CompTIA Pro 4 exams
£2,072 Now £1,099
Select an option below to show price
/ month for 6 monthsWhat's included:
Four essential CompTIA courses worth £796
Four exams included: CompTIA A+ Core 1, CompTIA A+ Core 2, CompTIA Network+ and CompTIA Security + worth £880
Unlimited Mock Test Support, Mock Test Teacher and Account Manager worth £396
Saving of £1,123
All with 12 months access
The CompTIA Pro includes the most sought after CompTIA courses and CompTIA exams with 12 months access. This is the perfect bundle for those that are working in IT that want to stand out and gain an easy salary increase.
Four CompTIA courses included:
CompTIA IT Fundamentals +
CompTIA A +
CompTIA Network +
CompTIA Security +
Four CompTIA exams included:
CompTIA A+ Core 1 220-1101
CompTIA A+ Core 2 220-1102
CompTIA Network+ N10-008
CompTIA Security+ SY0-601
All with 12 months access with unlimited Mock Test Support and Mock Test Teacher included to ensure we will get you up to those pass marks.
A better career and higher salaries from CompTIA
Average Salary Indicator
Example of Completion Certificate awarded when each course is completed
Example of official CompTIA certificates included when you pass the exams
CompTIA IT Fundamentals Module Outline
The CompTIA IT Fundamentals course is perfect for you if you’re considering a career in IT or if you work in a similar field that requires a broad
understanding of IT, like in a sales role at an IT company. CompTIA IT Fundamentals is a stepping stone to more advanced certifications such
as CompTIA A+, and then to CompTIA Network+ and CompTIA Security+.
The CompTIA IT Fundamentals course focuses on the essential IT skills and knowledge needed by advanced end-users and entry-level IT professionals:
- Identifying and explaining computer components.
- Setting up a workstation: including conducting software installations.
- Establishing network connectivity.
- Identifying compatibility issues and identifying and preventing security risks.
- Managing the safety and preventative maintenance of computers.
Module 1 Software
Module 2 Hardware
Module 3 Security
Module 4 Networking
Module 5 Basic IT Literacy
Module 6 Course Review
CompTIA A+ Module Outline
The CompTIA A+ is in two parts Core 1 and Core 2. You must complete Core 1 before you attempt Core 2. This course includes both parts and is the new course which covers the update in 2022. CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.
CompTIA A+ 220-1102 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.
CompTIA A + 220-1101 Core 1
1.0 – Mobile Devices
• What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile
devices
• 1.5 Given a scenario, connect and configure accessories and ports of other
mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and
application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization
2.0 Networking
• What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO
network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by
networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their
features
• 2.8 Given a scenario, use appropriate networking tools
3.0 Hardware
• What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on
cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a
custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and
settings
• 3.11 Given a scenario, install and maintain various print technologies
4.0 Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization
5.0 Hardware and Network Troubleshooting
• What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while
adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network
problems
CompTIA A + 220-1102 Core 2
Module 1 – Operation Systems
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
Module 2 – Security
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
Module 3 – Software Troubleshooting
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
Module 4 – Operational Procedures
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies
CompTIA Network + Module Outline
The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:
• Networking concepts
• Network infrastructure and deploying common network components
• Network operations and supporting a production network
• Network security concepts and implementing basic network security
• Network troubleshooting
Network Concepts
- Intro Network Plus N10-008
- Basic networking
- Activity basic networking
- OSI model
- Exploring the OSI model act
- Protocol and ports
- Activity examining protocols and ports
- Connection oriented vs connectionless
- Activity comparing TCP and UDP
- Internet protocol (IP)
- Activity examining the lower layer protocols
- Layer 7 remote control protocols
- Layer 7 file transfer protocols
