Call +91 8248680690 Email: info.wasa.educon@gmail.com

Welome to WASA Educational Consultancy

CompTIA Certified SecurityX Training

The CompTIA Certified SecurityX Training equips professionals with essential cybersecurity skills to manage risks, implement governance frameworks, and ensure compliance with legal regulations. Participants will gain hands-on knowledge in risk management strategies, security architecture, and cloud infrastructure, including zero-trust implementation and identity access management (IAM). The course also covers software security, operational resilience, and troubleshooting authentication frameworks.

This training also focuses on security engineering and operations, where learners will enhance endpoint security, configure network infrastructure, and apply cryptographic concepts. Participants will explore advanced security automation techniques, threat modeling, and real-world incident response strategies. The course provides in-depth insights into threat hunting tools, attack mitigation, and security monitoring, preparing professionals for critical roles in cybersecurity defense.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Course Code: M719

Fee

₹20,000,000.00

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to info@tertiarycourses.com.ng and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topic 1 Governance Risk and Compliance

  • Implement Appropriate Governance Components
  • Explain Legal Compliance
  • Apply Risk Management Strategies

Topic 2 Security Architecture and Design

  • Apply Software Development
  • Integrate Software Architecture
  • Support Operational Resilience
  • Implement Cloud Infrastructure
  • Integrate Zero Trust Concepts
  • Troubleshoot using AAA and IAM

Topic 3 Security Engineering

  • Enhance Endpoint Security
  • Configure Network Infrastructure
  • Initiate Security Automation
  • Apply Cryptography Concepts

Topic 4 Security Operations and Incident Response 

  • Perform Threat Modeling
  • Examine Security Monitoring
  • Analyze Known Attack Methods and Associated Mitigations
  • Apply Threat Hunting Tools and Technologies
  • Evaluate Incident Analysis and Response

Course Info

Prerequisite:

This is a intermediate courser. Participants should have basic knowledge on the following subjects:

  • HTML
  • CSS
  • Javascript
  • ES6 or Typescript
  • Basic React

Software Requirement

Pls download and install the following software prior to the class

HRDF Funding

Please refer to this video https://youtu.be/Kzpd-V1F9Xs

1-     HRD Corp Grant Helper

How to submit grant applications for HRD Corp Claimable Courses

2-     Employers are required to apply for the grant at least one week before training commences.

Employers must submit their applications with supporting documents, including invoices/quotations, trainer profiles, training schedule and course content.

3-     First, Login to Employer’s e-TRIS account -https://etris.hrdcorp.gov.my

Second, Click Application

4-     Click Grant on the left side under Applications

5-     Click Apply Grant on the left side under Applications

6-     Click Apply

7-     Choose a Scheme Code and select HRD Corp Claimable Courses: Skim Bantuan Latihan Khas. Then, click Apply

8-     Scheme Code represents all types of training that suit the requirements provided by HRD Corp. Below are the list of schemes offered by HRD Corp:

9-     Select your Immediate Officer and click Next

10-  Select a Training Provider, then click Next

11-  Please select a training programme from the list, then key in all the required details and click Next

Select your desired training programme.

Give an explanation on why the participant is required to attend the training. E.g., related to their tasks/ career development, etc.

Explain the background and objective of this training.

Select a relevant focus area. For Employer-Specific Courses, select ‘Not Applicable’.

12-  If the training programme is a micro-credential programme, you are required to complete these 3 fields. Save and click Next

Insert MiCAS Application number

13-  Based on the nine (9) pillars listed below, HRD Corp Focus Area Courses are closely tied to support government initiatives towards nation building. As such, courses offered through the HRD Corp Focus Areas are designed to provide the workforce with skills required for current and future demands. Details of the focus areas are as follows:

14-  Please select a Course Title and Type of Training

15-  Select the correct type of training according to the actual type of training, or as mentioned in the training brochure:

16-  Please key in the Training Location and click Next

17-  Please select the Level of Certification and click Next

18-  Please follow the instructions and key in trainee details

19-  Click Add Batch, then click Save

20-  Click Add Trainee Details

21-  Please key in all the required details, then click Add

22-  Click Add if there are more participants. Once done, click Save

23-  Click Next

24-  Please key in the course fees and allowance details, then click Save

25-  Estimated cost includes the course fees/external trainer fees, allowances, and consumable training materials. Please comply with the HRD Corp Allowable Cost Matrix.

26-  Select Upfront Payment to Training Provider and key in the percentage from 0% to 30%. Then, click Save and Next

27-  Complete the declaration form and select a desired officer

28-  Add all the required documents, then click Add Attachment. Then, click Save and Submit Application

29-  Once the New Grant Application is successfully submitted, the Grant Officer will evaluate the application accordingly. The application may be queried if additional information is required.

The application status will be updated via the employer’s dashboard, email, and the e-TRiS inbox.

Job Roles

  • Cybersecurity Analyst
  • Information Security Officer
  • Security Operations Center (SOC) Analyst
  • IT Security Consultant
  • Network Security Engineer
  • Cyber Risk Analyst
  • Governance, Risk, and Compliance (GRC) Specialist
  • Security Architect
  • IT Security Administrator
  • Cloud Security Engineer
  • Security Incident Response Specialist
  • Penetration Tester
  • Ethical Hacker
  • Threat Intelligence Analyst
  • Systems Security Engineer
  • DevSecOps Engineer
  • Security Compliance Manager
hnical Team Lead (overseeing UI development).

Trainers

Mohammad Reza Aminian: Mohammad Reza Aminian is a software engineer and PhD candidate in field of Artificial Intelligence with more than 4 years experience of teaching web technologies and scripting languages. skilled in PHP, JavaScript, system design, Laravel, and Vue.js frameworks. He has been involved in the development and implementation of web-based management systems, web applications and APIs in different organizations and companies.

Leong YH: Leong YH is a career trainer specializing in Java and open-source solutions such as Debian GNU/Linux, Liferay, Vaadin, Cayenne, PostgreSQL, J2EE and more. Though a CIMA graduate, he delights in learning and effective teaching a wide array of IT technologies to the uninitiated. For example, he taught COBOL in 1998.

Chee Tat: Chee Tat started his first job in startup - AMS. That's where he sharpened his skills in Full-stack Java Web Development, Software Design, and soft skills such as requirements gathering with client, client-handling during UAT, client training and "how to drive in and out from Singapore". 8 months later, AMS decided to promote Chee Tat as Team Lead after seeing his leadership potential. 4 years later, Chee Tat joined IBM via the headhunter. Started as an individual contributor, Chee Tat was playing around with many IBM Middleware/SOA products such as MQ, WMB and etc. Chee Tat also designed and built many Java programs combined with other IBM Middleware products as interfaces to the clients' legacy systems. 1 year later he was promoted as SOA Adapter Team Lead to lead 3-5 developers. Chee Tat's won 3 awards during his service with IBM.

Write Your Own Review

You're reviewing: CompTIA Certified SecurityX Training

  • Reload captcha

You May Be Interested In These Courses