CompTIA-IT Certification Career Advancement Bundle

Interactive self paced eLearning course

1 STUDENTS ENROLLED

    If you plan on obtaining several CompTIA certifications, this bundle is the way to go. By the time you complete A+ you will have the skills and credential to start working in the IT field. When you add on Network+, and Security+, you’ll have a well-rounded foundation that will allow you to advance your IT career in many directions. As you’ve probably seen the more certifications you achieve, the more income you’ll make! Since CompTIA certifications are vendor neutral by achieving any CompTIA certification you give yourself a broad array of skills to qualify you for a variety of IT positions.

    Included products:

    CompTIA A+

    CompTIA A+ certification validates foundation-level knowledge and skills necessary for a career in IT support. It is the starting point for an exciting career in IT. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting.The A+ certification is your entry ticket into the IT World. 92% of employers require A+ for entry level IT positions. Candidate job roles include technical support specialist, field service technician, IT support technician, IT support administrator and IT support specialist. CompTIA A+ is part of the certification track for corporations such as Microsoft, HP and Cisco. For anyone wanting to enter the IT world, the CompTIA A+ certification is a great start! The A+ by CompTIA is recognized as one of the top entry-level certifications in the industry. It provides you with a solid foundation in hardware, software and troubleshooting skills in order to build or supplement your technical knowledge. This online course will prepare you for the CompTIA A+ 220-901 and 220-902 exams (CompTIA A+ 900 Series).

    CompTIA Network+

    The exam covers network technologies, installation and configuration, media and topologies, management, and security. Candidate job roles include network administrator, network technician, network installer, help desk technician and IT cable installer. Companies such as Dell, HP, Ricoh, Sharp and Xerox recommend or require CompTIA Network+ for their networking technicians. It is a technical prerequisite option for IT technicians seeking to join the Apple Consultants Network, and is recognized by the U.S. Department of Defense. Network+ is the next logical step from A+ to build your skills in the arena of network infrastructure and support. This course prepares the student to take the CompTIA Network+ N10-007 certification exam. It covers all exam objectives, as well as additional topics that provide background and context. Demonstrations and instructor commentary throughout the course come from real-world experience, with examples and tips that the network professional can use in a production environment.

    In this course, you will:

    – Describe networking concepts
    – Explain the function and installation of network infrastructure components
    – Describe network operations concepts and implementation
    – Describe network security concepts and implementation
    – Explain network troubleshooting techniques and tool usage

    CompTIA Security+ (SY0-401)

    The Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-401 exam. The CompTIA Security+ course is designed to teach students security basics and prepare them for testing to become Security+ certified. The Security+ covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes up with Cryptography and Public Key Infrastructure. This covered everything from the ever-expanding virtualization of various computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow along. IT security is an ever-growing field and its importance is recognized universally throughout the industry. This security+ course will cover security concerns from both a professional setting and on a personal level. This gives students who do not plan to apply their certificate in the immediate future the benefit of keeping up to date on the latest security practices and techniques that they can follow to keep themselves secure in a digital world. Each of the modules of this course is designed to align with the official objectives of this certification and expand past the scope of the certification to allow for real life application. They give the student some real life examples of various attacks or security practices that they can both apply in real life or use to further their understanding of a course objective.


    CompTIA A+ 220-901

    Module 1 Introduction To Personal Computers And IT Certification
    „„
    1.1 Personal Computer ConceptsPart 1
    1.2 Personal Computer Concepts Part 2
    1.3 Becoming An IT Professional
    1.4 Certification Basics
    1.5 Review

    Module 2 Internal Hardware Components
    „„
    2.1 Motherboards Part 1
    2.2 Motherboards Part 2
    2.3 BIOS Part 1
    2.4 BIOSPart 2
    2.5 BIOSPart 3
    2.6 Power Supplies Part 1
    2.7 Power SuppliesPart 2
    2.8 Central Processing Unit Part 1
    2.9 Central Processing UnitPart 2
    2.10 Central Processing Unit Part 3
    2.11 MemoryPart 1
    2.12 MemoryPart 2
    2.13 Review

    Module 3 Storage Fundamentals
    „„
    3.1 Storage Overview
    3.2 Magnetic Drives
    3.3 Solid State And Flash Drives
    3.4 Optical Drives
    3.5 RAID Technologies
    3.6 Tape Drives
    3.7 Installing Hard Drives
    3.8 Review

