Sale!

Cyber Security for Beginners with Career Program

From: £99.59 / month for 12 months

Clear

Description

Description

If you’ve ever considered working within the cyber security industry, but felt you lacked the knowledge or skills to launch your career, this might be what you’re looking for.

This course is aimed at absolute beginners to IT who want to start a career in cyber security or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cyber security and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies such as computer systems and networks, which you will be taught through this course.

The Average Cyber Security Analyst Profile:

This course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this course, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the IT security industry across the globe.

From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cyber security will gradually begin to develop.

Upon completion of the course, you will exit with a series of globally respected certifications and a deeper knowledge of cyber security concepts. You will also possess a set of cyber security skills you can apply to a vast range of cyber security job roles.

Learn what the CompTIA Security+ can do for your career.

Course features

   Video Learning

Access to video based online learning material. Tutors use diagrams and illustrations to teach the classes, as well as giving demonstrations of equipment. Lessons are pre-recorded allowing you to  fast-forward, rewind and pause at any time throughout the lessons. Videos can be viewed on different devices including a desktop computer, laptop, tablet, and smart phone.

  Accessible from Anywhere

Your course can be done from any where in the world. If you decide to move to a different city or even country, you can continue with the course from wherever you are. All you need is a device such as a desktop computer, laptop, tablet, smart phone, and an internet connection.

   Live Practice Labs

Access live practice labs, allowing you to put your course skills to the test in a live simulated environment. For instance, learn how to setup a firewall to protect a network from cyber attacks. The live labs have two functions: 1. guided exercises, instructing you to carry out tasks; 2. sand box environment, allowing you to play with the online equipment to test out your skills. Click here to learn more about the live labs.

  MeasureUP Practice Tests

Before you sit an exam, you will be given access to a MeasureUP practice test. These tests have two modes: 1. practice-mode, allowing you learn the questions and answers with resources included; 2. certification mode, allowing you to test yourself with a limited time and without the answers. These tests are the closest experience to the real exams. MeasureUP have been the gold standard in exam preparation for over 20 years.

  Exam Fees Paid

Your course comes with official CompTIA exam vouchers. This means all exam fees are fully paid. Exams must be taken at your local testing center. There are testing centers all over the country and across the globe. For most people, their nearest test center is less than 30 miles from their home or office. We will locate your nearest testing center.

   CompTIA Certifications

You will receive three certifications from CompTIA: the A+, Network+, and Security+ upon passing your exams. These certifications are globally recognised, meaning you can work any where in the world with them. CompTIA certifications are held in high regard by IT employers and IT recruiters. Click here to view salary and employment information.

  Tutor Support

If you ever get stuck during your studies, tutor support is available 24/7, 363 days of the year. As part of your course, you’ll have access to a live chat window allowing you to communicate with a team of tutors. The tutor is also able to speak with you over the phone if they feel it will help you. They can even give on-screen demonstrations and send you attachments.

  Career Program

As part of your course, you will get access to our Career Program to help you into work upon completion of your course. The Career Program includes: cover letter and CV preparation, Linkedin account creation, full career assessment, employment case management, active job search, short-listing for job roles, coordination with employers to secure employment opportunities, completion of application forms for IT roles, and interview planning and preparation. Click here to learn more about the Career Program.

  Spread the cost

Spread your course payments over 12 monthly installments. There’s no interest or charges. Only one application form to fill out. Click here to begin your application.

 

What’s it like to work in cyber security?

Course syllabus

1. CompTIA IT Fundamentals FC0-U51 (NO EXAM)

Module 1: Software

1.1 Course And Instructor Introduction
1.2 Software Operating Systems – Part 1
1.3 Software Operating Systems – Part 2
1.4 Software Operating Systems – Part 3
1.5 Software Operating Systems – Part 4
1.6 Software Operating Systems – Part 5
1.7 Common FileTypes – Part 1
1.8 Common FileTypes – Part 2
1.9 Software Management Best Practices – Part 1
1.10 Software Management Best Practices – Part 2
1.11 Alternative Software Technologies
1.12 Basic Software Features And Functions

Module 2: Hardware and IT

2.1 Basic Wired And Wireless Peripherals – Part 1
2.2 Basic Wired And Wireless Peripherals – Part 2
2.3 Basic Wired And Wireless Peripherals – Part 3
2.4 Common Computer Connector Types – Part 1
2.5 Common Computer Connector Types – Part 2
2.6 Internal Computer Components – Part 1
2.7 Internal Computer Components – Part 2

