Cyber Security Practical Experience Programme (PEP) Complete Package

Select an option below to show price

/ month for 6 months

Full Payment Discount – £845
Monthly installments – £894 (£149.00 x 6 months interest free)
Clear

Cyber Security Practical Experience Programme (PEP) Complete Package

Limited Offer £2846, Now £845

Select an option below to show price

/ month for 6 months

Full Payment Discount – £845
Monthly installments – £894 (£149.00 x 6 months interest free)
Clear

Enquire Now

Make an impact immediately

   11 essential  Cyber Security courses worth £2189

   Cyber Security Practical Experience with two Live Practise Labs worth £198

   Professional CV Consultation worth £149

   CompTIA A+ Exam included (Both parts) worth £310

  All with 12 months access

The Cyber Security PEP Complete package has been heavily discounted and is specifically designed as a FAST TRACK programme for you to get into IT Support and entry level Cyber Security. The programme contains all of the benefits of the IT Support Programme with a focus on Cyber Security courses and practice labs so that you can apply for Cyber Security roles in as little as 12 weeks (intense study) or 16 weeks (average study).

Your Programme is released in two parts.

Part 1: CompTIA IT Fundamentals, CompTIA A +, CompTIA Network +, CompTIA Cloud +, Windows 10, Cisco CCENT and ITIL Foundation (130 hours).

Part 2: CompTIA Security +, CompTIA Linux +, CompTIA CySA + and CCKK Cloud Computing Security Knowledge (63 hours).

The CompTIA A+ exam, CompTIA A+ and CompTIA Security + Practice Lab and Professional CV review is also included.

Average Salary Indicator

Start applying for jobs in 5 easy steps

Step 1

Complete Part 1 and Part 2 of the IT Support and Cyber Security courses included (Total 193 hours) and pass our Mock Test for the CompTIA A+

Step 2

Pass the CompTIA A+ Exam. Then complete the CompTIA A+ and CompTIA Security + Practise Labs

Step 3

Complete the Professional CV Review with one of our experts who will compile your new CV with your new skills

Step 4

You are now ready to start applying for jobs in IT Support £18k to £25k as well as Cyber Security entry level positions £25k to £30k.

Step 5

Take the CompTIA Security + or Cyber Security Analyst exam (exam cost not included) to solidify your experience as a Cyber Security Professional with salaries of £35k +

Some of the skills you will learn with this Programme

Windows 10

Installing, Configuring and Migrating Windows 10 Operating Systems

End User

Complete user management with finding users, unlocking accounts, resetting passwords and being a clear communicator with solutions

Cyber Security

leverage intelligence and threat detection techniques analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents

Security

Implementing and maintaining Network Security issues, Standard and Protocols.

Privacy and Policy

Comprehensive understanding of Privacy issues and Policies essential in every organisation

Enquire Now

Why Practise Labs are essential

Get Hands on Practical Experience

By broadening your understanding and skills in different networks, windows, servers and more with hands on practical experience

Increase productivity

Practise Labs actually increase your study productivity as they allow you to practice what you are studying

Make mistakes and break things

We are firm believers in one of the quickest ways to learn is to put into practice what you have just learnt. A Live Lab allows you to mistakes and learn from them and break things and fix them.

Over 100 Practise Labs available

Covering every area in IT ensures that we have you covered no matter which discipline you want to study in IT

Get your CV seen with the ITcertify Pro CV review service

- 1 hour consultation with a CV Specialist

- Guaranteed AST Robot Proof CV

- Skills Optimisation

- Experience Optimisation

- Layout and Keyword Optimisation

Real examples of Jobs advertised that the Cyber Security PEP Complete Programme will get you interviews for

Courses included

CompTIA IT Fundamentals Module Outline

The CompTIA IT Fundamentals course is perfect for you if you’re considering a career in IT or if you work in a similar field that requires a broad
understanding of IT, like in a sales role at an IT company. CompTIA IT Fundamentals is a stepping stone to more advanced certifications such
as CompTIA A+, and then to CompTIA Network+ and CompTIA Security+.

The CompTIA IT Fundamentals course focuses on the essential IT skills and knowledge needed by advanced end-users and entry-level IT professionals:

  • Identifying and explaining computer components.
  • Setting up a workstation: including conducting software installations.
  • Establishing network connectivity.
  • Identifying compatibility issues and identifying and preventing security risks.
  • Managing the safety and preventative maintenance of computers.

Module 1 Software

1.1 Course And Instructor Introduction
1.2 Software Operating Systems-Part1
1.3 Software Operating Systems-Part2
1.4 Software Operating Systems-Part3
1.5 Software Operating Systems-Part4
1.6 Software Operating Systems-Part5
1.7 Common File Types-Part1
1.8 Common File Types-Part2
1.9 Software Management Best Practices-Part1
1.10 Software Management Best Practices-Part2
1.11 Alternative Software Technologies
1.12 Basic Software Features And Functions

Module 2 Hardware

2.1 Basic Wired And Wireless Peripherals-Part1
2.2 Basic Wired And Wireless Peripherals-Part2
2.3 Basic Wired And Wireless Peripherals-Part3
2.4 Common Computer Connector Types-Part1
2.5 Common Computer Connector Types-Part2
2.6 Internal Computer Components-Part1
2.7 Internal Computer Components-Part2