- Layer 7 file transfer protocols
- Layer 7 messaging protocols
- Activity examining messaging protocols
- Layer 7 web traffic protocols
- layer 7 streaming media protocols
- Layer 7 infrastructure management protocols
- Switching
- Activity creating collision and broadcast domains
- Interface properties and segmentation
- Activity creating a basic network segment
- Switching part 2
- Activity switching
- Switching loop management
- Activity managing switching loops
- VLANs
- Activity creating VLANs
- Routing
- Activity examining ARP
- IP addressing basics
- Activity configuring IP
- Routers
- Activity setting up a router
- Routing basics
- Activity adding static routes
- VLAN routing
- Activity routing between VLANs
- NAT/PAT
- Activity configuring NAT/PAT
- Routing protocols
- Activity configuring a routing protocol
- Firewalls
- Activity configuring firewalls
- Advanced switching and routing concepts
- Activity exploring IPv6
- Performance concepts
- IP addressing
- Subnetting
- Activity learning to subnet
- Address assignments
- Network types and topologies
- Wireless topologies
- Network types
- Technologies that facilitate the internet of things (IoT)
- Wireless technologies
- 802.11 standards
- Wi-Fi frequencies
- Wi-Fi antenna concepts
- Bluetotoh
- Cellular
- Activity using an RF spectrum analyzer
- Cloud concepts
- Activity exploring cloud services
- Network services
- Activity setting up DNS
- DHCP service
- Activity setting up DHCP
- NTP
Infrastructure
- Infrastructure
- Activity testing a fiber optic cable
- Plenum vs. PVC
- Activity crimping on an RJ-45 connector
- Transceivers
- Activity terminating cable to a 110 block
- Copper cable standards
- Activity creating a crossover cable
- Ethernet deployment standards
- Network device placement and installation
- Repeater
- Router
- Modem
- Activity setting up a WAP
- Firewall
- Media converter
- Advanced network devices
- Wireless controller
- Proxy server
- Activity configuring proxy settigns
- VPN concentrator
- Virtual networking components
- Network storage types
- WAN technologies
- Transmission mediums
- Activity configuring WAN links
- Termination
Network Operation
- Change management
- IDF-MDF documentation
- Labeling
- Logical vs physical diagrams
- Network operations documentation
- Rack diagrams
- Standard operation procedures
- Using documentation act
- Wiring and ports locations
- Continuity and disaster
- MTTR mean time repair
- Recovery
- Backing up your data act
- Event management
- Metrics
- Scanning monitoring patching
- Testing the network act
- HTTPS management
- Out of band management
- RDP
- Remote access methods
- Remote file access
- making remote connections act
- SSH
- VNC
- Policies and best practices
- Creating policies and procedures act
Network Security
Physical Security Devices
• Detection
• Prevention
Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot
Network Troubleshooting and Tools
Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
Troubleshoot Wired Connectivity and Performance
• Signal Issues:
• Attenuation
• Latency
• Jitter
• Crosstalk
• EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
• Open/short
• Incorrect pin-out
• Incorrect Cable Type
• Bad Port
• Damaged cable
• Bent pins
• Transceiver Issues:
• Transceiver mismatch
• TX/RX reverse
• Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
• Bottleneck
• VLAN mismatch
• Network connection LED status indicators
Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
• Attenuation
• Reflection
• Refraction
• Absorption
• Latency & Jitter
• Antenna Issues:
• Incorrect antenna type
• Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
• Interference
• Channel overlap
• Overcapacity
• Distance limitations
• Frequency mismatch
• Power levels
• Signal-to-noise ratio
• WAP Misconfiguration:
• Wrong SSID
• Wrong passphrase
• Security type mismatch
• Activity Troubleshooting WAP Issues
Troubleshoot Common Network Service Issues
• Common Network Issues:
• Physical Connectivity
• Incorrect IP Address
• Incorrect Gateway
• Incorrect Netmask
• Names Not Resolving
• Untrusted SSL Certificate
• DCP Issues:
• Duplicate IP Addresses
• Expired IP Address
• Rogue DHCP
• Exhausted DHCP Scope
• Firewall/ACL Issues:
• Blocked TCP/UDP Ports
• Incorrect Host-based Firewall Settings
• Incorrect ACL Settings
• Advanced Network Issues:
• DNS Server Issues
• Duplicate MAC Addresses
• Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue
CompTIA Security + Module Outline
The CompTIA Security+ course will prepare you to become CompTIA Security+ certified. ITcertify covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes with Cryptography and Public Key Infrastructure.
You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company.
