Cyber Security for Beginners with Career Program


    Pay over 1 year at £91.25 per month


    If you’ve ever considered working within the cyber security industry, but felt you lacked the knowledge or skills to launch your career, this might be what you’re looking for. This course is aimed at absolute beginners to IT who want to start a career in cyber security or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cyber security and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies such as computer systems and networks, which you will be taught through this course.

    This course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this course, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the IT security industry across the globe.

    From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cyber security will gradually begin to develop. Upon completion of the course, you will exit with a series of globally respected certifications and a deeper knowledge of cyber security concepts. You will also possess a set of cyber security skills you can apply to a vast range of cyber security job roles.

    An example of the CompTIA Security+ certification you can gain through this course.


    The course is comprised of six separate courses in total. Three of which are skills based only with no exam, and three certification courses with a final exam after each course. The final course being the CompTIA Security+. Two of the non-certification courses provide a soft introduction to modern day cyber security practices. These course titles include Cyber Security Awareness and Prevention; and Data Security Compliance. The skills and certifications that you gain through this course will offer you scope to work in other areas aside from cyber security. These include IT support, networking, systems administration, and data compliance.

    Learn what the CompTIA Security+ can do for your career.



    Course Features


       Video Learning

    Access to video based online learning material. Tutors use diagrams and illustrations to teach the classes, as well as giving demonstrations of equipment. Lessons are pre-recorded allowing you to  fast-forward, rewind and pause at any time throughout the lessons. Videos can be viewed on different devices including a desktop computer, laptop, tablet, and smart phone.

      Accessible from Anywhere

    Your course can be done from any where in the world. If you decide to move to a different city or even country, you can continue with the course from wherever you are. All you need is a device such as a desktop computer, laptop, tablet, smart phone, and an internet connection.

       Live Practice Labs

    Access live practice labs, allowing you to put your course skills to the test in a live simulated environment. For instance, learn how to setup a firewall to protect a network from cyber attacks. The live labs have two functions: 1. guided exercises, instructing you to carry out tasks; 2. sand box environment, allowing you to play with the online equipment to test out your skills. Click here to learn more about the live labs.

      MeasureUP Practice Tests

    Before you sit an exam, you will be given access to a MeasureUP practice test. These tests have two modes: 1. practice-mode, allowing you learn the questions and answers with resources included; 2. certification mode, allowing you to test yourself with a limited time and without the answers. These tests are the closest experience to the real exams. MeasureUP have been the gold standard in exam preparation for over 20 years.

      Exam Fees Paid

    Your course comes with official CompTIA exam vouchers. This means all exam fees are fully paid. Exams must be taken at your local testing center. There are testing centers all over the country and across the globe. For most people, their nearest test center is less than 30 miles from their home or office. We will locate your nearest testing center.

       CompTIA Certifications

    Upon passing your exams, you will receive three certifications from CompTIA: the A+, Network+, and Security+. These certifications are globally recognised, meaning you can work any where in the world with them. CompTIA certifications are held in high regard by IT employers and IT recruiters. Click here to view salary and employment information.

      Career Program

    As part of your course, you will get access to our Career Program to help you into work upon completion of your course. The Career Program includes: cover letter and CV preparation, Linkedin account creation, full career assessment, employment case management, active job search, short-listing for job roles, coordination with employers to secure employment opportunities, completion of application forms for IT roles, and interview planning and preparation. Click here to learn more about the Career Program.

      Spread the cost

    Spread your course payments over 12 monthly installments through Knoma. There’s no interest or charges. Just one easy online application to complete. You’ll get an instant decision.


    Who are CompTIA? Watch this video to find out.