Module 3 Security

3.1 Basic Security Threats-Part1
3.2 Basic Security Threats-Part2
3.3 Basic Security Threats-Part3
3.4 Security Best Practices-Part1
3.5 Security Best Practices-Part2
3.6 Web-Browsing Best Practices
3.7 Web-Browsing Best Practices Demo-Part1
3.8 Web-Browsing Best Practices Demo-Part2
3.9 Web-Browsing Best Practices Demo-Part3

Module 4 Networking

4.1 Setup And Configure Basic SOHO Router
4.2 Wireless Router Demo
4.3 Compare And Contrast Cellular Wireless And Wire Data Connections
4.5 Compare And Contrast Different Methods Of Sharing And Storage-Part1
4.6 Compare And Contrast Different Methods Of Sharing And Storage-Part2
4.7 Compare And Contrast Different Methods Of Sharing And Storage-Part3

Module 5 Basic IT Literacy

5.1 Setting Up A Basic Workstation-Part1
5.2 Setting Up A Basic Workstation-Part2
5.3 Setting Up A Basic Workstation Demo-Part1
5.4 Setting Up A Basic Workstation Demo-Part2
5.5 Setting Up A Basic Workstation Demo-Part3
5.6 Basic Methods Of Navigating An Operating System-Part1
5.7 Basic Methods Of Navigating An Operating System-Part2
5.8 Basic Methods Of Navigating An Operating System Demo-Part1
5.9 Basic Methods Of Navigating An Operating System Demo-Part2
5.10 Basic Support Concepts
5.11 Basic Backup Concepts
5.12 Environmental And Safety Concepts-Part1
5.13 Environmental And Safety Concepts-Part2

Module 6 Course Review

6.1 Software Domain Review
6.2 Hardware Domain Review
6.3 Security Domain Review
6.4 Networking Domain Review
6.5 Basic IT Literacy Review
6.6 Course Review Question
6.7 Test Taking Tips
6.8 Course Outro

CompTIA A+ Module Outline

The CompTIA A+ is in two parts Core 1 and Core 2. You must complete Core 1 before you attempt Core 2. This course includes both parts and is the new course which covers the update in 2019. CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.

CompTIA A+ 220-1002 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.

CompTIA A + 220-1001 Core 1

1.0 – Mobile Devices
• What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile
devices
• 1.5 Given a scenario, connect and configure accessories and ports of other
mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and
application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization
2.0 Networking
• What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO
network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by
networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their
features
• 2.8 Given a scenario, use appropriate networking tools
3.0 Hardware
• What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on
cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a
custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and
settings
• 3.11 Given a scenario, install and maintain various print technologies
4.0 Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization
5.0 Hardware and Network Troubleshooting
• What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while
adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network
problems

CompTIA A + 220-1002 Core 2

Module 1 – Operation Systems
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
Module 2 – Security
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
Module 3 – Software Troubleshooting
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
Module 4 – Operational Procedures
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies

CompTIA Network + Module Outline

The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:

• Networking concepts
• Network infrastructure and deploying common network components
• Network operations and supporting a production network
• Network security concepts and implementing basic network security
• Network troubleshooting

Network Concepts

  • Intro Network Plus N10-007
  • Basic networking
  • Activity basic networking
  • OSI model
  • Exploring the OSI model act
  • Protocol and ports
  • Activity examining protocols and ports
  • Connection oriented vs connectionless
  • Activity comparing TCP and UDP
  • Internet protocol (IP)
  • Activity examining the lower layer protocols
  • Layer 7 remote control protocols
  • Layer 7 file transfer protocols
  • Layer 7 file transfer protocols
  • Layer 7 messaging protocols
  • Activity examining messaging protocols
  • Layer 7 web traffic protocols
  • layer 7 streaming media protocols
  • Layer 7 infrastructure management protocols
  • Switching
  • Activity creating collision and broadcast domains
  • Interface properties and segmentation
  • Activity creating a basic network segment
  • Switching part 2
  • Activity switching
  • Switching loop management
  • Activity managing switching loops
  • VLANs
  • Activity creating VLANs
  • Routing
  • Activity examining ARP
  • IP addressing basics
  • Activity configuring IP
  • Routers
  • Activity setting up a router
  • Routing basics
  • Activity adding static routes
  • VLAN routing
  • Activity routing between VLANs
  • NAT/PAT
  • Activity configuring NAT/PAT
  • Routing protocols
  • Activity configuring a routing protocol
  • Firewalls
  • Activity configuring firewalls
  • Advanced switching and routing concepts
  • Activity exploring IPv6
  • Performance concepts
  • IP addressing
  • Subnetting
  • Activity learning to subnet
  • Address assignments
  • Network types and topologies
  • Wireless topologies
  • Network types
  • Technologies that facilitate the internet of things (IoT)
  • Wireless technologies
  • 802.11 standards
  • Wi-Fi frequencies
  • Wi-Fi antenna concepts
  • Bluetotoh
  • Cellular
  • Activity using an RF spectrum analyzer
  • Cloud concepts
  • Activity exploring cloud services
  • Network services
  • Activity setting up DNS
  • DHCP service
  • Activity setting up DHCP
  • NTP

