A+, Net+, Security+

Hours: 240 / Access Length: 12 Months / Delivery: Online, Self-Paced
Retail Price: $3,464.00

Course Overview:

CompTIA A+, Network+, Security+ Authorized Training Partner
 
This comprehensive CompTIA A+ course prepares you for both the Core 1 (220-1201) and Core 2 (220-1202) certification exams. Beyond test preparation, the program focuses on building the demonstrable, hands-on skills that today's employers demand for entry-level IT support positions. Upon completion, you will be able to confidently perform essential duties by applying your knowledge across hardware, software, networking, and security.

The CompTIA Network+ certification validates your ability to install, configure, and manage wired and wireless networks. It demonstrates that you have the skills to troubleshoot common network problems and ensure network security. This certification is ideal for those who are beginning their careers in IT networking or want to validate their foundational network knowledge. Earning your CompTIA Network+ certification will give you a competitive edge in the job market and help you advance your IT career.

If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of IT security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your cybersecurity skill set so that you can confidently perform your duties in any entry-level security role.

On course completion of CompTIA A+ 220-1201 and 220-1202, you will be able to:

  • Install, configure, and troubleshoot PC hardware, mobile devices, and printers.
  • Install, manage, and secure operating systems like Windows, while also supporting other OS and mobile software.
  • Configure network hardware and services, support virtualization and cloud concepts, and implement SOHO network security.
  • Apply operational procedures for support, data management, and security.

On completion of the CompTIA Network+ (N10-009), you will be able to:

  • Explain the OSI and TCP/IP Models.
  • Explain properties of network traffic.
  • Install and configure switched networks.
  • Configure IP networks.
  • Install and configure routed networks.
  • Configure and monitor ports and protocols.
  • Explain network application and storage issues.
  • Monitor and troubleshoot networks.
  • Explain network attacks and mitigations.
  • Install and configure security devices.
  • Explain authentication and access controls.
  • Deploy and troubleshoot cabling solutions.
  • Implement and troubleshoot wireless technologies.
  • Compare and contrast WAN technologies.
  • Use remote access methods.
  • Identify site policies and best practices.

On completion of the CompTIA Security+ (SY0-701), you will be able to:

  • Summarize fundamental security concepts.
  • Compare threat types.
  • Explain appropriate cryptographic solutions.
  • Implement identity and access management.
  • Secure enterprise network architecture.
  • Secure cloud network architecture.
  • Explain resiliency and site security concepts.
  • Explain vulnerability management.
  • Evaluate network security capabilities.
  • Assess endpoint security capabilities.
  • Enhance application security capabilities.
  • Explain incident response and monitoring concepts.
  • Analyze indicators of malicious activity.
  • Summarize security governance concepts.
  • Explain risk management processes.
  • Summarize data protection and compliance concepts.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA A+ 220-1201, 220-1202, Network+ N10-009, and Security+ SY0-701 certification exams.

Course Outline:

CompTIA A+ 220-1201 Curriculum:
Lesson 1: What Does an IT Specialist Do?

You have finally secured a position in information technology (IT), and it begins today! Awesome, but what can you expect of your new position, and what work assignments should you expect each day? Answering the question of what your day-to-day "routine" will be is not an easy one, as different companies utilize technology for different purposes

Lesson 2: Installing Motherboards and Connectors

One of the main roles of a CompTIA A+ technician is to install and configure personal computer (PC) hardware. This hands-on part of the job is what draws many people to a career in information technology (IT) support. As an IT professional, you will set up desktop computers and help end users select a system configuration and peripheral devices that are appropriate to their work. You will often have to connect peripheral devices using the correct cables and connectors and install plug-in adapter cards.

To complete these tasks, you must understand how the peripheral devices and internal PC components are connected via the motherboard. As you may encounter many different environments in your work, you must also be able to distinguish and support both modern and legacy connection interfaces.

Lesson 3: Installing System Devices

The market for computer parts is complicated. There are many types of processors, memory modules, disk drives, and power supplies, each with different features. As a CompTIA A+ technician, you need to understand these features and know how they work together to build a computer that fits specific needs. You also need to solve compatibility problems and be confident in installing and removing these often expensive and delicate parts.

