Cyber Security Job Programme

£2846, Now £899

£899.00

Full Payment Discount – £899

+ FREE UPGRADE to our more premium Elite Edition – ends 11.59pm 2nd December

Professional and Accredited Online Learning

Accredited and Professional courses you can access on our world class online learning portal. Study anytime, anyplace.

Can now be taken online via a webcam. Super fast booking times with easy access. No more travel hassle.

Our practical experience allows you to connect to live equipment through advanced cloud systems. Just like when you work in IT.

Award Winning Premium Student Support

Your own Mock Test Teacher and Account Manager to guide you through every step

Our unlimited Mock Test Support means you have unlimited chances to pass

Your new CV we build you gets past filter systems on Job Boards and we’ll support you with our job recommendations.

7

No IT experience needed. Our Programme is for complete Beginners. We provide you with the 7 things you need to begin your new IT career

1. Skills from Accredited courses

2. Official exams recognised worldwide

3. Real Practical Experience

4. Your own Account Manager

5. Your own Mock Test Teacher

6. Unlimited Mock Tests

7. Career Support

Enquire Now

Everything you need is included

CompTIA IT Fundamentals+

CompTIA A+ Core 1 and Core 2

CompTIA Network+

CompTIA Cloud+

CompTIA ITIL Foundations

Microsoft Windows

Cisco CCNA

CompTIA Security+

CompTIA Cyber Security Analyst

CompTIA Linux+

Cloud Computing Security Knowledge

Ethical Hacker

2 x Exams included

CompTIA A+ Core 1 220-1101

CompTIA A+ Core 2 220-1102

2 x Practice Labs included

CompTIA A+ Core 2 220-1102

CompTIA Security+ SYO-701

Graduate Officially with a CompTIA Partner

Complete CV Build

Professional Reference

Personal Statement Build

Cover Letter Build

Email Signature Build

LinkedIn Profile Enhancement

Employer Reference Verification

Study as many hours as you want, when you want

The cyber security course programme is designed as a FAST TRACK programme. You have the best of both worlds where you get up to 2 years access to everything but can still complete the entire programme in just 4-5 months based on 15 hours a week study.

Or do 8 hours a week study allowing you to complete the entire programme in 8 months. Or even 4 hours a week allows you to complete in 12 months.

The main thing is you decide how many hours you want to study each week, whether it's 5 hours one week, 15 hours another week or you take a few weeks off. You are in complete control.

Get the best of both worlds
Up to 24 months access.
But you can still complete in just 4 - 5 months.

Your cyber security course programme is released in two parts. Each part has 12 months access. As soon as you finish Part 1, we release part 2 straight away with a fresh 12 months access giving you up to 24 months access in total.

Part 1: Complete the seven accredited and professional IT courses and pass the CompTIA A+ exams with our unlimited Mock Test Support and Mock Test Teacher.

Part 2: Complete the five accredited and professional Cyber Security courses, complete both practice labs and then enjoy our Award Winning Career support which includes a new CV, Cover Letter, LinkedIn Profile enhancement, Reference from a CompTIA Authorised Partner and more so that you can begin your new IT Career.

Average Salary Indicator

Just some of our graduates

Flexibility to study online but still having support was very important to me and they delivered

Liza TetskiFrom:Carer
To: 1st Line Support
Goal achieved: Increased salary from £18k to £25K

Really enjoyed the CompTIA courses, great team found the career support simply superb

Kevin ChunFrom: Sales Assistant
To: IT Support Analyst
Goal achieved: Increased salary from £24k to £30K

Passed my exams in 6 weeks and began my IT job just 3 weeks later, fantastic programme.

John PearsonFrom: Office Services
To:Infrastructure Technician
Goal achieved: Increased salary from £22k to £29K

Myself and colleagues have been using IT Certify for years for all our upskill needs.

Leo BrossFrom: Analyst
To: Cloud Specialist
Goal achieved: Increase day rate from £400 to £700

Get a free IT career consultation.

    Module outlines for each course

    CompTIA IT Fundamentals Module Outline

    The CompTIA IT Fundamentals course is the first course you will study on the cyber security course programme. This course is perfect for you if you’re considering a career in IT or if you work in a similar field that requires a broad understanding of IT, like in a sales role at an IT company. CompTIA IT Fundamentals is a stepping stone to more advanced certifications such as CompTIA A+, and then to CompTIA Network+ and CompTIA Security+.

    The CompTIA IT Fundamentals course focuses on the essential IT skills and knowledge needed by advanced end-users and entry-level IT professionals:

    • Identifying and explaining computer components.
    • Setting up a workstation: including conducting software installations.
    • Establishing network connectivity.
    • Identifying compatibility issues and identifying and preventing security risks.
    • Managing the safety and preventative maintenance of computers.

    Module 1 Software

    1.1 Course And Instructor Introduction
    1.2 Software Operating Systems-Part1
    1.3 Software Operating Systems-Part2
    1.4 Software Operating Systems-Part3
    1.5 Software Operating Systems-Part4
    1.6 Software Operating Systems-Part5
    1.7 Common File Types-Part1
    1.8 Common File Types-Part2
    1.9 Software Management Best Practices-Part1
    1.10 Software Management Best Practices-Part2
    1.11 Alternative Software Technologies
    1.12 Basic Software Features And Functions

    Module 2 Hardware

    2.1 Basic Wired And Wireless Peripherals-Part1
    2.2 Basic Wired And Wireless Peripherals-Part2
    2.3 Basic Wired And Wireless Peripherals-Part3
    2.4 Common Computer Connector Types-Part1
    2.5 Common Computer Connector Types-Part2
    2.6 Internal Computer Components-Part1
    2.7 Internal Computer Components-Part2

    Module 3 Security

    3.1 Basic Security Threats-Part1
    3.2 Basic Security Threats-Part2
    3.3 Basic Security Threats-Part3
    3.4 Security Best Practices-Part1
    3.5 Security Best Practices-Part2
    3.6 Web-Browsing Best Practices
    3.7 Web-Browsing Best Practices Demo-Part1
    3.8 Web-Browsing Best Practices Demo-Part2
    3.9 Web-Browsing Best Practices Demo-Part3

    Module 4 Networking

    4.1 Setup And Configure Basic SOHO Router
    4.2 Wireless Router Demo
    4.3 Compare And Contrast Cellular Wireless And Wire Data Connections
    4.5 Compare And Contrast Different Methods Of Sharing And Storage-Part1
    4.6 Compare And Contrast Different Methods Of Sharing And Storage-Part2
    4.7 Compare And Contrast Different Methods Of Sharing And Storage-Part3

    Module 5 Basic IT Literacy

    5.1 Setting Up A Basic Workstation-Part1
    5.2 Setting Up A Basic Workstation-Part2
    5.3 Setting Up A Basic Workstation Demo-Part1
    5.4 Setting Up A Basic Workstation Demo-Part2
    5.5 Setting Up A Basic Workstation Demo-Part3
    5.6 Basic Methods Of Navigating An Operating System-Part1
    5.7 Basic Methods Of Navigating An Operating System-Part2
    5.8 Basic Methods Of Navigating An Operating System Demo-Part1
    5.9 Basic Methods Of Navigating An Operating System Demo-Part2
    5.10 Basic Support Concepts
    5.11 Basic Backup Concepts
    5.12 Environmental And Safety Concepts-Part1
    5.13 Environmental And Safety Concepts-Part2

    Module 6 Course Review

    6.1 Software Domain Review
    6.2 Hardware Domain Review
    6.3 Security Domain Review
    6.4 Networking Domain Review
    6.5 Basic IT Literacy Review
    6.6 Course Review Question
    6.7 Test Taking Tips
    6.8 Course Outro

    CompTIA A+ Module Outline

    The CompTIA A+ is in two parts Core 1 and Core 2 and is the second course included on the cyber security course programme. You must complete Core 1 before you attempt Core 2. This course includes both parts and is the new course. CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.

    CompTIA A+ 220-1102 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.