    Course Syllabus

    1. CompTIA IT Fundamentals FC0-U61 (NO EXAM)

    IT Concepts and Terminology

    Understand the basics of computing
    Understand basic terminology
    Comprehend notational systems
    Explain the value of data and troubleshooting


    Setting up and installing common peripheral devices

    Applications and Software

    Manage applications software
    Understand various components of an operating system
    Explain the purpose of methods of application architecture

    Software Development

    Comprehend programming language categories
    Interpret logic
    Understand the purpose of programming concepts

    Database Fundamentals

    Explain database concepts
    Explain structures
    Explain purpose
    Understand methods used to interface


    Understand confidentiality
    Understand integrity
    Understand availability concerns of secure devices
    Understand best practice methods of secure devices

    2. CompTIA A+ 220-1101 and 1102 (2 EXAMS INCLUDED)

    CompTIA A+ 220-1101


    Module 1 – CompTIA A+ 220-1101 Devices, Setups, and Installs
    1.1 Introduction to the Course, Meet the Instructor
    1.2 Appropriate Safety Procedures
    1.3 PC Components
    1.4 Guidelines for PC Disassembly
    1.5 Motherboards
    1.6 CPU Sockets
    1.7 PCI Bus
    1.8 Storage Bus (SATA and IDE)
    1.9 Discussing PC Components
    1.10 Common Connection Interfaces
    1.11 Wired and Wireless Connection Standards
    1.12 Install Peripheral Devices
    1.13 Guidelines and Discussion for Installing Peripheral Devices
    Module 2 – CompTIA A+ 220-1101 Displays and Multimedia Devices
    2.1 Displays and Multimedia
    2.2 Display Device Connections and Cables
    2.3 Discussing Display Device Installation and Configuration
    2.4 Troubleshoot Display Devices
    2.5 Guidelines for Troubleshooting Display Devices
    2.6 Discussing Display Device Troubleshooting
    2.7 Install and Configure Multimedia Devices
    2.8 Discussing Multimedia Device Installation and Configuration
    Module 3 – CompTIA A+ 220-1101 Supporting Multiple Drive Types
    3.1 Supporting Multiple Drive Types and Memory
    3.2 Memory Types
    3.3 RAM Types
    3.4 Memory Modules
    3.5 DIMM and SO-DIMM Technologies
    3.6 Parity and ECC RAM
    3.7 Memory Compatibility Issues
    3.8 Discussing System Memory Installation
    3.9 Install and Configure Mass Storage Devices
    3.10 Storage Adapters and Cables
    3.11 Solid State Drives
    3.12 Guidelines for Installing Mass Storage Devices
    3.13 Discussing Mass Storage Device Installation and Configuration
    3.14 Install and Configure Removable Storage
    3.15 Discussing Removable Storage Device Installation and Configuration
    3.16 Configure RAID
    3.17 RAID Configuration Options
    3.18 Discussing RAID Configuration
    3.19 Troubleshoot Storage Devices
    3.20 Boot Failures
    3.21 Discussing Storage Device Troubleshooting
    Module 4 – CompTIA A+ 220-1101 Accounting for CPUs and Internal Components
    4.1 Install Upgrade CPUs
    4.2 Multiprocessing and Multicore Processors
    4.3 Discussing CPU Upgrades
    4.4 Configure and Update BIOS UEFI
    4.5 Discussing BOIS-UEFI Configuration and Updates
    4.6 Install Power Supplies
    4.7 Discussing Power Supply Installation
    4.8 Troubleshoot Internal System Components
    4.9 POST and Boot Problems
    4.10 Boot Troubleshooting and Log Entries
    4.11 Motherboard Component Problems
