COMPTIA

Sort By:  
HARDWARE SUPPORT AND MAINTENANCE COMPTIA A+ (COMPTIA A+)

The CompTIA A+ course consists of two exams. Students need to clear both in order to achieve this certification.The first exam code is 220-901. The course contents for this exam include computer technology basics, basic networking tasks, and setup of different hardware like PCs, laptops etc. The other exam you need to appear for is CompTIA A+ 220-902. This exam is about installing and configuring operating systems of PCs. Individuals also need to learn how to configure common features like email and network connectivity. They are required to be proficient in performing such tasks on Apple iOS, Android OS, and other mobile phone operating systems. Students can appear for either of the exam series in order to gain CompTIA A+ certification.

  • General Knowledge and Terms
  • Recognize the roles of a computer service professional
  • Become familiar with the history of the computer
  • State the three stages of computing and identify associated devices
  • Recognize the difference between serial and parallel communication
  • Convert between binary, decimal and hexadecimal
  • Identify the ASCII value for a given character
  • Describe the function of the computer bus
  • Identify cables and connectors


Basic Electricity and Safety

  • Define common electricity terms
  • State Ohm's Law and its associated formula
  • Describe the difference between direct and alternating current
  • Demonstrate the proper use of a multimeter to test a computer power supply
  • Identify basic electronic components and their function
  • List several ways to avoid electro-static discharge
  • Recognize the importance of following proper safety procedures and list several safety precautions
  • Identify the common types of fire extinguishers
  • Motherboards and Processors
  • Recognize the function and styles of computer cases
  • Identify the components of the motherboard
  • List the functions of the motherboard and its associated components


Change CMOS settings

  • State the purpose of the POST test
  • State the function of and the difference between the computer bus and address bus
  • Identify the different types of processor mounts and socket types
  • Be familiar with the history of processors and cite the advancements – speed, data bus, address bus, cache, memory, etc.
  • State the procedure for installing a CPU
  • Determine the upgrade value for various CPUs


Memory

  • Define ROM and RAM
  • Calculate the amount of memory of a given DRAM chip
  • Recognize the relationship between processor speed and memory access time
  • Recognize the relationship between computer clock speed and RAM speed
  • Identify various memory chips and list the features of each
  • Identify various memory modules and list the features of each
  • Determine the number of SIMMs or DIMMs required to fill one memory bank of a 286, 486 and Pentium
  • Identify the memory configuration of a given computer
  • Demonstrate the proper technique for installing memory
  • Recognize memory problems and list options for repair
  • Compare logical, expanded and extended memory
  • List techniques to optimize memory


Power Supplies
 

  • Identify important issues to consider when replacing a power supply
  • List common types of power supplies
  • Estimate the amount of wattage necessary to power computer components
  • Identify connectors and their respective components to which they provide power
  • Demonstrate proper installation of P8 and P9 connectors to the motherboard
  • Identify cable colors and their respective wattage and tolerance
  • Identify molex and mini connectors and what components to which they provide power
  • List common types of power problems
  • Determine the best use of surge suppressors and uninterruptible power supply
  • Recognize the common symptoms of power problems


Storage Devices 

  • List the disk capacities of 5 ¼ and 3 ½ inch floppy disks
  • State the basic procedure for installing storage devices floppy disk drive, hard drive and CD-ROM
  • Identify the proper techniques for maintaining and troubleshooting storage devices floppy disk drive, hard drive and CD-ROM
  • Recognize the physical layout of data on hard drive
  • Check CMOS settings for floppy drive configuration
  • Determine CHS values
  • Prepare a hard drive for installation
  • Partition a hard drive
  • Recognize the structure and value of SCSI drives
  • Identify the current standards for multimedia computers