    CompTIA A + 220-1101 Core 1

    1.0 – Mobile Devices
    • What are we covering?
    • 1.1 Given a scenario, install and configure laptop hardware and components
    • 1.2 Given a scenario, install components within the display of a laptop
    • 1.3 Given a scenario, use appropriate laptop features
    • 1.4 Compare and contrast characteristics of various types of other mobile
    devices
    • 1.5 Given a scenario, connect and configure accessories and ports of other
    mobile devices
    • 1.6 Given a scenario, configure basic mobile device network connectivity and
    application support
    • 1.7 Given a scenario, use methods to perform mobile device synchronization
    2.0 Networking
    • What are we covering?
    • 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
    • 2.2 Compare and contrast common networking hardware devices
    • 2.3 Given a scenario, install and configure a basic wired/wireless SOHO
    network
    • 2.4 Compare and contrast wireless networking protocols
    • 2.5 Summarize the properties and purposes of services provided by
    networked hosts
    • 2.6 Explain common network configuration concepts
    • 2.7 Compare and contrast internet connection types, network types and their
    features
    • 2.8 Given a scenario, use appropriate networking tools
    3.0 Hardware
    • What are we covering?
    • 3.1 Explain basic cable types, features and their purposes
    • 3.2 Identify common connector types
    • 3.3 Given a scenario, install RAM types
    • 3.4 Given a scenario, select, install and configure storage devices
    • 3.5 Given a scenario, install and configure motherboards, CPUs and add-on
    cards
    • 3.6 Explain the purposes and uses of various peripheral types
    • 3.7 Summarize power supply types and features
    • 3.8 Given a scenario, select and configure appropriate components for a
    custom PC configuration to meet customer specifications/needs
    • 3.9 Given a scenario, install and configure common devices
    • 3.10 Given a scenario, configure SOHO multifunction devices/printers and
    settings
    • 3.11 Given a scenario, install and maintain various print technologies
    4.0 Virtualization and Cloud Computing
    • 4.1 Compare and contrast cloud computing concepts
    • 4.2 Given a scenario, set up and configure client-side virtualization
    5.0 Hardware and Network Troubleshooting
    • What are we covering?
    • 5.1 Given a scenario, use the best practice methodology to resolve problems
    • 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
    CPUs and power
    • 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
    • 5.4 Given a scenario, troubleshoot video, projector and display issues
    • 5.5 Given a scenario, troubleshoot common mobile device issues while
    adhering to the appropriate procedures
    • 5.6 Given a scenario, troubleshoot printers
    • 5.7 Given a scenario, troubleshoot common wires and wireless network
    problems

    CompTIA A + 220-1102 Core 2

    Module 1 – Operation Systems
    • Compare and contrast common operating system types and their purposes
    • Compare and contrast features of Microsoft Windows versions
    • Summarize general OS installation considerations and upgrade methods
    • Given a scenario, use appropriate Microsoft command line tools
    • Given a scenario, use Microsoft operating system features and tools
    • Given a scenario, use Microsoft Windows Control Panel utilities
    • Summarize application installation and configuration concepts
    • Given a scenario, configure Microsoft Windows networking on a client/desktop
    • Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
    systems
    Module 2 – Security
    • Summarize the importance of physical security measures
    • Explain logical security concepts
    • Compare and contrast wireless security protocols and authentication methods
    • Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
    • Compare and contrast social engineering, threats, and vulnerabilities
    • Compare and contrast the differences of basic Microsoft Windows OS security settings
    • Given a scenario, implement security best practices to secure a workstation
    • Given a scenario, implement methods for securing mobile devices
    • Given a scenario, implement appropriate data destruction and disposal methods
    • Given a scenario, configure security on SOHO wireless and wired networks
    Module 3 – Software Troubleshooting
    •Given a scenario, troubleshoot Microsoft Windows OS problems
    • Given a scenario, troubleshoot and resolve PC security issues
    • Given a scenario, use best practice procedures for malware removal
    • Given a scenario, troubleshoot mobile OS and application issues
    • Given a scenario, troubleshoot mobile OS and application security issues
    Module 4 – Operational Procedures
    •Compare and contrast best practices associated with types of documentation
    • Given a scenario, implement basic change management best practices
    • Given a scenario, implement basic disaster prevention and recovery methods
    • Explain common safety procedures • Explain environmental impacts and appropriate controls
    • Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
    policy concepts
    • Given a scenario, use proper communication techniques and professionalism
    • Identify the basics of scripting • Given a scenario, use remote access technologies

    CompTIA Network + Module Outline

    The third course on the cyber security course programme: The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:

    • Networking concepts
    • Network infrastructure and deploying common network components
    • Network operations and supporting a production network
    • Network security concepts and implementing basic network security
    • Network troubleshooting

    Network Concepts

    • Intro Network Plus N10-008
    • Basic networking
    • Activity basic networking
    • OSI model
    • Exploring the OSI model act
    • Protocol and ports
    • Activity examining protocols and ports
    • Connection oriented vs connectionless
    • Activity comparing TCP and UDP
    • Internet protocol (IP)
    • Activity examining the lower layer protocols
    • Layer 7 remote control protocols
    • Layer 7 file transfer protocols
    • Layer 7 file transfer protocols
    • Layer 7 messaging protocols
    • Activity examining messaging protocols
    • Layer 7 web traffic protocols
    • layer 7 streaming media protocols
    • Layer 7 infrastructure management protocols
    • Switching
    • Activity creating collision and broadcast domains
    • Interface properties and segmentation
    • Activity creating a basic network segment
    • Switching part 2
    • Activity switching
    • Switching loop management
    • Activity managing switching loops
    • VLANs
    • Activity creating VLANs
    • Routing
    • Activity examining ARP
    • IP addressing basics
    • Activity configuring IP
    • Routers
    • Activity setting up a router
    • Routing basics
    • Activity adding static routes
    • VLAN routing
    • Activity routing between VLANs
    • NAT/PAT
    • Activity configuring NAT/PAT
    • Routing protocols
    • Activity configuring a routing protocol
    • Firewalls
    • Activity configuring firewalls
    • Advanced switching and routing concepts
    • Activity exploring IPv6
    • Performance concepts
    • IP addressing
    • Subnetting
    • Activity learning to subnet
    • Address assignments
    • Network types and topologies
    • Wireless topologies
    • Network types
    • Technologies that facilitate the internet of things (IoT)
    • Wireless technologies
    • 802.11 standards
    • Wi-Fi frequencies
    • Wi-Fi antenna concepts
    • Bluetotoh
    • Cellular
    • Activity using an RF spectrum analyzer
    • Cloud concepts
    • Activity exploring cloud services
    • Network services
    • Activity setting up DNS
    • DHCP service
    • Activity setting up DHCP
    • NTP

    Infrastructure

    • Infrastructure
    • Activity testing a fiber optic cable
    • Plenum vs. PVC
    • Activity crimping on an RJ-45 connector
    • Transceivers
    • Activity terminating cable to a 110 block
    • Copper cable standards
    • Activity creating a crossover cable
    • Ethernet deployment standards
    • Network device placement and installation
    • Repeater
    • Router
    • Modem
    • Activity setting up a WAP
    • Firewall
    • Media converter
    • Advanced network devices
    • Wireless controller
    • Proxy server
    • Activity configuring proxy settigns
    • VPN concentrator
    • Virtual networking components
    • Network storage types
    • WAN technologies
    • Transmission mediums
    • Activity configuring WAN links
    • Termination

    Network Operation

    • Change management
    • IDF-MDF documentation
    • Labeling
    • Logical vs physical diagrams
    • Network operations documentation
    • Rack diagrams
    • Standard operation procedures
    • Using documentation act
    • Wiring and ports locations
    • Continuity and disaster
    • MTTR mean time repair
    • Recovery
    • Backing up your data act
    • Event management
    • Metrics
    • Scanning monitoring patching
    • Testing the network act
    • HTTPS management
    • Out of band management
    • RDP
    • Remote access methods
    • Remote file access
    • making remote connections act
    • SSH
    • VNC
    • Policies and best practices
    • Creating policies and procedures act