Infrastructure

  • Infrastructure
  • Activity testing a fiber optic cable
  • Plenum vs. PVC
  • Activity crimping on an RJ-45 connector
  • Transceivers
  • Activity terminating cable to a 110 block
  • Copper cable standards
  • Activity creating a crossover cable
  • Ethernet deployment standards
  • Network device placement and installation
  • Repeater
  • Router
  • Modem
  • Activity setting up a WAP
  • Firewall
  • Media converter
  • Advanced network devices
  • Wireless controller
  • Proxy server
  • Activity configuring proxy settigns
  • VPN concentrator
  • Virtual networking components
  • Network storage types
  • WAN technologies
  • Transmission mediums
  • Activity configuring WAN links
  • Termination

Network Operation

  • Change management
  • IDF-MDF documentation
  • Labeling
  • Logical vs physical diagrams
  • Network operations documentation
  • Rack diagrams
  • Standard operation procedures
  • Using documentation act
  • Wiring and ports locations
  • Continuity and disaster
  • MTTR mean time repair
  • Recovery
  • Backing up your data act
  • Event management
  • Metrics
  • Scanning monitoring patching
  • Testing the network act
  • HTTPS management
  • Out of band management
  • RDP
  • Remote access methods
  • Remote file access
  • making remote connections act
  • SSH
  • VNC
  • Policies and best practices
  • Creating policies and procedures act

Network Security

Physical Security Devices
• Detection
• Prevention
Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot

Network Troubleshooting and Tools

Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
Troubleshoot Wired Connectivity and Performance
• Signal Issues:
• Attenuation
• Latency
• Jitter
• Crosstalk
• EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
• Open/short
• Incorrect pin-out
• Incorrect Cable Type
• Bad Port
• Damaged cable
• Bent pins
• Transceiver Issues:
• Transceiver mismatch
• TX/RX reverse
• Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
• Bottleneck
• VLAN mismatch
• Network connection LED status indicators
Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
• Attenuation
• Reflection
• Refraction
• Absorption
• Latency & Jitter
• Antenna Issues:
• Incorrect antenna type
• Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
• Interference
• Channel overlap
• Overcapacity
• Distance limitations
• Frequency mismatch
• Power levels
• Signal-to-noise ratio
• WAP Misconfiguration:
• Wrong SSID
• Wrong passphrase
• Security type mismatch
• Activity Troubleshooting WAP Issues
Troubleshoot Common Network Service Issues
• Common Network Issues:
• Physical Connectivity
• Incorrect IP Address
• Incorrect Gateway
• Incorrect Netmask
• Names Not Resolving
• Untrusted SSL Certificate
• DCP Issues:
• Duplicate IP Addresses
• Expired IP Address
• Rogue DHCP
• Exhausted DHCP Scope
• Firewall/ACL Issues:
• Blocked TCP/UDP Ports
• Incorrect Host-based Firewall Settings
• Incorrect ACL Settings
• Advanced Network Issues:
• DNS Server Issues
• Duplicate MAC Addresses
• Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue

CompTIA Cloud + Module Outline

The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments, who must understand and deliver cloud infrastructure. Recommended experience includes at least 24-36 months of work experience in IT networking, storage, or data centre administration, and familiarity with any major hypervisor technologies for server virtualisation

Cloud concepts and models

1. Intro
2. Models Part 1
3. Models Part2
4. Service And Delivery Models
5. Terms And Characteristics
6. Objects Storage Concepts

Virtualisation

1. Virtualization
2. Install Configure Manage VM And Devices
(Hands on Snapshots & Cloning)
Demo
3. Backups (Hands on Virtual Network Interface Cards) Demo
4. Virtual Disks (Hands on Virtual Disks) Demo
5. Virtual Switches
6. Virtual Resource Migration
7. Benefits Of Virtualization In A Cloud Environment
8. Compare And Contrast Virtual Environment

Infrastructure

1. Infrastructure
2. Different Access Protocols
3. Explain Storage Configuration
4. File Systems Types
5. Executing Storage Provisioning
6. Network Share Demo
7. Implement Appropriate Network Configurations
8. Importance Of Network Optimization
9. Troubleshoot Basic Network Configuration Part 1
10. Troubleshoot Basic Network Configuration Part 2
11. Troubleshoot Commands Part 1
12. Troubleshoot Commands Part 2
13. Troubleshoot Commands Part 3
14. Explain Common Network Protocols
15. Common Hardware Resources

Resource management

1. Resource Management Part 1
2. Resource Management Part 2
3. Establishing Baselines And Thresholds
4. Appropriately Allocate Physical Host Resources Part 1
5. Appropriately Allocate Physical Host Resources Part 2
6. Appropriately Allocate Virtual Guest Resources Part 1
7. Appropriately Allocate Virtual Guest Resources Part 2
8. Use Appropriate Tools For Remote Access

Security

1. Security Part 1
2. Security Part 2
3. Storage Security Concepts And Methods
4. Different Encryption Technologies
5. Identify Access Control Methods

Systems Management

1. Systems Management Part 1
2. Systems Management Part 2
3. Diagnose Remediate And Optimize Part 1
4. Diagnose Remediate And Optimize Part 2
5. Common Performance Concepts Part 1
6. Common Performance Concepts Part 2
7. Testing Techniques

Business Continuity in the Cloud

1. Business Continuity In Cloud Part 1
2. Business Continuity In Cloud Part 2
3. Solutions To Meet Availability Requirements
4. Conclusion

