A man sitting in front of multiple computer screens.

Security Support Specialist (Security+)

The Security+ training course will assist you in preparing for the CompTIA Security+ certification SY0-601 exam through comprehensive material that covers the key objectives and fundamentals to perform core security functions while pursuing an information technology-based career. Successful completion of this course will allow you to assess an organization’s security strength while recommending and implementing appropriate security solutions based on those assessments. Learners will be able to monitor and secure various security environments like cloud, mobile, and IoT (Internet of Things) in addition to obtaining an awareness of applicable laws, policies, and compliance standards. Also, you will be able to identify, analyze, and properly respond to security incidents.

Cybersecurity skills are applicable in a variety of IT (Information Technology) positions and have become imperative in security-related roles. With an estimated 31 percent employment increase projected over the next ten years according to the U.S. Bureau of Labor Statistics, demand for security professionals is high. Learning comprehensive workplace security skills allows you to become a knowledgeable go-to source for reducing liabilities, risk, and other expenses for an organization.

This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. After completing the course, you can set up your own exam dates and times at a nearby testing center.

Certifications:

Testout: SecurityPro

CompTIA Security+

  1. Introduction
    1. Welcome
      1. About the Course
      2. About the Certification
  2. Security Foundations
    1. Introduction to Security
      1. Key Terms: Introduction to Security
      2. Flashcards: Introduction to Security
      3. Readings and Resources: Introduction to Security
      4. Slide Deck: Introduction to Security
      5. Self-Assessment: Introduction to Security
      6. Critical Questions: Introduction to Security
      7. Supplemental Projects: Introduction to Security
      8. Complimentary Lecture Prep: Introduction to Security
      9. Access Complimentary Lectures – Security Foundations
      10. Key Terms Practice Quiz: Introduction to Security
      11. Quiz: Part 1
    2. Threat Management
      1. Key Terms: Threat Management
      2. Flashcards: Threat Management
      3. Readings and Resources: Threat Management
      4. Slide Deck: Threat Management
      5. Self-Assessment: Threat Management
      6. Critical Questions: Threat Management
      7. Supplemental Projects: Threat Management
      8. Complimentary Lecture Prep: Threat Management
      9. Access Complimentary Lectures – Threat Management
      10. Key Terms Practice Quiz: Threat Management
      11. Quiz: Part 2
  3. Security and Protection
    1. Threats and Attacks
      1. Key Terms: Threats and Attacks
      2. Flashcards: Threats and Attacks
      3. Readings and Resources: Threats and Attacks
      4. Slide Deck: Threats and Attacks
      5. Self-Assessment: Threats and Attacks
      6. Critical Questions: Threats and Attacks
      7. Supplemental Projects: Threats and Attacks
      8. Complimentary Lecture Prep: Threats and Attacks
      9. Access Complimentary Lectures – Threats and Attacks
      10. Key Terms Practice Quiz: Threats and Attacks
      11. Quiz: Part 3
    2. Endpoint Application Development
      1. Key Terms: Endpoint Application Development
      2. Flashcards: Endpoint Application Development
      3. Readings and Resources: Endpoint Application Development
      4. Slide Deck: Endpoint Application Development
      5. Self-Assessment: Endpoint Application Development
      6. Critical Questions: Endpoint Application Development
      7. Supplemental Projects: Endpoint Application Development
      8. Complimentary Lecture Prep: Endpoint Application Development
      9. Access Complimentary Lectures – Endpoint Application Development
      10. Key Terms Practice Quiz: Endpoint Application Development
      11. Quiz: Part 4
    3. Mobile Device Security
      1. Key Terms: Mobile Device Security
      2. Flashcards: Mobile Device Security
      3. Readings and Resources: Mobile Device Security
      4. Slide Deck: Mobile Device Security
      5. Self-Assessment: Mobile Device Security
      6. Critical Questions: Mobile Device Security
      7. Supplemental Projects: Mobile Device Security
      8. Complimentary Lecture Prep: Mobile Device Security
      9. Access Complimentary Lectures – Mobile Device Security
      10. Key Terms Practice Quiz: Mobile Device Security
      11. Quiz: Part 5
  4. Cryptography
    1. The Basics
      1. Key Terms: The Basics
      2. Flashcards: The Basics
      3. Readings and Resources: The Basics
      4. Slide Deck: The Basics
      5. Self-Assessment: The Basics
      6. Critical Questions: The Basics
