Why choose this bootcamp?

icon

Exam taking Strategies

  • Practice with Performance Based Questions
  • Learn the best practices for preparing for CompTIA Security+ certification exam
icon

Live Mentorship

  • Instructor-led live classes
  • 25+ hours of mentored live lectures
icon

Dedicated Question bank

  • Carefully designed study material for the CompTIA Security+ certification exam

Who is this bootcamp for?

  • img

    Young Professionals

    who are looking to join the Cyber Security workforce

  • img

    Mid to Senior-level IT Professionals

    who are looking to build their credibility with a security certification

  • img

    Cyber security Professionals

    who want to apply new-age tools and experiment at their workplace

How will this bootcamp benefit you?

  • 1

    Step Ahead in Your Career

    Prepare for becoming a CompTIA Security+ certified Cyber Security Expert and learn exam-taking strategies.

  • 2

    Get complete coverage for the examination

    Learn about Attacks threats and vulnerabilities, Incident Response, and much more.

  • 3

    Get hands-on Cyber Security experience

    Learn to incorporate Cyber Security best practices and gain problem-solving skill.

Certificate from Great Learning

Upon successfully completing the Bootcamp, learners will receive a certificate of completion from Great Learning.

zoom icon certificate

Build techniques to attempt CompTIA Security+ Certificate Examination

Comprehensive Curriculum

5-6 Hours

Weekly Learning Commitment

2

Mock Exams

The curriculum has been developed by distinguished faculty from Great Learning meet the evolving needs of the Cyber world. Learners will be taught using a combination of learning methods. These include bite-sized lecture videos, Instructor-led online classes with special emphasis on strategies needed to take a strong attempt at the CompTIA Security+ Certificate Examination.

    Orientation

    In this first week of the program you will receive access to the learning platform. Getting to know each other will be the highlight of this week. Great Learning’s team will help you get on board with the program.

    Pre-Work (Optional)

    For professionals seeking a career in cyber security, we have a special course to fortify the fundamentals of cyber security solutions. With a strong foundation, your learning journey in cyber security culminating in the CompTIA Security+ certification will be more streamlined.

    Module 1: General Security Concepts

    Key Takeaways

    • Differentiate between the types of security controls and their implementation
    • Grasp the fundamental concepts of cybersecurity
    • Understand change management processes and its impact on security
    • Develop the ability to implement appropriate cryptographic solutions

    Topics

    • Types of Cybersecurity Controls
    • CIA (Confidentiality, Integrity, and Availability) Triad
    • Authentication, Authorization, and Accounting (AAA)
    • Zero Trust
    • Change management concepts
    • Cryptography
    • Blockchain
    • Digital Signatures and certificates

    Module 2: Threats, Vulnerabilities, and Mitigations

    Key Takeaways

    • Evaluate common threat actors and their motivation
    • Understand different types of threat actors, attack vectors and attack surfaces
    • Recognize the security concerns associated with various types of vulnerabilities
    • Learn to analyze indicators of malicious activities
    • Assimilate mitigation techniques used to secure the enterprise.

    Topics

    • Types and attributes of Threat actors
    • Attack Surfaces - Human Vectors, Unsecure Networks, Supply Chain vectors and Unsupported systems/applications
    • Types of vulnerabilities
    • Attacks on Application & Network
    • Malware-based attacks
    • Physical attacks
    • Cryptographic attacks
    • Mitigation Strategies

    Module 3: Security Architecture

    Key Takeaways

    • Delve into the implications of different architecture models in the context of cybersecurity.
    • Learn to apply security principles for securing enterprise infrastructure
    • Understand data protection strategies
    • Discover the importance of recovery and resilience in security architecture.