Buses 

  • Describe the function of expansion buses
  • List the common types of buses
  • Describe the development of the expansion bus
  • List the width and speed of various types of buses
  • Describe the importance of configuring expansion cards and addressing
  • Describe how cascading works
  • List the typical IRQ settings and causes of conflicts
  • List the function of DMA channels
  • List the settings for standard ports
  • Create a startup disk (with CD-ROM)
  • Identify system settings
  • Identify expansion bus
  • Disassembly, Reassembly, and Upgrading
  • Recognize the importance of preparation and documentation in the process of upgrading
  • Identify the components, use, and benefits of the tool kit
  • Demonstrate the proper and safe procedure for disassembly of a computer
  • Demonstrate the proper and safe procedure for re-assembly of a computer
  • List considerations regarding the installation of the following components: CPU, expansion card, IDE drive, and motherboard
  • List the proper procedure for installing the following components: CPU, expansion card, IDE drive, and motherboard 


Printers 

  • Identify the attributes of dot matrix, ink jet, and laser printers
  • List the typical troubleshooting techniques for dot matrix, ink jet, and laser printers
  • List the function of the toner cartridge components
  • Describe the laser printing process
  • Describe the technology used to enhance printing resolution
  • Install a printer driver


Monitors 

  • Define terminology related to computer monitors
  • Describe how the cathode ray tube operates
  • Describe the pros and cons of interlacing
  • Describe CRT sweeping
  • Calculate dots per inch given pitch measurement
  • Demonstrate the proper procedure for adjusting screen resolution
  • Calculate a monitor's viewable size given the horizontal and vertical resolution
  • Describe the four standard levels of operation
  • Demonstrate the proper procedure for adjusting the monitor
  • Identify three places to check when a monitor is not working
  • Recognize that internal servicing of a monitor is beyond the scope of A+ certified individuals
  • List ways to maintain a quality monitor image
  • List video display adapters and their basic features
  • Calculate the minimum memory requirement given resolution and color depth
  • List the types of memory available to use for video cards


Modems 

  • Define basic terms related to modems
  • Describe how modems function
  • Describe how parity is used
  • Describe the steps to install a modem
  • Define common information transfer protocols
  • Recognize the importance of modem standards
  • List possible causes and solutions for troubleshooting modems


Portable Systems 

  • Identify and list the attributes of laptops, notebooks, sub-notebooks, and personal digital assistants (PDA)
  • Describe the four PCMCIA types
  • Compare dual scan displays with active matrix displays
  • Identify the key portability issues with processors, memory and hard disk drives
  • Recognize the importance of voltage reduction and power management
  • Describe the trackball, trackpoint, and trackpad pointing devices
  • Describe and compare the current battery technology


Networking Concepts
 

  • Compare a Local Area Network (LAN) to a Wide Area Network (WAN)
  • Describe the basic types of networks
  • Diagram network topology
  • Describe the procedure for installing a network interface card
  • Identify network cabling
  • Describe the primary access methods
  • Define network protocols
  • Describe the devices that can extend the limits of a LAN
  • List the probable causes for network problems
  • Define basic Internet terminology
  • Describe the fundamentals to getting Internet connectivity


Preventive Maintenance 

  • Identify the components of a cleaning tool kit
  • List the procedures for cleaning computer components – monitor, hard disk drives, floppy disk drives, keyboard and mouse
  • Clean the keyboard and mouse
  • List the procedure for cleaning dot-matrix, ink-jet, and laser printers
  • Recognize the importance of establishing a preventive maintenance schedule
  • Identify the recyclable items that require special disposal


Introduction to Operating Systems 

  • Compare operating system with application software
  • Describe the three components of operating systems – firmware, operating system
  • software and interface
  • Compare the command line interfaces with graphical user interface
  • Recognize the importance of DOS as the basis for today's operating systems
  • Identify real and protected mode
  • List the features of Windows operating systems
  • Working in a Command Line Prompt Environment
  • Define basic DOS terminology
  • List commonly used DOS commands and their function
  • View Help in DOS
  • List CONFIG.SYS and AUTOEXEC.BAT commands and their function
  • Determine the source of common problems and issues associated with DOS
  • List features of Windows 3.x
  • Working in a GUI Environment
  • Compare DOS and Windows 3.x system with Windows 9x
  • List features of Windows 9x
  • Describe the process of installing Windows 9x
  • Review the Device Manager
  • Describe the Registry and how to make changes using the Control Panel
  • Use the Control Panel to adjust the display settings
  • Managing Files and Disks in Windows 9x
  • Manage Files and Folders using Explorer and My Computer
  • Customize desktop using Active Desktop


