CompTIA Security+
Grow your cybersecurity skills with this CompTIA Security+ course.
Learn More
Docnito's 3 Month Course
Ready for a new start? This course includes 225 hours of training and is worth 15 credits. This training course is designed to equip you with the skills needed to begin your career in the cyber security field.
Why Take a Cyber security Course?
This program was built to help individuals learn how to apply cybersecurity practices to protect systems, data, and networks. As cyber threats evolve daily, it is more crucial than ever for organizations to successfully integrate strong security measures.
Why Choose Docnito?
- This is a transferable Pathway Course. Our partner college, the award winning CanScribe College accepts Docnito course credits allowing you to use this course as a transfer credit to CanScribe College.
- Docnito courses are also asynchronous allowing you to complete the course as fast as you would like and at whatever times you'd like.
- Our courses are 100% online, which means you never have to leave home to attend classes!
About This Course
Learn the Fundamentals in Just 3 Months!
Program Details
WHAT YOU WILL LEARN
Upon successful completion of this course, students will be able to compare a wide range of security controls and understand core cybersecurity principles, including the CIA triad, AAA, zero trust, and deception technologies. They will explain change management processes and apply cryptographic solutions, including encryption, PKI, hashing, and blockchain. Students will identify various threat actors, their motivations, and attack vectors, and assess vulnerabilities across systems and environments. They will analyze malicious activity, apply mitigation techniques, and compare infrastructure models like cloud, on-premises, IoT, and ICS. Emphasis will be placed on securing enterprise infrastructure, protecting data, ensuring resilience and recovery, and managing computing resources. Additionally, students will demonstrate skills in asset and vulnerability management, system monitoring, and configuring enterprise security tools. They will implement identity and access controls, understand automation and incident response processes, and use data sources for investigations. Finally, students will summarize security governance and compliance practices, conduct risk assessments, evaluate third-party risks, and promote security awareness throughout an organization.
Tuition
Check out our tuition page to see how our credits and tuition work.
Requirements
This program follows an open admission policy and does not require specific academic prerequisites. Applicants are expected to possess basic literacy, numeracy, and computer skills sufficient to participate in course activities. Enrollment is finalized upon completion of the application process and payment of applicable fees.
Curriculum
Chapter 1: Summarize Fundamental Security Concepts
Chapter 2: Compare Threat Types
Chapter 3: Explain Cryptographic Solutions
Chapter 4: Implement Identity and Access Management
Chapter 5: Secure Enterprise Network Architecture
Chapter 6: Secure Cloud Network Architecture
Chapter 7: Explain Resiliency and Site Security Concepts
Chapter 8: Explain Vulnerability Management
Chapter 9: Evaluate Network Security Capabilities
Chapter 10: Assess Endpoint Security Capabilities
Chapter 11: Enhance Application Security Capabilities
Chapter 12: Explain Incident Response and Monitoring Concepts
Chapter 13: Analyze Indicators of Malicious Activity
Chapter 14: Summarize Security Governance Concepts
Chapter 15: Explain Risk Management Processes
Chapter 16: Summarize Data Protection and Compliance Concepts
Chapter 17: Final Exam