Lesson 4: Troubleshooting PC Hardware

You have recently been hired as an IT support specialist for a large corporation. The company has been experiencing a range of hardware-related issues that are affecting employee productivity. Your task is to diagnose and resolve these issues, ensuring that all desktop, laptop, and client devices are functioning optimally. The problems include system firmware settings, power and disk issues, and system and display problems. Your goal is to systematically troubleshoot and fix these issues. Each lesson will have more specific tasks within this scenario that could be solved with the information found within that lesson.

Lesson 5: Comparing Local Networking Hardware

Network support is a great competency for IT technicians at all levels to possess. In today's environment, standalone computing is a rarity. Just about every digital device on the planet today is connected to external resources via a network, whether it is a small office/home office (SOHO) network, a corporate WAN, or to the Internet directly.

The ability to connect, share, and communicate using a network is crucial for running a business and staying connected to everything in the world. As a CompTIA® A+® support technician, if you understand the technologies that underlie both local and global network communications, you can play an important role in ensuring that the organization you support stays connected.

This module will help you understand how different types of networks are categorized and how to compare and contrast network cabling, hardware, and wireless standards.

Lesson 6: Configuring Network Addressing and Internet Connections

You have just been assigned to work together with two colleagues on a project. The team has worked together before on a few projects, but this is the first time that the three of you are not in the same physical location. John is in Austin, Texas, Evan lives in London, and you are visiting Alice Springs, Australia. This remote location dynamic of the team will require time management from all members but also a reliance on technology solutions to facilitate meetings through a collaboration software application. To make this application work, your system needs to use a network address and several communication protocols. These communication protocols allow for a standard "language" to be used between devices across the Internet.

Several new hardware devices are used to make these Internet-wide communications occur. These include modems and radio antennas to connect to an internet service provider (ISP). The network addressing and forwarding function is performed by router devices and the Internet Protocol (IP).

This lesson will help you to compare the technologies that underpin Internet access and configure the main protocols in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite that enable communications between networks and the Internet.

Lesson 7: Supporting Network Services

Application protocols implement services such as web browsing, email, and file sharing. As well as computer server roles, modern networks use a variety of Internet security appliances and smart devices. Some networks are integrated with embedded system devices that underpin industrial technologies. While you will not have responsibility for configuring the devices and servers that run these applications, being able to summarize the functions and purposes of server roles will help you assist other technicians.

Being able to summarize the function of protocols up the network stack is also a prerequisite for troubleshooting network issues. When you are diagnosing connectivity problems with a host, you need to determine whether the issue is with a cable or adapter that you can resolve or whether there is a wider network or application server issue that you will need to escalate to senior support staff.

Lesson 8: Summarizing Virtualization and Cloud Concepts

You work at a mid-sized law firm that is transitioning to a more virtualized and cloud-based infrastructure. Your role involves managing client devices, supporting desktop and laptop users, and ensuring the smooth operation of virtualized environments and cloud services. The firm is looking to improve its hardware utilization, enhance security, and provide flexible, scalable solutions for its employees.

Lesson 9: Supporting Mobile Devices

This lesson focuses on mobile devices and how they differ from desktop systems in terms of features, upgrade/repair procedures, and troubleshooting. As a certified CompTIA® A+® technician, you will be expected to configure, maintain, and troubleshoot laptops, smartphones, and tablets. With the proper information and the right skills, you will be ready to support these devices as efficiently as you support their desktop counterparts.

Lesson 10: Supporting Print Devices

You work for a graphic design firm that specializes in creating marketing materials, including brochures, posters, and digital content for various clients. The firm relies heavily on a range of print devices, including multifunction printers, laser printers, inkjet printers, and 3-D printers, to produce high-quality outputs for client presentations and proofs. Your task is to ensure that all print devices are functioning optimally, are well-maintained, and that any issues are quickly resolved to minimize downtime and maintain productivity.

CompTIA A+ 220-1202 Curriculum:
Lesson 1: What Does an IT Specialist Do

You have finally secured a position in information technology (IT), and it begins today! Awesome, but what can you expect of your new position, and what work assignments should you expect each day? Answering the question of what your day-to-day "routine" will be is not an easy one, as different companies utilize technology for different purposes.

Lesson 2: Managing Support Procedures

Support for customers and clients provides an interesting dynamic to working as an IT specialist. Every issue is something new to learn and resolve. While the issues change, the process by which we resolve them should not vary much issue to issue. Imagine you have been assigned to resolve an issue with an employee's laptop. This employee works remotely in another time zone, and you will need to rely on email and phone conversations to work through the troubleshooting steps. Ensuring that you communicate efficiently and effectively will be key to handling the issue as a professional.

