CompTIA Pro 4 exams

Select an option below to show price

/ month for 6 months

Clear

CompTIA Pro 4 exam bundle CompTIA A+, CompTIA Network+, CompTIA Security+

CompTIA Pro 4 exams

£2,072 Now £1,099

Select an option below to show price

/ month for 6 months

Clear

Enquire Now

What's included:

   Four essential CompTIA courses worth £796

   Four exams included: CompTIA A+ Core 1, CompTIA A+ Core 2, CompTIA Network+ and CompTIA Security + worth £880

   Unlimited Mock Test Support, Mock Test Teacher and Account Manager worth £396

   Saving of £1,123

  All with 12 months access

The CompTIA Pro includes the most sought after CompTIA courses and CompTIA exams with 12 months access. This is the perfect bundle for those that are working in IT that want to stand out and gain an easy salary increase.

Four CompTIA courses included:
CompTIA IT Fundamentals +
CompTIA A +
CompTIA Network +
CompTIA Security +

Four CompTIA exams included:
CompTIA A+ Core 1 220-1101
CompTIA A+ Core 2 220-1102
CompTIA Network+ N10-008
CompTIA Security+ SY0-601

All with 12 months access with unlimited Mock Test Support and Mock Test Teacher included to ensure we will get you up to those pass marks.

A better career and higher salaries from CompTIA

Average Salary Indicator

Enquire Now

Example of Completion Certificate awarded when each course is completed

Example of official CompTIA certificates included when you pass the exams

CompTIA IT Fundamentals Module Outline

The CompTIA IT Fundamentals course is perfect for you if you’re considering a career in IT or if you work in a similar field that requires a broad
understanding of IT, like in a sales role at an IT company. CompTIA IT Fundamentals is a stepping stone to more advanced certifications such
as CompTIA A+, and then to CompTIA Network+ and CompTIA Security+.

The CompTIA IT Fundamentals course focuses on the essential IT skills and knowledge needed by advanced end-users and entry-level IT professionals:

  • Identifying and explaining computer components.
  • Setting up a workstation: including conducting software installations.
  • Establishing network connectivity.
  • Identifying compatibility issues and identifying and preventing security risks.
  • Managing the safety and preventative maintenance of computers.

Module 1 Software

1.1 Course And Instructor Introduction
1.2 Software Operating Systems-Part1
1.3 Software Operating Systems-Part2
1.4 Software Operating Systems-Part3
1.5 Software Operating Systems-Part4
1.6 Software Operating Systems-Part5
1.7 Common File Types-Part1
1.8 Common File Types-Part2
1.9 Software Management Best Practices-Part1
1.10 Software Management Best Practices-Part2
1.11 Alternative Software Technologies
1.12 Basic Software Features And Functions

Module 2 Hardware

2.1 Basic Wired And Wireless Peripherals-Part1
2.2 Basic Wired And Wireless Peripherals-Part2
2.3 Basic Wired And Wireless Peripherals-Part3
2.4 Common Computer Connector Types-Part1
2.5 Common Computer Connector Types-Part2
2.6 Internal Computer Components-Part1
2.7 Internal Computer Components-Part2

Module 3 Security

3.1 Basic Security Threats-Part1
3.2 Basic Security Threats-Part2
3.3 Basic Security Threats-Part3
3.4 Security Best Practices-Part1
3.5 Security Best Practices-Part2
3.6 Web-Browsing Best Practices
3.7 Web-Browsing Best Practices Demo-Part1
3.8 Web-Browsing Best Practices Demo-Part2
3.9 Web-Browsing Best Practices Demo-Part3

Module 4 Networking

4.1 Setup And Configure Basic SOHO Router
4.2 Wireless Router Demo
4.3 Compare And Contrast Cellular Wireless And Wire Data Connections
4.5 Compare And Contrast Different Methods Of Sharing And Storage-Part1
4.6 Compare And Contrast Different Methods Of Sharing And Storage-Part2
4.7 Compare And Contrast Different Methods Of Sharing And Storage-Part3