Manage Disks 

  • Troubleshooting Windows 9x
  • Troubleshoot with System Monitor and Resource Meter
  • Use Backup, Disk Cleanup, and Drive Converter
  • Use Maintenance Wizard, ScanDisk, and Scheduled Tasks
  • Troubleshoot Printing Problems and Viruses


Windows Network OS 

  • Become familiar with Windows NT File Services and Security
  • Install, Upgrade, and Uninstall Windows Network OS
  • Troubleshoot Windows NOS
  • Learn about Windows Administrative Tools


Windows Desktop OS

  • Become familiar with the features and benefits of Windows Desktop OS
  • Install Windows Desktop OS
  • Become familiar with Windows Desktop OS Administrative Tools


Networks
 

  • Become familiar with Network Operating Systems
  • Find out how to share resources over a network
  • Learn the OSI model
  • Learn about Internet working
  • Staying on Top of Your Profession
  • Recognize the importance of staying current
  • List sources of support and information
  • List materials necessary to be prepared for troubleshooting
  • Describe troubleshooting techniques
  • Recognize the necessity of record keeping and documentation
Schedule for HARDWARE SUPPORT AND MAINTENANCE COMPTIA A+
CourseExam
CompTIA A+220-901,
220-902

2 Hours Daily 3 Times a Week

Total Duration 4 Months


Prerequisites
  • Basic Computer knowledge.
Recommended Courses and Certification:
  • Installing and Configuring Windows Server 2012
  • Network+
  • Server+
₵1,500.00
CERTIFICATE IN HARDWARE AND NETWORKING (COMPREHENSIVE) (CERTIFICATE IN HARDWARE AND NETWORKING)

INTRODUCTION

Over the years computers have become an integral part of the office environment. Aspiring professionals in the IT field need to understand the basics of computers. In addition, they need to acquire basic skills to solve common computer-related problems and enhance their productivity. Windows has emerged as one of the most widely used operating systems over the last decade. Windows is easy to use and has therefore become very popular. 

The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job.  In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems.

In addition, this course also addresses the latest skills needed by technicians, such as basic principles on how to secure a network and network technologies, media and topologies, devices, management, tools and security.

This course includes following modules:
Understand the fundamentals of computer technology, networking, and security.
Identify hardware, peripheral, networking, and security components of a computer.
Understand the basic functionality of the Windows OS.
Understand basic troubleshooting methodology.
Practice proper safety procedures while working with computers.
Effectively interact with customers and peers.
Identify and define network components, models, and protocols 
 Install, configure, and troubleshoot networks  
 Manage and monitor networks  
 Implement security methods to ensure network security
Describe the enterprise desktop life cycle.
Assess hardware and infrastructure readiness for enterprise level desktop deployment.
Identify and select the appropriate deployment option as per organizational requirements.
Deploy, manage, and secure desktops by implementing centralized policies.
Design, configure, and implement desktop settings
Manage and maintain an organizational desktop infrastructure.
Plan, configure, and implement user state virtualization. 
  

INTERNATIONAL CERTIFICATION EXAMS

CompTIA A+ 220-901

CompTIA A+ 220-902

CompTIA N+ N10-007

COURSE CONTENTS/MODULES

Part 1 - Installing, Configuring, Managing, & troubleshooting a PC (A+) (54 Hours)

After completing this course, the students should be able to:
Describe computers and their components. 
Install, maintain, and troubleshoot computer components and peripherals. 
Diagnose and troubleshoot issues affecting laptops and personal computing devices. 
Install and configure the Windows OS.
Describe OS boot sequences, methods, user interfaces, startup utilities, and system tools and utilities. 
Carry out preventative maintenance and safety procedures. 
Describe computer networks, their components, network connectivity options and methods. 
Mitigate computer security threats. 
Describe green computing and its approaches. 
Appropriately use communication skills at the workplace.



