Event
CompTIA Security+ Bootcamp March Academic Break
March 16, 2026 6:00 PM – 10:00 PM PT
Bootcamps
CompTIA Security+ Bootcamp March Academic Break
Schedule
March 16, 2026 – March 19, 2026
6:00 PM — 10:00 PM PT

Bootcamp Overview:

This bootcamp is designed to prepare students for the CompTIA Security+ certification exam SY0-701. Throughout this intensive program, students will gain hands-on experience in foundational and advanced cybersecurity practices, helping them develop the skills needed to secure and defend modern enterprise environments.

Who Should Attend:

This course is ideal for candidates pursuing the CompTIA Security+ certification who are interested in establishing a career in cybersecurity or IT security. It is also beneficial for IT professionals seeking to gain foundational and intermediate security knowledge that will enhance their current roles.

What’s Included:

  • Four days of expert-led, live Security+ training (4 hours each day).
  • Access to exam preparation software tailored specifically to the SY0-701 exam.
  • Engaging practical exercises, review sessions, and a practice exam on the final day to ensure full preparedness.

Prerequisites:

Participants should have passed CIS120A and CIS120B to gain a basic understanding of IT concepts, including networking, computing devices, and systems administration. Familiarity with fundamental cybersecurity principles.

Recommended Resources:

CompTIA Security+ (SY0-701) Study Guide: Principles of Information Security, 7th Edition by Michael E. Whitman and Herbert J. Mattord. 2022

Certification Details:

This bootcamp prepares students to pass the CompTIA Security+ SY0-701 certification exam. Key domains and objectives covered in this course include:

  • 1.0 General Security Concepts 12%
  • 2.0 Threats, Vulnerabilities, and Mitigations 22%
  • 3.0 Security Architecture 18%
  • 4.0 Security Operations 28%
  • 5.0 Security Program Management and Oversight 20%

What You’ll Learn:

  • Basics of computing include input, processing, output, and storage.
  • Security Models and Strategies:
  • Understand Zero Trust Architecture and its role in modern security, focusing on adaptive identity, policy-driven access, and implicit trust zones.
  • Deception Techniques such as honeypots and honeynets to mislead attackers and enhance security intelligence.
Cloud-Specific Threats:
  • Identify and mitigate vulnerabilities unique to cloud environments, including containerization and serverless architectures.
  • Best practices for securing cloud-based infrastructure and avoiding common configuration pitfalls.
Advanced Cryptographic Techniques:
  • Encryption fundamentals (symmetric, asymmetric, hashing, salting) and their importance in data protection.
  • Key Management practices include Public Key Infrastructure (PKI), digital signatures, and the use of trusted hardware (e.g., TPM, HSM).
  • Advanced applications such as secure enclaves and certificate authorities to safeguard information assets.
Risk Management and Third-Party Security:
  • Strategies for managing third-party and vendor risk in enterprise environments, emphasizing policy controls and vendor assessments.
  • Overview of security frameworks for program management and oversight, ensuring consistent security operations.
Incident Response and Forensics:
  • Introduction to incident response phases (e.g., detection, containment, eradication) and the incident response lifecycle.
  • Use of digital forensics tools like Autopsy to identify and analyze digital evidence.
  • Hands-on scenarios to practice response protocols and forensics procedures.
IoT and Embedded Systems Security:
  • Security considerations for IoT, embedded, and specialized systems, addressing unique risks in these often-overlooked areas.
  • Real-world examples of securing IoT devices and mitigating vulnerabilities in embedded systems.
  • Automation in Security Operations:
  • Overview of Security Orchestration, Automation, and Response (SOAR) tools and their role in streamlining security processes.
  • Automating tasks like incident response, threat detection, and compliance monitoring for operational efficiency.
Vulnerability Scanning and CVSS:
  • Basics of vulnerability management with an emphasis on scanning tools and interpreting Common Vulnerability Scoring System (CVSS) scores.
  • Best practices for assessing, prioritizing, and remediating vulnerabilities to strengthen security posture.
Share This Event
Schedule
March 16, 2026 – March 19, 2026
6:00 PM — 10:00 PM PT

California Institution

401 Mile of Cars Way #100, National City, CA 91950

New Mexico Institution

1717 Louisiana Blvd., NE., Suite 208 Albuquerque, NM, 87110

California Institute of Applied Technology participates in the State Authorization Reciprocity Agreements.

California Institute of Applied Technology Logo

© 2026 California Institute of Applied Technology | info@ciat.edu | (877) 559 - 3621 | Privacy Policy

California Institute of Applied Technology has shared ownership and management of two distinct institutions. California Institute of Applied Technology located in California, and California Institute of Applied Technology located in New Mexico.

GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government website at https://www.benefits.va.gov/gibill. CIAT is approved to offer VA benefits. *Financial aid is available for those who qualify. *Students are encouraged to take certification exams while actively enrolled in their Certificate or Degree program. Unlimited certification exam attempts expire 180 days after graduation. Select exams are not eligible for unlimited retakes - see certification exam policy for details. Certifications or courses may change to address industry trends or improve quality