As you work through the process, you will also need to ensure you are documenting the steps you have taken and the results of any test you have run. In some cases, the problem will not be resolved in the same day and other team members may need to continue to find a solution after your shift ends. Tracking and documentation of steps taken thus far allows them to continue the process rather than starting all over again with the issue. Understanding which application you are working with and ensuring the correct operating system has been identified will be helpful in finding a resolution as well.

Lesson 3: Configuring Windows

The operating system (OS) is the software that provides a user interface to the computer hardware and provides an environment in which to run software applications and create computer networks. As a professional IT support representative or PC service technician, your job will include installing, configuring, maintaining, and troubleshooting personal computer (PC) operating systems.

Before you can perform any of these tasks, you need to understand the basics of what an operating system is, including the various versions, features, components, and technical capabilities. With this knowledge, you can provide effective support for all types of system environments.

In this lesson, you will learn how the basic administrative interfaces for Microsoft® Windows 10® and Microsoft® Windows 11® can be used to configure user and system settings.

Lesson 4: Managing Windows

The rapidly growing e-commerce company you work for is expanding its operations and upgrading its IT infrastructure to handle increased online traffic and improve internal processes. Your role is to ensure that all desktop and laptop devices are configured correctly, maintained efficiently, and securely connected to the network, while also providing support for any technical issues that arise during the transition.

Lesson 5: Supporting Windows

Supporting an operating system is a greater challenge than simply being able to use the various configuration utilities, management consoles, and commands. To support an OS, you must be able to plan the deployment of software, train and assist users, and troubleshoot problems. As well as technical challenges, there are operational and business factors to consider when installing operating systems and third-party software. Troubleshooting requires knowledge of common symptoms and probable causes in addition to being able to use tools to recover a system or data files. This lesson will help prepare you to meet these challenges so that you can play an effective support role.

Lesson 6: Securing Windows

As a CompTIA A+ technician, your duties will include setting up and configuring computers so that they can connect to a network. By installing, configuring, and troubleshooting networking capabilities, you will be able to provide users with the connectivity they need to be able to perform their job duties.

Once you have the computer network up and running, you can start to configure it to provide useful services. File and print sharing are key uses of almost every network. When configuring these resources, you must be aware of potential security issues and understand how to set permissions correctly to ensure that data is only accessible to those users who really should have been authorized to see it.

Along with permissions, you will also need to manage user accounts on networks. Windows networks can use local accounts within workgroups or centralized Active Directory accounts on a domain network. In this lesson, you will learn some basic principles for managing users in both types of environments.

Lesson 7: Installing Operating Systems

A mid-sized healthcare clinic is planning to upgrade its office IT infrastructure. The clinic currently uses a mix of outdated Windows editions and hardware. Your task is to ensure a smooth transition to the latest Windows editions, optimize system performance, and implement efficient installation and upgrade processes across all client devices, ensuring compliance with healthcare industry regulations such as HIPAA.

Lesson 8: Supporting Other OS

You work for a mid-sized educational institution, TechEd Academy, which provides both in-person and online courses. The institution uses a diverse range of operating systems across its computer labs, faculty offices, and student devices, including Linux and macOS. Your role involves ensuring seamless operation, security, and support for these systems, enabling faculty and students to focus on teaching and learning without technical interruptions.

Lesson 9: Configuring SOHO Network Security

As a CompTIA A+ technician, you are in a position to identify potential security issues before they become big problems. By identifying security threats and vulnerabilities, as well as some of the controls that can counteract them, you can help keep your organization's computing resources safe from unauthorized access. In this lesson, you will identify security threats and vulnerabilities, plus some of the logical and physical controls used to mitigate them on SOHO networks.

Lesson 10: Managing Security Settings

Firewalls provide a security border around a network, but this secure border is not sufficient to protect against insider threats, advanced malware, or sophisticated threat-actor tactics and techniques. Most organizations deploy defense in depth controls to ensure that each endpoint— computer, laptop, smartphone, or tablet— is deployed in a hardened configuration in terms of both the OS and the web browser software.