Threats, Attacks, and Vulnerabilities
1.1 Introduction
1.2 Types Of Malware- Part 1
1.3 Types Of Malware- Part 2
1.4 Types Of Attacks- Part 1
1.5 Types Of Attacks- Part 2
1.6 Types Of Attacks- Part 3
1.7 Types Of Attacks- Part 4
1.8 Types Of Attacks- Part 5
1.9 Threat Actors- Part 1
1.10 Threat Actors- Part 2
1.11 Penetration Testing And Vulnerability Scanning- Part 1
1.12 Penetration Testing And Vulnerability Scanning- Part 2
1.13 Impact Of Vulnerabilities- Part 1
1.14 Impact Of Vulnerabilities- Part 2
Technologies and Tools
2.1 Networking Hardware And Software- Part 1
2.2 Networking Hardware And Software- Part 2
2.3 Networking Hardware And Software- Part 3
2.4 Networking Hardware And Software- Part 4
2.5 Networking Hardware And Software- Part 5
2.6 Networking Hardware And Software- Part 6
2.7 Security Assessment- Part 1
2.8 Security Assessment- Part 2
2.9 Troubleshooting Issues- Part 1
2.10 Troubleshooting Issues- Part 2
2.11 Securing Mobile Devices- Part 1
2.12 Securing Mobile Devices- Part 2
2.13 Securing Mobile Devices- Part 3
2.14 Securing Mobile Devices- Part 4
2.15 Secure Protocols- Part 1
2.16 Secure Protocols- Part 2
Architecture and Design
3.1 Secure Network Architecture- Part 1
3.2 Secure Network Architecture- Part 2
3.3 Secure System Designs- Part 1
3.4 Secure System Designs- Part 2
3.5 Secure Staging Deployment Concepts
3.6 Embedded Systems- Part 1
3.7 Embedded Systems- Part 2
3.8 Application Development And Deployment- Part 1
3.9 Application Development And Deployment- Part 2
3.10 Application Development And Deployment- Part 3
3.11 Physical Security Controls- Part 1
3.12 Physical Security Controls- Part 2
3.13 Physical Security Controls- Part 3
3.14 Cloud Virtualization- Part 1
3.15 Cloud Virtualization- Part 2
Identity and Access Management
4.1 Identity And Access Management- Part 1
4.2 Identity And Access Management- Part 2
4.3 Identity And Access Services- Part 1
4.4 Identity And Access Services- Part 2
4.5 Management Controls- Part 1
4.6 Management Controls- Part 2
4.7 Account Management Practices- Part 1
4.8 Account Management Practices- Part 2
4.9 Account Management Practices- Part 3
Risk Management
5.1 Organizational Security- Part 1
5.2 Organizational Security- Part 2
5.3 Business Impact Analysis Concepts- Part 1
5.4 Business Impact Analysis Concepts- Part 2
5.5 Risk Management- Part 1
5.6 Risk Management- Part 2
5.7 Incident Response Procedures- Part 1
5.8 Incident Response Procedures- Part 2
5.9 Forensics- Part 1
5.10 Forensics- Part 2
5.11 Disaster Recovery- Part 1
5.12 Disaster Recovery- Part 2
5.13 Types Of Control- Part 1
5.14 Types Of Control- Part 2
5.15 Data Security And Privacy Practices- Part 1
5.16 Data Security And Privacy Practices- Part 2
Cryptography and PKI
6.1 Cryptographic Basics- Part 1
6.2 Cryptographic Basics- Part 2
6.3 Cryptographic Basics- Part 3
6.4 Cryptographic Algorithms- Part 1
6.5 Cryptographic Algorithms- Part 2
6.6 Wireless Security- Part 1
6.7 Wireless Security- Part 2
6.8 Implementing PKI- Part 1
6.9 Implementing PKI- Part 2
6.10 Implementing PKI- Part 3
6.11 Conclusion
Additional information
Package | CompTIA Pro with CompTIA IT Fundamentals, CompTIA A +, CompTIA Network + and CompTIA Security + |
---|---|
Course Code | CompTIA 220-1101 and 220-1102, CompTIA FC0-U61, CompTIA N10-008, CompTIA SY0-601 |
Awarded By | CompTIA |
Hours | 98 |
Included In Bundles | This is the CompTIA Pro 4 exam bundle |
Access | 12 Months |
Prior courses / experience needed | No previous experience required. Open to everyone |
Exam Code | 220-1101 and 220-1102, CompTIA N10-008, CompTIA SY0-601 |
Practise Lab Available | Related Practise Labs available but not included in this package |
Part of a Badge with multiple courses | 4 x courses and 4 x exams included |
All delivered through our world class learning portal
Navigation and Controls
Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.
Expert instructor led training
Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise
Visual demonstrations and multimedia presentations
Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios
Quizzes and exam simulators
Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.
Flash cards and educational games
ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.