    Network Security

    Physical Security Devices
    • Detection
    • Prevention
    Authentication and Access Control
    • Authorization, Authentication, and Accounting
    • Multifactor Authentication
    • Access Control
    • Activity: Examining Access Control Mechanisms
    Basic Wireless Network Security
    • WPA
    • WPA2
    • TKIP-RC4
    • CCMP-AES
    • Authentication and Authorization
    • Geofencing
    • Activity: Demonstrating the Need for Wireless Security
    Common Network Attacks
    • DoS
    • Social Engineering
    • Insider Threat
    • Logic Bomb
    • Rogue Access Point
    • Evil Twin
    • War-driving
    • Phishing
    • Ransomware
    • DNS Poisoning
    • ARP Poisoning
    • Spoofing
    • Deauthentication
    • Brute Force
    • VLAN Hopping
    • Man-in-the-Middle
    • Exploits vs. Vulnerabilities
    • Activity Conducting a Phishing Attack
    Network Device Hardening
    • Changing Default Credentials
    • Avoiding Common Passwords
    • File Hashing
    • Generating New Keys
    • Activity Supporting Secure Authentication and Encryption
    • Upgrading Firmware
    • Patching and Updates
    • Disabling Unnecessary Services
    • Using Secure Protocols
    • Disabling Unused Ports
    Common Mitigation Techniques
    • Signature Management
    • Device Hardening
    • Change Native VLAN
    • Switchport Protection
    • Network Segmentation
    • Privileged User Account
    • File Integrity Monitoring
    • Role Separation
    • Restricting Access Via ACLs
    • Honeypot/Honeynet
    • Penetration Testing
    • Activity: Implementing a Honeypot

    Network Troubleshooting and Tools

    Network Troubleshooting Methodology
    • Identify the Problem
    • Establish a Theory of Probable Cause
    • Test the Theory to Determine the Cause
    • Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
    • Implement the Solution or Escalate as Necessary
    • Verify Full System Functionality and , if Applicable, Implement Preventive Measures
    • Document Findings, Actions, and Outcomes
    Using the Appropriate Tool
    • Hardware Tools – Basic Hand Held
    • Hardware Tools – Analyzers
    • Activity: Troubleshooting with Hardware Tools
    • Software Tools – Testers and Analyzers
    • Activity: Troubleshooting with Software Tools
    • Software Tools – Command Line
    • Activity: Using Command Line Tools
    Troubleshoot Wired Connectivity and Performance
    • Signal Issues:
    • Attenuation
    • Latency
    • Jitter
    • Crosstalk
    • EMI
    • Activity Troubleshooting Signal Problems
    • Physical Issues:
    • Open/short
    • Incorrect pin-out
    • Incorrect Cable Type
    • Bad Port
    • Damaged cable
    • Bent pins
    • Transceiver Issues:
    • Transceiver mismatch
    • TX/RX reverse
    • Duplex/speed mismatch
    • Activity: Troubleshooting Transceiver Problems
    • Traffic Flow Issues:
    • Bottleneck
    • VLAN mismatch
    • Network connection LED status indicators
    Troubleshoot Wireless Connectivity and Performance
    • Signal Loss:
    • Attenuation
    • Reflection
    • Refraction
    • Absorption
    • Latency & Jitter
    • Antenna Issues:
    • Incorrect antenna type
    • Incorrect antenna placement
    • Incorrect WAP type
    • WAP Issues:
    • Interference
    • Channel overlap
    • Overcapacity
    • Distance limitations
    • Frequency mismatch
    • Power levels
    • Signal-to-noise ratio
    • WAP Misconfiguration:
    • Wrong SSID
    • Wrong passphrase
    • Security type mismatch
    • Activity Troubleshooting WAP Issues
    Troubleshoot Common Network Service Issues
    • Common Network Issues:
    • Physical Connectivity
    • Incorrect IP Address
    • Incorrect Gateway
    • Incorrect Netmask
    • Names Not Resolving
    • Untrusted SSL Certificate
    • DCP Issues:
    • Duplicate IP Addresses
    • Expired IP Address
    • Rogue DHCP
    • Exhausted DHCP Scope
    • Firewall/ACL Issues:
    • Blocked TCP/UDP Ports
    • Incorrect Host-based Firewall Settings
    • Incorrect ACL Settings
    • Advanced Network Issues:
    • DNS Server Issues
    • Duplicate MAC Addresses
    • Incorrect Time
    • Unresponsive Service
    • Hardware Failure
    • Activity Case Study: Troubleshooting an Unusual Network Issue

    CompTIA Cloud + Module Outline

    The fourth course on the cyber security course programme: The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments, who must understand and deliver cloud infrastructure. Recommended experience includes at least 24-36 months of work experience in IT networking, storage, or data centre administration, and familiarity with any major hypervisor technologies for server virtualisation

    Cloud concepts and models

    1. Intro
    2. Models Part 1
    3. Models Part2
    4. Service And Delivery Models
    5. Terms And Characteristics
    6. Objects Storage Concepts

    Virtualisation

    1. Virtualization
    2. Install Configure Manage VM And Devices
    (Hands on Snapshots & Cloning)
    Demo
    3. Backups (Hands on Virtual Network Interface Cards) Demo
    4. Virtual Disks (Hands on Virtual Disks) Demo
    5. Virtual Switches
    6. Virtual Resource Migration
    7. Benefits Of Virtualization In A Cloud Environment
    8. Compare And Contrast Virtual Environment

    Infrastructure

    1. Infrastructure
    2. Different Access Protocols
    3. Explain Storage Configuration
    4. File Systems Types
    5. Executing Storage Provisioning
    6. Network Share Demo
    7. Implement Appropriate Network Configurations
    8. Importance Of Network Optimization
    9. Troubleshoot Basic Network Configuration Part 1
    10. Troubleshoot Basic Network Configuration Part 2
    11. Troubleshoot Commands Part 1
    12. Troubleshoot Commands Part 2
    13. Troubleshoot Commands Part 3
    14. Explain Common Network Protocols
    15. Common Hardware Resources

    Resource management

    1. Resource Management Part 1
    2. Resource Management Part 2
    3. Establishing Baselines And Thresholds
    4. Appropriately Allocate Physical Host Resources Part 1
    5. Appropriately Allocate Physical Host Resources Part 2
    6. Appropriately Allocate Virtual Guest Resources Part 1
    7. Appropriately Allocate Virtual Guest Resources Part 2
    8. Use Appropriate Tools For Remote Access

    Security

    1. Security Part 1
    2. Security Part 2
    3. Storage Security Concepts And Methods
    4. Different Encryption Technologies
    5. Identify Access Control Methods

    Systems Management

    1. Systems Management Part 1
    2. Systems Management Part 2
    3. Diagnose Remediate And Optimize Part 1
    4. Diagnose Remediate And Optimize Part 2
    5. Common Performance Concepts Part 1
    6. Common Performance Concepts Part 2
    7. Testing Techniques

    Business Continuity in the Cloud

    1. Business Continuity In Cloud Part 1
    2. Business Continuity In Cloud Part 2
    3. Solutions To Meet Availability Requirements
    4. Conclusion

    Microsoft: Configuring Windows Devices

    The Windows course is the fifth course on the cyber security course programme and will equip you building solid identities, protection of content (data loss protection), mobile device management policy, virtualization with Hyper-V, application management using the Company Portal and the Windows Store. You’ll also understand Windows 10 security and integrated Azure features as well as below:

    – Manage identity in Windows 10
    – Plan Windows 10 desktop and device deployment
    – Plan and implement a Microsoft 365 solution
    – Configure Windows 10 networking and storage
    – Manage data access and protection
    – Manage remote access, apps and updates and recovery

    Modules 1 - 3

    Module 1: Introducing Windows 10
    – Course Introduction
    – What Makes Windows 10 Different
    – Overview Of Windows 10 Features
    – Navigating And Using Windows 10-Part1
    – Navigating And Using Windows 10-Part2
    Module 2: Installing Windows 10
    – Preparing For Installation
    – Installation Options
    – Upgrading And Migrating-Part1
    – Upgrading And Migrating-Part2
    Module 3: Configuring Devices
    – Overview Of Configuration Tools
    – Common Configuration Options
    – Managing User Accounts-Part1
    – Managing User Accounts-Part2
    – Using Control Panel
    – Using Windows Administration Tools-Part1
    – Using Windows Administration Tools-Part2
    -Using Windows PowerShell-Part1
    – Using Windows PowerShell-Part2

