out our DoD 8570 overview.

The Security+ certification, while highly respected, is designed for earlier stage information security professionals- it is often the first security certification earned by neophyte security professionals. It is an excellent differentiator for entry-level practitioners and security personnel.

The CISSP designation is an advanced credential that recognizes years of subject-matter expertise. If you think you may need a more advanced course, try CISSP.

A few days before class, you will receive an email with details on how to access our virtual training room, and physical courseware will be delivered to your shipping address.

Our virtual classes are instructed in a way that mirrors the experience you would get from an in-person course. That way, students remain fully engaged and the information sticks! Our virtual training courses are packed with interactive whiteboards, breakout rooms, virtual sticky note walls, and more to help ensure your success on the exam.

Individuals who hold the PMP certification will earn 40 PDUs through the course.

After passing the CompTIA Security+ certification exam, you will be eligible for 30 CEUs.

The current Security+ certification exam, SY0-501, consists of 90 performance-based and multiple choice questions to be answered within 90 minutes. The questions are weighted, so some are worth more than others. In fact, there are some used as “test” questions that aren’t used in scoring the exam. You won’t be informed of a question’s value during or after the exam. The exam is graded on a scale of 100 900 points. You’ll need a 750/900 to pass.

Performance based questions test your ability to solve problems in a simulated environment. Most of them appear at the beginning of the exam – you won’t be able to see a clock when working on them.

Yes, the timer will be visible throughout the exam, except when you’re answering the performance based questions and the simulation window is open.

Certainly. You can skip any question and return to it later. You’ll be able to flag any questions you’d like to return to for review as you go through the exam. When you reach the last question of the exam, you’ll have an opportunity to review it in its entirety. This is when we recommend revisiting any flagged questions.

You’re not allowed to bring anything into the testing area (phones, smart watches, pens, paper, and notes are all prohibited). You’ll be provided with a dry erase sheet and a marker. You may write whatever you’d like on this sheet, and you may write on it prior to the beginning the timer for the exam.

Yes. Once you have completed the exam, you’ll be informed of your score on the screen. Your score will not be included on your certificate or on the CompTIA website.

CompTIA doesn’t limit the number of times you may retake the exam. However, after the first retake, you’re required to wait at least 14 calendar days to schedule a third attempt. If you’ve passed the exam, you can’t retake it until a new exam series is released. (Why would anyone want to do that, though? Bananas.)

Your CompTIA Security+ certification is good for three years from the day of your exam. The Continuing Education (CE) program allows you to extend your certification in three-year intervals through activities and training that relate to the content of your certification. Like Security+ itself, CompTIA Security+ ce also carries globally-recognized ISO/ANSI accreditation status.

