Skip to main content

Security+ 6-week Bootcamps

Our CompTIA Security+ exam preparation program is designed to build the foundational knowledge and skills required to earn the credential. Recognized as a leading, vendor-neutral certification for professionals beginning or advancing in cybersecurity roles, Security+ establishes a strong baseline across essential security domains. This course guides participants through targeted practice and assessments to reinforce understanding, ensuring they are well-prepared to succeed on the exam.

Designed for IT professionals seeking a strong foundation in cybersecurity concepts, CompTIA Security+ supports individuals entering or advancing in security-focused roles. This certification builds confidence in applying security best practices and communicating effectively with technical teams, leadership, and organizational stakeholders. 

Security+ validates baseline, vendor-neutral knowledge across core cybersecurity domains, including network security, risk management, threat detection, incident response, and governance fundamentals. Content in this course is: 

  • Aligned with the CompTIA Security+ exam objectives (SY0-701); 
  • Designed to reflect real-world, hands-on cybersecurity scenarios; 
  • Reviewed and informed by subject matter experts with industry and instructional experience; and 
  • Structured to support learners preparing for entry- to mid-level cybersecurity roles. 

CompTIA certifications are globally recognized and widely adopted across industry, government, and academia. Security+ is approved for U.S. Department of Defense (DoD) 8140/8570 compliance and aligned with the Cyber Workforce Framework (CWF), making it a foundational credential for professionals working in regulated or defense-related environments.

This bootcamp is for individuals who cannot commit to a full-time, one-week intensive program, offering a more flexible and manageable learning pace.

Overview

Modalities

Online

Formats

Instructor-Led

Price

$2,399.00

Partners

RevU

Course Dates

See Available Dates

Topics

Information Technology and Engineering

This Course Offered By

Red text "CompTIA" and registered trademark

There are no formal prerequisites for this certification. However, candidates must complete the following steps to learn and maintain the CompTIA Security+ certificate:

  • Pass the CompTIA Security+ certification examination1
  • Earn the certification upon successful completion of the exam22;
  • Maintain the certification through CompTIA’s Continuing Education (CE) Program;
  • Complete 50 Continuing Education (CEUs) within each three-year renewal cycle; and
  • Submit CEUs and applicable renewal fees through the CompTIA portal before the certification expiration date.   

1 – Current exam: SY0-701

2 – No separate application process is required.

Note: While not required, CompTIA recommends that candidates have Network+ (or equivalent knowledge) and approximately two years of experience in IT administration with a security focus.

Schedule

Classes Start
Mar 02, 2026

Classes End
Apr 13, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Apr 06, 2026

Classes End
May 18, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
May 04, 2026

Classes End
Jun 15, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jun 01, 2026

Classes End
Jul 13, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Jul 06, 2026

Classes End
Aug 17, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

Schedule

Classes Start
Aug 03, 2026

Classes End
Sep 14, 2026

Meeting Times
W 7:00PM to 8:00PM

Instruction

Format
Instructor-Led

Instructors

Dr. Scott White

Dr. Scott White

Program Director – Cybersecurity Bachelor Completion Program

Fees

Cost
$2,399.00

General security concepts (12%) 

  • Security controls: comparing technical, preventive, managerial, deterrent, operational, detective, physical, corrective, compensating, and directive controls. 
  •  undamental concepts: summarizing confidentiality, integrity, and availability (CIA); non-repudiation; authentication, authorization, and accounting (AAA); zero trust; and deception/disruption technology. 
  • Change management: explaining business processes, technical implications, documentation, and version control. 
  •  Cryptographic solutions: using public key infrastructure (PKI), encryption, obfuscation, hashing, digital signatures, and blockchain. 