Paart 2 - Protocol & Internetworking Standards (N+) (44 Hours)

After completing this course, the students should be able to:
Explore and summarize networking concepts. 
Install, configure, and troubleshoot wired and wireless networks. 
Identify the various network media types and connector types. 
Explore different network topologies.
Explore the LAN and WAN technologies. 
Identify and troubleshoot common connectivity issues.  
Analyze network traffic using the appropriate network monitoring resource. 
Implement wireless security measures. 
Identify the methods of network access security and user authentication. 
Identify common threats, vulnerabilities, and mitigation techniques in the context of network security.



Part 3 - Enterprise Business Desktop Deployment (42 Hours)

After completing this course, the students should be able to:
Understand desktop deployment 
Identify the different desktop deployment levels and methods 
Assess the network infrastructure for deployment and test application compatibility 
Identify deployment scenarios and challenges and guidelines for desktop deployment 
Understand the role of Active Directory Domain Services (AD DS) 
Identify image formats and the imaging process and create and maintain images
Plan and deploy desktops in a small business environment, medium business environment, and an enterprise business environment 
Install and configure Remote Desktop Services (RDS) 
Implement user state virtualization, desktop deployment support, and desktop security 
Monitor the desktop health using various tools and troubleshoot enterprise desktops

Course Content / Exam(s)

Schedule for CompTIA Network+ Training
CourseExam
CompTIA A+220-901 & 220-902
CompTIA N+N10-007

2 Hours Daily 3 Times a Week


Total Duration 1 Years

Prerequisites
  • Basic Computer knowledge.
Recommended Courses and Certification:
  • Installing and Configuring Windows Server 2012
  • Network+
  • Server+
₵1,500.00
CompTIA CySA+ Cybersecurity Analyst (Cybersecurity Analyst)


TARGET AUDIENCE

The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.

 

COURSE OBJECTIVES

The CompTIA CySA+ certification is a vendor-neutral credential. The CompTIA CySA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technical, “hands-on” focus on IT security analytics.

The CompTIA CySA+ exam is based on these objectives:
Threat Management
Vulnerability Management

  • Cyber Incident Response
  • Security Architecture and Tool Sets


 

