CompTIA Course Bundle

Provided by

About the course

Description

This online training course is comprehensive and designed to cover the topics listed under the curriculum.

COURSE CURRICULUM

----------------COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) - CAS-001------------------

1. PROCESS OF UNDERLYING SECURITY MODELS

2. HOW TO SELECT SECURITY?

3. UNDERSTANDING CRYPTOGRAPHY

4. STORAGE TIPS

5. VIRTUAL COMPUTING METHODOLOGIES

6. DEFINITION OF IPV6

7. REMOTE ACCESS SECURITY TECHNIQUES

8. STUDYING DOMAIN NAME SYSTEM

9. WORKING WITH DIRECTORY SERVICES

10. LEARNING OF FIREWALL AND VPN

11. SECURITY CONFIGURATION MANAGEMENT TECHNIQUES

12. UNDERSTANDING NETWORK INFRASTRUCTURE SECURITY

13. OVERVIEW OF SECURE WEB SERVICES - PART 1

14. DEFINE BUFFER OVERFLOWS AND SQL INJECTION

15. PROCESS OF ACCESS CONTROLLING AND SINGLE SIGN

16. PROCESS OF RISK ASSESSMENT AND ASSESSMENT TECHNIQUES

17. DEFINITIN OF COMMON VULNERABILITY

18. WHAT ARE PERSONALLY IDENTIFIABLE INFORMATION?

19. UNDERSTANDING OF RISK MANAGEMENT

20. DEFINITIONS OF FRAMEWORKS

21. EXPLORE INTERCONNECTING SYSTEMS, SECURITY SERVICES AND CONTINUOUS MONITORING

22. WAY OF INCIDENT HANDLING AND INCIDENT RESPONSE

23. WHAT IS REQUIREMENTS PROCESSING? & STANDARDS BODIES

24. OVERVIEW OF SECURE SYSTEM LIFE CYCLE

25. DEFINE OF EMAIL, BYOD AND VOICE OVER IP

26. PROCESS OF PHYSICAL FACILITIES ASSESSMENT

----------------COMPTIA A+ (220-801 OR JK0-801)----------------

1. INTRODUCTION TO IT CERTIFICATION AND PERSONAL COMPUTERS

2. IDENTIFYING INTERNAL HARDWARE COMPONENTS

3. WORKING WITH STORAGE

4. EXPLORING HARDWARE CAPABILITIES

5. HOW TO WORK WITH PERIPHERAL DEVICES AND LAPTOP COMPUTERS

6. DEFINITIONS OF COMPUTER NETWORKING AND OPERATIONAL PROCEDURES

---------------COMPTIA CLOUD+ (CV0-001)---------------

1. LEARNING OF CONCEPTS, MODELS AND VIRTUALIZATION TECHNIQUES

2. UNDERSTANDING OF INFRASTRUCTURE

3. HOW TO MANAGE RESOURCES?

4. LEARNING ABOUT SECURITY

5. SYSTEMS MANAGEMENT PROCESS AND BUSINESS CONTINUITY

---------------COMPTIA IT FUNDAMENTALS (FC0-U51)----------------

1. OVERVIEW OF SOFTWARE

2. EXPLAINING HARDWARE

3. OVERVIEW OF SECURITY

4. DEFINITION OF NETWORKING

5. BASIC IT LITERACY

6. THE COURSE REVIEW

---------------COMPTIA MOBILITY+(MB0-001)----------------

1. DEFINITIONS OF OVER-THE-AIR TECHNOLOGIES

2. OVERVIEW OF NETWORK INFRASTRUCTURE

3. EXPLAINING MOBILE DEVICE MANAGER

4. DEFINITION OF SECURITY

5. WAY OF TROUBLESHOOTING AND REVIEW

---------------COMPTIA NETWORK+ (N10-006)--------------

1. FUNDAMENTALS OF NETWORKING

2. WHAT ARE NETWORKING STANDARDS?

3. TRANSMISSION AND NETWORK CABLING

4. UNDERSTANDING TCPIP PART

5. IDENTIFYING NETWORK DEVICES

6. LEARNING WIRELESS NETWORK, WIDE AREA NETWORK AND REMOTE ACCESS TECHNIQUES

7. DEFINITION OF NETWORK SECURITY

8. PROCESS OF BUILDING HIGH PERFORMANCE NETWORKS

9. HOW TO MONITOR AND TROUBLESHOOT NETWORKS?

--------------COMPTIA SECURITY+ (SY0-401 OR JK0-018)---------------

1. WHAT IS NETWORK SECURITY

2. UNDERSTANDING COMPLIANCE AND OPERATIONAL SECURITY

3. IDENTIFYING THREATS AND VULNERABILITIES

4. IDENTIFYING APPLICATION, DATA AND HOST SECURITY AND ACCESS CONTROL

5. LEARNING CRYPTOGRAPHY

---------------COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) - CAS-001---------------

