CompTIA Security+ Mini Course
Crushing the CompTIA Security+ Exam
What's Included
- 4 Modules covering critical cybersecurity issues that every IT professional should know
By the End of This Course, You'll Be Able To...
- Explain key concepts of an adversary’s characteristics, their approach, and a few specific examples of how they attack a network
- Explain basic concepts of architecting security and give an example of a way we protect our network
- Explain key concepts in cryptography and how it protects our networks, data, and privacy
- Explain how security operations help ensure an organization remain security and reduce risk
Who is This Course For
- Anyone interested in passing the CompTIA Security+ exam
- Anyone who is looking to get into or advance their career in IT

Course Details
Price
Access Duration:
Course Format
Course Content
Welcome and Getting Started
This short initial module is to welcome you to the course and set you up for success in making it through the course.
Day 1 - Hacking Tactics, Techniques, and Procedures (TTPs)
Day 2 - Architecting Security
Day 3 - Cryptography
Part of architecting security is setting up good cryptography. In day 3, we’ll be the incredible world of cryptography and what it’s all about.
Day 4 - Security Operations
architecting and deploying secure systems isn’t enough to protect todays organizations. In day 4, we’ll explore the security functions of an organization and how the contribute to a fully functioning security program.
Instructor Bios

Andrew Grimes
With over 25 years of experience in IT, Andrew has a wealth of experience. His experience includes managing small- and large-scale networks, teaching networking and cybersecurity at the college level, and managing IT teams and departments. In his last role Andrew served as the IT Director for a SaaS company which had millions of users. Some of his accomplishments there were migrating their whole infrastructure to the cloud, developing a full security program and becoming SOC 2 Type 2 compliant, and a team of 15 to support the business technologies and provide end user support.