Despite best efforts to assess risks and deploy countermeasures, most networks will suffer from security incidents. As an IT specialist, you will need to be able to use best practice methods and tools to identify and eliminate malware and other intrusions to minimize the impact of these incidents.

Lesson 11: Supporting Mobile Software

You work for a logistics and transportation company, which relies heavily on mobile devices for tracking shipments, managing logistics, and communicating with drivers on the road. Recently, the company has experienced several issues with mobile device security and performance, impacting operational efficiency. Your task is to ensure that all mobile devices used by the company are secure, perform optimally, and comply with company policies to maintain smooth logistics operations.

Lesson 12: Using Data Security

As a CompTIA A+ technician, you will usually perform support tasks within the context of a company's operational procedures. These procedures include performing data backups and recovery, handling different types of sensitive data, and even integrating artificial intelligence into the organization's applications and workflows.

This lesson will help you to identify the technologies and best practices that underpin these important procedures.

Lesson 13: Implementing Operational Procedures

Documented procedures for employees and clients to follow ensure that a high level of service is maintained and that processes are completed with consistent outcomes. Having the documentation to support your operations, along with understanding the processes to follow should an incident or disaster occur, can ensure your organization can maintain progress as business needs change. Documentation of your organization's infrastructure ensures that you and your team of IT professionals have an awareness of the assets you are all responsible for. When changes are made to those assets, be it an update for the operating systems or a complete reconfiguration of an equipment rack, all changes should be documented so all team members are aware of the change.

CompTIA Network+ N10-009 Curriculum:

Lesson 1: Explaining Network Topologies

Computer networks are complex systems that incorporate multiple functions, standards, and proprietary technologies. The Open Systems Interconnection (OSI) model is used to try to simplify some of this complexity. It divides network technologies among seven functional layers. This makes it easier to separate and focus on individual concepts and technologies while retaining an understanding of relationships between functions of technologies placed in other layers.

This module uses the OSI model to give you an overview of the technologies that you will be studying in the rest of the course. You will compare the functions of these layers in the OSI model and apply those concepts to the installation and configuration of a small office/home office network.

You will also learn how to apply a methodology to structure troubleshooting activity, so that you can diagnose and resolve problems efficiently.

Lesson 2: Supporting Cabling and Physical Installations

At the Physical layer, networks are made from different cabling types and their connectors and transceivers. These establish direct links between nodes in a local segment. At the Data Link layer, nodes in these segments are given a standard means of exchanging data as frames.

As they are closely related, networking products often define standards for both the Physical and Data Link layers. While plenty of products have been used in the past, many cabled networks are now based on the Ethernet standards. Understanding the options and specifications for Ethernet are essential to building and supporting networks of all sizes.

In this module, you will summarize standards for deploying Ethernet over copper and fiber optic media types and identify the tools and techniques required to deploy and troubleshoot Ethernet cabling.

Lesson 3: Configuring Interfaces and Switches

Cabling establishes the links between nodes on the network, but each node also requires a network interface that both connects the cabling and performs the Data Link layer addressing and framing functions necessary for communications.

Also, not many networks are established by directly connecting each end system to every other local system. Cabling and support costs are reduced by using intermediate systems to establish local networks. These intermediate systems are deployed as network appliances such as hubs, bridges, and switches. Installing and configuring these devices will be a regular task for you during your career in network administration.

Lesson 4: Configuring Network Addressing

The Physical and Data Link layers covered in the previous course modules establish local links between nodes. At the Network layer—layer 3—these individual networks can be connected together into a network of networks, or internetwork.

In this module, you will identify the addressing and data delivery methods of the Internet Protocol (IP). IP is at the heart of most modern networks and consequently one of the most important topic areas for a network professional to understand and apply.

IP is implemented on network hosts using a wide variety of configuration interfaces and tools. You must be confident about selecting an appropriate tool to use to complete a particular support or troubleshooting task.

This module also introduces IPv6 addressing concepts and highlights some key differences between IPv6 and IPv4.

Lesson 5: Configuring Routing and Advanced Switching

Now that you are aware of the basic concepts of IP addressing and forwarding, you can start identifying ways that paths between networks are implemented. Routers work at layer 3 to aggregate information about neighboring networks and forward packets along an appropriate path to their final destination.

While configuring routing infrastructure is often a senior job role, you should understand basic concepts and be able to apply them to solve common issues.