Module 3: Security

3.1 Basic Security Threats – Part 1
3.2 Basic Security Threats – Part 2
3.3 Basic Security Threats – Part 3
3.4 Security Best Practices – Part 1
3.5 Security Best Practices – Part 2
3.6 Web-Browsing Best Practices
3.7 Web-Browsing Best Practices Demo – Part 1
3.8 Web-Browsing Best Practices Demo – Part 2
3.9 Web-Browsing Best Practices Demo – Part 3

Module 4: Networking

4.1 Setup And Configure Basic SOHO Router
4.2 Wireless Router Demo
4.3 Compare And Contrast Cellular Wireless And Wire Data Connections
4.5 Compare And Contrast Different Methods OfSharingAndStorage – Part 1
4.6 Compare And Contrast Different Methods OfSharingAndStorage – Part 2
4.7 Compare And Contrast Different Methods OfSharingAndStorage – Part 3

Module 5: Basic IT Literacy

5.1 Setting Up A Basic Workstation – Part 1
5.2 Setting Up A Basic Workstation – Part 2
5.3 Setting Up A Basic Workstation Demo – Part 1
5.4 Setting Up A Basic Workstation Demo – Part 2
5.5 Setting Up A Basic Workstation Demo – Part 3
5.6 Basic Methods Of Navigating An Operating System – Part 1
5.7 Basic Methods Of Navigating An Operating System – Part 2
5.8 Basic Methods Of Navigating An Operating System Demo – Part 1
5.9 Basic Methods Of Navigating An Operating System Demo – Part 2
5.10 Basic Support Concepts
5.11 Basic Backup Concepts
5.12 Environmental And Safety Concepts – Part 1
5.13 Environmental And Safety Concepts – Part 2

Module 6: Course Review

6.1 Software Domain Review
6.2 Hardware Domain Review
6.3 Security Domain Review
6.4 Networking Domain Review
6.5 Basic IT Literacy Review
6.6 Course Review Question
6.7 Test Taking Tips
6.8 Course Outro

2. CompTIA A+ 220-901 and 902 (2 EXAMS INCLUDED)

CompTIA A+ 220-901

Module 1 Introduction To Personal Computers And IT Certification
1.1 Personal Computer ConceptsPart 1
1.2 Personal Computer Concepts Part 2
1.3 Becoming An IT Professional
1.4 Certification Basics
1.5 Review

Module 2 Internal Hardware Components

2.1 Motherboards Part 1
2.2 Motherboards Part 2
2.3 BIOS Part 1
2.4 BIOSPart 2
2.5 BIOSPart 3
2.6 Power Supplies Part 1
2.7 Power SuppliesPart 2
2.8 Central Processing Unit Part 1
2.9 Central Processing UnitPart 2
2.10 Central Processing Unit Part 3
2.11 MemoryPart 1
2.12 MemoryPart 2
2.13 Review

Module 3 Storage Fundamentals

3.1 Storage Overview
3.2 Magnetic Drives
3.3 Solid State And Flash Drives
3.4 Optical Drives
3.5 RAID Technologies
3.6 Tape Drives
3.7 Installing Hard Drives
3.8 Review

Module 4 Expanding Hardware Capabilities

4.1 Expansion Components OvereviewPart 1
4.2 Expansion Components OvereviewPart 2
4.3 Expansion TechnologiesPart 1
4.4 Expansion TechnologiesPart 2
4.5 Video CardsPart 1
4.6 Video CardsPart 2
4.7 Sound Cards
4.8 Networking Interface Cards
4.9 Alternative Expansion Devices
4.10 Review

Module 5 Working With Peripheral Devices

5.1 Peripheral Devices Overview
5.2 Input Devices Part 1
5.3 Input DevicesPart 2
5.4 Input Devices Part 3
5.5 Output Devices Video MonitorsPart 1
5.6 Output DevicesVideo MonitorsPart 2
5.7 Output Devices Video Monitors Part 3
5.8 Output DevicesPrinters And ScannersPart1
5.9 Output Devices Printers And Scanners Part2
5.10 Output DevicesPrinters And ScannersPart 3
5.11 Output Devices Printers And ScannersPart 4
5.12 Input And Output Devices
5.13 Review

