CompTIA Security+ Instructor-Led Training
comptia-security-plus
Join our instructor-led Security+ training to prepare for the SY0-701 exam and master threats, attacks, and vulnerabilities.


About This Class
Build real-world cybersecurity skills with expert guidance in our CompTIA Security+ course.
Our instructor-led CompTIA Security+ online course helps you upskill or reskill in today’s threat landscape, covering everything from vulnerabilities and cryptography to cloud security and digital forensics.
This training is designed for learners who need structure, support, and practical experience to stay on track.
Get step-by-step help from certified instructors, review real exam scenarios with hands-on labs, prep with Q&A sessions, and practice tests tailored to the SY0-701 exam domains.
Target Audience
Students
Non-IT professionals
Tech-adjacent workers
Experience Level
Intermediate to Expert-level
Prerequisites
Basic understanding of networking and IT concepts
CompTIA Network+ certification (recommended, not required)
1–2 years of work experience in IT with a security focus (preferred)

Explore your next online class schedule.
What Do You Get?
Training Essentials
JOB Roles You Can Apply For
Components Available
Hands-on Labs
37+ LiveLab | 37+ Video tutorials | 01:02+ Hours
Self-Paced Training
40+ Modules | 80+ Video tutorials | 02:30+ Hours
Practice Tests
3 Full-Length Tests | 180 Questions
Skills You'll Gain
Lesson Plan
- The Security+ Exam What Does This Course Cover? Exam SY0-701 Exam Objectives SY0-701 Certification Exam Objective Map
- Cybersecurity Objectives Data Breach Risks Implementing Security Controls Data Protection Summary Exam Essentials
- Exploring Cybersecurity Threats Threat Data and Intelligence Summary Exam Essentials
- Malware Summary Exam Essentials
- Social Engineering and Human Vectors Password Attacks Summary Exam Essentials
- Vulnerability Management Vulnerability Classification Penetration Testing Audits and Assessments Vulnerability Life Cycle Summary Exam Essentials
- Software Assurance Best Practices Designing and Coding for Security Software Security Testing Injection Vulnerabilities Exploiting Authentication Vulnerabilities Exploiting Authorization Vulnerabilities Exploiting Web Application Vulnerabilities Application Security Controls Secure Coding Practices Automation and Orchestration Summary Exam Essentials
- An Overview of Cryptography Goals of Cryptography Cryptographic Concepts Modern Cryptography Symmetric Cryptography Asymmetric Cryptography Hash Functions Digital Signatures Public Key Infrastructure Asymmetric Key Management Cryptographic Attacks Emerging Issues in Cryptography Summary Exam Essentials
- Identity Authentication and Authorization Authentication Methods Accounts Access Control Schemes Summary Exam Essentials
- Resilience and Recovery in Security Architectures Response and Recovery Controls Physical Security Controls Summary Exam Essentials
- Exploring the Cloud Virtualization Cloud Infrastructure Components Cloud Security Issues Hardening Cloud Infrastructure Summary Exam Essentials
- Operating System Vulnerabilities Hardware Vulnerabilities Protecting Endpoints Hardening Techniques Operating System Hardening Securing Embedded and Specialized Systems Asset Management Summary Exam Essentials
- Designing Secure Networks Secure Protocols Network Attacks Summary Exam Essentials
- Building Secure Wireless Networks Managing Secure Mobile Devices Summary Exam Essentials
- Incident Response Incident Response Data and Tools Mitigation and Recovery Summary Exam Essentials
- Digital Forensic Concepts Conducting Digital Forensics Reporting Digital Forensics and Intelligence Summary Exam Essentials
- Security Governance Understanding Policy Documents Change Management Personnel Management Third-Party Risk Management Complying with Laws and Regulations Adopting Standard Frameworks Security Awareness and Training Summary Exam Essentials
- Analyzing Risk Managing Risk Risk Tracking Disaster Recovery Planning Privacy Summary Exam Essentials
Hands-on Labs
- Examining Spyware Analyzing Malware Using VirusTotal
- Using Social Engineering Techniques to Plan an Attack Cracking a Linux Password Using John the Ripper Cracking Passwords
- Scan for Vulnerabilities Using Nikto Conducting Vulnerability Scanning Using Nessus Consulting a Vulnerability Database Gathering Site Information
- Fuzzing Using OWASP ZAP Performing SQL Injection in DVWA Exploiting LFI and RFI Vulnerabilities Conducting a Cross-Site Request Forgery Attack Performing an XSS Attack in DVWA Examining Application Vulnerabilities Exploiting an Overflow Vulnerability Exploiting a TOCTOU Vulnerability
- Using Symmetric Encryption Creating Asymmetric Key Pairs Creating File Hashes Examining PKI Certificates
- Installing a RADIUS Server Examining Kerberos Settings Enforcing Password Policies Using the chmod Command Creating Linux Users and Groups
- Detecting Virtualization
- Capturing Credentials On-path Launching a DoS Attack
- Securing a Wi-Fi Hotspot
- Examining MITRE ATT&CK Viewing Linux Event Logs Viewing Windows Event Logs
- Completing the Chain of Custody Using FTK Imager Analyzing Forensic Case with Autopsy
Frequently Asked Questions
Have questions? We’ve got answers.
- CySA+ is more advanced than CompTIA Security+ SY0-701 and focuses on threat detection and response; Security+ is better suited for foundational cybersecurity knowledge.
- The best way to study is through an instructor-led CompTIA Security+ 701 training or a structured CompTIA Security+ online course with hands-on labs, practice tests, and real-time guidance.