Module 5 Basic IT Literacy

5.1 Setting Up A Basic Workstation-Part1
5.2 Setting Up A Basic Workstation-Part2
5.3 Setting Up A Basic Workstation Demo-Part1
5.4 Setting Up A Basic Workstation Demo-Part2
5.5 Setting Up A Basic Workstation Demo-Part3
5.6 Basic Methods Of Navigating An Operating System-Part1
5.7 Basic Methods Of Navigating An Operating System-Part2
5.8 Basic Methods Of Navigating An Operating System Demo-Part1
5.9 Basic Methods Of Navigating An Operating System Demo-Part2
5.10 Basic Support Concepts
5.11 Basic Backup Concepts
5.12 Environmental And Safety Concepts-Part1
5.13 Environmental And Safety Concepts-Part2

Module 6 Course Review

6.1 Software Domain Review
6.2 Hardware Domain Review
6.3 Security Domain Review
6.4 Networking Domain Review
6.5 Basic IT Literacy Review
6.6 Course Review Question
6.7 Test Taking Tips
6.8 Course Outro

CompTIA A+ Module Outline

The CompTIA A+ is in two parts Core 1 and Core 2. You must complete Core 1 before you attempt Core 2. This course includes both parts and is the new course which covers the update in 2022. CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.

CompTIA A+ 220-1102 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.

CompTIA A + 220-1101 Core 1

1.0 – Mobile Devices
• What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile
devices
• 1.5 Given a scenario, connect and configure accessories and ports of other
mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and
application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization
2.0 Networking
• What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO
network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by
networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their
features
• 2.8 Given a scenario, use appropriate networking tools
3.0 Hardware
• What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on
cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a
custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and
settings
• 3.11 Given a scenario, install and maintain various print technologies
4.0 Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization
5.0 Hardware and Network Troubleshooting
• What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while
adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network
problems

CompTIA A + 220-1102 Core 2

Module 1 – Operation Systems
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
Module 2 – Security
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
Module 3 – Software Troubleshooting
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
Module 4 – Operational Procedures
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies

CompTIA Network + Module Outline

The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:

• Networking concepts
• Network infrastructure and deploying common network components
• Network operations and supporting a production network
• Network security concepts and implementing basic network security
• Network troubleshooting

Network Concepts

  • Intro Network Plus N10-008
  • Basic networking
  • Activity basic networking
  • OSI model
  • Exploring the OSI model act
  • Protocol and ports
  • Activity examining protocols and ports
  • Connection oriented vs connectionless
  • Activity comparing TCP and UDP
  • Internet protocol (IP)
  • Activity examining the lower layer protocols
  • Layer 7 remote control protocols
  • Layer 7 file transfer protocols
  • Layer 7 file transfer protocols
  • Layer 7 messaging protocols
  • Activity examining messaging protocols
  • Layer 7 web traffic protocols
  • layer 7 streaming media protocols
  • Layer 7 infrastructure management protocols
  • Switching
  • Activity creating collision and broadcast domains
  • Interface properties and segmentation
  • Activity creating a basic network segment
  • Switching part 2
  • Activity switching
  • Switching loop management
  • Activity managing switching loops
  • VLANs
  • Activity creating VLANs
  • Routing
  • Activity examining ARP
  • IP addressing basics
  • Activity configuring IP
  • Routers
  • Activity setting up a router
  • Routing basics
  • Activity adding static routes
  • VLAN routing
  • Activity routing between VLANs
  • NAT/PAT
  • Activity configuring NAT/PAT
  • Routing protocols
  • Activity configuring a routing protocol
  • Firewalls
  • Activity configuring firewalls
  • Advanced switching and routing concepts
  • Activity exploring IPv6
  • Performance concepts
  • IP addressing
  • Subnetting
  • Activity learning to subnet
  • Address assignments
  • Network types and topologies
  • Wireless topologies
  • Network types
  • Technologies that facilitate the internet of things (IoT)
  • Wireless technologies
  • 802.11 standards
  • Wi-Fi frequencies
  • Wi-Fi antenna concepts
  • Bluetotoh
  • Cellular
  • Activity using an RF spectrum analyzer
  • Cloud concepts
  • Activity exploring cloud services
  • Network services
  • Activity setting up DNS
  • DHCP service
  • Activity setting up DHCP
  • NTP