Microsoft 70-697: Configuring Windows Devices Windows 10

The Windows 10 course will equip you building solid identities, protection of content (data loss protection), mobile device management policy, virtualization with Hyper-V, application management using the Company Portal and the Windows Store. You’ll also understand Windows 10 security and integrated Azure features as well as below:

– Manage identity in Windows 10
– Plan Windows 10 desktop and device deployment
– Plan and implement a Microsoft 365 solution
– Configure Windows 10 networking and storage
– Manage data access and protection
– Manage remote access, apps and updates and recovery

Modules 1 - 3

Module 1: Introducing Windows 10
– Course Introduction
– What Makes Windows 10 Different
– Overview Of Windows 10 Features
– Navigating And Using Windows 10-Part1
– Navigating And Using Windows 10-Part2
Module 2: Installing Windows 10
– Preparing For Installation
– Installation Options
– Upgrading And Migrating-Part1
– Upgrading And Migrating-Part2
Module 3: Configuring Devices
– Overview Of Configuration Tools
– Common Configuration Options
– Managing User Accounts-Part1
– Managing User Accounts-Part2
– Using Control Panel
– Using Windows Administration Tools-Part1
– Using Windows Administration Tools-Part2
-Using Windows PowerShell-Part1
– Using Windows PowerShell-Part2

Modules 4 - 6

Module 4: Configuring Network Connectivity
– TCP IP Network Connectivity-Part1
– TCP IP Network Connectivity-Part2
– TCP IP Network Connectivity-Part3
– Name Resolution
– Wireless
– Remote Access Overview-Part1
– Remote Access Overview-Part2
– Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
– Managing Hard Disks-Part1
– Managing Hard Disks-Part2
– Managing Hard Disks-Part3
– Creating And Managing Storage Spaces
– Overview Of Data Access
– Configuring And Managing File Access
– Managing Shared Folder
– Understanding Work Folder
– Managing Printers
Module 6: Managing Apps
– Installing And Configuring Applications
– Managing Apps From The Windows Store
– Managing Microsoft Edge Web Browser

Modules 7 - 10

Module 7: Managing Device Security
– Configuring Network Security-Part1
– Configuring Network Security-Part2
– Configuring Local Security
– Configuring Data Security-Part1
– Configuring Data Security-Part2
– Configuring Device Security
Module 8: Maintaining Windows 10
– Updating Windows 10
– Monitoring And Optimizing Windows 10-Part1
– Monitoring And Optimizing Windows 10-Part2
Module 9: Troubleshooting And Recovery
– Managing Devices And Drives
– Recovery Files
– Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
– Overview Of Image Based Deployment
– Automating Installations
– Windows Activation

Modules 11 - 13

Module 11: Managing User Profiles And User State
Virtualization
– Managing User Profiles-Part1
– Managing User Profiles-Part2
– User State Virtualization
– User Profile Migration
Module 12: Managing Desktop And Application Settings
Using Group policy
– Using Group Policy To Manage Windows 10 Devices-Part1
– Using Group Policy To Manage Windows 10 Devices-Part2
– Using Group Policy To Manage Windows 10 Devices-Part3
– Using Group Policy To Manage Windows 10 Devices-Part4
– Using Group Policy To Manage Applications-Part1
– Using Group Policy To Manage Applications-Part2
Module 13: Configuring And Managing Client Hyper-V
– Introduction To Client Hyper-V
– Creating Virtual Machines
– Managing Virtual Machine Storage And Snapshot
– Conclusion

CISCO Certified Entry Network Technician CCENT

The CCENT course is the first step in ultimately achieving the CCNA Routing and Switching Certification. Here you will develop skills installing, configuring, and troubleshooting small networks as well as working with Cisco routers and switches which form the heart of any IT Network career