COURSE CONTENT

  • 1. Threat Management
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
  • Procedures/common tasks: 
  • Topology discovery 
  • OS fingerprinting 
  • Service discovery 
  • Packet capture 
  • Log review 
  • Router/firewall ACLs review 
  • Email harvesting 
  • Social media profiling 
  • Social engineering 
  • DNS harvesting 
  • Phishing
  • Variables: 
  • Wireless vs. wired 
  • Virtual vs. physical 
  • Internal vs. external 
  •  On-premises vs. cloud
  • Tools:
  •  NMAP 
  •  Host scanning 
  •  Network mapping 
  •  NETSTAT 
  •  Packet analyzer 
  •  IDS/IPS 
  •  HIDS/NIDS 
  •  Firewall rule-based and logs 
  •  Syslog 
  •  Vulnerability scanner
  • Given a scenario, analyze the results of a network reconnaissance
  • Point-in-time data analysis: 
  • Packet analysis 
  • Protocol analysis 
  • Traffic analysis 
  • Netflow analysis 
  • Wireless analysis
  • Data correlation and analytics: 
  • Anomaly analysis 
  • Trend analysis 
  • Availability analysis 
  • Heuristic analysis 
  • Behavioral analysis
  • Data output: 
  • Firewall logs 
  • Packet captures 
  • NMAP scan results 
  • Event logs 
  • Syslogs 
  • IDS report
  • Tools: 
  • SIEM 
  • Packet analyzer 
  • IDS 
  • Resource monitoring tool 
  • Netflow analyzer
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure
  • Network segmentation: 
  • System isolation 
  • Jump box
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs: 
  • Sinkhole
  • Hardening: 
  • Mandatory Access Control (MAC) 
  • Compensating controls 
  • Blocking unused ports/services 
  • Patching
  • Network Access Control (NAC): 
  • Time-based 
  • Rule-based 
  • Role-based
  • Location-based
  • Explain the purpose of practices used to secure a corporate environment
  • Penetration testing: 
  • Rules of engagement
  • Reverse engineering: 
  • Isolation/sandboxing 
  • Hardware 
  • Software/malware
  • Training and exercises: 
  • Red team 
  • Blue team 
  • White team
  • Risk evaluation: 
  • Technical control review 
  • Operational control review 
  • Technical impact and likelihood
  • 2. Vulnerability Management
  • Given a scenario, implement an information security vulnerability management process
  • Identification of requirements: 
  • Regulatory environments 
  • Corporate policy 
  • Data classification 
  • Asset inventory
  • Establish scanning frequency: 
  • Risk appetite 
  • Regulatory requirements 
  • Technical constraints 
  • Workflow
  • Configure tools to perform scans according to specification: 
  • Determine scanning criteria 
  • Tool updates/plug-ins 
  • Permissions and access
  • Execute scanning
  • Generate reports: 
  • Automated vs. manual distribution
  • Remediation:
  • Prioritizing
  • Communication/change control
  • Sandboxing/testing
  • Inhibitors to remediation
  • Ongoing scanning and continuous monitoring
  • Given a scenario, analyze the output resulting from a vulnerability scan
  • Analyze reports from a vulnerability scan: 
  • Review and interpret scan results
  • Validate results and correlate other data points 
  • Compare to best practices or compliance 
  • Reconcile results 
  • Review related logs and/or other data sources 
  • Determine trends
  • Compare and contrast common vulnerabilities found in the following targets within an organization
  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure:
  • Virtual hosts
  • Virtual networks
  • Management interface
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices
  • 3. Cyber Incident Response
  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident
  • Threat classification: 
  • Known threats vs. unknown threats 
  • Zero day 
  • Advanced persistent threat
  • Factors contributing to incident severity and prioritization: 
  • Scope of impact
  • Types of data
  • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
  • Forensics kit: 
  • Digital forensics workstation 
  • Write blockers 
  • Cables 
  • Drive adapters 
  • Wiped removable media 
  • Cameras 
  • Crime tape 
  • Tamper-proof seals 
  • Documentation/forms
  • Forensic investigation suite:
  • Imaging utilities 
  • Analysis utilities 
  • Chain of custody 
  • Hashing utilities 
  • OS and process analysis 
  • Mobile device forensics 
  • Password crackers 
  • Cryptography tools 
  • Log viewers
  • Explain the importance of communication during the incident response process
  • Stakeholders:
  • HR
  • Legal
  • Marketing
  • Management
  • Purpose of communication processes:
  • Limit communication to trusted parties
  • Disclosure based on regulatory/legislative requirements
  • Prevent inadvertent release of information
  • Secure method of communication
  • Role-based responsibilities:
  • Technical 
  • Management 
  • Law enforcement 
  • Retain incident response provider
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response
  • Common network-related symptoms:
  • Bandwidth consumption
  • Beaconing
  • Irregular peer-to-peer communication
  • Rogue devices on the network
  • Scan sweeps
  • Unusual traffic spikes
  • Common host-related symptoms:
  • Processor consumption
  • Memory consumption
  • Drive capacity consumption
  • Unauthorized software
  • Malicious processes
  • Unauthorized changes
  • Unauthorized privileges
  • Data exfiltration
  • Common application-related symptoms:
  • Anomalous activity 
  • Introduction of new accounts 
  • Unexpected output 
  • Unexpected outbound communication 
  • Service interruption 
  • Memory overflows
  • Summarize the incident recovery and post-incident response process
  • Containment techniques:
  • Segmentation
  • Isolation
  • Removal
  • Reverse engineering
  • Eradication techniques:
  • Sanitization 
  • Reconstruction/reimage 
  • Secure disposal
  • Validation:
  • Patching
  • Permissions
  • Scanning
  • Verify logging/communication to security monitoring
  • Corrective actions:
  • Lessons learned report
  • Change control process
  • Update incident response plan
  • Incident summary report
  • 4. Security Architecture and Tool Sets
  • Explain the relationship between frameworks, common policies, controls, and procedures
  • Regulatory compliance
  • Frameworks:
  • NIST
  • ISO
  • COBIT
  • SABSA
  • TOGAF
  • ITIL
  • Policies:
  • Password policy
  • Acceptable use policy
  • Data ownership policy
  • Data retention policy
  • Account management policy
  • Data classification policy
  • Controls:
  • Control selection based on criteria
  • Organizationally defined parameters
  • Physical controls
  • Logical controls
  • Administrative controls
  • Procedures: 
  • Continuous monitoring 
  • Evidence production 
  • Patching 
  • Compensating control development 
  • Control testing procedures 
  • Manage exceptions 
  • Remediation plans
  • Verifications and quality control: 
  • Audits 
  • Evaluations
  • Assessments
  • Maturity model
  • Certification
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management
  • Security issues associated with context-based authentication:
  • Time
  • Location
  • Frequency
  • Behavioral
  • Security issues associated with identities:
  • Personnel
  • Endpoints
  • Servers
  • Services
  • Roles
  • Applications
  • Security issues associated with identity repositories:
  • Directory services
  • TACACS+
  • RADIUS
  • Security issues associated with federation and single sign-on:
  • Manual vs. automatic provisioning/deprovisioning
  • Self-service password reset
  • Exploits:
  • Impersonation
  • Man-in-the-middle
  • Session hijack
  • Cross-site scripting
  • Privilege escalation
  • Rootkit
  • Given ascenario, review security architecture and make recommendations to implement compensating controls
  • Security data analytics:
  • Data aggregation and correlation
  • Trend analysis
  • Historical analysis
  • Manual review: 
  • Firewall log 
  • Syslogs 
  • Authentication logs 
  • Event logs
  • Defense in depth:
  • Personnel
  • Processes
  • Technologies
  • Other security concepts
  • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
  • Best practices during software development:
  • Security requirements definition
  • Security testing phases
  • Manual peer reviews
  • User acceptance testing
  • Stress test application
  • Security regression testing
  • Input validation
  • Secure coding best practices:
  • OWASP
  • SANS
  • Center for Internet Security
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
  • Preventative:
  • IPS
  • HIPS
  • Firewall
  • Antivirus
  • Anti-malware
  • EMET
  • Web proxy
  • Web Application Firewall (WAF)
  • Collective:
  • SIEM
  • Network scanning
  • Vulnerability scanning
  • Packet capture
  • Command line/IP utilities
  • IDS/HIDS
  • Analytical:
  • Vulnerability scanning
  • Monitoring tools
  • Interception proxy
  • Exploit:
  • Interception proxy
  • Exploit framework
  • Fuzzers
  • Forensics:
  • Forensic suites
  • Hashing
  • Password cracking
  • Imaging