      7. Supplemental Projects: The Basics
      8. Complimentary Lecture Prep: The Basics
      9. Access Complimentary Lectures – The Basics
      10. Key Terms Practice Quiz: The Basics
      11. Quiz: Part 6
    2. Part 7: Keys and Protocols
      1. Key Terms: Keys and Protocols
      2. Flashcards: Keys and Protocols
      3. Readings and Resources: Keys and Protocols
      4. Slide Deck: Keys and Protocols
      5. Self-Assessment: Keys and Protocols
      6. Critical Questions: Keys and Protocols
      7. Supplemental Projects: Keys and Protocols
      8. Complimentary Lecture Prep: Keys and Protocols
      9. Access Complimentary Lectures – Keys and Protocols
      10. Key Terms Practice Quiz: Keys and Protocols
      11. Quiz: Part 7
  5. Security on Networks
    1. Networking Threats
      1. Key Terms: Networking Threats
      2. Flashcards: Networking Threats
      3. Readings and Resources: Networking Threats
      4. Slide Deck: Networking Threats
      5. Self-Assessment: Networking Threats
      6. Critical Questions: Networking Threats
      7. Supplemental Projects: Network Threats
      8. Complimentary Lecture Prep: Network Threats
      9. Access Complimentary Lectures = Networking Threats
      10. Key Terms Practice Quiz: Networking Threats
      11. Quiz: Part 8
    2. Network Applications
      1. Key Terms: Network Applications
      2. Flashcards: Networking Applications
      3. Readings and Resources: Network Applications
      4. Slide Deck: Network Applications
      5. Self-Assessment: Network Applications
      6. Critical Questions: Network Applications
      7. Supplemental Projects: Network Applications
      8. Complimentary Lecture Prep: Network Applications
      9. Access Complimentary Lectures – Networking Applications
      10. Key Terms Practice Quiz: Networking Applications
      11. Quiz: Part 9
    3. Cloud and Virtualization
      1. Key Terms: Cloud and Virtualization
      2. Flashcards: Cloud and Virtualization
      3. Readings and Resources: Cloud and Virtualization
      4. Slide Deck: Cloud and Virtualization
      5. Self-Assessment: Cloud and Virtualization
      6. Critical Questions: Cloud and Virtualization
      7. Supplemental Projects: Cloud and Virtualization
      8. Complimentary Lecture Prep: Cloud and Virtualization
      9. Access Complimentary Lectures – Cloud and Virtualization
      10. Key Terms Practice Quiz: Cloud and Virtualization
      11. Quiz: Part 10
    4. Wireless Networks
      1. Key Terms: Wireless Networks
      2. Flashcards: Wireless Networks
      3. Readings and Resources: Wireless Security
      4. Slide Deck: Wireless Networks
      5. Self-Assessment: Wireless Networks
      6. Critical Questions: Wireless Network
      7. Supplemental Projects: Wireless Security
      8. Complimentary Lecture Prep: Wireless Security
      9. Access Complimentary Lectures – Wireless Networking
      10. Key Terms Practice Quiz: Wireless Security
      11. Quiz: Part 11
  6. Enterprise Security
    1. Authentication
      1. Key Terms: Authentication
      2. Flashcards: Authentication
      3. Readings and Resources: Authentication
      4. Slide Deck: Authentication
      5. Self-Assessment: Authentication
      6. Critical Questions: Authentication
      7. Supplemental Projects: Authentication
      8. Complimentary Lecture Prep: Authentication
      9. Access Complimentary Lectures = Authentication
      10. Key Terms Practice Quiz: Authentication
      11. Quiz: Part 12
    2. Incidents
      1. Key Terms: Incidents
      2. Flashcards: Incidents
      3. Readings and Resources: Incidents
      4. Slide Deck: Incidents
      5. Self-Assessment: Incidents
      6. Critical Questions: Incidents
      7. Supplemental Projects: Incidents
      8. Complimentary Lecture Prep: Incidents
      9. Access Complimentary Lectures = Incidents
      10. Key Terms Practice Quiz: Incidents
      11. Quiz: Part 13
    3. Resilience
      1. Key Terms: Resilience
      2. Key Terms: Resilience
      3. Flashcards: Resilience
      4. Slide Deck: Resilience
      5. Self-Assessment: Resilience
      6. Critical Questions: Resilience
      7. Supplemental Projects: Resilience
      8. Complimentary Lecture Prep: Resilience
      9. Access Complimentary Lectures = Resilience
      10. Key Terms Practice Quiz: Resilience
      11. Quiz: Part 14
    4. Risk Management
      1. Key Terms: Risk Management
      2. Flashcards: Risk Management
      3. Readings and Resources: Risk Management
      4. Slide Deck: Risk Management
      5. Self-Assessment: Risk Management
      6. Critical Questions: Risk Management
      7. Supplemental Projects: Risk Management
      8. Complimentary Lecture Prep: Risk Management
      9. Access Complimentary Lectures = Risk Management
      10. Key Terms Practice Quiz: Risk Management
      11. Quiz: Part 15
  7. Conclusion
    1. Final Exam
    2. Completion Confirmation
 

