Course Code: IT 121
357 Course Visits
CompTIA Security+
Course Sector:
Information Technology
Course Dates and Locations
Choose a date and location to book your seat
No.
Date
Days
Location
Fees
Enrollment
01
28 Jul - 01 Aug 2025
5 Days
Cape Town, South Africa
$4,950
02
10 - 14 Aug 2025
5 Days
Dubai, UAE
$4,250
03
06 - 10 Oct 2025
5 Days
Online, Virtual
$2,150
04
20 - 24 Oct 2025
5 Days
Dubai, UAE
$4,250
05
16 - 20 Nov 2025
5 Days
Riyadh, KSA
$4,250
06
22 - 26 Dec 2025
5 Days
Abu Dhabi, UAE
$4,250
Introduction
Training course introducion / brief

This CompTIA Server+ training course is designed to provide participants with the fundamental knowledge necessary to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam (SY0-501). This course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.

Course Objectives
At the end of the training course, participants will be able to

  • Proactively implement sound security protocols to mitigate security risks
  • Quickly respond to security issues
  • Retroactively identify where security breaches may have occurred
  • Design a network, on-site or in the cloud, with security in mind

Course Audience
Who is this course for, and can benefit the most

This training course will benefit IT professionals and personnel interested in pursuing a career in cybersecurity, Network Administrators, and Cybersecurity Associates.

Course Outline
The course aims and learning outcomes
Chapter 1: Security Fundamentals
Module A: Security concepts
  •        Module B: Risk management
  •        Module C: Vulnerability assessment

Chapter 2: Understanding attacks

  •       Module A: Understanding attackers
  •         Module B: Social engineering
  •         Module C: Malware
  •         Module D: Network attacks
  •         Module E: Application attacks

Chapter 3: Cryptography

  •       Module A: Cryptography concepts
  •     Module B: Public key infrastructure

Chapter 4: Network fundamentals
  •        Module A: Network components
  •         Module B: Network addressing
  •         Module C: Network ports and applications

Chapter 5: Securing networks

  •    Module A: Network security components
  •         Module B: Transport encryption
  •         Module C: Hardening networks
  •         Module D: Monitoring and detection

Chapter 6: Securing hosts and data
  •         Module A: Securing hosts
  •         Module B: Securing data
  •         Module C: Mobile device security

Chapter 7: Securing network services

  •         Module A: Securing applications
  •         Module B: Virtual and cloud systems

Chapter 8: Authentication
  •       Module A: Authentication factors
  •       Module B: Authentication protocols

Chapter 9: Access control

  •         Module A: Access control principles
  •       Module B: Account management

Chapter 10: Organizational security
  • Module A: Security policies
  •        Module B: User training
  •         Module C: Physical security and safety

Chapter 11: Disaster planning and recovery

  •      Module A: Business continuity
  •        Module B: Fault tolerance and recovery
  •         Module C: Incident response
  • LABS

Chapter 1: Understanding Attacks

  •         Examining Phishing Attacks
  •         Examining Malware
  •         Probing a Site
  •         Simulating a DOS Attack
  •         Cracking Passwords
  •         Simulating an Eavesdropping Attack
  •         Exploring Application Vulnerabilities
  •         Examining SQL Injection Attacks
  •         Examining Client-side Attacks

Chapter 2: Cryptography

  •       Symmetric Encryption
  •         Asymmetric Encryption
  •         Creating File Hashes
  •         Installing a Certificate Authority

Chapter 3: Network Fundamentals

  • Using TCP/IP Tools

Chapter 4: Securing the Network

  • Configuring a Firewall
  •         Examining Website Certificates
  •        Securing a WAP
  •       Viewing Event Logs
  •       Scanning the Network

Chapter 5: Securing Hosts and Data

  •         Enabling BitLocker

Chapter 6: Securing Network Services

  •         Finding Vulnerable Code

Chapter 7: Authentication
  •       Installing a RADIUS Server
  •         Examining Active Directory
Chapter 8: Access Control

  •       Managing NTFS Permissions
  •         Managing Active Directory Objects
  •       Using Group Policy Objects
  •         Creating a Security Template
Chapter 9: Disaster planning and recovery
  •         Using Windows Server Backup
Providers and Associations
Providing the best training services and benefits to our valued clients
Boost certificate of completion
BOOST's Professional Attendance Certificate “BPAC” is always given to the delegates after completing the training course, and depends on their attendance of the program at a rate of no less than 80%, besides their active participation and engagement during the program sessions.
ENDORSED EDUCATION PROVIDER
Over all rating
Excellent
Average
Below average
Flexible deadlines
Customized dates accordance to your schedule
Shareable Certificate
Earn certificate upon completion
COURSE METHODOLOGY

Our Training programs are implemented by combining the participants' academic knowledge and practical practice (30% theoretical / 70% practical activities).

At The end of the training program, Participants are involved in practical workshop to show their skills in applying what they were trained for. A detailed report is submitted to each participant and the training department in the organization on the results of the participant's performance and the return on training. Our programs focus on exercises, case studies, and individual and group presentations.

Trending Courses
The most bespoke and flexible training courses
01
Sep
- 05 -
Days
Certified Business Analysis Professional- IIBA
Dubai, UAE
24
Nov
- 03 -
Days
Happiness To Have and Hold
Dubai, UAE
10
Nov
- 05 -
Days
Practical Negotiation Skills for Contract Management
Jeddah, KSA
10
Feb
- 05 -
Days
The Scheduling Professional (PMI-SP Exam Preparation)
Dubai, UAE
10
Aug
- 05 -
Days
Emotional Intelligence and Advanced Communication Skills for Leaders
Salalah, Oman
30
Jun
- 05 -
Days
The Risk Management Professional (PMI-RMP Exam Preparation)
Istanbul, Turkey
14
Sep
- 05 -
Days
Competitive Bidding: Understanding Procurement Bids
Riyadh, KSA
18
May
- 05 -
Days
Professional in Business Analysis (PMI-PBA Exam Preparation)
Jeddah, KSA
15
Dec
- 05 -
Days
The Business Analyst (PBA) - PMI Certified
Dubai, UAE
07
Apr
- 05 -
Days
IOSH Managing and Working Safely
Abu Dhabi, UAE
13
Apr
- 05 -
Days
OSHA: Occupational Safety and Health Administration Standards
Riyadh, KSA
17
Feb
- 05 -
Days
Artificial Intelligence for Leaders
Abu Dhabi, UAE
20
Jan
- 05 -
Days
Certified Treasury Professional
Dubai, UAE
18
Aug
- 05 -
Days
ISO 55001 2014 Lead Auditor (Asset Management Systems) – Lead Auditor
Muscat, Oman
20
Jan
- 05 -
Days
Leading and Building a Positive, Motivated, and Empowered Teams
Online, Virtual
01
Sep
- 05 -
Days
Introduction to Machine Learning and Artificial Intelligence
Abu Dhabi, UAE