 

COURSE PREREQUISITES

While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience. It is recommended for CompTIA CySA+ certification candidates to have the following:

  • 3-4 years of hands-on information security or related experience
  • Network+, Security+, or equivalent knowledge

 

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 4 Months

₵4,500.00
NETWORKING SUPPORT AND MAINTENANCE (COMPTIA N+) (COMPTIA N+N10-007 )

CompTIA’s Network+ certification is an entry level vendor neutral certification for aspiring system and network administrators.
The Network+ course provides basic training in managing, maintaining, troubleshooting, installing and configuring a network infrastructure. 
Nine months of experience in network support or administration along with a CompTIA A+ certification is recommended before the Network+ course. Network+ certification is also a step towards attaining higher level vendor specific certifications such as Microsoft (MCSE, MCITP), Cisco (CCNA, CCNP) and Linux (Linux+, RHCE).

When an organization’s networks form the backbone of its operations, the network administrator has to ensure that its networks function smoothly at all times. For this, organizations require network administrators who have a thorough understanding of networking concepts, including network connectivity devices, signal transmission methods, network models, networking standards, and switching technologies.  

In the current global business environment where organizations may operate from several geographical locations, it is important that network administrators are able to manage and monitor networks efficiently. In addition, in the context of organizations’ need for greater security for their networks, data, and systems, network administrators must have the ability to implement security mechanisms to prevent and mitigate security attacks.  

This course equips students with comprehensive knowledge of networking concepts and the skills required to set up, manage, troubleshoot, and secure networks.