    Module 4 Expanding Hardware Capabilities
    „„
    4.1 Expansion Components OvereviewPart 1
    4.2 Expansion Components OvereviewPart 2
    4.3 Expansion TechnologiesPart 1
    4.4 Expansion TechnologiesPart 2
    4.5 Video CardsPart 1
    4.6 Video CardsPart 2
    4.7 Sound Cards
    4.8 Networking Interface Cards
    4.9 Alternative Expansion Devices
    4.10 Review

    Module 5 Working With Peripheral Devices
    „„
    5.1 Peripheral Devices Overview
    5.2 Input Devices Part 1
    5.3 Input DevicesPart 2
    5.4 Input Devices Part 3
    5.5 Output Devices Video MonitorsPart 1
    5.6 Output DevicesVideo MonitorsPart 2
    5.7 Output Devices Video Monitors Part 3
    5.8 Output DevicesPrinters And ScannersPart1
    5.9 Output Devices Printers And Scanners Part2
    5.10 Output DevicesPrinters And ScannersPart 3
    5.11 Output Devices Printers And ScannersPart 4
    5.12 Input And Output Devices
    5.13 Review

    Module 6 Mobiles Devices
    „„
    6.1 Mobile Devices Overview
    6.2 Laptop Computer Components Part 1
    6.3 Laptop Computer ComponentsPart 2
    6.4 Laptop Computer Expansion Capabilities
    6.5 Replacing Portable Computer ComponentsPart 1
    6.6 Replacing Portable Computer ComponentsPart 2
    6.7 Additional Mobile Devices Part 1
    6.8 Additional Mobile DevicesPart 2
    6.9 Mobile Device Ports And Connectors
    6.10 Review

    Module 7 Computer Networking
    „
    7.1 Networking FundamentalsPart 1
    7.2 Networking Fundamentals Part 2
    7.3 Network DevicesPart 1
    7.4 Network Devices Part 2
    7.5 Cable And Connectors Part 1
    7.6 Cable And ConnectorsPart 2
    7.8 TCP/IP FundamentalsPart 1
    7.9 TCP/IP FundamentalsPart2
    7.10 TCP/IP FundamentalsPart3
    7.11 TCP/IP Fundamentals Part 4
    7.12 TCP/IP FundamentalsPart 5
    7.13 Internet Connectivity
    7.14 Wireless Networks Part 1
    7.15 Wireless NetworksPart 2

    Module 8 Hardware And Network Troubleshooting
    „„
    Troubleshooting Models Part 1
    Troubleshooting ModelsPart 2
    Troubleshooting Physical IssuesPart 1
    Troubleshooting Physical Issues Part 2
    Troubleshooting Physical IssuesPart 3
    Troubleshooting Networking Issues Part 1
    Troubleshooting Networking IssuesPart 2
    Troubleshooting Mobile Devices
    Troubleshooting Printers

    CompTIA Network+ N10-007 Course Description

    Prerequisites
    Students taking this course should meet the following pre-requisites:
    • CompTIA A+ certification or equivalent experience
    • At least 1 year of experience supporting TCP/IP networks
    Course Objectives
    By the end of this course, you will:
    • Describe basic networking concepts
    • Describe network infrastructure and explain how to deploy common network components
    • Describe network operations and explain how to support a production network
    • Describe network security concepts and explain how to implement basic network security
    • Describe network troubleshooting and explain how to use common tools to troubleshoot a network

    Lab Setup
    To enhance learning and reinforce concepts, students can participate in the activities as desired. To prepare your own lab environment, please see the lab setup manual CompTIA Network+ N10-007 Course Lab Setup Guide.
    NOTE:
    Some activities in this course include demonstrations using real-world tools. It is NOT a requirement to
    purchase or use these tools for successful completion of this course. Students are not expected to
    demonstrate the use of any particular tool during the exam. You WILL, however, have to be able to
    explain the purpose of all of the tools, how they work in general, and when it is appropriate to choose
    one particular tool over another.

    Module 1 – Networking Concepts
    1.1 Basic Networking
    You will explain basic networking.