1. PROCESS OF UNDERLYING SECURITY MODELS

2. HOW TO SELECT SECURITY?

3. UNDERSTANDING CRYPTOGRAPHY

4. STORAGE TIPS

5. VIRTUAL COMPUTING METHODOLOGIES

6. DEFINITION OF IPV6

7. REMOTE ACCESS SECURITY TECHNIQUES

8. STUDYING DOMAIN NAME SYSTEM

9. WORKING WITH DIRECTORY SERVICES

10. LEARNING OF FIREWALL AND VPN

11. SECURITY CONFIGURATION MANAGEMENT TECHNIQUES

12. UNDERSTANDING NETWORK INFRASTRUCTURE SECURITY

13. OVERVIEW OF SECURE WEB SERVICES - PART 1

14. DEFINE BUFFER OVERFLOWS AND SQL INJECTION

15. PROCESS OF ACCESS CONTROLLING AND SINGLE SIGN

16. PROCESS OF RISK ASSESSMENT AND ASSESSMENT TECHNIQUES

17. DEFINITIN OF COMMON VULNERABILITY

18. WHAT ARE PERSONALLY IDENTIFIABLE INFORMATION?

19. UNDERSTANDING OF RISK MANAGEMENT

20. DEFINITIONS OF FRAMEWORKS

21. EXPLORE INTERCONNECTING SYSTEMS, SECURITY SERVICES AND CONTINUOUS MONITORING

22. WAY OF INCIDENT HANDLING AND INCIDENT RESPONSE

23. WHAT IS REQUIREMENTS PROCESSING? & STANDARDS BODIES

24. OVERVIEW OF SECURE SYSTEM LIFE CYCLE

25. DEFINE OF EMAIL, BYOD AND VOICE OVER IP

26. PROCESS OF PHYSICAL FACILITIES ASSESSMENT

--------------COMPTIA CLOUD ESSENTIALS (CLO – 001)---------------

1. IDENTIFYING CHARACTERISTICS OF CLOUD SERVICES FROM A BUSINESS PERSPECTIVE

2. THE BUSINESS VALUE OF CLOUD COMPUTING

3. TYPES OF TECHNICAL PERSPECTIVES CLOUD, ADOPTION OF CLOUD AND IT SERVICE MANAGEMENT

4. IDENTIFYING RISKS AND CONSEQUENCES OF CLOUD COMPUTING

Method of Assessment:

After each course candidates will need to complete the CompTIA official exam or exams. For full exam details, please see the individual course pages.

Please note: official exams are not included in this course bundle and need to be purchased separately.

Certification: Successful candidates will be awarded the CompTIA Advanced Security Practitioner (CASP) – CAS-001, CompTIA A+ (220-801 or JK0-801), CompTIA Cloud+ (CV0-001), CompTIA IT Fundamentals (FC0-U51), CompTIA Mobility+ (MB0-001), CompTIA Network+ (N10-006), CompTIA Security+ (SY0-401 or JK0-018), CompTIA Advanced Security Practitioner (CASP) – CAS-001, and CompTIA Cloud Essentials (CLO – 001) certificates.

Who is this course for?

This course is ideally suited to those hoping to become CompTIA certified to the highest level.

Requirements

Learners must be age 16 and should have a good grasp of the English language, numeracy, literacy and ICT.

Please note: Each of the CompTIA certifications have different recommended levels of experience, to check these candidates should visit the individual course pages.

Career path

This course would allow you to fulfil any of the following roles:

  • IT Consultant
  • IT Technical Services
  • IT Relationship Manager
  • IT Architect
  • Consultant
  • IT Security Specialist
  • IT Manager
  • IT Security Consultant
  • IT Security Engineer
  • IT Security Controls Manager
  • IT Security Administrator
  • Information Security Analyst
  • Network Administrator
  • Help Desk Technician
  • Network Support Specialist
  • Network Analyst
 
 

Related article

Could you be making CV mistakes that are sabotaging your job search? It’s quite possible, and easily fixed, by addressing these common CV mistakes.