Module 1 Networking Fundamentals

1.1 Introduction

1.2 Introduction To TCPIP Networking Part 1

1.3 Introduction To TCPIP Networking Part 2

1.4 Introduction To TCPIP Networking Part 3

1.5 Introduction To TCPIP Networking Part 4

1.6 Ethernet LAN Fundamentals Part 1

1.7 Ethernet LAN Fundamentals Part 2

1.8 Ethernet LAN Fundamentals Part 3

1.9 Wide Area Networks Part 1

1.10 Wide Area Networks Part 2

1.11 IPv4 Addressing And Routing Fundamentals Part 1

1.12 IPv4 Addressing And Routing Fundamentals Part 2

1.13 IPv4 Addressing And Routing Fundamentals Part 3

1.14 TCPIP Transport And Applications Part 1

1.15 TCPIP Transport And Applications Part 2

Module 2 - Basic Ethernet LAN Implementation

2.1 Command Line Essentials Part 1

2.2 Command Line Essentials Part 2

2.3 Command Line Essentials Part 3

2.4 Ethernet LAN Switching

2.5 Managing Ethernet Switches Part 1

2.6 Managing Ethernet Switches Part 2

2.7 Configuring Switch Interfaces

Module 3 - Designing Ethernet LANS

3.1 Understanding LAN Design Options Part 1

3.2 Understanding LAN Design Options Part 2

3.3 Understanding LAN Design Options Part 3

3.4 Implementing And Configuring Ethernet VLANS Part 1

3.5 Implementing And Configuring Ethernet VLANS Part 2

Module 4 - Understanding IPv4

4.1 IPv4 Subnetting Part 1

4.2 IPv4 Subnetting Part 2

4.3 IPv4 Subnetting Part 3

4.4 IPv4 Subnetting Part 4

4.5 Analyzing Classful IPv4 Networks Part 1

4.6 Analyzing Classful IPv4 Networks Part 2

4.7 Analyzing Classful IPv4 Networks Part 3

4.8 Analyzing Subnet Masks Part 1

4.9 Analyzing Subnet Masks Part 2

4.10 Analyzing existing Subnets

Module 5 - Working with Cisco Routers

5.1 Implementing IPv4 Part 1
5.2 Implementing IPv4 Part 2
5.3 Configuring IPv4 Address And Static Routes Part 1
5.4 Configuring IPv4 Address And Static Routes Part 2
5.5 Configuring IPv4 Address And Static Routes Part 3
5.6 Using Dynamic Routing Protocols Part 1
5.7 Using Dynamic Routing Protocols Part 2
5.8 Configuring IPv4 Hosts Part 1
5.9 Configuring IPv4 Hosts Part 2

Module 6 - IPv4 Design and Troubleshooting

6.1 Designing IP Subnets Part 1

6.2 Designing IP Subnets Part 2

6.3 Using VLAN Part 1

6.4 Using VLAN Part 2

6.5 Troubleshooting IPv4

Module 7 - IPv4 Design and Troubleshooting

7.1 Access Control Lists Part 1

7.2 Access Control Lists Part 2

7.3 Access Control Lists Part 3

7.4 Access Control Lists Part 4

7.5 Network Address Translation Part 1

7.6 Network Address Translation Part 2

Module 8 - Implementing IPv6

8.1 IPv6 Fundamentals Part 1

8.2 IPv6 Fundamentals Part 2

8.3 IPv6 Fundamentals Part 3

8.4 IPv6 Fundamentals Part 4

8.5 IPv6 Addressing And Subnetting Part 1

8.6 IPv6 Addressing And Subnetting Part 2

8.7 Implementing IPv6 Part 1

8.8 Implementing IPv6 Part 2

8.9 Implementing IPv6 Part 3

8.10 Implementing IPv6 Part 4

8.11 Course Conclusion

Information Technology Infrastructure Library (ITIL Foundations)

This ITIL Foundation course covers the IT Infrastructure Library best practices. ITIL is globally accepted as the most widely used best practices for IT service management. This ITcertify course gives students the necessary knowledge to enter or enhance their career in project management or IT service management. Companies that use ITIL best practices range from the Fortune 500 market, Government, DOD, small business and is also used internationally. This course covers the 5 main concepts within ITIL: Service Strategy, Design, Transition, Operation and Continual Service Improvement.

Module 1

• 1.1 Intro
• 1.2 About Scheme
• 1.3 Levels Of Qualifications
• 1.4 Qualification Bodies
• 1.5 The ITIL Foundation Certifcation Stubble

Module 2

•  2.1 Service And Service Management Part 1
•  2.2 Service And Service Management Part 2
•  2.3 Service Management Processes Part 1
•  2.4 Service Management Processes Part 2
•  2.5 Service Management Best Practices And Summary

Module 3

•  3.1 Service Management Practices
•  3.2 Why ITIL
•  3.3 The Service Lifecycle

Module 4

•  4.1 Service Strategy Purpose And Objectives
•  4.2 Service Strategy Scope
•  4.3 Business Value Stubble
•  4.4 Key Principles Part 1
•  4.5 Key Principles Part 2
•  4.6 Service Stragey Processes

Module 5

• 5.1 Service Design Purpose And Objectives
• 5.2 Scope Of Service Design
• 5.3 Business Value Service Design
• 5.4 Service Design Key Principles
• 5.5 Service Design Processes Part 1
• 5.6 Service Design Processes Part 2
• 5.7 Service Design Processes Part 3
• 5.8 Service Design Processes Part 4

Module 6

•  6.1 Service Transition Purpose And Objectives
•  6.2 Service Transition Scope And Business Value
•  6.3 Service Transition Key Principles
•  6.4 Service Transition Processes Part 1
•  6.5 Service Transition Processes Part 2
•  6.6 Service Transition Processes Part 3
•  6.7 Service Transition Processes Part 4

Module 7

•   7.1 Intro To Service Operation
•  7.2 Service Operation Basic Concepts
•  7.3 Service Operation Processes Part 1
•  7.4 Service Operation Processes Part 2
•  7.5 Service Operation Access Management
•  7.6 Service Operation Functions

Module 8

•  8.1 Continual Service Improvement Purpose Objectives AndScope
•  8.2 Continual Service Improvement Key Principles
•  8.3 Continual Service Improvement Processes

Module 9

•  9.1 SMT
•  9.2 SMT Service Automation
•  9.3 SMT Service Analytics
•  10.1 How It All Fits Together
•  10.2 Outro

CompTIA Security + Module Outline

The CompTIA Security+ course will prepare you to become CompTIA Security+ certified. ITcertify covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes with Cryptography and Public Key Infrastructure.

You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company. 