    Modules 4 - 6

    Module 4: Configuring Network Connectivity
    – TCP IP Network Connectivity-Part1
    – TCP IP Network Connectivity-Part2
    – TCP IP Network Connectivity-Part3
    – Name Resolution
    – Wireless
    – Remote Access Overview-Part1
    – Remote Access Overview-Part2
    – Troubleshooting Connectivity
    Module 5: Managing Storage, Data, And Printers
    – Managing Hard Disks-Part1
    – Managing Hard Disks-Part2
    – Managing Hard Disks-Part3
    – Creating And Managing Storage Spaces
    – Overview Of Data Access
    – Configuring And Managing File Access
    – Managing Shared Folder
    – Understanding Work Folder
    – Managing Printers
    Module 6: Managing Apps
    – Installing And Configuring Applications
    – Managing Apps From The Windows Store
    – Managing Microsoft Edge Web Browser

    Modules 7 - 10

    Module 7: Managing Device Security
    – Configuring Network Security-Part1
    – Configuring Network Security-Part2
    – Configuring Local Security
    – Configuring Data Security-Part1
    – Configuring Data Security-Part2
    – Configuring Device Security
    Module 8: Maintaining Windows 10
    – Updating Windows 10
    – Monitoring And Optimizing Windows 10-Part1
    – Monitoring And Optimizing Windows 10-Part2
    Module 9: Troubleshooting And Recovery
    – Managing Devices And Drives
    – Recovery Files
    – Recovering Devices
    Module 10: Deploying Windows 10 Enterprise Desktops
    – Overview Of Image Based Deployment
    – Automating Installations
    – Windows Activation

    Modules 11 - 13

    Module 11: Managing User Profiles And User State
    Virtualization
    – Managing User Profiles-Part1
    – Managing User Profiles-Part2
    – User State Virtualization
    – User Profile Migration
    Module 12: Managing Desktop And Application Settings
    Using Group policy
    – Using Group Policy To Manage Windows 10 Devices-Part1
    – Using Group Policy To Manage Windows 10 Devices-Part2
    – Using Group Policy To Manage Windows 10 Devices-Part3
    – Using Group Policy To Manage Windows 10 Devices-Part4
    – Using Group Policy To Manage Applications-Part1
    – Using Group Policy To Manage Applications-Part2
    Module 13: Configuring And Managing Client Hyper-V
    – Introduction To Client Hyper-V
    – Creating Virtual Machines
    – Managing Virtual Machine Storage And Snapshot
    – Conclusion

    Cisco 200-301: Cisco Certified Network Association (CCNA)

    This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.

    After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

    CCNA exams objectives, and covers topics such as:

    Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
    VLANs, STP, and EtherChannel (static, PAGP, and LACP)
    WAN technologies
    Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
    Device monitoring protocols, including SNMPv2 and SNMPv3
    Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS

    Module 1: Exploring the Functions of Networking

    1. Instructor Intro
    2. Course Intro
    3. Exploring the Functions of Networking pt.1
    4. Exploring the Functions of Networking pt.2

    Module 2: Introduction the Host-to-Host Communications Model

    1. Introducing the Host-to-Host Communications Model pt.1
    2. Introducing the Host-to-Host Communications Model pt.2

    Module 3: Introducing LANs

    1. Introducing LANs
    2. Get Started with CLI Demo
    3. Adding Description to Interfaces Demo
    4. Configure Gateway on a Switch Demo
    5. Visualize Interfaces and Statistics Demo
    6. Show Version Command Demo
    7. CDP Demo

    Module 4: Exploring the TCP/IP Link Layer

    1. Exploring the TCP/IP Link Layer pt.1
    2. Exploring the TCP/IP Link Layer pt.2

    Module 5: Subnetting

    1. Subnetting pt.1
    2. Subnetting pt.2
    3. Subnetting pt.3
    4. Subnetting pt.4
    CCNA 200-301
    5. Subnetting pt.5
    6. Subnetting pt.6

    Module 6: Explaining the TCP/IP Transport Layer and Application Layer

    1. Explaining the TCP/IP Transport Layer and Application Layer pt.1
    2. Explaining the TCP/IP Transport Layer and Application Layer pt.2
    3. Explaining the TCP/IP Transport Layer and Applications Layer pt.3

    Module 7: Exploring the Functions of Routing

    1. Exploring the Functions of Routing pt.1
    2. Exploring the Functions of Routing pt.2
    3. Exploring the Functions of Routing pt.3
    4. Configuring RIP Demo
    5. EIGRP Demo pt.1
    6. EIGRP Demo pt.2

    Module 8: Exploring the Packet Delivery Process

    1. Exploring the Packet Delivery Process

    Module 9: Troubleshooting a Simple Network

    1. Troubleshooting a Simple Network

    Module 10: Introducing Basic IPv6

    1. Introducing Basic IPv6 pt.1
    2. Introducing Basic IPv6 pt.2
    3. Introducing Basic IPv6 pt.3
    4. Introducing Basic IPv6 pt.4
    5. Introducing Basic IPv6 pt.5
    6. Introducing Basic IPv6 pt.6
    7. Introducing Basic IPv6 pt.7
    8. Introducing Basic IPv6 pt.8
    9. IPv6 Basic Configuration and SLAAC Demo pt.1
    10. IPv6 Basic Configuration and SLAAC Demo pt.2
    11. IPv6 Routing Demo pt.1
    12. IPv6 Routing Demo pt.2
    13. IPv6 Static Routes Demo

    Module 11: Configuring Static Routing

    1. Configuring Static Routing
    2. Static Routes Demo

    Module 12: Implementing VLANs And Trunks

    1. Implementing VLANs and Trunks pt.1
    2. Implementing VLANs and Trunks pt.2
    3. Implementing VLANs and Trunks pt.3
    4. Implementing VLANs and Trunks pt.4
    5. Spanning-tree Protocol Demo pt.1
    6. Spanning-tree Protocol Demo pt.2
    7. Spanning-tree Protocol Demo pt.3

    Module 13: Routing Between VLANs

    1. Routing Between VLANs
    2. Inter VLAN Routing Demo

    Module 14: Introducing OSPF

    1. Introducing OSPF pt.1
    2. Introducing OSPF pt.2
    3. Introducing OSPF pt.3
    4. Introducing OSPF pt.4
    5. OSPF Single Area Demo pt.1
    6. OSPF Single Area Demo pt.2
    7. OSPF Multiple Area Demo pt.1
    8. OSPF Multiple Area Demo pt.2

    Module 15: Building Redundant Switched Topologies

    1. Building Redundant Switch Topologies pt.1
    2. Building Redundant Switch Topologies pt.2

    Module 16: Improving Redundant Switched Topologies with EtherChannel

    1. Improving Redundant Switched Topologies with EtherChannel pt.1
    2. Improving Redundant Switched Topologies with EtherChannel pt.2
    3. Configuring Ether Channel Demo

    Module 17: Exploring Layer 3 Redundancy

    1. Exploring Layer 3 Redundancy

    Module 18: Introducing WAN Technologies

    1. Introducing WAN Technologies pt.1
    2. Introducing WAN Technologies pt.2
    3. Introducing WAN Technologies pt.3
    4. Introducing WAN Technologies pt.4
    5. Introducing WAN Technologies pt.5
    6. Introducing WAN Technologies pt.6

    Module 19: Explaining Basics of ACL

    1. Explaining Basics of ACL pt.1
    2. Explaining Basics of ACL pt.2
    3. Explaining Basics of ACL pt.3

    Module 20: Enabling Internet Connectivity

    1. Enabling Internet Connectivity
    2. DHCP Demo
    3. Static NAT Demo
    4. PAT Using Specific IP Demo
    5. PAT Using UP of Interface Demo

    Module 21: Introducing Qos

    1. Introducing QoS pt.1
    2. Introducing QoS pt.2
    3. Introducing QoS pt.3
    4. Introducing QoS pt.4
    5. Introducing QoS pt.5

    Module 22: Introducing Architectures and Virtualization

    1. Introducing Architectures and Virtualization pt.1
    2. Introducing Architectures and Virtualization pt.2
    3. Introducing Architectures and Virtualization pt.3
    4. Introducing Architectures and Virtualization pt.4