CompTIA Security+ Training Syllabus

  • Social engineering attacks
  • Cyber attacks
  • Threat analysis
  • Application attacks
  • Network attacks
  • Actors and threats
  • Attributes of actors
  • Vectors
  • Threat intelligence sources
  • Open-source intelligence
  • Vulnerability databases
  • Indicators of compromise
  • Research sources
  • Vulnerabilities application
  • Cloud-based vs. on-premises
  • Weak configurations
  • Improper or weak patch management
  • Penetration testing
  • Threat hunting
  • Vulnerability scans
  • Syslog/Security information and event management (SIEM)
  • Configuration management
  • Access management
  • Identity management
  • Network security compliance
  • Data sovereignty
  • Data protection
  • Cloud models
  • Cloud service providers
  • Managed service provider (MSP)/managed security service provider (MSSP)
  • On-premises vs. off-premises
  • Microservices/API
  • Infrastructure as code
  • Serverless architecture
  • Virtualization
  • Environment
  • Provisioning and deprovisioning
  • Integrity measurement
  • Secure coding techniques
  • Open Web Application Security Project (OWASP)
  • Software diversity
  • Elasticity
  • Scalability
  • Authentication methods
  • Biometrics
  • Multifactor authentication (MFA) factors and attributes
  • Authentication, authorization, and accounting (AAA)
  • Cloud vs. on-premises requirements
  • Redundancy
  • Replication
  • On-premises vs. cloud
  • Backup types
  • Non-persistence
  • High availability
  • Restoration order
  • Embedded systems
  • Supervisory control and data acquisition (SCADA)/industrial control system (ICS)
  • Internet of things (IoT)
  • Voice over IP (VoIP)
  • HVAC
  • Drones
  • Surveillance systems
  • Communication considerations
  • Badges
  • Alarms
  • Cameras
  • Closed-circuit television (CCTV)
  • Industrial camouflage
  • Fencing
  • Sensors
  • Digital signatures
  • Key length
  • Salting
  • Hashing
  • Key exchange
  • Modes of operation
  • Blockchain
  • Domain name system security extensions (DNSSEC)
  • SSH
  • Secure real-time transport protocol (SRTP)
  • File Transfer Protocol, Secure (FTPS)
  • SSH File Transfer Protocol (SFTP)
  • Simple Network Management Protocol, versi0n 3 (SNMPv3)
  • Endpoint protection
  • Boot integrity
  • Database
  • Application security
  • Hardening
  • Self-encrypting drive (SED)/Full-disk encryption (FDE)
  • Hardware root of trust
  • Trusted platform module (TPM)
  • Load balancing
  • Network segmentation
  • Virtual Private Network (VPN)
  • Wireless Network
  • Network Appliances
  • DNS
  • Network access control (NAC)
  • Cryptographic protocols
  • Authentication protocols
  • Methods
  • Installation considerations
  • Connection methods and receivers
  • Mobile device management (MDM)
  • Mobile devices
  • Deployment models
  • Enforcement and monitoring procedures
  • Cloud security controls
  • Solutions
  • Cloud native controls vs. third-party solutions
  • Identity
  • SSH keys
  • Identity provider (IdP)
  • Account types
  • Account policies
  • Authentication management
  • Password keys/vaults
  • Knowledge-based authentication
  • Authentication/authorization
  • Access control schemes
  • Key management
  • Certificate authority (CA)
  • Types of certificates
  • Certificate formats
  • Concepts
  • Network reconnaissance and discovery
  • File manipulation
  • Shell and script environments
  • Packet capture and replay
  • Forensics
  • Exploitation frameworks
  • Incident response plans
  • Incident response process
  • Exercises
  • Attack frameworks
  • Stakeholder management
  • Vulnerability scan output
  • SIEM dashboards
  • Log files
  • NXLog
  • Bandwidth monitors
  • Metadata
  • Netflow/sFlow
  • Reconfigure endpoint security solutions
  • Configuration changes
  • Isolation
  • Containment
  • Segmentation
  • SOAR
  • Documentation/evidence
  • Acquisition
  • On-premises vs. cloud
  • Integrity
  • Preservation
  • Data recovery
  • Strategic intelligence/counterintelligence
  • Managerial
  • Operational
  • Control types
  • Preventive
  • Detective
  • Corrective
  • Regulations, standards, and legislation
  • Key frameworks
  • Center for Internet Security (CIS)
  • National Institute of Standards and Technology (NIST)
  • Risk Management Framework (RMF)
  • Cybersecurity Framework (CSF)
  • Benchmarks/secure configuration guides
  • Personnel
  • Diversity of training techniques
  • Third-party risk management
  • Data
  • Credential policies
  • Organizational policies
  • Risk types
  • Risk management strategies
  • Risk mitigation activities
  • Risk mitigation
  • Risk analysis
  • Business impact analysis
  • Organizational consequences of privacy and data breaches
  • Notifications of breaches
  • Data types
  • End to end security
  • Privacy enhancing technologies
  • Roles and responsibilities

Why Beyond20

Subject Matter Expertise

We understand that your goal is to learn effectively and get certified in one shot. After all, certification training can be a substantial investment. As such, it’s critical to us that you learn from someone who will help you retain key concepts and get you across the finish line efficiently.

But at the same time, who wants to take a boring class? If we’re going to spend a lot of time looking at screens, the material should at least be engaging. That’s why we’re hyper-focused on bringing variety to your virtual training experience. People learn differently, so we use several methods to teach concepts throughout the day.

White Glove Service

We all know that bad customer service is one of the most frustrating things there is. That’s why we’ve endeavored to create the kind of training experience that we would want for ourselves.

We're a US-based organization with offices in DC, Phoenix, and San Diego. Come through! Otherwise, we'll be happy to meet you virtually.

Rest assured: At Beyond20, our instructors are some of the world’s best. Not only does our training staff have decades of experience leading real-world cyber security initiatives, but in many cases, we are the official authors of authoritative publications (e.g., ITIL). Working with Beyond20 means learning from the top subject matter experts out there. It means training and taking your exams with confidence.

Next-Gen Virtual Training

Depending on the course, this can include interactive whiteboards, breakout rooms, virtual sticky note walls, and more. We take this approach not only because it's more fun than simply memorizing terms, but because it works.

From the instant that you first reach out to us with a quick question, to that glorious moment when you learn you’ve earned the certification, our job is to make sure that every interaction you have with us is a positive one. If you look at our hundreds of Google-verified reviews, you’ll see that we take it seriously! Beyond20 is not a risky choice.

If you're PMP-certified, our courses will earn you PDUs!

Related Resources