Module 6 Mobiles Devices

6.1 Mobile Devices Overview
6.2 Laptop Computer Components Part 1
6.3 Laptop Computer ComponentsPart 2
6.4 Laptop Computer Expansion Capabilities
6.5 Replacing Portable Computer ComponentsPart 1
6.6 Replacing Portable Computer ComponentsPart 2
6.7 Additional Mobile Devices Part 1
6.8 Additional Mobile DevicesPart 2
6.9 Mobile Device Ports And Connectors
6.10 Review

Module 7 Computer Networking

7.1 Networking FundamentalsPart 1
7.2 Networking Fundamentals Part 2
7.3 Network DevicesPart 1
7.4 Network Devices Part 2
7.5 Cable And Connectors Part 1
7.6 Cable And ConnectorsPart 2
7.8 TCP/IP FundamentalsPart 1
7.9 TCP/IP FundamentalsPart2
7.10 TCP/IP FundamentalsPart3
7.11 TCP/IP Fundamentals Part 4
7.12 TCP/IP FundamentalsPart 5
7.13 Internet Connectivity
7.14 Wireless Networks Part 1
7.15 Wireless NetworksPart 2

Module 8 Hardware And Network Troubleshooting

Troubleshooting Models Part 1
Troubleshooting ModelsPart 2
Troubleshooting Physical IssuesPart 1
Troubleshooting Physical Issues Part 2
Troubleshooting Physical IssuesPart 3
Troubleshooting Networking Issues Part 1
Troubleshooting Networking IssuesPart 2
Troubleshooting Mobile Devices
Troubleshooting Printers

CompTIA A+ 220-902

Module 1: Introduction To Operating Systems

1.1 Introduction
1.2 Operating Systems Overview Part 1
1.3 Operating Systems Overview Part 2
1.4 Operating Systems Functions Part 1
1.5 Operating Systems Functions Part 2
1.6 Windows OS Versions Part 1
1.7 Windows OS Versions Part 2
1.8 Windows OS Versions Part 3
1.9 Basic Navigation And Management Part 1
1.10 Basic Navigation And Management Part 2

Module 2: Installing Windows Operating Systems

2.1 PreInstalling Task
2.2 Performing Clean Installs Part 1
2.3 Performing Clean Installs Part 2
2.4 Performing Upgrades
2.5 Migrating User Data

Module 3: Configuration And Management In Windows

3.1 Using Control Panel And PC Settings Part 1
3.2 Using Control Panel And PC Settings Part 2
3.3 Using Control Panel And PC Settings Part 3
3.4 Using Graphical Administrative Tools Part 1
3.5 Using Graphical Administrative Tools Part 2
3.6 Using Graphical Administrative Tools Part 3
3.7 Using Graphical Administrative Tools Part 4
3.8 Using Command Line Administrative Tools
3.9 Configuring Networking Part 1
3.10 Configuring Networking Part 2
3.11 Configuring Networking Part 3
3.12 Operating System Security Part 1
3.13 Operating System Security Part 2
3.14 Operating System Security Part 3
3.15 Windows Preventative Maintenance

Module 4: Utilizing Alternative Operating Systems

4.1 Mac And Linux Overview
4.2 OS Features And Tools
4.3 Best Practices Using Alternative Operating Systems
4.4 Basic Command Line Administration In Linux
4.5 Network Operating Systems Part 1
4.6 Network Operating Systems Part 2

Module 5: Virtualization And Cloud Computing

5.1 Understanding Virtualization
5.2 Basic Cloud Concepts

Module 6: Managing Mobile Devices

6.1 Mobile Devices Overview
6.2 Mobile Operating Systems
6.3 Network Connectivity And Email
6.4 Mobile Device Synchronization

Module 7: Understanding System Security

7.1 Understanding Threats To Security Part 1
7.2 Understanding Threats To Security Part 2
7.3 Understanding Threats To Security Part 3
7.4 Understanding Common Prevention Methods Part 1
7.5 Understanding Common Prevention Methods Part 2
7.6 Understanding Common Prevention Methods Part 3