Threats, Attacks, and Vulnerabilities

1.1 Introduction
1.2 Types Of Malware- Part 1
1.3 Types Of Malware- Part 2
1.4 Types Of Attacks- Part 1
1.5 Types Of Attacks- Part 2
1.6 Types Of Attacks- Part 3
1.7 Types Of Attacks- Part 4
1.8 Types Of Attacks- Part 5
1.9 Threat Actors- Part 1
1.10 Threat Actors- Part 2
1.11 Penetration Testing And Vulnerability Scanning- Part 1
1.12 Penetration Testing And Vulnerability Scanning- Part 2
1.13 Impact Of Vulnerabilities- Part 1
1.14 Impact Of Vulnerabilities- Part 2

Technologies and Tools

2.1 Networking Hardware And Software- Part 1
2.2 Networking Hardware And Software- Part 2
2.3 Networking Hardware And Software- Part 3
2.4 Networking Hardware And Software- Part 4
2.5 Networking Hardware And Software- Part 5
2.6 Networking Hardware And Software- Part 6
2.7 Security Assessment- Part 1
2.8 Security Assessment- Part 2
2.9 Troubleshooting Issues- Part 1
2.10 Troubleshooting Issues- Part 2
2.11 Securing Mobile Devices- Part 1
2.12 Securing Mobile Devices- Part 2
2.13 Securing Mobile Devices- Part 3
2.14 Securing Mobile Devices- Part 4
2.15 Secure Protocols- Part 1
2.16 Secure Protocols- Part 2

Architecture and Design

3.1 Secure Network Architecture- Part 1
3.2 Secure Network Architecture- Part 2
3.3 Secure System Designs- Part 1
3.4 Secure System Designs- Part 2
3.5 Secure Staging Deployment Concepts
3.6 Embedded Systems- Part 1
3.7 Embedded Systems- Part 2
3.8 Application Development And Deployment- Part 1
3.9 Application Development And Deployment- Part 2
3.10 Application Development And Deployment- Part 3
3.11 Physical Security Controls- Part 1
3.12 Physical Security Controls- Part 2
3.13 Physical Security Controls- Part 3
3.14 Cloud Virtualization- Part 1
3.15 Cloud Virtualization- Part 2

Identity and Access Management

4.1 Identity And Access Management- Part 1
4.2 Identity And Access Management- Part 2
4.3 Identity And Access Services- Part 1
4.4 Identity And Access Services- Part 2
4.5 Management Controls- Part 1
4.6 Management Controls- Part 2
4.7 Account Management Practices- Part 1
4.8 Account Management Practices- Part 2
4.9 Account Management Practices- Part 3

Risk Management

5.1 Organizational Security- Part 1
5.2 Organizational Security- Part 2
5.3 Business Impact Analysis Concepts- Part 1
5.4 Business Impact Analysis Concepts- Part 2
5.5 Risk Management- Part 1
5.6 Risk Management- Part 2
5.7 Incident Response Procedures- Part 1
5.8 Incident Response Procedures- Part 2
5.9 Forensics- Part 1
5.10 Forensics- Part 2
5.11 Disaster Recovery- Part 1
5.12 Disaster Recovery- Part 2
5.13 Types Of Control- Part 1
5.14 Types Of Control- Part 2
5.15 Data Security And Privacy Practices- Part 1
5.16 Data Security And Privacy Practices- Part 2

Cryptography and PKI

6.1 Cryptographic Basics- Part 1
6.2 Cryptographic Basics- Part 2
6.3 Cryptographic Basics- Part 3
6.4 Cryptographic Algorithms- Part 1
6.5 Cryptographic Algorithms- Part 2
6.6 Wireless Security- Part 1
6.7 Wireless Security- Part 2
6.8 Implementing PKI- Part 1
6.9 Implementing PKI- Part 2
6.10 Implementing PKI- Part 3
6.11 Conclusion

CompTIA Linux + Module Outline

CompTIA Linux+ validates the competencies required of an early career system administrator supporting Linux systems. Here you will learn how to be able to perform maintenance tasks with the command line, install & configure a workstation and be able to configure a basic network

Intro and Instructions

Intro

1. Introduction

2. Introduction to Building Labs

3. Things You Need To Do

4. Install Demo Virtual Box

Instructions 

1. Navigation

2. Commands with Lab Demo

3. Internal and External Commands

4. Overview of Shell Commands Tricks

5. Exploring Shell Configuration

6. Stream Redirection

7. Overview of Processing Text Using Filters

8. Overview File-Viewing Commands

9. Overview Using Grep

10. Syntax and Summary

11. Overview of Exam Essentials

Managing Software and Configuring hardware

2.1 Managing Software
2.2 Overview Using RPM
2.3 RPM Part 2
2.4 Overview Using Cpio
2.5 Overview Using Debian and Apt_cache
2.6 Using Apt-get
2.7 Debian Tools
2.8 Managing Shared Libraries
2.9 Overview Locating Library Files
2.10 Foreground and Background Processes
2.11 Managing Software Summary

3.1 Configuring Hardware
3.2 Configuring Devices
3.3 Configuring USB
3.4 Configuring Hard Disk
3.5 Designing Hard Disk Layout
3.6 Logical Volume Management
3.7 Creating Partitions Filesystems
3.8 Overview Using Fdisk
3.9 Overview Common Filesystem Types
3.10 Creating Filesystem
3.11 Maintaining Filesystem Health
3.12 Configuring Hardware Summary

Managing Files and Booting Files

4.1 Managing Files
4.2 File Archiving Commands
4.3 Managing Files Ownership
4.4 Managing Disk Quotas
4.5 Directories and Content
4.6 Overview Tools for Locating Files
4.7 Overview of Exam Essentials