    Topics:
    • Intro to networking
    • Networking architectures
    • Activity Basic Networking

    1.2 OSI Model
    You will explain devices, applications, protocols, and services at their appropriate OSI layers.
    Topics:
    • Layer 7 – Application
    • Layer 6 – Presentation
    • Layer 5 – Session
    • Layer 4 – Transport
    • Layer 3 – Network
    • Layer 2 – Data Link
    • Layer 1 – Physical
    • Activity Exploring the OSI Model

    1.3 Protocols and Ports
    You will explain the purposes and uses of ports and protocols.
    Topics:
    • Protocols and ports overview
    • Activity Examining Protocols and Ports
    • Connection-oriented vs. connectionless
    • Transmission Control Protocol (TCP)
    • User Datagram Protocol (UDP)
    • Activity Comparing TCP and UDP
    • Internet Protocol (IP)
    • Internet Control Messaging Protocol (ICMP)
    • Internet Group Messaging Protocol (IGMP)
    • Activity Examining the Lower Layer Protocols
    • Layer 7 Remote Control Protocols
    • Layer 7 File Transfer Protocols
    • Layer 7 Messaging Protocols
    • Activity Examining Messaging Protocols
    • Layer 7 Web Traffic Protocols
    • Layer 7 Streaming Media Protocols
    • Layer 7 Infrastructure Management Protocols

    1.4 Switching
    You will explain the concepts and characteristics of switching.
    Topics:
    • Packet-switched vs. circuit-switched networks

    • Properties of Network Traffic
    • Contention Management
    • Activity Creating Collision and Broadcast Domains
    • Interface Properties and Segmentation
    • Activity Creating a Basic Network Segment
    • Switching prt 2
    • Activity Switching
    • Switching Loop Management
    • Activity Managing Switching Loops
    • VLANs
    • Activity Creating VLANs

    1.5 Routing
    You will explain the concepts and characteristics of routing.
    Topics:
    • ARP
    • Activity Examining ARP
    • IP Addressing Basics
    • Activity Configuring IP
    • Routers
    • Activity Setting Up a Router
    • Routing Basics
    • Activity Adding Static Routes
    • VLAN Routing
    • Activity Routing Between VLANs
    • NAT/PAT
    • Activity Configuring NAT/PAT
    • Routing Protocols
    • Activity Configuring a Routing Protocol
    • Firewalls
    • Activity Configuring Firewalls

    1.6 Advanced Switching and Routing Concepts
    You will explain advanced switching and routing concepts.
    Topics:
    • IPv6 Concepts
    • Activity Exploring IPv6
    • Performance Concepts
    • Distributed Switching
    • Software-defined Networking

    1.7 IP Addressing
    You will, given a scenario, configure the appropriate IP addressing components.

    Topics:
    • Public vs. Private
    • Loopback and Reserved
    • Subnet Mask
    • Default Gateway
    • Virtual IP
    • Subnetting
    • Activity Learning to Subnet
    • Address Assignments

    1.8 Network Types and Topologies
    You will compare and contrast the characteristics of network topologies, types and technologies.
    Topics:
    • Wired Topologies
    • Wireless Topologies
    • Network Types
    • Technologies that Facilitate the Internet Of Things (IoT)
    • (No activity for this chapter)

    1.9 Wireless Technologies
    You will, given a scenario, implement the appropriate wireless technologies and configurations.
    Topics:
    • Radio Basics
    • 802.11 Standards
    • Wi-Fi Frequencies
    • Wi-Fi Antenna Concepts
    • Bluetooth
    • Cellular
    • Site Surveys
    • Activity Using an RF Spectrum Analyzer

    1.10 Cloud Concepts
    You will summarize cloud concepts and their purposes.
    Topics:
    • Types of Services
    • Cloud Delivery Models
    • Security Implications/Considerations
    • Activity Exploring Cloud Services

    1.11 Network Services
    You will explain the functions of network services.
    Topics:
    • DNS Service
    • Activity Setting up DNS
    • DHCP Service
    • Activity Setting Up DHCP
    • NTP
    • IPAM

    Module 2 – Infrastructure

    2.1 Cabling Solutions
    You will, given a scenario, deploy the appropriate cabling solution.
    Topics:
    • Media Types
    • Activity Testing a Fiber Optic Cable
    • Plenum vs. PVC
    • Connector Types
    • Activity Crimping on an RJ-45 Connector
    • Transceivers
    • Termination Points
    • Activity Terminating Cable to a 110 Block
    • Copper Cable Standards
    • Copper Termination Standards
    • Activity Creating a Crossover Cable
    • Ethernet Deployment Standards

    2.2 Network Device Placement and Installation
    You will, given a scenario, determine the appropriate placement of networking devices on a
    network and install/configure them.
    Topics:
    • Network Interface
    • Repeater
    • Hub
    • Bridge
    • Switch
    • Router
    • Modem
    • Wireless Access Point
    • Activity Setting up a WAP
    • Firewall