Schedule for CompTIA Network+ Training
CourseExam
CompTIA N+N10-007

2 Hours Daily 3 Times a Week


Total Duration 3 Months

Prerequisites
  • CompTIA A+ certification or equivalent knowledge, though CompTIA A+ certification is not required.
Recommended Courses and Certification:
  • Career Enabler™ - Linux Administrator
  • Career Enabler™ : CISCO (Network & Security)
  • CompTIA Security+
  • Linux+
  • RHCE
  • Server+
₵1,700.00
CompTIA Security+

COURSE OVERVIEW

This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience whose job role is focused on system security.

This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.


TARGET AUDIENCE

CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator.

COURSE OBJECTIVES

On course completion, you will be able to:

  • Identify network attack strategies and defenses.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of cryptographic standards and products.
  • Identify network- and host-based security technologies and practices.
  • Describe how wireless and remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.

COURSE CONTENT

Module 1 / Threats, Attacks, and Vulnerabilities

  • Indicators of Compromise
  • Why is Security Important?
  • Security Policy
  • Threat Actor Types
  • The Kill Chain
  • Social Engineering
  • Phishing
  • Malware Types
  • Trojans and Spyware
  • Open Source Intelligence
  • Lab - VM Orientation
  • Lab - Malware Types
  • Critical Security Controls
  • Security Control Types
  • Defence in Depth
  • Frameworks and Compliance
  • Vulnerability Assessments and Pentests
  • Security Assessment Techniques
  • Pen Testing Concepts
  • Vulnerability Scanning Concepts
  • Exploit Frameworks
  • Lab - Using Vulnerability Assessment Tools
  • Security Posture Assessment Tools
  • Topology Discovery
  • Service Discovery
  • Packet Capture
  • Packet Capture Tools
  • Remote Access Trojans
  • Honeypots and Honeynets
  • Lab - Using Network Scanning Tools 1
  • Lab - Using Network Scanning Tools 2
  • Lab - Using Steganography Tools
  • Incident Response
  • Incident Response Procedures
  • Preparation Phase
  • Identification Phase
  • Containment Phase
  • Eradication and Recovery Phases

Module 2 / Identity and Access Management

  • Cryptography
  • Uses of Cryptography
  • Cryptographic Terminology and Ciphers
  • Cryptographic Products
  • Hashing Algorithms
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Diffie-Hellman and Elliptic Curve
  • Transport Encryption
  • Cryptographic Attacks
  • Lab - Implementing Public Key Infrastructure
  • Public Key Infrastructure
  • PKI Standards
  • Digital Certificates
  • Certificate Authorities
  • Types of Certificate
  • Implementing PKI
  • Storing and Distributing Keys
  • Key Status and Revocation
  • PKI Trust Models
  • PGP / GPG
  • Lab - Deploying Certificates and Implementing Key Recovery
  • Identification and Authentication
  • Access Control Systems
  • Identification
  • Authentication
  • LAN Manager / NTLM
  • Kerberos
  • PAP, CHAP, and MS-CHAP
  • Password Attacks
  • Token-based Authentication
  • Biometric Authentication
  • Common Access Card
  • Lab - Using Password Cracking Tools
  • Identity and Access Services
  • Authorization
  • Directory Services
  • RADIUS and TACACS+
  • Federation and Trusts
  • Federated Identity Protocols
  • Account Management
  • Formal Access Control Models
  • Account Types
  • Windows Active Directory
  • Creating and Managing Accounts
  • Account Policy Enforcement
  • Credential Management Policies
  • Account Restrictions
  • Accounting and Auditing
  • Lab - Using Account Management Tools

Module 3 / Architecture and Design (1)