    4.12 Discussing System Component Troubleshooting
    Module 5 – CompTIA A+ 220-1101 All About Network Theories
    5.1 Wired Networks
    5.2 Common Ethernet Network Implementations
    5.3 Taps and Mirrors
    5.4 Discussing Wired Networks
    5.5 Network Hardware Devices
    5.6 Switches
    5.7 Power Over Ethernet
    5.8 Discussing Network Hardware Devices
    5.9 Wireless Networks
    5.10 Access Points and Wireless Network Modes
    5.11 Discussing Wireless Networks
    5.12 Internet Connection Types
    5.13 Wireless Internet Service Providers WISP
    5.14 Discussing Internet Connection Types
    5.15 Network Configuration Concepts
    5.16 The TCIP-IP Protocol Suite
    5.17 Internet Protocol and IP Addressing
    5.18 Public and Private IP Addresses
    5.19 IPv6
    5.20 Discussing Network Configuration Concepts
    5.21 Network Services
    5.22 DNS
    5.23 Dynamic and Static IP Configurations
    5.24 DNS Records MX and A
    5.25 Web Servers and HTTP-HTTPS
    5.26 Discussing Network Services
    Module 6 – CompTIA A+ 220-1101 Network Operations and Diagnostics
    6.1 Configuring and Troubleshooting Networks
    6.2 Network Connections in Windows
    6.3 Install and Configure SOHO Networks
    6.4 Configure SOHO Network Security
    6.5 Firewalls
    6.6 Port Forwarding and Port Triggering
    6.7 Windows Firewall
    6.8 Network Security and Embedded Appliances
    6.9 Configure Remote Access
    6.10 Discussing Remote Access Configuration
    6.11 Troubleshoot Network Connections
    6.12 IP Configuration Issues
    6.13 Routing Issues
    6.14 Discussing Network Connection Troubleshooting
    Module 7 – CompTIA A+ 220-1101 Cloud and Virtualization Computing
    7.1 Configure Client-Side Virtualisation
    7.2 Hypervisors
    7.3 Processor Support and Resource Requirements
    7.4 Virtual Networks
    7.5 Client-Side Virtualization
    7.6 Cloud Computing Concepts
    7.7 Internal and External Shared Resources
    7.8 Cloud Service Options
    7.9 Virtual Desktops
    7.10 Software-Defined Networking (SDN)
    7.11 Discussing Cloud Computing Concepts
    Module 8 – CompTIA A+ 220-1101 Laptop Features and Troubleshooting
    8.1 Use Laptop Features
    8.2 Expansion Options
    8.3 Discussing Laptop Features
    8.4 Install and Configure Laptop Hardware
    8.5 Discussing Laptop Hardware Installation and Configuration
    8.6 Troubleshoot Common Laptop Issues
    8.7 Discussing Troubleshooting Common laptop Issues
    Module 9 – CompTIA A+ 220-1101 Syncing and Setup of Mobile Devices
    9.1 Syncing and Setup of Mobile Devices
    9.2 Connect and Configure Mobile Devices
    9.3 Configure Mobile Device Network Connectivity
    9.4 Mobile VPN Configuration
    9.5 Email Configuration Options
    9.6 Discussing Mobile Device Network Connectivity Configuration
    9.7 Support Mobile Apps
    9.8 Discussing Mobile App Support
    Module 10 – CompTIA A+ 220-1101 All Things Printing
    10.1 All Things Printing
    10.2 Discussing Laser Printer Maintenance
    10.3 Maintain Inkjet Printers
    10.4 Discussing Inkjet Printer Maintenance
    10.5 Maintain Impact, Thermal, and 3D Printers
    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
    10.7 Install and Configure Printers
    10.8 Discussing Printer Installation and Configuration
    10.9 Troubleshoot Print Device Issues
    10.10 Install and Configure Imaging Devices
    10.11 Discussing Device Installation and Configuration