    • Media Converter
    • Wireless Range Extender
    • VoIP Endpoint

    2.3 Advanced Network Devices
    You will explain the purposes and use cases for advanced networking devices.
    Topics:
    • Multilayer Switch
    • Wireless Controller
    • Load Balancer
    • IDS/IPS
    • Proxy Server
    • Activity Configuring Proxy Settings
    • VPN Concentrator
    • AAA/RADIUS Server
    • UTM Appliance
    • NGFW/Layer 7 Firewall
    • VoIP PBX
    • VoIP Gateway
    • Content Filter

    2.4 Virtualization and Network Storage Technologies
    You will explain the purposes of virtualization and network storage technologies.
    Topics:
    • Virtual Networking Components
    • Network Storage Types
    • Connection Types
    • Jumbo Frames
    • (No activity for this chapter)

    2.5 WAN Technologies
    You will compare and contrast WAN technologies.
    Topics:
    • Service Types
    • Transmission Mediums
    • Characteristics of Service
    • Activity Configuring WAN Links
    • Termination

    Module 3 – Network Operations
    3.1 Documentation
    You will, given a scenario, use appropriate documentation and diagrams to manage the
    network.
    Topics:
    • Diagram Symbols
    • Standard Operating Procedures/Work Instructions
    • Logical vs. Physical Diagrams
    • Rack Diagrams
    • Change Management Documentation
    • Wiring and Port Locations
    • IDF/MDF Documentation
    • Labeling
    • Network Configuration and Performance Baselines
    • Inventory Management
    • Activity Using Documentation

    3.2 Business Continuity and Disaster Recovery
    You will compare and contrast business continuity and disaster recovery concepts.
    Topics:
    • Availability Concepts
    • Recovery
    • Activity Backing Up Your Data
    • MTTR
    • MTBF
    • SLA Requirements

    3.3 Scanning, Monitoring, and Patching
    You will explain common scanning, monitoring and patching processes and summarize their
    expected outputs.
    Topics:
    • Processes
    • Event Management
    • SNMP Monitors
    • Metrics
    • Activity Testing the Network

    3.4 Remote Access Methods
    You will, given a scenario, use remote access methods.
    Topics:
    • VPN
    • RDP
    • SSH
    • VNC
    • Telnet
    • HTTPS/Management URL
    • Remote File Access
    • Out-of-Band Management
    • Activity Making Remote Connections

    3.5 Policies and Best Practices
    You will identify policies and best practices.
    Topics:
    • Privileged User Agreement
    • Password Policy
    • On-boarding/Off-boarding Procedures
    • Licensing Restrictions
    • International Export Controls
    • Data Loss Prevention
    • Remote Access Policies
    • Incident Response Policies
    • BYOD
    • AUP
    • NDA
    • System Life Cycle
    • Safety Procedures And Policies
    • Activity Creating Policies and Procedures

    Module 4 – Network Security
    4.1 Physical Security Devices
    You will summarize the purposes of physical security devices.
    Topics:
    • Detection
    • Prevention
    • (No activity for this chapter)

    4.2 Authentication and Access Control
    You will explain authentication and access controls.
    Topics:
    • Authorization, Authentication, and Accounting
    • Multifactor Authentication
    • Access Control
    • Activity Examining Access Control Mechanisms

    4.3 Basic Wireless Network Security
    You will, given a scenario, secure a basic wireless network.
    Topics:
    • WPA
    • WPA2
    • TKIP-RC4
    • CCMP-AES
    • Authentication and Authorization
    • Geofencing
    • Activity Demonstrating the Need for Wireless Security

    4.4 Common Network Attacks
    You will summarize common networking attacks.
    Topics:
    • DoS
    • Social Engineering
    • Insider Threat
    • Logic Bomb
    • Rogue Access Point
    • Evil Twin
    • War-driving
    • Phishing
    • Ransomware
    • DNS Poisoning
    • ARP Poisoning
    • Spoofing
    • Deauthentication
    • Brute Force
    • VLAN Hopping
    • Man-in-the-Middle
    • Exploits vs. Vulnerabilities
    • Activity Conducting a Phishing Attack

    4.5 Network Device Hardening
    You will, given a scenario, implement network device hardening.
    Topics:
    • Changing Default Credentials
    • Avoiding Common Passwords
    • File Hashing
    • Generating New Keys
    • Activity Supporting Secure Authentication and Encryption
    • Upgrading Firmware
    • Patching and Updates
    • Disabling Unnecessary Services
    • Using Secure Protocols
    • Disabling Unused Ports