    Module 23: Introducing System Monitoring

    1. Introducing System Monitoring pt.1
    2. Introducing System Monitoring pt.2
    3. Introducing System Monitoring pt.3

    Module 24: Managing Cisco Devices

    1. Managing Cisco Devices pt.1
    2. Managing Cisco Devices pt.2
    3. NTP Demo
    4. Syslog Demo

    Module 25: Examining the Security Threat Landscape

    1. Examining the Security Thread Landscape pt.1
    2. Examining the Security Thread Landscape pt.2

    Module 26: Implementing Threat Defense Technologies

    1. Implementing Thread Defense Technologies pt.1
    2. Implementing Thread Defense Technologies pt.2
    3. Implementing Thread Defense Technologies pt.3
    4. Implementing Thread Defense Technologies pt.4
    5. Implementing Thread Defense Technologies pt.5
    6. Authentication Protocols Demo pt.1
    7. Authentication Protocols Demo pt.2
    8. Device Hardening Demo pt.1
    9. Device Hardening Demo pt.2
    10. Device Hardening Demo pt.3
    11. Port Security Demo

    Module 27: Exam Preparation

    1. Exam Prep Tips

    Information Technology Infrastructure Library (ITIL Foundations)

    The seventh course on the cyber security course programme: The ITIL Foundations course covers the IT Infrastructure Library best practices. ITIL is globally accepted as the most widely used best practices for IT service management. This ITcertify course gives students the necessary knowledge to enter or enhance their career in project management or IT service management. Companies that use ITIL best practices range from the Fortune 500 market, Government, DOD, small business and is also used internationally. This course covers the 5 main concepts within ITIL: Service Strategy, Design, Transition, Operation and Continual Service Improvement.

    Module 1

    • 1.1 Intro
    • 1.2 About Scheme
    • 1.3 Levels Of Qualifications
    • 1.4 Qualification Bodies
    • 1.5 The ITIL Foundation Certifcation Stubble

    Module 2

    • 2.1 Service And Service Management Part 1
    • 2.2 Service And Service Management Part 2
    • 2.3 Service Management Processes Part 1
    • 2.4 Service Management Processes Part 2
    • 2.5 Service Management Best Practices And Summary

    Module 3

    • 3.1 Service Management Practices
    • 3.2 Why ITIL
    • 3.3 The Service Lifecycle

    Module 4

    • 4.1 Service Strategy Purpose And Objectives
    • 4.2 Service Strategy Scope
    • 4.3 Business Value Stubble
    • 4.4 Key Principles Part 1
    • 4.5 Key Principles Part 2
    • 4.6 Service Stragey Processes

    Module 5

    • 5.1 Service Design Purpose And Objectives
    • 5.2 Scope Of Service Design
    • 5.3 Business Value Service Design
    • 5.4 Service Design Key Principles
    • 5.5 Service Design Processes Part 1
    • 5.6 Service Design Processes Part 2
    • 5.7 Service Design Processes Part 3
    • 5.8 Service Design Processes Part 4

    Module 6

    • 6.1 Service Transition Purpose And Objectives
    • 6.2 Service Transition Scope And Business Value
    • 6.3 Service Transition Key Principles
    • 6.4 Service Transition Processes Part 1
    • 6.5 Service Transition Processes Part 2
    • 6.6 Service Transition Processes Part 3
    • 6.7 Service Transition Processes Part 4

    Module 7

    • 7.1 Intro To Service Operation
    • 7.2 Service Operation Basic Concepts
    • 7.3 Service Operation Processes Part 1
    • 7.4 Service Operation Processes Part 2
    • 7.5 Service Operation Access Management
    • 7.6 Service Operation Functions

    Module 8

    • 8.1 Continual Service Improvement Purpose Objectives AndScope
    • 8.2 Continual Service Improvement Key Principles
    • 8.3 Continual Service Improvement Processes

    Module 9

    • 9.1 SMT
    • 9.2 SMT Service Automation
    • 9.3 SMT Service Analytics
    • 10.1 How It All Fits Together
    • 10.2 Outro

    CompTIA Security + Module Outline

    The eighth course on the cyber security course programme: The CompTIA Security+ course will prepare you to become CompTIA Security+ certified. ITcertify covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes with Cryptography and Public Key Infrastructure.

    You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company.

    Threats, Attacks, and Vulnerabilities

    1.1 Introduction
    1.2 Types Of Malware- Part 1
    1.3 Types Of Malware- Part 2
    1.4 Types Of Attacks- Part 1
    1.5 Types Of Attacks- Part 2
    1.6 Types Of Attacks- Part 3
    1.7 Types Of Attacks- Part 4
    1.8 Types Of Attacks- Part 5
    1.9 Threat Actors- Part 1
    1.10 Threat Actors- Part 2
    1.11 Penetration Testing And Vulnerability Scanning- Part 1
    1.12 Penetration Testing And Vulnerability Scanning- Part 2
    1.13 Impact Of Vulnerabilities- Part 1
    1.14 Impact Of Vulnerabilities- Part 2

    Technologies and Tools

    2.1 Networking Hardware And Software- Part 1
    2.2 Networking Hardware And Software- Part 2
    2.3 Networking Hardware And Software- Part 3
    2.4 Networking Hardware And Software- Part 4
    2.5 Networking Hardware And Software- Part 5
    2.6 Networking Hardware And Software- Part 6
    2.7 Security Assessment- Part 1
    2.8 Security Assessment- Part 2
    2.9 Troubleshooting Issues- Part 1
    2.10 Troubleshooting Issues- Part 2
    2.11 Securing Mobile Devices- Part 1
    2.12 Securing Mobile Devices- Part 2
    2.13 Securing Mobile Devices- Part 3
    2.14 Securing Mobile Devices- Part 4
    2.15 Secure Protocols- Part 1
    2.16 Secure Protocols- Part 2

    Architecture and Design

    3.1 Secure Network Architecture- Part 1
    3.2 Secure Network Architecture- Part 2
    3.3 Secure System Designs- Part 1
    3.4 Secure System Designs- Part 2
    3.5 Secure Staging Deployment Concepts
    3.6 Embedded Systems- Part 1
    3.7 Embedded Systems- Part 2
    3.8 Application Development And Deployment- Part 1
    3.9 Application Development And Deployment- Part 2
    3.10 Application Development And Deployment- Part 3
    3.11 Physical Security Controls- Part 1
    3.12 Physical Security Controls- Part 2
    3.13 Physical Security Controls- Part 3
    3.14 Cloud Virtualization- Part 1
    3.15 Cloud Virtualization- Part 2

    Identity and Access Management

    4.1 Identity And Access Management- Part 1
    4.2 Identity And Access Management- Part 2
    4.3 Identity And Access Services- Part 1
    4.4 Identity And Access Services- Part 2
    4.5 Management Controls- Part 1
    4.6 Management Controls- Part 2
    4.7 Account Management Practices- Part 1
    4.8 Account Management Practices- Part 2
    4.9 Account Management Practices- Part 3

    Risk Management

    5.1 Organizational Security- Part 1
    5.2 Organizational Security- Part 2
    5.3 Business Impact Analysis Concepts- Part 1
    5.4 Business Impact Analysis Concepts- Part 2
    5.5 Risk Management- Part 1
    5.6 Risk Management- Part 2
    5.7 Incident Response Procedures- Part 1
    5.8 Incident Response Procedures- Part 2
    5.9 Forensics- Part 1
    5.10 Forensics- Part 2
    5.11 Disaster Recovery- Part 1
    5.12 Disaster Recovery- Part 2
    5.13 Types Of Control- Part 1
    5.14 Types Of Control- Part 2
    5.15 Data Security And Privacy Practices- Part 1
    5.16 Data Security And Privacy Practices- Part 2

    Cryptography and PKI

    6.1 Cryptographic Basics- Part 1
    6.2 Cryptographic Basics- Part 2
    6.3 Cryptographic Basics- Part 3
    6.4 Cryptographic Algorithms- Part 1
    6.5 Cryptographic Algorithms- Part 2
    6.6 Wireless Security- Part 1
    6.7 Wireless Security- Part 2
    6.8 Implementing PKI- Part 1
    6.9 Implementing PKI- Part 2
    6.10 Implementing PKI- Part 3
    6.11 Conclusion

