C)SP+: Certified Security Principles +

Become an EPIC Affiliate

To view the class schedule you need to become an Affiliate

  • Largest “Guaranteed To Run” public technical training schedules available
  • Easy to become an Affiliate – no charge or fee
Become an EPIC Affiliate

already an Affiliate?  Login

About this Course

Mile2’s Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control, and multi‐factor authentication become standard methods of protection. Students are given real-world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.

The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions.

Audience Profile

  • IT Professionals
  • Server Administrators
  • Network Administrators
  • Virtualization and Cloud Administrators
  • Anyone that needs a general understanding of security,
  • Those seeking the Security+Certification
  • 8570 Directive

At Course Completion

Upon completion, the Certified Security Principles+ candidate will not only be able to competently take the C)SP+ exam but will also understand the principle security knowledge to keep companies IP and IT infrastructure safe.
The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”),which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100
multiple choice questions.


Module 1
Introduction to IT Security
Understanding Security
Building a Security Program
CIA Triad
Governance, Risk, Compliance
State of Security Today
Module 2
Risk Management
Risk Management
Risk Assessment
Types of Risk, Threats and Vulnerabilities
Mitigating Attacks
Discovering Vulnerabilities and Threats
Responding to Risk
Module 3
Understanding of Cryptography
Understanding Cryptography
Symmetric Encryption
Asymmetric Encryption
Cryptography in Use
Module 4
Understanding Identity and Access Management
Identity Management
Authentication Techniques
Single Sign-on
Access Control Monitoring
Module 5
Managing Data Security
Virtualization Principles
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
The Layers
Relevant CCM Controls
Module 6
Data Security
Different Types of Storage
Encryption Options
Data Management
Module 7
Managing Server/Host Security
The Operating Systems
Hardening the OS
Physical security
Virtualization and Cloud Technologies
Module 8
Application Security for Non
Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Patch/Update/Configuration Management
Module 9
Understanding Mobile Device Security (IoT)
What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Corporate Management
Module 10
Managing Day to Day Security
Company Responsibilities
Product Management
Business Continuity Basics
Incident Response
Why Train?
Module 11
Understating Compliance and Auditing
Benefits of Compliance
What is Auditing


Recommended minimum
One-year of experience with server administration or network administration.
General understanding of business processes is beneficial.