    4.6 Common Mitigation Techniques
    You will explain common mitigation techniques and their purposes.
    Topics:
    • Signature Management
    • Device Hardening
    • Change Native VLAN
    • Switchport Protection
    • Network Segmentation
    • Privileged User Account
    • File Integrity Monitoring
    • Role Separation
    • Restricting Access Via ACLs
    • Honeypot/Honeynet
    • Penetration Testing
    • Activity Implementing a Honeypot

    Module 5 – Network Troubleshooting and Tools
    5.1 Network Troubleshooting Methodology
    You will explain the network troubleshooting methodology.
    Topics:
    • Identify the Problem
    • Establish a Theory of Probable Cause
    • Test the Theory to Determine the Cause
    • Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
    • Implement the Solution or Escalate as Necessary

    • Verify Full System Functionality and , if Applicable, Implement Preventive Measures
    • Document Findings, Actions, and Outcomes
    • (No activity for this chapter)

    5.2 Using the Appropriate Tool
    You will, given a scenario, use the appropriate tool.
    Topics:
    • Hardware Tools – Basic Hand Held
    • Hardware Tools – Analyzers
    • Activity Troubleshooting with Hardware Tools
    • Software Tools – Testers and Analyzers
    • Activity Troubleshooting with Software Tools
    • Software Tools – Command Line
    • Activity Using Command Line Tools

    5.3 Troubleshoot Wired Connectivity and Performance
    You will, given a scenario, troubleshoot common wired connectivity and performance issues.
    Topics:
    • Signal Issues:
    • Attenuation
    • Latency
    • Jitter
    • Crosstalk
    • EMI
    • Activity Troubleshooting Signal Problems
    • Physical Issues:
    • Open/short
    • Incorrect pin-out
    • Incorrect Cable Type
    • Bad Port
    • Damaged cable
    • Bent pins
    • Transceiver Issues:
    • Transceiver mismatch
    • TX/RX reverse
    • Duplex/speed mismatch
    • Activity Troubleshooting Transceiver Problems
    • Traffic Flow Issues:
    • Bottleneck
    • VLAN mismatch
    • Network connection LED status indicators

    5.4 Troubleshoot Wireless Connectivity and Performance
    You will, given a scenario, troubleshoot common wireless connectivity and performance issues.
    Topics:
    • Signal Loss:
    • Attenuation
    • Reflection
    • Refraction
    • Absorption
    • Latency & Jitter
    • Antenna Issues:
    • Incorrect antenna type
    • Incorrect antenna placement
    • Incorrect WAP type
    • WAP Issues:
    • Interference
    • Channel overlap
    • Overcapacity
    • Distance limitations
    • Frequency mismatch
    • Power levels
    • Signal-to-noise ratio
    • WAP Misconfiguration:
    • Wrong SSID
    • Wrong passphrase
    • Security type mismatch
    • Activity Troubleshooting WAP Issues

    5.5 Troubleshoot Common Network Service Issues
    You will, given a scenario, troubleshoot common network service issues.
    Topics:
    • Common Network Issues:
    • Physical Connectivity
    • Incorrect IP Address
    • Incorrect Gateway
    • Incorrect Netmask
    • Names Not Resolving
    • Untrusted SSL Certificate
    • DHCP Issues:
    • Duplicate IP Addresses
    • Expired IP Address
    • Rogue DHCP
    • Exhausted DHCP Scope
    • Firewall/ACL Issues:

    • Blocked TCP/UDP Ports
    • Incorrect Host-based Firewall Settings
    • Incorrect ACL Settings
    • Advanced Network Issues:
    • DNS Server Issues
    • Duplicate MAC Addresses
    • Incorrect Time
    • Unresponsive Service
    • Hardware Failure
    • Activity Case Study: Troubleshooting an Unusual
    CompTIA A+ 220-901

    Module 1 Introduction To Personal Computers And IT Certification
    „„
    1.1 Personal Computer ConceptsPart 1
    1.2 Personal Computer Concepts Part 2
    1.3 Becoming An IT Professional
    1.4 Certification Basics
    1.5 Review

    Module 2 Internal Hardware Components
    „„
    2.1 Motherboards Part 1
    2.2 Motherboards Part 2
    2.3 BIOS Part 1
    2.4 BIOSPart 2
    2.5 BIOSPart 3
    2.6 Power Supplies Part 1
    2.7 Power SuppliesPart 2
    2.8 Central Processing Unit Part 1
    2.9 Central Processing UnitPart 2
    2.10 Central Processing Unit Part 3
    2.11 MemoryPart 1
    2.12 MemoryPart 2
    2.13 Review