Threats, vulnerabilities, and mitigations (22%):

  •  Threat actors and motivations: comparing nation-states, unskilled attackers, hacktivists, insider threats, organized crime, shadow IT, and motivations like data exfiltration, espionage, and financial gain.
  • Threat vectors and attack surfaces: explaining message-based, unsecure networks, social engineering, file-based, voice call, supply chain, and vulnerable software vectors.
  • Vulnerabilities: explaining application, hardware, mobile device, virtualization, operating system (OS)-based, cloud-specific, web-based, and supply chain vulnerabilities.
  • Malicious activity: analyzing malware attacks, password attacks, application attacks, physical attacks, network attacks, and cryptographic attacks.
  • Mitigation techniques: using segmentation, access control, configuration enforcement, hardening, isolation, and patching.

Security architecture (18%):

  • Architecture models: comparing on-premises, cloud, virtualization, Internet of Things (IoT), industrial control systems (ICS), and infrastructure as code (IaC).
  • Enterprise infrastructure: applying security principles to infrastructure considerations, control selection, and secure communication/access. Data protection: comparing data types, securing methods, general considerations, and classifications.
  • Resilience and recovery: explaining high availability, site considerations, testing, power, platform diversity, backups, and continuity of operations.

Security operations (28%):

  • Computing resources: applying secure baselines, mobile solutions, hardening, wireless security, application security, sandboxing, and monitoring.
  • Asset management: explaining acquisition, disposal, assignment, and monitoring/tracking of hardware, software, and data assets.
  • Vulnerability management: identifying, analyzing, remediating, validating, and reporting vulnerabilities.
  • Alerting and monitoring: explaining monitoring tools and computing resource activities.
  • Enterprise security: modifying firewalls, IDS/IPS, DNS filtering, DLP (data loss prevention), NAC (network access control), and EDR/XDR (endpoint/extended detection and response).
  • Identity and access management: implementing provisioning, SSO (single sign-on), MFA (multifactor authentication), and privileged access tools.
  • Automation and orchestration: explaining automation use cases, scripting benefits, and considerations.
  • Incident response: implementing processes, training, testing, root cause analysis, threat hunting, and digital forensics.
  • Data sources: using log data and other sources to support investigations.

Security program management and oversight (20%):

  • Security governance: summarizing guidelines, policies, standards, procedures, external considerations, monitoring, governance structures, and roles/responsibilities.
  • Risk management: explaining risk identification, assessment, analysis, register, tolerance, appetite, strategies, reporting, and business impact analysis (BIA).
  • Third-party risk: managing vendor assessment, selection, agreements, monitoring, questionnaires, and rules of engagement.
  • Security compliance: summarizing compliance reporting, consequences of non-compliance, monitoring, and privacy.
  • Audits and assessments: explaining attestation, internal/external audits, and penetration testing.
  • Security awareness: implementing phishing training, anomalous behavior recognition, user guidance, reporting, and monitoring.

  • Assess and Manage Security Risks 
  • Identify common threats, vulnerabilities, and attack vectors, including malware, social engineering, and insider threats 
  • Perform basic risk analysis, including likelihood, impact, and mitigation strategies 
  • Apply security controls to reduce organizational risk 
  • Design and Implement Secure Architecture 
  • Explain and apply secure network designs, including segmentation, zero trust concepts, and cloud security models 
  • Secure enterprise environments, including on-prem, hybrid, and cloud infrastructures 
  • Implement secure configurations for endpoints, servers, and mobile device
  • Implement Security Operations and Controls Configure and manage identify and access management (IAM) controls such as authentication, authorization, and accounting 
  • Apply cryptographic solutions, including encryption, PKI, certificates, and hashing 
  • Detect and Respond to Security Incidents Recognize indicators of compromise and analyze security events and logs 
  • Follow proper incident response procedures, including preparation, detection, containment, eradication, and recovery 
  • Understand digital forensic basics, including evidence handling and chain of custody 
  • Apply Governance, Risk, and Compliance (GRC) Principles 
  • Explain the purpose of security policies, standards, and procedures 
  • Understand legal, regulatory, and compliance requirements (e.g., privacy, data protection, industry frameworks) 
  • Support business continuity, disaster recovery, and resilience planning 
  • Promote Security Awareness and Best Practices 
  • Apply secure coding and operational best practices 
  • Recognize the human element of security, including training, awareness, and social engineering prevention 
  • Communicate security concepts effectively to technical and non-technical stakeholders.