    CompTIA A+ 220-1102

    Module 1 – CompTIA A+ 220-1102 Operating System Management
    1.1 Introduction to the Course, Meet the Instructor
    1.2 Identify Common Operating Systems
    1.3 Microsoft Windows
    1.4 Work and Education Features
    1.5 Windows System Limits
    1.6 Apple Operating Systems
    1.7 Linux Disk and File Management
    1.8 Discussing OS Types
    1.9 Use Windows Features and Tools
    1.10 Administrative Tools
    1.11 Manage Files in Windows
    1.12 System Hierarchies
    1.13 File Attributes
    1.14 Discussing Windows Features and Tools
    1.15 Manage Disks in Windows
    1.16 Discussing File Management in Windows
    1.17 The Windows Disk Management Console
    1.18 Discussing Windows Disk Management
    1.19 Manage Devices in Windows
    1.20 Device Manager
    1.21 Discussing Windows Device Manager
    Module 2 – CompTIA A+ 220-1102 Configuring and installing the OS
    2.1 Configuring and Installing the OS
    2.2 Installation Boot Methods
    2.3 Disk Formatting and Partitioning
    2.4 Networking Considerations
    2.5 Post Installation Tasks
    2.6 OS Installation Types
    2.7 Unattended Installations
    2.8 Maintain OSs
    2.9 OS Updates
    2.10 Anti-Malware Updates
    2.11 Scheduled Backups
    2.12 Task Schedulers part 1
    2.13 Task Schedulers part 2
    2.14 Install Windows 10 Demonstration
    2.15 Discussing OS Maintenance
    Module 3 – CompTIA A+ 220-1102 Tools to Troubleshoot and Maintain the OS
    3.1 Install and Manage Windows Applications
    3.2 Windows OS Tools
    3.3 Application and Print Services
    3.4 Task Manager
    3.5 Manage Windows Performance
    3.6 Windows Performance Management Tools
    3.7 Troubleshoot Windows
    3.8 Event Viewer
    3.9 The System Configuration Utility
    3.10 Troubleshooting Tips Boot Process
    3.11 Troubleshooting Tips for Windows System Issues
    3.12 Blue Screens and Spontaneous Shutdowns
    3.13 Troubleshooting Tips for File and Memory Corruption
    3.14 Safe Boot
    3.15 System Repair Disc
    3.16 System Restore
    3.17 Guidelines for Troubleshooting Windows Issues
    Module 4 – CompTIA A+ 220-1102 Network Management Tools
    4.1 Network Management Tools
    4.2 Network Connectivity
    4.3 IP Addressing and Connection Types
    4.4 Proxy Settings
    4.5 Windows Client Configuration
    4.6 Location Services
    4.7 Firewalls
    4.8 Network Troubleshooting
    4.9 Remote Desktop Tools
    4.10 Desktop Management and Remote Monitoring Tools
    4.11 Discussion Topics
    Module 5 – CompTIA A+ 220-1102 Sharing Resources and Wrights Management
    5.1 Sharing Resources and Wrights Management
    5.2 User Group Accounts
    5.3 Local Security Policy
    5.4 SSO and Credential Manager
    5.5 Workgroups and Homegroups
    5.6 Network and Sharing Centre
    5.7 Network Share Configuration
    5.8 NTSF File and Folder Permissions
    5.9 Configure Active Directory Accounts and Policies
    5.10 Domain Membership and Group Policy Objects
    5.11 Basic AD Functions
    5.12 Account Locks and Password Resets
    Module 6 – CompTIA A+ 220-1102 Threats and Security Measures
    6.1 Threats and Security Measures
    6.2 Logical Security Concepts
    6.3 Encryption
    6.4 PKI and Certificates
    6.5 Execution Control
    6.6 NAC
    6.7 Discussing Logical Security Concepts
    6.8 Threats and Vulnerabilities
    6.9 Types of Password Attacks
    6.10 Discussing Threats and Vulnerabilities
    6.11 Physical Security Controls
    6.12 Discussing Physical Security Measures
    Module 7 – CompTIA A+ 220-1102 Policies to Protect Data
    7.1 Policies to Protect Data
    7.2 Implement Security Best Practices
    7.3 Guidelines for Implementing Security Best Practices
    7.4 Discussing Security Best Practices Implementation
    7.5 Implement Data Protection Policies
    7.6 ACLs and Directory Permissions
    7.7 Full Disk Encryption
    7.8 Guidelines for Implementing Data Protection Policies
    7.9 Discussing Data Protection Policies
    7.10 Protect Data During Incident Response
    7.11 Discussing Data Protection During Incident Response
    Module 8 – CompTIA A+ 220-1102 Prevent Malware and Security Threats
    8.1 Prevent Malware and Security Threats
    8.2 Detect, Remove, and Prevent Malware
    8.3 Trojan Horses and Spyware
    8.4 Sources of Malware Infection
    8.5 Best Practices for Malware Removal
    8.6 Discussing Detecting, Removing, and Preventing Malware Infections
    8.7 Troubleshoot Common Workstation Security Issues
    8.8 Discussing Troubleshoot Common Workstation Security Issues
    Module 9 – CompTIA A+ 220-1102 Supporting and Troubleshooting Mobile Devices
    9.1 Supporting and Troubleshooting Mobile Devices
    9.2 Secure Mobile Devices
    9.3 IOT Internet of Things
    9.4 Discussing Mobile Device Security
    9.5 Troubleshoot Mobile Device Issues
    9.6 Mobile Device Security Troubleshooting
    9.7 Discussing Troubleshooting Mobile Devices
    Module 10 – CompTIA A+ 220-1102 Implementing Operational Procedures
    10.1 Implementing Operational Procedures
    10.2 Environmental Impacts and Controls
    10.3 Discussing Environmental Impact and Controls
    10.4 Create and Maintain Documentation
    10.5 Discussing Documentation Creation and Maintenance
    10.6 Use Basic Change Management Best Practices
    10.7 Discussing Change Management Best Practices
    10.8 Implement Disaster Prevention and Recovery Methods
    10.9 Discussing Implement Disaster Prevention and Recovery Methods
    10.10 Basic Scripting Concepts
    10.11 Discussing Scripting
    10.12 Professionalism and Communication
    10.13 Discussing Professionalism and Communication Skills