Infrastructure

  • Infrastructure
  • Activity testing a fiber optic cable
  • Plenum vs. PVC
  • Activity crimping on an RJ-45 connector
  • Transceivers
  • Activity terminating cable to a 110 block
  • Copper cable standards
  • Activity creating a crossover cable
  • Ethernet deployment standards
  • Network device placement and installation
  • Repeater
  • Router
  • Modem
  • Activity setting up a WAP
  • Firewall
  • Media converter
  • Advanced network devices
  • Wireless controller
  • Proxy server
  • Activity configuring proxy settigns
  • VPN concentrator
  • Virtual networking components
  • Network storage types
  • WAN technologies
  • Transmission mediums
  • Activity configuring WAN links
  • Termination

Network Operation

  • Change management
  • IDF-MDF documentation
  • Labeling
  • Logical vs physical diagrams
  • Network operations documentation
  • Rack diagrams
  • Standard operation procedures
  • Using documentation act
  • Wiring and ports locations
  • Continuity and disaster
  • MTTR mean time repair
  • Recovery
  • Backing up your data act
  • Event management
  • Metrics
  • Scanning monitoring patching
  • Testing the network act
  • HTTPS management
  • Out of band management
  • RDP
  • Remote access methods
  • Remote file access
  • making remote connections act
  • SSH
  • VNC
  • Policies and best practices
  • Creating policies and procedures act

Network Security

Physical Security Devices
• Detection
• Prevention
Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot

Network Troubleshooting and Tools

Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
Troubleshoot Wired Connectivity and Performance
• Signal Issues:
• Attenuation
• Latency
• Jitter
• Crosstalk
• EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
• Open/short
• Incorrect pin-out
• Incorrect Cable Type
• Bad Port
• Damaged cable
• Bent pins
• Transceiver Issues:
• Transceiver mismatch
• TX/RX reverse
• Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
• Bottleneck
• VLAN mismatch
• Network connection LED status indicators
Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
• Attenuation
• Reflection
• Refraction
• Absorption
• Latency & Jitter
• Antenna Issues:
• Incorrect antenna type
• Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
• Interference
• Channel overlap
• Overcapacity
• Distance limitations
• Frequency mismatch
• Power levels
• Signal-to-noise ratio
• WAP Misconfiguration:
• Wrong SSID
• Wrong passphrase
• Security type mismatch
• Activity Troubleshooting WAP Issues
Troubleshoot Common Network Service Issues
• Common Network Issues:
• Physical Connectivity
• Incorrect IP Address
• Incorrect Gateway
• Incorrect Netmask
• Names Not Resolving
• Untrusted SSL Certificate
• DCP Issues:
• Duplicate IP Addresses
• Expired IP Address
• Rogue DHCP
• Exhausted DHCP Scope
• Firewall/ACL Issues:
• Blocked TCP/UDP Ports
• Incorrect Host-based Firewall Settings
• Incorrect ACL Settings
• Advanced Network Issues:
• DNS Server Issues
• Duplicate MAC Addresses
• Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue

CompTIA Security + Module Outline

The CompTIA Security+ course will prepare you to become CompTIA Security+ certified. ITcertify covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes with Cryptography and Public Key Infrastructure.

You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company. 

Threats, Attacks, and Vulnerabilities

1.1 Introduction
1.2 Types Of Malware- Part 1
1.3 Types Of Malware- Part 2
1.4 Types Of Attacks- Part 1
1.5 Types Of Attacks- Part 2
1.6 Types Of Attacks- Part 3
1.7 Types Of Attacks- Part 4
1.8 Types Of Attacks- Part 5
1.9 Threat Actors- Part 1
1.10 Threat Actors- Part 2
1.11 Penetration Testing And Vulnerability Scanning- Part 1
1.12 Penetration Testing And Vulnerability Scanning- Part 2
1.13 Impact Of Vulnerabilities- Part 1
1.14 Impact Of Vulnerabilities- Part 2

Technologies and Tools

2.1 Networking Hardware And Software- Part 1
2.2 Networking Hardware And Software- Part 2
2.3 Networking Hardware And Software- Part 3
2.4 Networking Hardware And Software- Part 4
2.5 Networking Hardware And Software- Part 5
2.6 Networking Hardware And Software- Part 6
2.7 Security Assessment- Part 1
2.8 Security Assessment- Part 2
2.9 Troubleshooting Issues- Part 1
2.10 Troubleshooting Issues- Part 2
2.11 Securing Mobile Devices- Part 1
2.12 Securing Mobile Devices- Part 2
2.13 Securing Mobile Devices- Part 3
2.14 Securing Mobile Devices- Part 4
2.15 Secure Protocols- Part 1
2.16 Secure Protocols- Part 2

