Skip to main content

V8

Security Pro

Security Pro is a comprehensive training course that prepares you to master foundational cybersecurity concepts and skills. This course is designed to help you gain the knowledge needed to secure networks, systems, and data in today’s technology-driven environments. With hands-on simulations, real-world scenarios, and certification preparation, Security Pro ensures you are ready to excel in technology security roles and prepares you for the CompTIA Security+ (V7) certification.

Pro Security CompCert

Course objectives

Network security

  • Identify and mitigate common network vulnerabilities.
  • Implement secure network configurations and protocols.

Threats and vulnerabilities

  • Recognize and respond to malware, phishing, and other cyber threats.
  • Conduct vulnerability assessments and penetration testing.

Access control and identity management

  • Implement authentication and authorization techniques.
  • Manage user accounts and permissions securely.

Cryptography

  • Understand encryption methods and their applications.
  • Use cryptographic tools to secure data in transit and at rest.

Incident response and recovery

  • Develop and execute incident response plans.
  • Implement disaster recovery and business continuity strategies.


Buy now

Competency assessment details

  • Included with the course: Security Pro competency assessment

  • Launch date: November 7, 2023

  • Assessment format: Performance-based tasks in a simulated environment

  • Question count: Up to 15 lab questions

  • Task count: Up to 55 tasks in the assessment

  • Time limit: 120 minutes

  • Score range: 200 - 2000

  • Passing score: 1400

  • Recommended experience: Before starting the course, you should have a foundational knowledge of networking and basic cybersecurity concepts

Skills learned

  • Protect networks by identifying vulnerabilities and implementing secure configurations.

  • Recognize and mitigate cyber threats like malware and phishing.

  • Manage user authentication and permissions securely.

  • Use cryptographic tools to protect sensitive information.

  • Develop plans to respond to and recover from security incidents.

Stay informed

Advance with confidence

Get updates, insights, and exclusive offers to support your learning journey and career growth.