    Module 3 Storage Fundamentals
    „„
    3.1 Storage Overview
    3.2 Magnetic Drives
    3.3 Solid State And Flash Drives
    3.4 Optical Drives
    3.5 RAID Technologies
    3.6 Tape Drives
    3.7 Installing Hard Drives
    3.8 Review

    Module 4 Expanding Hardware Capabilities
    „„
    4.1 Expansion Components OvereviewPart 1
    4.2 Expansion Components OvereviewPart 2
    4.3 Expansion TechnologiesPart 1
    4.4 Expansion TechnologiesPart 2
    4.5 Video CardsPart 1
    4.6 Video CardsPart 2
    4.7 Sound Cards
    4.8 Networking Interface Cards
    4.9 Alternative Expansion Devices
    4.10 Review

    Module 5 Working With Peripheral Devices
    „„
    5.1 Peripheral Devices Overview
    5.2 Input Devices Part 1
    5.3 Input DevicesPart 2
    5.4 Input Devices Part 3
    5.5 Output Devices Video MonitorsPart 1
    5.6 Output DevicesVideo MonitorsPart 2
    5.7 Output Devices Video Monitors Part 3
    5.8 Output DevicesPrinters And ScannersPart1
    5.9 Output Devices Printers And Scanners Part2
    5.10 Output DevicesPrinters And ScannersPart 3
    5.11 Output Devices Printers And ScannersPart 4
    5.12 Input And Output Devices
    5.13 Review

    Module 6 Mobiles Devices
    „„
    6.1 Mobile Devices Overview
    6.2 Laptop Computer Components Part 1
    6.3 Laptop Computer ComponentsPart 2
    6.4 Laptop Computer Expansion Capabilities
    6.5 Replacing Portable Computer ComponentsPart 1
    6.6 Replacing Portable Computer ComponentsPart 2
    6.7 Additional Mobile Devices Part 1
    6.8 Additional Mobile DevicesPart 2
    6.9 Mobile Device Ports And Connectors
    6.10 Review

    Module 7 Computer Networking
    „
    7.1 Networking FundamentalsPart 1
    7.2 Networking Fundamentals Part 2
    7.3 Network DevicesPart 1
    7.4 Network Devices Part 2
    7.5 Cable And Connectors Part 1
    7.6 Cable And ConnectorsPart 2
    7.8 TCP/IP FundamentalsPart 1
    7.9 TCP/IP FundamentalsPart2
    7.10 TCP/IP FundamentalsPart3
    7.11 TCP/IP Fundamentals Part 4
    7.12 TCP/IP FundamentalsPart 5
    7.13 Internet Connectivity
    7.14 Wireless Networks Part 1
    7.15 Wireless NetworksPart 2

    Module 8 Hardware And Network Troubleshooting
    „„
    Troubleshooting Models Part 1
    Troubleshooting ModelsPart 2
    Troubleshooting Physical IssuesPart 1
    Troubleshooting Physical Issues Part 2
    Troubleshooting Physical IssuesPart 3
    Troubleshooting Networking Issues Part 1
    Troubleshooting Networking IssuesPart 2
    Troubleshooting Mobile Devices
    Troubleshooting Printers