Architecture and Design

3.1 Secure Network Architecture- Part 1
3.2 Secure Network Architecture- Part 2
3.3 Secure System Designs- Part 1
3.4 Secure System Designs- Part 2
3.5 Secure Staging Deployment Concepts
3.6 Embedded Systems- Part 1
3.7 Embedded Systems- Part 2
3.8 Application Development And Deployment- Part 1
3.9 Application Development And Deployment- Part 2
3.10 Application Development And Deployment- Part 3
3.11 Physical Security Controls- Part 1
3.12 Physical Security Controls- Part 2
3.13 Physical Security Controls- Part 3
3.14 Cloud Virtualization- Part 1
3.15 Cloud Virtualization- Part 2

Identity and Access Management

4.1 Identity And Access Management- Part 1
4.2 Identity And Access Management- Part 2
4.3 Identity And Access Services- Part 1
4.4 Identity And Access Services- Part 2
4.5 Management Controls- Part 1
4.6 Management Controls- Part 2
4.7 Account Management Practices- Part 1
4.8 Account Management Practices- Part 2
4.9 Account Management Practices- Part 3

Risk Management

5.1 Organizational Security- Part 1
5.2 Organizational Security- Part 2
5.3 Business Impact Analysis Concepts- Part 1
5.4 Business Impact Analysis Concepts- Part 2
5.5 Risk Management- Part 1
5.6 Risk Management- Part 2
5.7 Incident Response Procedures- Part 1
5.8 Incident Response Procedures- Part 2
5.9 Forensics- Part 1
5.10 Forensics- Part 2
5.11 Disaster Recovery- Part 1
5.12 Disaster Recovery- Part 2
5.13 Types Of Control- Part 1
5.14 Types Of Control- Part 2
5.15 Data Security And Privacy Practices- Part 1
5.16 Data Security And Privacy Practices- Part 2

Cryptography and PKI

6.1 Cryptographic Basics- Part 1
6.2 Cryptographic Basics- Part 2
6.3 Cryptographic Basics- Part 3
6.4 Cryptographic Algorithms- Part 1
6.5 Cryptographic Algorithms- Part 2
6.6 Wireless Security- Part 1
6.7 Wireless Security- Part 2
6.8 Implementing PKI- Part 1
6.9 Implementing PKI- Part 2
6.10 Implementing PKI- Part 3
6.11 Conclusion

Additional information

Package

CompTIA Pro with CompTIA IT Fundamentals, CompTIA A +, CompTIA Network + and CompTIA Security +

Course Code

CompTIA 220-1101 and 220-1102, CompTIA FC0-U61, CompTIA N10-008, CompTIA SY0-601

Awarded By

CompTIA

Hours

98

Included In Bundles

This is the CompTIA Pro 4 exam bundle

Access

12 Months

Prior courses / experience needed

No previous experience required. Open to everyone

Exam Code

220-1101 and 220-1102, CompTIA N10-008, CompTIA SY0-601

Practise Lab Available

Related Practise Labs available but not included in this package

Part of a Badge with multiple courses

4 x courses and 4 x exams included

Enquire Now

All delivered through our world class learning portal

Navigation and Controls

Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.

Expert instructor led training

Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise

Visual demonstrations and multimedia presentations

Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios

Quizzes and exam simulators

Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.

Flash cards and educational games

ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.

Enquire Now

Additional information

Package

CompTIA Pro with CompTIA IT Fundamentals, CompTIA A +, CompTIA Network + and CompTIA Security +

Course Code

CompTIA 220-1101 and 220-1102, CompTIA FC0-U61, CompTIA N10-008, CompTIA SY0-601

Awarded By

CompTIA

Hours

98

Included In Bundles

This is the CompTIA Pro 4 exam bundle

Access

12 Months

Prior courses / experience needed

No previous experience required. Open to everyone

Exam Code

220-1101 and 220-1102, CompTIA N10-008, CompTIA SY0-601

Practise Lab Available

Related Practise Labs available but not included in this package

Part of a Badge with multiple courses

4 x courses and 4 x exams included