Module 8: Troubleshooting And Operational Procedures

8.1 Troubleshooting Theory
8.2 Communication And Professionalism Part 1
8.3 Communication And Professionalism Part 2
8.4 Operational And Safety Procedures
8.5 Security And Privacy Guidelines For Troubleshooting
8.6 Troubleshooting Operating Systems Part 1
8.7 Troubleshooting Operating Systems Part 2
8.8 Troubleshooting Mobile Devices Part 1
8.9 Troubleshooting Mobile Devices Part 2
8.10 Troubleshooting Common Security Issues Part 1
8.11 Troubleshooting Common Security Issues Part 2
8.12 Conclusion

3. Cyber Security Awareness and Prevention (NO EXAM)

Module 1: Introduction to Cyber Security Awareness

1.1 Course Introduction
1.2 Where We Are Today
1.3 Areas Of Protection
1.4 The Connection – Part 1
1.5 The Connection – Part 2
1.6 Network Protection
1.7 Browsing Blunders – Part 1
1.8 Browsing Blunders – Part 2
1.9 Settings – Part 1
1.10 Settings – Part 2
1.11 Settings – Part 3
1.12 Settings – Part 4
1.13 Cookies
1.14 Browsing Tips And Tricks
1.15 Email Cant Hurt You Right – Part 1
1.16 Email Cant Hurt You Right – Part 2
1.17 Viruses – Part 1
1.18 Viruses – Part 2
1.19 Viruses – Part 3
1.20 Course Outro

Module 2: Managing Mobile Device Security

2.1 Managing Mobile Device Security Part 1
2.2 Managing Mobile Device Security Part 2
2.3 Secure Access
2.4 Secure Access iPhone Demo
2.5 Secure Access Android Demo
2.6 Protect The Data
2.7 Protect The Data Android Demo
2.8 Protect The Data iPhone Demo
2.9 Manage App Access
2.10 Manage App Access iPhone Demo
2.11 Manage App Access Android Demo
2.12 Stay Up To Date
2.13 Stay Up To Date Android Demo
2.14 Stay Up To Date iPhone Demo
2.15 Use Other Tools To Help
2.16 Prepare For The Worst
2.17 Prepare For The Worst Android Demo
2.18 Prepare For The Worst iPhone Demo
2.19 Best Practices

4. Data Security Compliance (NO EXAM)

Module 1: Data Breaches And ID Theft

1.1 Course Introduction
1.2 Threat And Cost

Module 2: Device Security Basics

2.1 It’s All About YOU- Part 1
2.2 It’s All About YOU- Part 2

Module 3: Avoiding Inadvertent Disclosure

3.1 No More OOps- Part 1
3.2 No More OOps- Part 2

Module 4: Physical And Technical Safeguards

4.1 The DOOf Security- Part 1
4.2 The DOOf Security – Part 2
4.3 Course Outro

5. CompTIA Network+ N10-007 (1 EXAM)

Module 1: Networking Concepts

1.1 Basic Networking
• Intro to networking
• Networking architectures
• Activity: Basic Networking
1.2 OSI Model
• Layer 7 – Application
• Layer 6 – Presentation
• Layer 5 – Session
• Layer 4 – Transport
• Layer 3 – Network
• Layer 2 – Data Link
• Layer 1 – Physical
• Activity: Exploring the OSI Model
1.3 Protocols and Ports
• Protocols and ports overview
• Activity: Examining Protocols and Ports
• Connection-oriented vs. connectionless
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Activity: Comparing TCP and UDP
• Internet Protocol (IP)
• Internet Control Messaging Protocol (ICMP)
• Internet Group Messaging Protocol (IGMP)
• Activity: Examining the Lower Layer Protocols
• Layer 7 Remote Control Protocols
• Layer 7 File Transfer Protocols
• Layer 7 Messaging Protocols
• Activity: Examining Messaging Protocols
• Layer 7 Web Traffic Protocols
• Layer 7 Streaming Media Protocols
• Layer 7 Infrastructure Management Protocols
1.4 Switching
• Properties of Network Traffic
• Contention Management
• Activity: Creating Collision and Broadcast Domains
• Interface Properties and Segmentation
• Activity: Creating a Basic Network Segment
• Switching prt 2
• Activity: Switching
• Switching Loop Management
• Activity: Managing Switching Loops
• VLANs
• Activity: Creating VLANs
1.5 Routing
• ARP
• Activity: Examining ARP
• IP Addressing Basics
• Activity: Configuring IP
• Routers
• Activity: Setting Up a Router
• Routing Basics
• Activity Adding Static Routes
• VLAN Routing
• Activity: Routing Between VLANs
• NAT/PAT
• Activity: Configuring NAT/PAT
• Routing Protocols
• Activity Configuring a Routing Protocol
• Firewalls
• Activity: Configuring Firewalls
1.6 Advanced Switching and Routing Concepts
• IPv6 Concepts
• Activity: Exploring IPv6
• Performance Concepts
• Distributed Switching
• Software-defined Networking
1.7 IP Addressing
• Public vs. Private
• Loopback and Reserved
• Subnet Mask
• Default Gateway
• Virtual IP
• Subnetting
• Activity: Learning to Subnet
• Address Assignments
1.8 Network Types and Topologies
• Wired Topologies
• Wireless Topologies
• Network Types
• Technologies that Facilitate the Internet Of Things (IoT)
1.9 Wireless Technologies
• Radio Basics
• 802.11 Standards
• Wi-Fi Frequencies
• Wi-Fi Antenna Concepts
• Bluetooth
• Cellular
• Site Surveys
• Activity: Using an RF Spectrum Analyzer
1.10 Cloud Concepts
• Types of Services
• Cloud Delivery Models
• Security Implications/Considerations
• Activity: Exploring Cloud Services
1.11 Network Services
• DNS Service
• Activity: Setting up DNS
• DHCP Service
• Activity: Setting Up DHCP
• NTP
• IPAM