    3. Cyber Security Awareness and Prevention (NO EXAM)
    Introduction to Cyber Security Awareness
    Managing Mobile Device Security
    4. Data Security Compliance (NO EXAM)
    Data Breaches And ID Theft
    Device Security Basics
    Avoiding Inadvertent Disclosure
    Physical And Technical Safeguards
    5. CompTIA Network+ N10-008 (1 EXAM)

    Module 0 – Course introduction
    0.1 Instructor Intro
    0.2 Course Overview
    Module 1 – Networking Fundamentals
    1.1 Intro to Networking
    1.1.1 Activity: Creating a Network
    1.2 Common Terminology
    1.2.1 Activity: Examining Ports and Sockets
    1.3 OSI Model
    1.4 DoD Model
    1.4.1 Activity: Examining Network Layers
    1.5 TCP, UDP, IP
    1.5.1 Activity: Examining TCP
    1.5.2 Activity: Examining UDP
    1.5.3 Activity: Examining IP
    1.6 ICMP, IGMP, ARP
    1.6.1 Activity: Examining ICMP
    1.6.2 Activity: Examining ARP
    1.6.3 Activity: Examining IGMP
    1.7 Network Topologies
    1.8 Network Types
    1.9 Part 1: Network Characteristics
    1.9 Part 2: Network Characteristics
    1.10 Module 1 outro
    Module 2 – Cables and Connectors
    2.1 Ethernet Standards
    2.2 Copper Cable Types
    2.3 Fibre Optic Cable Types
    2.4 Connector Types
    2.4.1 Activity: Selecting the Right Cable
    2.5 Media Converters and Transceivers
    2.6 Cable Management
    2.7 Module 2 Outro
    Module 3 – Internet Protocol (IP)
    3.1 IPv4 Basics
    3.2 IP Packet and Interface Types
    3.2.1 Activity: Configuring Client IP Settings
    3.3 Binary Numbering System
    3.4 Classful and Classless Addressing
    3.5 Understanding CIDR Notation
    3.6 IPv4 Subnetting Method
    3.7 Verifying with Binary
    3.8 Finding Subnet IDs
    3.8.1 Activity: Subnetting a Class C Network
    3.9 The Delta in Action
    3.9.1 Activity: Subnetting With the Delta
    3.10 Subnetting Based on Hosts
    3.11 Subnetting in Other Octets
    3.12 Supernetting
    3.12.1 Activity: Supernetting
    3.13 IPv6
    3.14 IPv4 – IPv6 Transition Mechanisms
    3.15 Module 3 Outro
    Module 4 – Layer 7 Protocols
    4.1 Remote Control Protocols
    4.2 File Sharing Protocols
    4.3 Web Protocols
    4.4 Email Protocols
    4.5 Database Protocols
    4.6 Voice Protocols
    4.7 Security Protocols
    4.8 Management Protocols
    4.9 Module 4 Outro
    Module 5 – Network Services
    5.1 DHCP
    5.1.1 Activity: Configuring DHCP
    5.1.2 Activity: Configuring a DHCP Relay Agent
    5.2 DNS
    5.2.1 Activity: Configuring DNS – Part 1
    5.2.2 Activity: Configuring DNS – Part 2
    5.3 NTP
    5.4 Corporate and Datacentre Network Architecture
    5.5 Cloud Concepts and Connectivity Options
    5.6 Module 5 Outro
    Module 6 – Networking Devices
    6.1 Introductory Concepts
    6.2 Repeaters and Hubs
    6.2.1 Activity: Connecting Devices with a Hub
    6.3 Bridges and Switches
    6.3.1 Activity: Connecting Devices with a Switch
    6.4 Routers and Multilayer Switches
    6.5 Security Devices
    6.6 Modems
    6.7 Module 6 Outro
    Module 7 – Networked Devices
    7.1 IP Devices
    7.2 IoT
    7.2.1 Activity – Programming IoT Devices
    7.3 ICS/SCADA
    7.4 Module 7 Outro
    Module 8 – Routing and Bandwidth Management
    8.1 Routing Basics
    8.1.1 Activity: Configuring Static Routes
    8.2 Packet Delivery on the Same Network
    8.3 IP Routing Across a Single Router
    8.4 IP Routing Across Multiple Hops
    8.4.1 Activity: Static Routes – CHALLENGE
    8.5 Route Selection
    8.6 RIP
    8.6.1 Activity: Configuring RIP – CHALLENGE
    8.7 OSPF
    8.8 EIGRP
    8.9 BGP
    8.10 NAT/PAT
    8.11 Bandwidth Management (with Module 8 Outro)
    Module 9 – Ethernet Switching