    CompTIA A+ 220-902

    Module 1: Introduction To Operating Systems

    1.1 Introduction

    1.2 Operating Systems Overview Part 1

    1.3 Operating Systems Overview Part 2

    1.4 Operating Systems Functions Part 1

    1.5 Operating Systems Functions Part 2

    1.6 Windows OS Versions Part 1

    1.7 Windows OS Versions Part 2

    1.8 Windows OS Versions Part 3

    1.9 Basic Navigation And Management Part 1

    1.10 Basic Navigation And Management Part 2

    Module 2: Installing Windows Operating Systems

    2.1 PreInstalling Task

    2.2 Performing Clean Installs Part 1

    2.3 Performing Clean Installs Part 2

    2.4 Performing Upgrades

    2.5 Migrating User Data

    Module 3: Configuration And Management In Windows

    3.1 Using Control Panel And PC Settings Part 1

    3.2 Using Control Panel And PC Settings Part 2

    3.3 Using Control Panel And PC Settings Part 3

    3.4 Using Graphical Administrative Tools Part 1

    3.5 Using Graphical Administrative Tools Part 2

    3.6 Using Graphical Administrative Tools Part 3

    3.7 Using Graphical Administrative Tools Part 4

    3.8 Using Command Line Administrative Tools

    3.9 Configuring Networking Part 1

    3.10 Configuring Networking Part 2

    3.11 Configuring Networking Part 3

    3.12 Operating System Security Part 1

    3.13 Operating System Security Part 2

    3.14 Operating System Security Part 3

    3.15 Windows Preventative Maintenance

    Module 4: Utilizing Alternative Operating Systems

    4.1 Mac And Linux Overview

    4.2 OS Features And Tools

    4.3 Best Practices Using Alternative Operating

    Systems

    4.4 Basic Command Line Administration In Linux

    4.5 Network Operating Systems Part 1

    4.6 Network Operating Systems Part 2

    Module 5: Virtualization And Cloud Computing

    5.1 Understanding Virtualization

    5.2 Basic Cloud Concepts

    Module 6: Managing Mobile Devices

    6.1 Mobile Devices Overview

    6.2 Mobile Operating Systems

    6.3 Network Connectivity And Email

    6.4 Mobile Device Synchronization

    Module 7: Understanding System Security

    7.1 Understanding Threats To Security Part 1

    7.2 Understanding Threats To Security Part 2

    7.3 Understanding Threats To Security Part 3

    7.4 Understanding Common Prevention Methods Part 1

    7.5 Understanding Common Prevention Methods Part 2

    7.6 Understanding Common Prevention Methods Part 3

    Module 8: Troubleshooting And Operational Procedures

    8.1 Troubleshooting Theory

    8.2 Communication And Professionalism Part 1

    8.3 Communication And Professionalism Part 2

    8.4 Operational And Safety Procedures

    8.5 Security And Privacy Guidelines For Troubleshooting

    8.6 Troubleshooting Operating Systems Part 1

    8.7 Troubleshooting Operating Systems Part 2

    8.8 Troubleshooting Mobile Devices Part 1

    8.9 Troubleshooting Mobile Devices Part 2

    8.10 Troubleshooting Common Security Issues Part 1

    8.11 Troubleshooting Common Security Issues Part 2

    8.12 Conclusion

    CompTIA SY0-501: Security+

    Module 1 – Threats, Attacks, and Vulnerabilities

    1.1 Introduction
    1.2 Types Of Malware – Part 1
    1.3 Types Of Malware – Part 2
    1.4 Types Of Attacks – Part 1
    1.5 Types Of Attacks – Part 2
    1.6 Types Of Attacks – Part 3
    1.7 Types Of Attacks – Part 4
    1.8 Types Of Attacks – Part 5
    1.9 Threat Actors – Part 1
    1.10 Threat Actors – Part 2
    1.11 Penetration Testing And Vulnerability Scanning – Part 1
    1.12 Penetration Testing And Vulnerability Scanning – Part 2
    1.13 Impact Of Vulnerabilities – Part 1
    1.14 Impact Of Vulnerabilities – Part 2

    Module 2 – Technologies and Tools

    2.1 Networking Hardware And Software – Part 1
    2.2 Networking Hardware And Software – Part 2
    2.3 Networking Hardware And Software – Part 3
    2.4 Networking Hardware And Software – Part 4
    2.5 Networking Hardware And Software – Part 5
    2.6 Networking Hardware And Software – Part 6
    2.7 Security Assessment – Part 1
    2.8 Security Assessment – Part 2
    2.9 Troubleshooting Issues – Part 1
    2.10 Troubleshooting Issues – Part 2
    2.11 Securing Mobile Devices – Part 1
    2.12 Securing Mobile Devices – Part 2
    2.13 Securing Mobile Devices – Part 3
    2.14 Securing Mobile Devices – Part 4
    2.15 Secure Protocols – Part 1
    2.16 Secure Protocols – Part 2

    Module 3 – Architecture and Design

    3.1 Secure Network Architecture – Part 1
    3.2 Secure Network Architecture – Part 2
    3.3 Secure System Designs – Part 1
    3.4 Secure System Designs – Part 2
    3.5 Secure Staging Deployment Concepts
    3.6 Embedded Systems – Part 1
    3.7 Embedded Systems – Part 2
    3.8 Application Development And Deployment – Part 1
    3.9 Application Development And Deployment – Part 2
    3.10 Application Development And Deployment – Part 3
    3.11 Physical Security Controls – Part 1
    3.12 Physical Security Controls – Part 2
    3.13 Physical Security Controls – Part 3
    3.14 Cloud Virtualization – Part 1
    3.15 Cloud Virtualization – Part 2

    Module 4 – Identity and Access Management

    4.1 Identity And Access Management – Part 1
    4.2 Identity And Access Management – Part 2
    4.3 Identity And Access Services – Part 1
    4.4 Identity And Access Services – Part 2
    4.5 Management Controls – Part 1
    4.6 Management Controls – Part 2
    4.7 Account Management Practices – Part 1
    4.8 Account Management Practices – Part 2
    4.9 Account Management Practices – Part 3