Module 2 – Infrastructure

2.1 Cabling Solutions
• Media Types
• Activity: Testing a Fiber Optic Cable
• Plenum vs.PVC
• Connector Types
• Activity: Crimping on an RJ-45 Connector
• Transceivers
• Termination Points
• Activity: Terminating Cable to a 110 Block
• Copper Cable Standards
• Copper Termination Standards
• Activity: Creating a Crossover Cable
• Ethernet Deployment Standards
2.2 Network Device Placement and Installation
• Network Interface
• Repeater
• Hub
• Bridge
• Switch
• Router
• Modem
• Wireless Access Point
• Activity Setting up a WAP
• Firewall
• Media Converter
• Wireless Range Extender
• VoIP Endpoint
2.3 Advanced Network Devices
• Multilayer Switch
• Wireless Controller
• Load Balancer
• IDS/IPS
• Proxy Server
• Activity Configuring Proxy Settings
• VPN Concentrator
• AAA/RADIUS Server
• UTM Appliance
• NGFW/Layer 7 Firewall
• VoIP PBX
• VoIP Gateway
• Content Filter
2.4 Virtualization and Network Storage Technologies
• Virtual Networking Components
• Network Storage Types
• Connection Types
• Jumbo Frames
2.5 WAN Technologies
• Service Types
• Transmission Mediums
• Characteristics of Service
• Activity Configuring WAN Links
• Termination

Module 3 – Network Operations

3.1 Documentation
• Diagram Symbols
• Standard Operating Procedures/Work Instructions
• Logical vs. Physical Diagrams
• Rack Diagrams
• Change Management Documentation
• Wiring and Port Locations
• IDF/MDF Documentation
• Labeling
• Network Configuration and Performance Baselines
• Inventory Management
• Activity Using Documentation
3.2 Business Continuity and Disaster Recovery
• Availability Concepts
• Recovery
• Activity Backing Up Your Data
• MTTR
• MTBF
• SLA Requirements
3.3 Scanning, Monitoring, and Patching
• Processes
• Event Management
• SNMP Monitors
• Metrics
• Activity: Testing the Network
3.4 Remote Access Methods
• VPN
• RDP
• SSH
• VNC
• Telnet
• HTTPS/Management URL
• Remote File Access
• Out-of-Band Management
• Activity: Making Remote Connections
3.5 Policies and Best Practices
• Privileged User Agreement
• Password Policy
• On-boarding/Off-boarding Procedures
• Licensing Restrictions
• International Export Controls
• Data Loss Prevention
• Remote Access Policies
• Incident Response Policies
• BYOD
• AUP
• NDA
• System Life Cycle
• Safety Procedures And Policies
• Activity: Creating Policies and Procedures

Module 4 – Network Security

4.1 Physical Security Devices
• Detection
• Prevention
4.2 Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
4.3 Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
4.4 Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
4.5 Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
4.6 Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot

Module – Network Troubleshooting and Tools

5.1 Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
5.2 Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
5.3 Troubleshoot Wired Connectivity and Performance
• Signal Issues:
o Attenuation
o Latency
o Jitter
o Crosstalk
o EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
o Open/short
o Incorrect pin-out
o Incorrect Cable Type
o Bad Port
o Damaged cable
o Bent pins
• Transceiver Issues:
o Transceiver mismatch
o TX/RX reverse
o Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
o Bottleneck
o VLAN mismatch
o Network connection LED status indicators
5.4 Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
o Attenuation
o Reflection
o Refraction
o Absorption
• Latency & Jitter
• Antenna Issues:
o Incorrect antenna type
o Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
o Interference
o Channel overlap
o Overcapacity
o Distance limitations
o Frequency mismatch
o Power levels
o Signal-to-noise ratio
• WAP Misconfiguration:
o Wrong SSID
o Wrong passphrase
o Security type mismatch
• Activity Troubleshooting WAP Issues
5.5 Troubleshoot Common Network Service Issues
• Common Network Issues:
o Physical Connectivity
o Incorrect IP Address
o Incorrect Gateway
o Incorrect Netmask
o Names Not Resolving
o Untrusted SSL Certificate
• DHCP Issues:
o Duplicate IP Addresses
o Expired IP Address
o Rogue DHCP
o Exhausted DHCP Scope
• Firewall/ACL Issues:
o Blocked TCP/UDP Ports
o Incorrect Host-based Firewall Settings
o Incorrect ACL Settings
• Advanced Network Issues:
o DNS Server Issues
o Duplicate MAC Addresses
o Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue

6. CompTIA Security+ SY0-501 (1 EXAM)

Module 1: Networking Terminology

1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network

2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices

Module 3: Wireless

3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology

4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards

5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2

Module 6: Physical Security

6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls

Module 7: Risk Analysis

7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)

8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore

Module 9: Introduction To Computer Forensics

9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response

Module 10: Types Of Attacks

10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks

Module 11: System Security Threats

11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware

Module 12: Security Assessments

12.1 Types Of Assessments
12.2 Penetration Testing

Module 13: Monitoring And Auditing

13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing

Module 14: Authentication

14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication

Module 15: Access Control

15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats

16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security

17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography

18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure

19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion

Who are CompTIA?

 

CompTIA is the certification body that will be awarding your certifications upon the successful passing of your exams. CompTIA is a globally recognised certification body, allowing you to take your certifications any where on the planet and have them acknowledged and accepted.

 

Examples of course certifications

Above are two examples of the certifications you can gain through this course: the CompTIA Network+ and CompTIA Security+ certification. All certifications in this course are globally recognised, allowing you to work throughout the world.

MeasureUP practice tests included

As part of this course, you will get access to MeasureUP practice tests to help prepare you for your exams. MeasureUP practice tests are endorsed by a range of certification bodies such as CompTIA, Microsoft, and Cisco.

Features of MeasureUP practice tests

 

  • Questions are similar to exam questions, allowing you to test your knowledge of exam objectives
  • Detailed explanations for both correct and distractor answers reinforce the material
  • ‘Practice Mode’ covers all objectives ensuring topics are covered
  • ‘Certification Mode’ (timed) prepares students for exam taking conditions
  • Instant, drill-down score reports tell you exactly the areas to focus on

 

Watch this video to learn more about MeasureUP practice tests.

 

How long do I have to complete the course?

You have 12 months to complete the courses and take the exams.

Potential future career paths

 

  • Cyber Security Engineer
  • Cyber Security Analyst
  • Cyber Security Investigator
  • Cyber Threat Analyst
  • Cyber Threat Consultant
  • IT Security Specialist
  • IT Security Consultant
  • Network Support Engineer
  • Network Configuration Engineer
  • Network Consultant
  • Network Analyst
  • Network Manager
  • Network Security Analyst
  • Network Security Technician
  • Network Security Auditor

Further questions?

If you have any further questions about this course, please call us on 020 7183 8790 or drop us an email at [email protected] We’re available Mon-Fri, 9am-6pm. Our support team will be happy to answer any questions you may have.

 

Would you like to see a demo?

Complete the form below and we’ll be in contact to arrange a demo of the course material and features. You can also use this form to arrange a call back. We’re happy to discuss the course and career program with you in more depth.

Additional Info

Additional information

Payment options

Single payment, 6 monthly installments, 12 monthly installments