Requirements:
Hardware Requirements:

  • This course can be taken on either a PC or Mac. Mac users are encouraged to have access to a Windows environment on their device.
  • A reliable Internet connection of at least 1 Mbps – to view video tutorials.
  • Headphones or speakers connected to your computer – to listen to video tutorials.
  • Any web cam with a minimum of 640×480 video pixel resolution – including both external and built-in web cams.
  • A microphone connected to your computer.

Software Requirements:

  • PC: Windows 10 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Email capabilities and access to a personal email account.

To enroll in this program, you should have high school (Secondary) level education and basic knowledge of computer hardware and operating systems—for example, how to power up and log on to a machine, how to use a mouse and keyboard, and basic Microsoft Windows navigation skills.

George Davis

Energetic, results driven Information Technology Expert with extensive experience in corporate and government information technology strategies. Expert knowledge in Client/Server Windows and Unix environments; Cisco Routing and Switching deployment and administration. Excel in Integrating virtualization, cyber security and cloud services to maximize the potential of existing technology options. Solid background in managing complex technology projects with cross functional teams. Dedicated to delivering a superior end user experience by balancing technical expertise with rapport building skills.

Retired US Army NCO where he held manny technology positions. George continued his IT Career as: Technology Instructor, System Administration, Network Technology Specialist, System Engineer, Help Desk Support,

He holds a dual Master of Science Degree in Information Technology and Human Resource Development from Webster University St lious Mo.

Technology Certification:

Microsoft:  MOS, MCP, MCSA, MCSE, MCITP (Security, Exchange, SharePoint)
Cisco:  CCNA, CCDA, CCNP
CompTia:  A+, Network+, Security +, Linux+
Oracle:  PL/SQL
ProSoft: Certified Internet Webmaster
Dapartment of Defense Security Clearance
(DOD8570.1 certificates)

Can I register for courses if I am an international student?

Yes, Tekskills courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country’s regulations prior to enrolling in courses that prepare for certification.

Does this course prepare for a certification?

Yes, this course will prepare you for the Security Pro / CompTIA Security+  Certificate exams and you will receive exam vouchers after successful completion of the program and financial obligation.

When can I start this course?

This course is open enrollment, so you can register and start the course whenever you are ready. Access to your course can take 24-48 business hours.

How long does it take to complete this course?

After you register, you will have up to 6 months to complete the course. The time allotted for completion has been calculated based on the number of course hours.

What if I don’t have enough time to complete the course within the time frame provided?

If you are unable to complete the course, contact your  [email protected] to help you work out a suitable completion date. Please note that an extension fee will be charged. If you are funded through a third-party organization, approval may also be required.

What kind of support will I receive?

The course instructor will be available by email to answer any questions you may have and to provide feedback on your performance. Occasionally, your course may be supported by a team of industry experts. You will also be assigned a Student Advisor for academic support.

What happens when I complete the course?

Upon successfully passing the final exam, you will be awarded a certificate of completion from the school or organization that you registered through.

Am I guaranteed a job?

Tekskills courses will help you gain the skills you need to obtain an entry-level position in most cases. However, you should always research the job market in your area before enrolling.

Can I get financial assistance?

Tekskills courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses.

How can I get more information about this course?

If you have questions that are not answered on our website, representatives are available via LIVE chat.  If you are visiting us during non-business hours, please send us a question using the “Contact Us.” Link

You can apply to similar entry level open positions after you graduate from this course:

Information Security Jobs in Phoenix, AZ | Indeed.com

Upload your resume – Let employers find you