    Module 5 – Risk Management

    5.1 Organizational Security – Part 1
    5.2 Organizational Security – Part 2
    5.3 Business Impact Analysis Concepts – Part 1
    5.4 Business Impact Analysis Concepts – Part 2
    5.5 Risk Management – Part 1
    5.6 Risk Management – Part 2
    5.7 Incident Response Procedures – Part 1
    5.8 Incident Response Procedures – Part 2
    5.9 Forensics – Part 1
    5.10 Forensics – Part 2
    5.11 Disaster Recovery – Part 1
    5.12 Disaster Recovery – Part 2
    5.13 Types Of Control – Part 1
    5.14 Types Of Control – Part 2
    5.15 Data Security And Privacy Practices – Part 1
    5.16 Data Security And Privacy Practices – Part 2

    Module 6 – Cryptography and PKI

    6.1 Cryptographic Basics – Part 1
    6.2 Cryptographic Basics – Part 2
    6.3 Cryptographic Basics – Part 3
    6.4 Cryptographic Algorithms – Part 1
    6.5 Cryptographic Algorithms – Part 2
    6.6 Wireless Security – Part 1
    6.7 Wireless Security – Part 2
    6.8 Implementing PKI – Part 1
    6.9 Implementing PKI – Part 2
    6.10 Implementing PKI – Part 3
    6.11 Conclusion

    A common concern with eLearning is that you will be un-supported as a learner.  With our courses this is not so.  Not only will you be able to see questions asked by previous learners through subject forums, but you will be able to directly message the trainer if you are stuck or don’t understand something.

    Trainers will respond to your question(s) within 24 hours, but usually much quicker.

    Furthermore, our courses use multi-media and have been carefully designed to cater for different learning styles, preferences and abilities:

    • Visual Learners – our courses are visually engaging, with many diagrams and images to illustrate and highlight key points
    • Auditory Learners – our courses contain clear audio, delivered by subject specialists rather than actors, which we find helps ensure that emphasis is placed on the most important aspects
    • Kinaesthetic Learners – our courses have many test questions and inter-active exercises embedded within them to aid those who learn best through practising what they have learnt
    • Course Accessibility – if you have a hearing impairment, or need to turn the audio off a full transcripts are available within our courses

    Some benefits of eLearning include:

    • Learning can occur at a time and place to suit you – around your work commitments and lifestyle
    • You can repeat the course units, exercises and tests as many times as you like, until you are confident
    • It is often cheaper than classroom courses, and there are no travel costs!
    • Associated exams can also be taken at home, on-line at a time to suit you using ProctorU service

    This software has been made available over your network connection via your web browser. The design has been implemented in Adobe Flash and contains Adobe PDF files. Your system should have the following minimum specification:-

    • Windows7®, Vista® or XP®, MAC OSX or Linux Ubuntu
    • Broadband-grade connection (=>0.5MB/sec)
    • Web Browser IE7+, Firefox.

    The system should include the latest updates & service packs. The software is best viewed at 1024 x 768 or higher resolution, a soundcard with speakers or headphones is also recommended.

    Course Reviews

    No Reviews found for this course.

    BUY NOW
    • £499.00 Excl VAT
    • 365 Days
    • Unlimited access anywhere, any time for 12 months
    • 90 hours of content
    • Fast effective training, written and designed by industry experts
    • Track your progress with our Learning Management System
    • Support available
    • Learn at your own pace and leisure
    • Easier to retain knowledge and revise topics than traditional methods
    • Exam preparation quizzes, tests and mock exams to ensure that you are 100% ready

    Currency Converter

    Currency Conversions are estimates and should be used as a cost guide.

    Reviews

    Cart

    <

    Who’s Online

    There are no users currently online
    top
    Balance Global Facebook Balance Global Linkedin Balance Global Facebook

    Balance Global. All rights reserved. Registered Office: Kingsmead Internet Investments Ltd t/a Balance Global 16 Garston Lane, Kenley, Surrey CR8 5BA Registered in England. 6954654.The company's main country of operation is the United Kingdom. ITIL/PRINCE2/PRINCE2 Agile/MSP is a registered trade mark of AXELOS Limited,used under permission of AXELOS Limited. All rights reserved. The Swirl logo is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. APMG-International Change Management is a trade mark of The APM Group Limited. The APMG-International Change Management and Swirl Device logo is a trade mark of The APM Group Limited.