Skip to main content

Security+ Boot Camp (1w) 2026

ABOUT THIS COURSE

Designed for IT professionals seeking a strong foundation in cybersecurity concepts, CompTIA Security+ supports individuals entering or advancing in security-focused roles. This certification builds confidence in applying security best practices and communicating effectively with technical teams, leadership, and organizational stakeholders.

Security+ validates baseline, vendor-neutral knowledge across core cybersecurity domains, including network security, risk management, threat detection, incident response, and governance fundamentals.

Content in this course is:

  • Aligned with the CompTIA Security+ exam objectives (SY0-701);
  • Designed to reflect real-world, hands-on cybersecurity scenarios;
  • Reviewed and informed by subject matter experts with industry and instructional experience; and
  • Structured to support learners preparing for entry- to mid-level cybersecurity roles.

CompTIA certifications are globally recognized and widely adopted across industry, government, and academia. Security+ is approved for U.S. Department of Defense (DoD) 8140/8570 compliance and aligned with the Cyber Workforce Framework (CWF), making it a foundational credential for professionals working in regulated or defense-related environments.

Red text "CompTIA" and registered trademark

Overview

Modality

Online

Format

Asynchronous

Pricing

$2399.00

Partner

RevU

Topic

CompTIA

General

Information Technology and Engineering

Security+

Course Dates

  • Dates: 1/19 – 1/23, 2026

COURSE REQUIREMENTS

CompTIA Security+ Certification Requirements

There are no formal prerequisites for this certification. However, candidates must complete the following steps to earn and maintain the CompTIA Security+ certification:

  • Pass the CompTIA Security+ certification examination (current exam: SY0-701);
  • Earn the certification upon successful completion of the exam (no separate application process is required);
  • Maintain the certification through CompTIA’s Continuing Education (CE) Program;
  • Complete 50 Continuing Education Units (CEUs) within each three-year renewal cycle; and
  • Submit CEUs and applicable renewal fees through the CompTIA certification portal before the certification expiration date.

Note: While not required, CompTIA recommends that candidates have Network+ (or equivalent knowledge) and approximately two years of experience in IT administration with a security focus.

COURSE SYLLABUS

General security concepts (12%)

  • Security controls: comparing technical, preventive, managerial, deterrent, operational, detective, physical, corrective, compensating, and directive controls.
  • Fundamental concepts: summarizing confidentiality, integrity, and availability (CIA); non-repudiation; authentication, authorization, and accounting (AAA); zero trust; and deception/disruption technology.
  • Change management: explaining business processes, technical implications, documentation, and version control.
  • Cryptographic solutions: using public key infrastructure (PKI), encryption, obfuscation, hashing, digital signatures, and blockchain.

Threats, vulnerabilities, and mitigations (22%)

  • Threat actors and motivations: comparing nation-states, unskilled attackers, hacktivists, insider threats, organized crime, shadow IT, and motivations like data exfiltration, espionage, and financial gain.
  • Threat vectors and attack surfaces: explaining message-based, unsecure networks, social engineering, file-based, voice call, supply chain, and vulnerable software vectors.
  • Vulnerabilities: explaining application, hardware, mobile device, virtualization, operating system (OS)-based, cloud-specific, web-based, and supply chain vulnerabilities.
  • Malicious activity: analyzing malware attacks, password attacks, application attacks, physical attacks, network attacks, and cryptographic attacks.
  • Mitigation techniques: using segmentation, access control, configuration enforcement, hardening, isolation, and patching.

Security architecture (18%)

  • Architecture models: comparing on-premises, cloud, virtualization, Internet of Things (IoT), industrial control systems (ICS), and infrastructure as code (IaC).
  • Enterprise infrastructure: applying security principles to infrastructure considerations, control selection, and secure communication/access.
  • Data protection: comparing data types, securing methods, general considerations, and classifications.
  • Resilience and recovery: explaining high availability, site considerations, testing, power, platform diversity, backups, and continuity of operations

Security operations (28%)

  • Computing resources: applying secure baselines, mobile solutions, hardening, wireless security, application security, sandboxing, and monitoring.
  • Asset management: explaining acquisition, disposal, assignment, and monitoring/tracking of hardware, software, and data assets.
  • Vulnerability management: identifying, analyzing, remediating, validating, and reporting vulnerabilities.
  • Alerting and monitoring: explaining monitoring tools and computing resource activities.
  • Enterprise security: modifying firewalls, IDS/IPS, DNS filtering, DLP (data loss prevention), NAC (network access control), and EDR/XDR (endpoint/extended detection and response).
  • Identity and access management: implementing provisioning, SSO (single sign-on), MFA (multifactor authentication), and privileged access tools.
  • Automation and orchestration: explaining automation use cases, scripting benefits, and considerations.
  • Incident response: implementing processes, training, testing, root cause analysis, threat hunting, and digital forensics.
  • Data sources: using log data and other sources to support investigations.

Security program management and oversight (20%)

  • Security governance: summarizing guidelines, policies, standards, procedures, external considerations, monitoring, governance structures, and roles/responsibilities.
  • Risk management: explaining risk identification, assessment, analysis, register, tolerance, appetite, strategies, reporting, and business impact analysis (BIA).
  • Third-party risk: managing vendor assessment, selection, agreements, monitoring, questionnaires, and rules of engagement.
  • Security compliance: summarizing compliance reporting, consequences of non-compliance, monitoring, and privacy.
  • Audits and assessments: explaining attestation, internal/external audits, and penetration testing.
  • Security awareness: implementing phishing training, anomalous behavior recognition, user guidance, reporting, and monitoring.