    CompTIA Linux + Module Outline

    The ninth course on the cyber security course programme: CompTIA Linux+ validates the competencies required of an early career system administrator supporting Linux systems. Here you will learn how to be able to perform maintenance tasks with the command line, install & configure a workstation and be able to configure a basic network

    Intro and Instructions

    Intro

    1. Introduction

    2. Introduction to Building Labs

    3. Things You Need To Do

    4. Install Demo Virtual Box

    Instructions

    1. Navigation

    2. Commands with Lab Demo

    3. Internal and External Commands

    4. Overview of Shell Commands Tricks

    5. Exploring Shell Configuration

    6. Stream Redirection

    7. Overview of Processing Text Using Filters

    8. Overview File-Viewing Commands

    9. Overview Using Grep

    10. Syntax and Summary

    11. Overview of Exam Essentials

    Managing Software and Configuring hardware

    2.1 Managing Software
    2.2 Overview Using RPM
    2.3 RPM Part 2
    2.4 Overview Using Cpio
    2.5 Overview Using Debian and Apt_cache
    2.6 Using Apt-get
    2.7 Debian Tools
    2.8 Managing Shared Libraries
    2.9 Overview Locating Library Files
    2.10 Foreground and Background Processes
    2.11 Managing Software Summary

    3.1 Configuring Hardware
    3.2 Configuring Devices
    3.3 Configuring USB
    3.4 Configuring Hard Disk
    3.5 Designing Hard Disk Layout
    3.6 Logical Volume Management
    3.7 Creating Partitions Filesystems
    3.8 Overview Using Fdisk
    3.9 Overview Common Filesystem Types
    3.10 Creating Filesystem
    3.11 Maintaining Filesystem Health
    3.12 Configuring Hardware Summary

    Managing Files and Booting Files

    4.1 Managing Files
    4.2 File Archiving Commands
    4.3 Managing Files Ownership
    4.4 Managing Disk Quotas
    4.5 Directories and Content
    4.6 Overview Tools for Locating Files
    4.7 Overview of Exam Essentials

    5.1 Booting Linux and Editing Files
    5.2 Boot and Reboot
    5.3 Understanding the Boot Process
    5.4 Runlevels Process
    5.5 Managing Runlevel Services
    5.6 Editing with Vi
    5.7 Booting Summary

    X and Admin

    6.1 X Windows Systems
    6.2 X Configuration Options
    6.3 X Configuration Options part 2
    6.4 Configuring X Fonts
    6.5 Configuring Xft Fonts
    6.6 Overview Managing GUI Logins
    6.7 Using X for Remote Access
    6.8 X Accessibility
    6.9 Addition Assistive Technologies
    6.10 Configuring Localization and Internationalization
    6.11 Querying and Setting Your Locale
    6.12 Configuring Printing
    6.13 Configuring Printing part 2
    6.14 Using Web-based CUPS Utilities

    7.1 Administering
    7.2 Directly Modifying Account Configuration
    7.3 Components of Account
    7.4 Adding Groups
    7.5 Tuning User and System Environments
    7.6 Reviewing Log File Contents
    7.7 Maintaining System Time
    7.8 Admin Summary

    Basic Networking and Scripts

    8.1 Basic Networking
    8.2 Network Addressing
    8.3 Network Addressing Part 2
    8.4 DNS Data Flow Zone and Resolution
    8.5 Network Ports
    8.6 Connections
    8.7 Testing Connectivity
    8.8 Wireshark Demo
    8.9 Basic Networking Summary

    9.1 Scripts E-mail and Databases
    9.2 Writing Scripts
    9.3 Writing Scripts Part 2
    9.4 Managing E-mail
    9.5 Managing Data with SQL
    9.6 Advantages of Database
    9.7 Scripts Summary

    Security

    10.1 Security
    10.2 Controlling Access Via TCP Wrappers
    10.3 Configuring Xinetd
    10.4 Uninstalling Or Reconfiguring Servers
    10.5 Tools for Managing Passwords
    10.6 Configuring SSH
    10.7 SSH Keys
    10.8 Controlling SSH Access
    10.9 Using GPG
    10.10 Security Summary

    CompTIA Cyber Security Analyst CySA +

    The tenth course on the cyber security course programme: The CompTIA Cyber Security Analyst CySA+ focuses on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’s applications and systems.
    The CompTIA Cyber Security Analyst CySA+ is a vendor neutral certification that expects three to four years of experience in a related field as well as a Security+ or equivalent knowledge.
    The CompTIA Cyber Security Analyst CySA+ lies between the CompTIA Security + as well as the CompTIA Advanced Security Practitioner (CASP) exams and is an excellent go between to tackle before diving into the CASP, but when the Security+ isn’t enough.
    Here you will gain an understanding of security best practices and protocols beyond that which is provided by the CompTIA Security + and will prove a level of expertise beyond that of basic security practices that are followed when using a computer. This allows any employee to prove a better understanding of enterprise security practices, and the necessary tools needed to protect a company network. The modules of this course align with the official objects of the certification and will expand past the scope of the certification to provide real life examples.

    Threat Management

    Module 1: Threat Management
    1.1 Introduction
    1.2 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 1
    1.3 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes
    1.4 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes
    1.5 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 4
    1.6 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 5
    1.7 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 6
    1.8 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 7
    1.9 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 8
    1.10 Given a scenario, apply environmental reconnaissance
    techniques using appropriate tools and processes Part 9
    1.11 Given a scenario, analyze the results of a network
    reconnaissance Part 1
    1.12 Given a scenario, analyze the results of a network
    reconnaissance Part 2
    1.13 Given a scenario, analyze the results of a network
    reconnaissance Part 3
    1.14 Given a scenario, analyze the results of a network
    reconnaissance Part 4
    1.15 Given a scenario, analyze the results of a network
    reconnaissance Part 5
    1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
    1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
    1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
    1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
    1.20 Explain the purpose of practices used to secure a corporate environment Part 1
    1.21 Explain the purpose of practices used to secure a corporate environment Part 2
    1.22 Explain the purpose of practices used to secure a corporate environment Part 3
    1.23 Explain the purpose of practices used to secure a corporate environment Part 4

    Vulnerability Management

    2.1 Given a scenario, implement an information security
    vulnerability management process Part 1
    2.2 Given a scenario, implement an information security
    vulnerability management process Part 2
    2.3 Given a scenario, implement an information security
    vulnerability management process Part 3
    2.4 Given a scenario, implement an information security
    vulnerability management process Part 4
    2.5 Given a scenario, implement an information security
    vulnerability management process Part 5
    2.6 Given a scenario, implement an information security
    vulnerability management process Part 6
    2.7 Given a scenario, implement an information security
    vulnerability management process Part 7
    2.8 Given a scenario, analyze the output resulting from a
    vulnerability scan Part 1
    2.9 Given a scenario, analyze the output resulting from a
    vulnerability scan Part 2
    2.10 Compare and contrast common vulnerabilities found in
    the following targets within an organization Part 1
    2.11 Compare and contrast common vulnerabilities found in
    the following targets within an organization Part 2
    2.12 Compare and contrast common vulnerabilities found in
    the following targets within an organization Part 3

    Cyber Incident Response

    3.1 Given a scenario, distinguish threat data or behavior to
    determine the impact of an incident Part 1
    3.2 Given a scenario, distinguish threat data or behavior to
    determine the impact of an incident Part 2
    3.3 Given a scenario, distinguish threat data or behavior to
    determine the impact of an incident Part 3
    3.4 Given a scenario, prepare a toolkit and use appropriate
    forensic tools during an investigation Part 1
    3.5 Given a scenario, prepare a toolkit and use appropriate
    forensic tools during an investigation Part 2
    3.6 Given a scenario, prepare a toolkit and use appropriate
    forensic tools during an investigation Part 3
    3.7 Given a scenario, prepare a toolkit and use appropriate
    forensic tools during an investigation Part 4
    3.8 Given a scenario, prepare a toolkit and use appropriate
    forensic tools during an investigation Part 5
    3.9 Explain the importance of communications during the
    incident response process
    3.10 Given a scenario, analyze common symptoms to select
    the best course of action to support incident response Part 1
    3.11 Given a scenario, analyze common symptoms to select
    the best course of action to support incident response Part 2
    3.12 Given a scenario, analyze common symptoms to select
    the best course of action to support incident response Part 3
    3.13 Given a scenario, analyze common symptoms to select
    the best course of action to support incident response Part 4
    3.14 Summarize the incident recovery and post-incident response process Part 1
    3.15 Summarize the incident recovery and post-incident response process Part 2
    3.16 Summarize the incident recovery and post-incident response process Part 3
    3.17 Summarize the incident recovery and post-incident response process Part 4