5.1 Booting Linux and Editing Files
5.2 Boot and Reboot
5.3 Understanding the Boot Process
5.4 Runlevels Process
5.5 Managing Runlevel Services
5.6 Editing with Vi
5.7 Booting Summary

X and Admin

6.1 X Windows Systems
6.2 X Configuration Options
6.3 X Configuration Options part 2
6.4 Configuring X Fonts
6.5 Configuring Xft Fonts
6.6 Overview Managing GUI Logins
6.7 Using X for Remote Access
6.8 X Accessibility
6.9 Addition Assistive Technologies
6.10 Configuring Localization and Internationalization
6.11 Querying and Setting Your Locale
6.12 Configuring Printing
6.13 Configuring Printing part 2
6.14 Using Web-based CUPS Utilities

7.1 Administering
7.2 Directly Modifying Account Configuration
7.3 Components of Account
7.4 Adding Groups
7.5 Tuning User and System Environments
7.6 Reviewing Log File Contents
7.7 Maintaining System Time
7.8 Admin Summary

Basic Networking and Scripts

8.1 Basic Networking
8.2 Network Addressing
8.3 Network Addressing Part 2
8.4 DNS Data Flow Zone and Resolution
8.5 Network Ports
8.6 Connections
8.7 Testing Connectivity
8.8 Wireshark Demo
8.9 Basic Networking Summary

9.1 Scripts E-mail and Databases
9.2 Writing Scripts
9.3 Writing Scripts Part 2
9.4 Managing E-mail
9.5 Managing Data with SQL
9.6 Advantages of Database
9.7 Scripts Summary

Security

10.1 Security
10.2 Controlling Access Via TCP Wrappers
10.3 Configuring Xinetd
10.4 Uninstalling Or Reconfiguring Servers
10.5 Tools for Managing Passwords
10.6 Configuring SSH
10.7 SSH Keys
10.8 Controlling SSH Access
10.9 Using GPG
10.10 Security Summary

CompTIA Cyber Security Analyst CySA +

The CompTIA Cyber Security Analyst CySA+ focuses on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’s applications and systems.
The CompTIA Cyber Security Analyst CySA+ is a vendor neutral certification that expects three to four years of experience in a related field as well as a Security+ or equivalent knowledge.
The CompTIA Cyber Security Analyst CySA+ lies between the CompTIA Security + as well as the CompTIA Advanced Security Practitioner (CASP) exams and is an excellent go between to tackle before diving into the CASP, but when the Security+ isn’t enough.
Here you will gain an understanding of security best practices and protocols beyond that which is provided by the CompTIA Security + and will prove a level of expertise beyond that of basic security practices that are followed when using a computer. This allows any employee to prove a better understanding of enterprise security practices, and the necessary tools needed to protect a company network. The modules of this course align with the official objects of the certification and will expand past the scope of the certification to provide real life examples.

Threat Management

Module 1: Threat Management
1.1 Introduction
1.2 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 1
1.3 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes
1.4 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes
1.5 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 4
1.6 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 5
1.7 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 6
1.8 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 7
1.9 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 8
1.10 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 9
1.11 Given a scenario, analyze the results of a network
reconnaissance Part 1
1.12 Given a scenario, analyze the results of a network
reconnaissance Part 2
1.13 Given a scenario, analyze the results of a network
reconnaissance Part 3
1.14 Given a scenario, analyze the results of a network
reconnaissance Part 4
1.15 Given a scenario, analyze the results of a network
reconnaissance Part 5
1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
1.20 Explain the purpose of practices used to secure a corporate environment Part 1
1.21 Explain the purpose of practices used to secure a corporate environment Part 2
1.22 Explain the purpose of practices used to secure a corporate environment Part 3
1.23 Explain the purpose of practices used to secure a corporate environment Part 4

Vulnerability Management

2.1 Given a scenario, implement an information security
vulnerability management process Part 1
2.2 Given a scenario, implement an information security
vulnerability management process Part 2
2.3 Given a scenario, implement an information security
vulnerability management process Part 3
2.4 Given a scenario, implement an information security
vulnerability management process Part 4
2.5 Given a scenario, implement an information security
vulnerability management process Part 5
2.6 Given a scenario, implement an information security
vulnerability management process Part 6
2.7 Given a scenario, implement an information security
vulnerability management process Part 7
2.8 Given a scenario, analyze the output resulting from a
vulnerability scan Part 1
2.9 Given a scenario, analyze the output resulting from a
vulnerability scan Part 2
2.10 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 1
2.11 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 2
2.12 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 3

Cyber Incident Response

3.1 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 1
3.2 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 2
3.3 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 3
3.4 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 1
3.5 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 2
3.6 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 3
3.7 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 4
3.8 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 5
3.9 Explain the importance of communications during the
incident response process
3.10 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 1
3.11 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 2
3.12 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 3
3.13 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 4
3.14 Summarize the incident recovery and post-incident response process Part 1
3.15 Summarize the incident recovery and post-incident response process Part 2
3.16 Summarize the incident recovery and post-incident response process Part 3
3.17 Summarize the incident recovery and post-incident response process Part 4