Lesson 6: Implementing Network Services

Layers 1 through 3 of the OSI model are concerned with addressing and packet forwarding and delivery. This basic connectivity is established for the purpose of transporting application data. In this module, you will describe how protocols at layer 4 provision the transport services that network applications depend upon. Also, this module identifies application protocols that perform low-level network operations tasks, such as providing dynamic address or name resolution services.

Lesson 7: Explaining Application Services

Where DHCP and DNS support basic network operations, other Application layer protocols provide platforms for user-level services, such as websites, databases, file/printer sharing, email, and voice/video calling.

You must be able to identify the ports used by these services and their performance and security requirements so that you can assist with product deployments and upgrades and perform basic troubleshooting.

Lesson 8: Supporting Network Management

So far in this course, you have learned about all the different network media and topologies plus the application protocols that go toward building network connectivity and services. In this module, you will demonstrate use of tools and management methods that will help you document network assets, determine baselines, and optimize your network's performance.

Lesson 9: Explaining Network Security Concepts

You have identified the basic components and concepts for deploying and monitoring a network, but a network implementation is not complete without security mechanisms. In this module, you will describe basic concepts related to network security. As a networking professional, it is part of your responsibility to understand these fundamental concepts so that you can support network security controls.

Lesson 10: Applying Network Security Features

Authentication and authorization policies and systems enforce access control. Access control ensures that an organization's data is processed and stored securely. During your career in network support, you will often have to configure accounts and permissions and troubleshoot issues arising from access control.

Lesson 11: Supporting Network Security Design

The idea of an office network with web, file, and messaging services is a familiar one, but it is not the only use of networking. Networks are also used to support industrial and fulfillment processes, for example. The types and variety of services run over a network have a direct impact on its design, and on the security design especially. To support these diverse networks, you must be able to explain segmentation and security zone concepts. You should also be able to describe the technologies used to ensure the physical security of a network site.

Lesson 12: Configuring Wireless Networks

Wireless media technologies have distinct advantages for businesses over cabling. They can be easier to install to existing premises, and they support the device mobility that users require from laptop or smartphone-based access to networks. Wireless technology implementations offer various advantages, but you need to understand their limitations and security issues to support them properly in your network environments.

Lesson 13: Comparing Remote Access Methods

Most local networks require some sort of external connection, whether to the global Internet or within an enterprise WAN. These long-distance communications are typically facilitated by service provider links. Supporting WAN and Internet access effectively is an essential competency to learn.

User services and network management often require the creation of various types of remote access, including virtual private networks (VPNs). While remote access makes networks more usable and accessible, it also broadens the attack surface. You must understand the implications of different remote access models and protocols so that you can support their secure use.

Lesson 14: Summarizing Cloud Concepts

As the Internet becomes more robust and capable of matching the performance of local networks, many services are being moved from on-premises servers to cloud providers. Even where services are kept on-site, the different requirements and design principles of datacenters are essential competencies for network technicians at all levels.

This module completes the Network+ course by summarizing the software-driven virtualization, automation, and orchestration functionality that underpins cloud services.

CompTIA Security+ SY0-701 Curriculum:

Lesson 1: Summarize Fundamental Security Concepts

Security is an ongoing process that includes assessing requirements, setting up organizational security systems, hardening and monitoring those systems, responding to attacks in progress, and deterring attackers. If you can summarize the fundamental concepts that underpin security functions, you can contribute more effectively to a security team. You must also be able to explain the importance of compliance factors and best practice frameworks in driving the selection of security controls and how departments, units, and professional roles within different types of organizations implement the security function.

Lesson 2: Compare Threat Types

To make an effective security assessment, you must be able to explain strategies for both defense and attack. Your responsibilities are likely to lie principally in defending assets, but to do this you must be able to explain the tactics, techniques, and procedures of threat actors. You must also be able to differentiate the types and capabilities of threat actors and the ways they can exploit the attack surface that your networks and systems expose.

Lesson 3: Explain Cryptographic Solutions

The protect cybersecurity function aims to build secure IT processing systems that exhibit the attributes of confidentiality, integrity, and availability. Many of these systems depend wholly or in part on cryptography. As an information security professional, you must understand the concepts underpinning cryptographic algorithms and their implementation in secure protocols and services. A s trong technical understanding of the subject will enable you to explain the importance of cryptographic systems and to select appropriate technologies to meet a given security goal.