    9.1 Ethernet Basics
    9.2 Switching Overview
    9.2.1 Activity: Examining a MAC Table
    9.3 VLANs
    9.3.1 Activity: Creating VLANs
    9.4 VLAN Trunking
    9.4.1 Activity: Configuring VLAN Trunking
    9.5 VLAN Routing
    9.5.1 Activity: Configuring VLAN Routing
    9.6 Contention Management
    9.7 Switchport Configuration (with Module 9 Outro)
    Module 10 – Wireless Technologies
    10.1 Wireless Overview
    10.2 Radio Basics
    10.3 Modulation
    10.4 Wi-Fi Standards
    10.5 Antennas
    10.6 Wi-Fi Service Sets
    10.7 Wi-Fi Security
    10.8 Cellular
    Module 11 Network Performance
    11.1 Monitoring Performance
    11.2 Common Metrics
    11.2.1 Activity: Examining Interface Statistics
    11.3 SNMP
    11.4 Netflow
    11.5 Network Security Monitoring (with Module 11 Outro)
    Module 12 High Availability and Disaster Recovery
    12.1 HA and DR Concepts
    12.2 High Availability Mechanisms
    12.3 Disaster Recovery Mechanisms
    12.4 Facility and Infrastructure Support (with Module 12 Outro)
    Module 13 Organizational Documents
    13.1 Plans and Procedures
    13.2 Security Policies
    13.3 Loss Prevention
    13.4 Common Agreements
    13.5 Common Documentation
    13.6 Structured Cabling – MDF and IDF
    13.7 Horizontal and Vertical Cabling
    13.7.1 Activity – Implementing Cable Management
    13.8 Labelling
    13.9 Surveys and Assessments (with Module 13 Outro)
    Module 14 Network Security
    14.1 Common Security Concepts
    14.2 Common Attack Types
    14.3 Spoofing-based Attacks
    14.4 Hijacking and MITM
    14.5 Social Engineering
    14.6 Network Segmentation
    14.7 Private VLANs
    14.8 Single Organization Authentication
    14.9 Extending Authentication
    14.10 Authorization
    14.11 Network Device Hardening
    14.12 Wireless Security
    14.13 Remote Access Security
    14.14 IoT Security
    14.15 Physical Security (with Module 14 Outro)
    Module 15 Network Troubleshooting
    15.1 Troubleshooting Methodology
    15.2 Physical Connectivity Issues
    15.3 Hardware Testing Tools
    15.3.1 Activity – Testing an Ethernet Cable
    15.3.2 Activity – Crimping on an RJ-45 Connector
    15.3.3 Activity – Punching Down Twisted Pair
    15.3.4 Activity – Using a Telephone Toner
    15.4 Understanding Electricity
    15.4.1 Activity – Checking Cable Continuity
    15.4.2 Activity – Testing DC Voltage
    15.4.3 Activity – Testing AC Voltage
    15.5 Twisted Pair Pinout Problems
    15.6 Twisted Pair Termination Problems
    15.7 Repairing Damaged Twisted Pair Cable
    15.8 Fibre Optic Connectivity Issues
    15.8.1 Activity – Testing a Fibre Optic Cable
    15.9 Common Port Problems
    15.9.1 Working with Ports and Their Devices
    15.10 Common Software Testing Tools
    15.10.1 Activity – Scanning for Open Ports
    15.11 Common Command Line Utilities
    15.12 Troubleshooting Basic IP Networking Issues
    15.13 Common Switching Issues
    15.14 Switching Test Tools and Techniques
    15.15 Common IP Routing Issues
    15.16 Wi-Fi Access Point Issues
    15.17 Wireless Interference
    15.17.1 Activity – Using a Spectrum Analyzer
    15.18 Wireless Antenna Issues
    15.18.1 Activity – Configuring a Wi-Fi Router
    15.19 WAP Placement Strategies
    15.20 Infrastructure Service Issues (DHCP)
    15.21 Infrastructure Service Issues (DNS)
    15.22 Infrastructure Service Issues (NTP)
    15.23 Firewall / ACL Issues
    15.24 VPN Issues
    15.25 Additional Network Security Troubleshooting and Tips
    15.26 Advanced Networking Issues
    15.27 Troubleshooting Server Services (with Module 15 Outro)
    CompTIA Network+ N10-008 Course Outro