    Security Architecture and Tool Sets

    4.1 Explain the relationship between frameworks, common
    policies, controls, and procedures Part 1
    4.2 Explain the relationship between frameworks, common
    policies, controls, and procedures Part 2
    4.3 Explain the relationship between frameworks, common
    policies, controls, and procedures Part 3
    4.4 Explain the relationship between frameworks, common
    policies, controls, and procedures Part 4
    4.5 Given a scenario, use data to recommend remediation of
    security issues related to identity and access management
    Part 1
    4.6 Given a scenario, use data to recommend remediation of
    security issues related to identity and access management
    Part 2
    4.7 Given a scenario, use data to recommend remediation of
    security issues related to identity and access management
    Part 3
    4.8 Given a scenario, use data to recommend remediation of
    security issues related to identity and access management
    Part 4
    4.9 Given a scenario, review security architecture and make
    recommendations to implement compensating controls Part 1
    4.10 Given a scenario, review security architecture and make
    recommendations to implement compensating controls Part 2
    4.11 Given a scenario, review security architecture and make
    recommendations to implement compensating controls Part 3
    4.12 Given a scenario, use applications security best practices
    while participating in the Software Development Life Cycle
    (SDLC) Part 1
    4.13 Given a scenario, use applications security best practices
    while participating in the Software Development Life Cycle
    (SDLC) Part 2
    4.14 Overview
    4.15 Conclusion

    Cloud Computing Security Knowledge

    The eleventh course on the cyber security course programme: The Cloud Computing Security Knowledge course provides students thorough coverage of cloud security fundamentals. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery. Upon completing this course, ITcertify students will be experts in the following topics:

    • Understanding cloud computing security challenges
    • Cloud computing security controls
    • Resiliency and Measured Usage
    • Understand the cloud computing architectural framework

    1: Architecture

    • NIST Definitions
    • Essential Characteristics
    • Service Models
    • Deployment Models
    • Multi-Tenancy
    • CSA Cloud Reference Model
    • Jericho Cloud Cube Model
    • Cloud Security Reference Model
    • Cloud Service Brokers
    • Service Level Agreements

    2: Governance and Enterprise Risk Management

    • Contractual Security Requirements
    • Enterprise and Information Risk Management
    • Third Party Management Recommendations
    • Supply chain examination
    • Use of Cost Savings for Cloud

    3: Legal Issues: Contracts and Electronic Discovery

    • Consideration of cloud-related issues in three dimensions
    • eDiscovery considerations
    • Jurisdictions and data locations
    • Liability for activities of subcontractors
    • Due diligence responsibility
    • Federal Rules of Civil Procedure and electronically stored information
    • Metadata
    • Litigation hold

    4: Compliance and Audit Management

    • Definition of Compliance
    • Right to audit
    • Compliance impact on cloud contracts
    • Audit scope and compliance scope
    • Compliance analysis requirements
    • Auditor requirements

    5: Information Management and Data Security

    • Six phases of the Data Security Lifecycle and their key elements
    • Volume storage
    • Object storage
    • Logical vs physical locations of data
    • Three valid options for protecting data
    • Data Loss Prevention
    • Detection Data Migration to the Cloud
    • Encryption in IaaS, PaaS & SaaS
    • Database Activity Monitoring and File Activity Monitoring
    • Data Backup
    • Data Dispersion
    • Data Fragmentation

    6: Interoperability and Portability

    • Definitions of Portability and Interoperability
    • Virtualization impacts on Portability and Interoperability
    • SAML and WS-Security
    • Size of Data Sets
    • Lock-In considerations by IaaS, PaaS & SaaS delivery models
    • Mitigating hardware compatibility issues

    7: Traditional Security, Business Continuity, and Disaster Recovery

    • Four D’s of perimeter security
    • Cloud backup and disaster recovery services
    • Customer due diligence related to BCM/DR
    • Business Continuity Management/Disaster Recovery due diligence
    • Restoration Plan
    • Physical location of cloud provider

    8: Data Center Operations

    • Relation to Cloud Controls Matrix
    • Queries run by data center operators
    • Technical aspects of a Provider’s data center operations for customers
    • Logging and report generation in multi-site clouds

    9: Incident Response

    • Factor allowing for more efficient and effective containment and recovery in a cloud
    • Main data source for detection and analysis of an incident
    • Investigating and containing an incident in an Infrastructure as a Service environment
    • Reducing the occurrence of application level incidents
    • How often should incident response testing occur
    • Offline analysis of potential incidents

    10: Application Security

    • Identity, entitlement, and access management (IdEA)
    • SDLC impact and implications
    • Differences in S-P-I models
    • Consideration when performing a remote vulnerability test of a cloud-based application
    • Categories of security monitoring for applications
    • Entitlement matrix

    11: Encryption and Key Management

    • Adequate encryption protection of data in the cloud
    • Key management best practices, location of keys, keys per user
    • Relationship to tokenization, masking, anonymization and cloud database controls

    12: Identity, Entitlement, and Access Management

    • Relationship between identities and attributes
    • Identity Federation
    • Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
    • SAML and WS-Federation
    • Provisioning and authoritative sources

    13: Virtualization

    • Security concerns for hypervisor architecture
    • VM guest hardening, blind spots, VM Sprawl, data comingling, instant-on gaps
    • In-Motion VM characteristics that can create a serious complexity for audits
    • How can virtual machine communications bypass network security controls
    • VM attack surfaces
    • Compartmentalization of VMs

    14: Security as a Service

    • 10 categories
    • Barriers to developing full confidence in security as a service (SECaaS)
    • Deployment of Security as a Service in a regulated industry prior SLA
    • Logging and reporting implications
    • How can web security as a service be deployed
    • What measures do Security as a Service providers take to earn the trust of their customers
    • ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
    • Isolation failure
    • Economic Denial of Service
    • Licensing Risks
    • VM hopping
    • Five key legal issues common across all scenarios
    • Top security risks in ENISA research
    • OVF
    • Underlying vulnerability in Loss of Governance
    • User provisioning vulnerability
    • Risk concerns of a cloud provider being acquired
    • Security benefits of cloud

    Ethical Hacker

    The Ethical Hacker (V12) course needs no introduction. In this course you will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed. Every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

    You will learn to :

    Hack Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks. You will crack passwords, intercept transmissions, use malware to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service your way to owning a target.

    Along with such venerable tools as nmap and netcat, you will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. You will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.

    Module 1 - Introduction to Ethical Hacking

    • 1.1 Information Security Overview
    • 1.2 Information Security Threats and Attack Vectors
    • 1.3 Hacking Concepts, Types, and Phases
    • 1.4 Ethical Hacking Concepts and Scope
    • 1.5 Information Security Controls
    • 1.6 Penetration Testing Concepts
    • 1.7 Information Security Laws and Standards

    Module 2 - Footprinting and Reconnaissance.