Lesson 4: Implement Identity and Access Management

Each network user and host device must be identified with an account so that you can control their access to your organization's applications, data, and services. The processes that support this requirement are referred to as identity and access management (IAM). Within IAM, authentication technologies ensure that only valid subjects (users or devices) can operate an account. Authentication requires the account holder to submit credentials that should only be known or held by them in order to access the account. There are many authentication technologies, and it is imperative that you be able to implement and maintain these security controls.

Lesson 5: Secure Enterprise Network Architecture

Managing user authentication and authorization is only one part of building secure information technology services. The network infrastructure must also be designed to run services with the properties of confidentiality, integrity, and availability. While design might not be a direct responsibility for you at this stage in your career, you should understand the factors that underpin design decisions, so that you can assist with analysis and planning.

Lesson 6: Secure Cloud Network Architecture

Cloud network architecture encompasses a range of concepts and technologies designed to ensure the confidentiality, integrity, and availability of data and applications within cloud-based environments. Cloud architecture and modern software deployment practices enable seamless integration, management, and optimization of resources within cloud-based environments. Key features include on-demand provisioning, elasticity, and scalability, which allow rapid deployment and dynamic adjustments to computing, storage, and network resources as required.

Lesson 7: Explain Resiliency and Site Security Concepts

Security architecture resilience refers to the design and implementation of systems and networks in a way that allows them to withstand and recover quickly from disruptions or attacks. This includes redundancy, fail-safe mechanisms, and robust incident response plans. By building resilience into the security architecture, cybersecurity teams ensure that even if a breach occurs, the impact is minimized, and normal operations can be restored quickly. Physical security protects personnel, hardware, software, networks, and data from physical actions and events that could cause severe damage or loss to an organization. This includes controls like access badges, CCTV systems, and locks, as well as sensors for intrusion detection. Physical security is a critical aspect of cybersecurity, as a breach in physical security can lead to direct access to systems and data, bypassing other cybersecurity measures.

Lesson 8: Explain Vulnerability Management

Vulnerability management is critical to any organization's cybersecurity strategy, encompassing identifying, evaluating, treating, and reporting security vulnerabilities in operating systems, applications, and other components of an organization's IT operations. Vulnerability management may involve patching outdated systems, hardening configurations, or upgrading to more secure versions of operating systems. For applications, it might include code reviews, security testing, and updating third-party libraries.

Lesson 9: Evaluate Network Security Capabilities

Secure baselines, hardening, wireless security, and network access control are fundamental concepts in cybersecurity. Secure baselines establish a set of standardized security configurations for different types of IT assets, such as operating systems, networks, and applications. These baselines represent a starting point for security measures, offering a defined minimum level of security that all systems must meet. Hardening is the process of reducing system vulnerabilities to make IT resources more resilient to attacks. It involves disabling unnecessary services, configuring appropriate permissions, applying patches and updates, and ensuring adherence to secure configurations defined by the secure baselines. Wireless security describes the measures to protect wireless networks from threats and unauthorized access. This includes using robust encryption (like WPA3), secure authentication methods (like RADIUS in enterprise mode), and monitoring for rogue access points.

Lesson 10: Assess Endpoint Security Capabilities

Security strategies may include additional considerations for mobile devices such as smartphones and tablets. While keeping the operating system and applications updated is still crucial, other practices such as disabling unnecessary features (like Bluetooth and NFC when not in use), limiting app permissions, and avoiding unsecured Wi-Fi networks become increasingly important. Installing trusted security apps, enabling device encryption, and enforcing screen locks are essential considerations. Mobile device management (MDM) solutions help manage and control security features across various mobile devices.

Lesson 11: Enhance Application Security Capabilities

Secure protocol and application development concepts are essential pillars of robust cybersecurity. Protocols such as HTTPS, SMTPS, and SFTP provide encrypted communication channels, ensuring data confidentiality and integrity during transmission. Similarly, email security protocols like SPF, DKIM, and DMARC work to authenticate sender identities and safeguard against phishing and spam. Secure coding practices encompass input validation to thwart attacks like SQL injection or XSS, enforcing the principle of least privilege to minimize exposure during a breach, implementing secure session management, and consistently updating and patching software components. Developers must also design software that generates structured, secure logs to support effective monitoring and alerting capabilities.