    6. CompTIA Security+ SY0-601 (1 EXAM)

    • Compare and contrast different types of social engineering techniques
    • analyze potential indicators to determine the type of attack
    • Analyze potential indicators associated with application attacks
    • Analyze potential indicators associated with network attacks
    • Explain different threat actors, vectors, and intelligence sources
    • Explain the security concerns associated with various types of vulnerabilities
    • Summarize the techniques used in security assessments
    • Explain the techniques used in penetration testing
    • Explain the importance of security concepts in an enterprise environment
    • Summarize virtualization and cloud computing concepts
    • Summarize secure application development, deployment, and automation concepts
    • Summarize authentication and authorization design concepts
    • Implement cybersecurity resilience
    • Explain the security implications of embedded and specialized systems
    • Explain the importance of physical security controls
    • Summarize the basics of cryptographic concepts
    • Implement secure protocols
    • Implement host or application security solutions
    • Implement secure network designs
    • Install and configure wireless security settings
    • Implement secure mobile solutions
    • Apply cybersecurity solutions to the cloud
    • Implement identity and account management controls
    • Implement authentication and authorization solutions
    • Implement public key infrastructure
    • Use the appropriate tool to assess organizational security
    • Summarize the importance of policies, processes, and procedures for incident response
    • Utilize appropriate data sources to support an investigation
    • Apply mitigation techniques or controls to secure an environment
    • Explain the key aspects of digital forensics
    • Compare and contrast various types of controls
    • Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
    • Explain the importance of policies to organizational security
    • Summarize risk management processes and concepts
    • Explain privacy and sensitive data concepts in relation to security.


    Meet someone working in cyber security


    MeasureUP practice tests included

    As part of this course, you will get access to MeasureUP practice tests to help prepare you for your exams. MeasureUP practice tests are endorsed by a range of certification bodies such as CompTIA, Microsoft, and Cisco.


    Features of MeasureUP practice tests:


    • Questions are similar to exam questions, allowing you to test your knowledge of exam objectives
    • Detailed explanations for both correct and distractor answers reinforce the material
    • ‘Practice Mode’ covers all objectives ensuring topics are covered
    • ‘Certification Mode’ (timed) prepares students for exam taking conditions
    • Instant, drill-down score reports tell you exactly the areas to focus on


    Watch this video to learn more about MeasureUP practice tests.

    Potential future career paths


    • Cyber Security Engineer
    • Cyber Security Analyst
    • Cyber Security Investigator
    • Cyber Threat Analyst
    • Cyber Threat Consultant
    • IT Security Specialist
    • IT Security Consultant
    • IT Support Technician
    • Network Engineer
    • Network Consultant
    • Data Centre Manager
    • IT Manager
    • IT Sales Account Manager
    • IT Consultant
    • Systems Administrator

    How long do I have to complete the course?


    You have 12 months to complete the courses and take the exams.


    Watch this video to learn more about CompTIA certifications.