    • 2.1 Footprinting Concepts
    • 2.2 Footprinting Methodology
    • 2.3 Footprinting Tools
    • 2.4 Footprinting Countermeasures
    • 2.5 Footprinting Penetration Testing

    Module 3 - Network Scanning

    • 3.1 Scanning Concepts
    • 3.2 Discovery Scans
    • 3.3 Port Scans
    • 3.4 Nmap
    • 3.5 Nmap Stealth Scans
    • 3.6 Nmap Options
    • 3.7 Hping and Other Scanners
    • 3.8 SSDP Scanning
    • 3.9 Scanning Beyond IDS and Firewall
    • 3.10 Banner Grabbing
    • 3.11 Scanning Penetration Testing

    Module 4 - Enumeration

    • 4.1 Enumeration Concepts
    • 4.2 NetBIOS Enumeration
    • 4.3 SNMP Enumeration
    • 4.4 LDAP Enumeration
    • 4.5 NTP Enumeration
    • 4.6 SMTP and DNS Enumeration
    • 4.7 Enumeration Countermeasures
    • 4.8 Enumeration Penetration Testing

    Module 5 - Vulnerability Analysis

    • 5.1 Vulnerability Assessment Concepts
    • 5.2 Vulnerability Assessment Solutions
    • 5.3 Vulnerability Scoring Systems
    • 5.4 Vulnerability Assessment Tools and Reports

    Module 6 - Malware Threats

    • 6.1 Introduction to Malware
    • 6.2 Trojan Concepts
    • 6.3 Virus and Worm Concepts
    • 6.4 Malware Reverse Engineering
    • 6.5 Malware Detection
    • 6.6 Countermeasures
    • 6.7 Anti-malware Software
    • 6.8 Malware Penetration Testing

    Module 7 - Sniffing

    • 7.1 Sniffing Concepts
    • 7.2 DHCP Attacks
    • 7.3 MAC Attacks
    • 7.4 ARP Poisoning
    • 7.5 DNS Poisoning
    • 7.7 Sniffing Tools
    • 7.8 Countermeasures
    • 7.9 Sniffing Detection Techniques
    • 7.10 Sniffing Penetration Testing

    Module 8 - Social Engineering

    • 8.1 Social Engineering Concepts
    • 8.2 Social Engineering Techniques
    • 8.3 Impersonation on Social Media Sites
    • 8.4 Identity Theft
    • 8.5 Social Engineering Countermeasures
    • 8.6 Social Engineering Penetration Testing

    Module 9 - Denial of Service

    • 9.1 DoS/DDoS Concepts
    • 9.2 Common DoS/DDoS Attack Techniques
    • 9.3 Additional DoS Attack Types
    • 9.4 Botnets
    • 9.5 DoS Countermeasures
    • 9.6 DoS Penetration Testing

    Module 10 - Session Hijacking

    • 10.1 Session Hijacking Concepts
    • 10.2 Browser Session Hijacking
    • 10.3 Ways to Compromise a Session Token
    • 10.4 Client Side Attacks
    • 10.5 Session Hijacking at the Network Level
    • 10.6 Session Hijacking Tools
    • 10.7 Session Hijacking Countermeasures
    • 10.8 Session Hijacking Penetration Testing

    Module 11 - Hacking Webservers

    • 11.1 Webserver Concepts
    • 11.2 Webserver Attacks
    • 11.3 Methodology of Webserver Attacks
    • 11.4 Webserver Attack Tools
    • 11.5 Webserver Attack Countermeasures
    • 11.6 Webserver Patch Management
    • 11.7 Webserver Security Tools
    • 11.8 Webserver Pen Testing

    Module 12 - Hacking Web Applications

    • 12.1 Web Application Concepts
    • 12.2 Web App Vulnerabilities and Exploits
    • 12.3 Web Application Threats
    • 12.4 Injection Attacks
    • 12.5 Hidden Fields and Clickjacking
    • 12.6 Cross Site Attacks
    • 12.7 Additional Web App Attacks
    • 12.8 Web App Hacking Methodology
    • 12.9 Web App Hacking Countermeasures
    • 12.10 Web App Security Tools
    • 12.11 Web Application Pen Testing

    Module 13 - SQL Injection

    • 13.1 SQL Injection Concepts
    • 13.2 Types of SQL Injections
    • 13.3 SQL Injection Methodology
    • 13.4 SQL Injection Tools
    • 13.5 SQL Injection Countermeasures

    Module 14 - Hacking Wireless Networks

    • 14.1 Wireless Concepts
    • 14.2 Wireless Discovery and Mapping
    • 14.3 Wi-Fi Sniffers
    • 14.4 Wi-Fi Attacks
    • 14.5 Wi-Fi Cracking
    • 14.6 Wireless Hacking Tools
    • 14.7 Bluetooth Hacking
    • 14.8 Wireless Hacking Countermeasures
    • 14.9 Wireless Security Tools
    • 14.10 Wireless Penetration Testing

    Module 15 - System Hacking

    • 15.1 System Hacking Methodology
    • 15.2 Windows System Vulnerabilities and Exploits
    • 15.3 Linux System Vulnerabilities and Exploits
    • 15.4 Password Cracking Methods
    • 15.5 Network Service Password Cracking
    • 15.6 Windows Password Cracking
    • 15.7 Linux Password Cracking
    • 15.8 Password Cracking Tools
    • 15.9 Other Methods for Obtaining Passwords
    • 15.10 Keylogging
    • 15.11 Spyware
    • 15.12 Rootkits
    • 15.13 Hiding Files
    • 15.14 Steganography
    • 15.15 Privilege Escalation
    • 15.16 Creating and Maintaining Remote Access
    • 15.17 Hiding Evidence
    • 15.18 System Hacking Penetration Testing

    Module 16 - Hacking Mobile Platforms

    • 16.1 Mobile Platform Attack Vectors
    • 16.2 Hacking Android OS
    • 16.3 Rooting Android
    • 16.4 Securing Android
    • 16.5 Hacking iOS
    • 16.6 Jailbreaking iOS
    • 16.7 Securing iOS
    • 16.8 Hacking Windows Phone OS
    • 16.9 Hacking Blackberry
    • 16.10 Mobile Device Management
    • 16.11 Mobile Security Guidelines and Tools
    • 16.12 Mobile Penetration Testing

    Module 17 - Evading IDS, Firewalls, and Honeypots

    • 17.1 Intrusion Detection
    • 17.2 Firewalls
    • 17.3 Honeypots
    • 17.4 IDS, Firewall, and Honeypot Tools
    • 17.5 Evasion
    • 17.6 Evasion Countermeasures
    • 17.7 IDS/Firewall/ Honeypot Penetration Testing

    Module 18 - Crytopgraphy

    • 18.1 Cryptography Concepts
    • 18.2 Encryption Algorithms
    • 18.3 Cryptography Tools
    • 18.4 Public Key Infrastructure (PKI)
    • 18.5 Email Encryption
    • 18.6 Disk Encryption
    • 18.7 Cryptography Attacks
    • 18.8 Cryptography Penetration Testing

    Module 19 - Cloud Computing

    • 19.1 Introduction to Cloud Computing
    • 19.2 Virtualization
    • 19.3 Cloud Computing Threats
    • 19.4 Countermeasures to Cloud Computing Threats
    • 19.5 Cloud Computing Attacks
    • 19.6 Cloud Security
    • 19.7 Cloud Security Best Practices
    • 19.8 Cloud Penetration Testing

    Module 20 - IoT Hacking

    • 20.1 IoT Concepts
    • 20.2 IoT Vulnerabilities and Attacks
    • 20.3 IoT Hacking Methodology and Tools
    • 20.4 IoT Hacking Countermeasures
    • 20.5 IoT Penetration Testing

    Enquire Now

    All delivered through our world class learning portal

    Navigation and Controls

    Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.

    Expert instructor led training

    Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise

    Visual demonstrations and multimedia presentations

    Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios

    Quizzes and exam simulators

    Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.

    Flash cards and educational games

    ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.

    Additional information

    Package

    Cyber Security Practical Experience Programme (PEP) Complete Package

    Course Code

    Cyber_PEP_COMPLETE

    Awarded By

    CompTIA, Microsoft and Cisco

    Hours

    193

    Included In Bundles

    This is the Cyber Security PEP Complete Bundle

    Access

    12 Months

    Prior courses / experience needed

    No previous experience required. Open to everyone

    Exam Code

    Both CompTIA A+ Exams included: CompTIA A+ Core 1 220-1101 and CompTIA A+ Core 2 220-1102

    Practise Lab Available

    Yes: CompTIA A+ Core 2 220-1102, Yes: CompTIA Security+ SY0-501

    Part of a Badge with multiple courses

    x 11 courses, ITcertify Pro CV Review and 2 x Practise Labs: CompTIA A+ and CompTIA Security + included