Lesson 12: Explain Incident Response and Monitoring Concepts

From a day-to-day perspective, incident response means investigating the alerts produced by monitoring systems and issues reported by users. This activity is guided by policies and procedures and assisted by various technical controls. Incident response is a critical security function, and will be a very large part of your work as a security professional. You must be able to summarize the phases of incident handling and utilize appropriate data sources to assist an investigation. Where incident response emphasizes the swift eradication of malicious activity, digital forensics requires patient capture, preservation, and analysis of evidence using verifiable methods. You may be called on to assist with an investigation into the details of a security incident and to identify threat actors. To assist these investigations, you must be able to summarize the basic concepts of collecting and processing forensic evidence that could be used in legal action or for strategic counterintelligence.

Lesson 13: Analyze Indicators of Malicious Activity

The preparation phase of incident response identifies data sources that can support investigations. It also provisions tools to aggregate and correlate this data and partially automate its analysis to drive an alerting and monitoring system. While automated detection is a huge support for the security team, it cannot identify all indicators of malicious activity. As an incident responder, you must be able to identify signs in data sources that point to a particular type of attack.

Lesson 14: Summarize Security Governance Concepts

Security governance is a critical aspect of an organization's overall security posture, providing a framework that guides the management of cybersecurity risks. It involves developing, implementing, and maintaining policies, procedures, standards, and guidelines to safeguard information assets and technical infrastructure. Security governance encompasses the roles and responsibilities of various stakeholders, emphasizing the need for a culture of security awareness throughout the organization. Governance frameworks must manage and maintain compliance with relevant laws, regulations, and contractual obligations while supporting the organization's strategic objectives. Effective security governance also involves continuous monitoring and improvement to adapt to evolving threats and changes in the business and regulatory environment.

Lesson 15: Explain Risk Management Processes

Effective risk management practices involve systematically identifying, assessing, mitigating, and monitoring organizational risks. Audits provide an independent and objective evaluation of processes, controls, and compliance, ensuring adherence to standards and identifying gaps that pose risks. On the other hand, assessments help evaluate the effectiveness of risk management strategies, identify potential vulnerabilities, and prioritize mitigation efforts. By combining audits and assessments, organizations can comprehensively understand risks, implement appropriate controls, and continuously monitor and adapt their risk management strategies to protect against potential threats. These practices are essential for maintaining proactive and resilient security operations while ensuring compliance with legal mandates.

Lesson 16: Summarize Data Protection and Compliance Concepts

Data protection and compliance encompass a range of practices and principles aimed at safeguarding sensitive information, ensuring privacy, and adhering to applicable laws and regulations. Data protection involves implementing measures to secure data against unauthorized access, loss, or misuse. It includes practices such as encryption, access controls, data backup, and secure storage. Compliance refers to conforming to legal, regulatory, and industry requirements relevant to data handling, privacy, security, and transparency. Organizations can safeguard individuals' privacy, ensure data security, fulfill legal requirements, and establish credibility with customers, partners, and regulatory authorities by comprehending and implementing these data protection and compliance principles. Compliance with applicable data protection laws, regulations, and standards is crucial for organizations to avoid legal liabilities, reputational damage, and financial penalties associated with noncompliance.

All necessary course materials are included.

Certification(s):

This course prepares students to take the CompTIA A+ 220-1201, 220-1202, Network+ N10-009, and Security+ SY0-701 certification exams.


System Requirements:

Internet Connectivity Requirements:

  • Cable, Fiber, DSL, or LEO Satellite (i.e. Starlink) internet with speeds of at least 10mb/sec download and 5mb/sec upload are recommended for the best experience.

NOTE: While cellular hotspots may allow access to our courses, users may experience connectivity issues by trying to access our learning management system.  This is due to the potential high download and upload latency of cellular connections.   Therefore, it is not recommended that students use a cellular hotspot as their primary way of accessing their courses.

Hardware Requirements:

  • CPU: 1 GHz or higher
  • RAM: 4 GB or higher
  • Resolution: 1280 x 720 or higher.  1920x1080 resolution is recommended for the best experience.
  • Speakers / Headphones
  • Microphone for Webinar or Live Online sessions.

Operating System Requirements:

  • Windows 7 or higher.
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:

  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari

Basic Software Requirements (These are recommendations of software to use):

  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is described in the above course outline.


** The course outlines displayed on this website are subject to change at any time without prior notice. **