  • Secure Network Design
  • Network Zones and Segments
  • Subnetting
  • Switching Infrastructure
  • Switching Attacks and Hardening
  • Endpoint Security
  • Network Access Control
  • Routing Infrastructure
  • Network Address Translation
  • Software Defined Networking
  • Lab - Implementing a Secure Network Design
  • Firewalls and Load Balancers
  • Basic Firewalls
  • Stateful Firewalls
  • Implementing a Firewall or Gateway
  • Web Application Firewalls
  • Proxies and Gateways
  • Denial of Service Attacks
  • Load Balancers
  • Lab - Implementing a Firewall
  • IDS and SIEM
  • Intrusion Detection Systems
  • Configuring IDS
  • Log Review and SIEM
  • Data Loss Prevention
  • Malware and Intrusion Response
  • Lab - Using an Intrusion Detection System
  • Secure Wireless Access
  • Wireless LANs
  • WEP and WPA
  • Wi-Fi Authentication
  • Extensible Authentication Protocols
  • Additional Wi-Fi Security Settings
  • Wi-Fi Site Security
  • Personal Area Networks
  • Physical Security Controls
  • Site Layout and Access
  • Gateways and Locks
  • Alarm Systems
  • Surveillance
  • Hardware Security
  • Environmental Controls


Module 4 / Architecture and Design (2)

  • Secure Protocols and Services
  • DHCP Security
  • DNS Security
  • Network Management Protocols
  • HTTP and Web Servers
  • SSL / TSL and HTTPS
  • Web Security Gateways
  • Email Services
  • S/MIME
  • File Transfer
  • Voice and Video Services (VoIP and VTC)
  • Lab - Implementing Secure Network Addressing Services
  • Lab - Configuring a Secure Email Service
  • Secure Remote Access
  • Remote Access Architecture
  • Virtual Private Networks
  • IPSec
  • Remote Access Servers
  • Remote Administration Tools
  • Hardening Remote Access Infrastructure
  • Lab - Implementing a Virtual Private Network
  • Secure Systems Design
  • Trusted Computing
  • Hardware / Firmware Security
  • Peripheral Device Security
  • Secure Configurations
  • OS Hardening
  • Patch Management
  • Embedded Systems
  • Security for Embedded Systems
  • Secure Mobile Device Services
  • Mobile Device Deployments
  • Mobile Connection Methods
  • Mobile Access Control Systems
  • Enforcement and Monitoring
  • Secure Virtualization and Cloud Services
  • Virtualization Technologies
  • Virtualization Security Best Practices
  • Cloud Computing
  • Cloud Security Best Practices


Module 5 / Risk Management

  • Forensics
  • Forensic Procedures
  • Collecting Evidence
  • Capturing System Images
  • Handling and Analyzing Evidence
  • Lab - Using Forensic Tools
  • Disaster Recovery and Resiliency
  • Continuity of Operations Plans
  • Disaster Recovery Planning
  • Resiliency Strategies
  • Recovery Sites
  • Backup Plans and Policies
  • Resiliency and Automation Strategies
  • Risk Management
  • Business Impact Analysis
  • Identification of Critical Systems
  • Risk Assessment
  • Risk Mitigation
  • Secure Application Development
  • Application Vulnerabilities
  • Application Exploits
  • Web Browser Exploits
  • Secure Application Design
  • Secure Coding Concepts
  • Auditing Applications
  • Secure DevOps
  • Lab - Identifying a Man-in-the-Browser Attack
  • Organizational Security
  • Corporate Security Policy
  • Personnel Management Policies
  • Interoperability Agreements
  • Data Roles
  • Data Sensitivity Labeling and Handling
  • Data Wiping and Disposal
  • Privacy and Employee Conduct Policies
  • Security Policy Training

COURSE PREREQUISITES

Ideally, you should have successfully completed the "CompTIA Network+ Support Skills" course and have around 24 months' experience of networking support or IT administration. It is not necessary that you pass the Network+ exam before completing Security+ certification, but it is recommended. Specifically, it is recommended that you have the following skills and knowledge before starting this course:

  • Know the function and basic features of the components of a PC.
  • Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles).
  • Operate the Linux OS using basic command-line tools.
  • Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
  • Understand TCP/IP addressing, core protocols, and troubleshooting tools.

TEST CERTIFICATION

  • This course was created for the CompTIA Security+ Certification SY0-501 exam covering the 2017 Edition certification exam objectives.

FOLLOW ON COURSES

  • Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, including CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).

 

Price Includes International Curriculum Courseware And Very Active Real-Time Labs.

2 Hours Daily 3 Times a Week

Total Duration 4 Months

 

₵1,800.00
Per Page      1 - 5 of 5
  • 1