    Topics

    • Security implication of Cloud architecture, Network Infrastructure, Virtualization and Industrial COntrol Systems (ICS)
    • Security Considerations in different architecture models
    • Selection of effective controls
    • Types and classification of data
    • Methods to secure data
    • Continuity of Operations
    • Backups
    • High availability

    Module 4: Security Operations

    Key Takeaways

    • Learn to apply common security techniques to computing resources
    • Delve into the security implications of proper hardware, software, and data asset management.
    • Explore vulnerability management activities
    • Understand the usage of alerting and monitoring security technologies
    • Discover techniques to modify security policies to enhance security
    • Comprehend the techniques to implement and maintain identity and access management
    • Grasp the importance of automation and orchestration related to secure operations
    • Learn about implementing incident response activities
    • Understand the usage of data sources to support an investigation

    Topics

    • Methods to Identify Vulnerabilities
    • Vulnerability response and remediation
    • Monitoring computing resources
    • Cybersecurity tools and technologies - Firewall, IDS (Intrusion Detection System), IPS (Intrusion Prevention System), Email Security, Security Information And Event Management (SIEM), Data Loss Prevention (DLP)
    • Identity access management
    • Multifactor authentication
    • Use cases of automation and scripting
    • Incident response activities
    • Event Logs and Data Sources

    Module 5: Security Program Management and Oversight

    Key Takeaways

    • Understand the measures required for effective security governance
    • Learn about the elements of cybersecurity risk management
    • Recognize the processes associated with third-party risk assessment and management.
    • Understand the elements of effective security compliance
    • Delve into the types and purposes of audits and assessments.
    • Learn to implement security awareness practices

    Topics

    • Guidelines, Policies, Standards, and Procedures
    • Risk Identification and Assessment
    • Risk Management Strategies
    • Third-party risk assessment and management
    • Compliance Monitoring and reporting
    • Internal and External Audits
    • Security awareness practices.

Meet Your Faculty

Learn from leading academicians in the field of Cyber Security.

  • Aniket Amdekar - Faculty Director

    Aniket Amdekar

    General Manager - Cyber Defence Education

    Aniket is the lead faculty for PGP in Cyber Security and has over 15 years of experience in the field. He has worked with companies like Symantec, Microsoft, MakeMyTrip, and Walmart. He holds multiple certifications like CISSP and CISM.

    Read more
  • Vikas Singh Yadav - Faculty Director

    Vikas Singh Yadav

    Chief Information Security Officer

    Vikas Yadav is an experienced Information Security professional and has held multiple leadership roles. He has done his M.Tech (Computer Science) from IIT Kharagpur and also holds CISSP certification. His core interests lie in Cloud Security and securing digitally native startups. He is a military veteran and has served in the Indian Army with Information Security and Warfare roles. He actively mentors students for Cyber Security roles.

    Read more

Fees and Application Details

Program Fees:
1,800 USD

Apply Now

Benefits of learning with us

  • 6-weeks online Bootcamp
  • Online learning with personalized mentorship
  • Instructor-led live classes
  • Live doubt clearing with industry experts
  • Certificate of completion from Great Learning
  • Mind Maps to help you remember concepts
  • Free Exam Voucher

Application Process

1

Submit the application

Apply by completing a simple online application form.

2

Screening process

Go through a call with the admission director’s office to ensure that this bootcamp is a good fit for you

3

Join bootcamp

An offer letter will be rolled out to the select few candidates. Secure your seat by paying the admission fee.

Upcoming Application Deadline

Admissions are closed once the requisite number of participants enroll for the upcoming cohort. Apply early to secure your seat.

Apply Now

Deadline: 21st Dec 2024

Generic image

Reach out to us

We hope you had a good experience with us. If you haven’t received a satisfactory response to your queries or have any other issue to address, please email us at

help@mygreatlearning.com

Batch Start Dates

Online Center

Online

To be announced

(Limited seats available)

Contact Us

Please fill in the form and a program advisor will reach out to you. You can also reach out to us at

Speak with our expert +1 512-212-4186 or email to security-plus@mygreatlearning.com

career guidance