Security Architecture and Tool Sets

4.1 Explain the relationship between frameworks, common
policies, controls, and procedures Part 1
4.2 Explain the relationship between frameworks, common
policies, controls, and procedures Part 2
4.3 Explain the relationship between frameworks, common
policies, controls, and procedures Part 3
4.4 Explain the relationship between frameworks, common
policies, controls, and procedures Part 4
4.5 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 1
4.6 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 2
4.7 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 3
4.8 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 4
4.9 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 1
4.10 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 2
4.11 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 3
4.12 Given a scenario, use applications security best practices
while participating in the Software Development Life Cycle
(SDLC) Part 1
4.13 Given a scenario, use applications security best practices
while participating in the Software Development Life Cycle
(SDLC) Part 2
4.14 Overview
4.15 Conclusion

Cloud Computing Security Knowledge

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery. Upon completing this course, ITcertify students will be experts in the following topics:

  • Understanding cloud computing security challenges
  • Cloud computing security controls
  • Resiliency and Measured Usage
  • Understand the cloud computing architectural framework

1: Architecture

• NIST Definitions
• Essential Characteristics
• Service Models
• Deployment Models
• Multi-Tenancy
• CSA Cloud Reference Model
• Jericho Cloud Cube Model
• Cloud Security Reference Model
• Cloud Service Brokers
• Service Level Agreements

2: Governance and Enterprise Risk Management

• Contractual Security Requirements
• Enterprise and Information Risk Management
• Third Party Management Recommendations
• Supply chain examination
• Use of Cost Savings for Cloud

3: Legal Issues: Contracts and Electronic Discovery

• Consideration of cloud-related issues in three dimensions
• eDiscovery considerations
• Jurisdictions and data locations
• Liability for activities of subcontractors
• Due diligence responsibility
• Federal Rules of Civil Procedure and electronically stored information
• Metadata
• Litigation hold

4: Compliance and Audit Management

• Definition of Compliance
• Right to audit
• Compliance impact on cloud contracts
• Audit scope and compliance scope
• Compliance analysis requirements
• Auditor requirements

5: Information Management and Data Security

• Six phases of the Data Security Lifecycle and their key elements
• Volume storage
• Object storage
• Logical vs physical locations of data
• Three valid options for protecting data
• Data Loss Prevention
• Detection Data Migration to the Cloud
• Encryption in IaaS, PaaS & SaaS
• Database Activity Monitoring and File Activity Monitoring
• Data Backup
• Data Dispersion
• Data Fragmentation

6: Interoperability and Portability

• Definitions of Portability and Interoperability
• Virtualization impacts on Portability and Interoperability
• SAML and WS-Security
• Size of Data Sets
• Lock-In considerations by IaaS, PaaS & SaaS delivery models
• Mitigating hardware compatibility issues

7: Traditional Security, Business Continuity, and Disaster Recovery

•  Four D’s of perimeter security
•  Cloud backup and disaster recovery services
•  Customer due diligence related to BCM/DR
•  Business Continuity Management/Disaster Recovery due diligence
•  Restoration Plan
•  Physical location of cloud provider

8: Data Center Operations

• Relation to Cloud Controls Matrix
• Queries run by data center operators
• Technical aspects of a Provider’s data center operations for customers
• Logging and report generation in multi-site clouds

9: Incident Response

• Factor allowing for more efficient and effective containment and recovery in a cloud
• Main data source for detection and analysis of an incident
• Investigating and containing an incident in an Infrastructure as a Service environment
• Reducing the occurrence of application level incidents
• How often should incident response testing occur
• Offline analysis of potential incidents

10: Application Security

• Identity, entitlement, and access management (IdEA)
• SDLC impact and implications
• Differences in S-P-I models
• Consideration when performing a remote vulnerability test of a cloud-based application
• Categories of security monitoring for applications
• Entitlement matrix

11: Encryption and Key Management

• Adequate encryption protection of data in the cloud
• Key management best practices, location of keys, keys per user
• Relationship to tokenization, masking, anonymization and cloud database controls

12: Identity, Entitlement, and Access Management

• Relationship between identities and attributes
• Identity Federation
• Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
• SAML and WS-Federation
• Provisioning and authoritative sources

13: Virtualization

• Security concerns for hypervisor architecture
• VM guest hardening, blind spots, VM Sprawl, data comingling, instant-on gaps
• In-Motion VM characteristics that can create a serious complexity for audits
• How can virtual machine communications bypass network security controls
• VM attack surfaces
• Compartmentalization of VMs

14: Security as a Service

•  10 categories
•  Barriers to developing full confidence in security as a service (SECaaS)
•  Deployment of Security as a Service in a regulated industry prior SLA
•  Logging and reporting implications
•  How can web security as a service be deployed
•  What measures do Security as a Service providers take to earn the trust of their customers
•  ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
•  Isolation failure
•  Economic Denial of Service
•  Licensing Risks
•  VM hopping
•  Five key legal issues common across all scenarios
•  Top security risks in ENISA research
•  OVF
•   Underlying vulnerability in Loss of Governance
•   User provisioning vulnerability
•   Risk concerns of a cloud provider being acquired
•   Security benefits of cloud

Bonus Course - Ethical Hacker

Ethical Hacker

The Ethical Hacker course is designed to give students an insight into the highly hands-on world of ethical hacking. It gives ITcertify students experience in network and system penetration testing. It guides the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows- and Kali Linux-based, covering a broad range of examples used by ethical hackers. The total time needed for this course is 33 hours.

In this course, you will learn hands-on penetration testing and hacking skills including:

– Footprinting, scanning, and enumeration
– Vulnerability analysis
– Sniffing and Spoofing
– Social engineering
– Denial of Service
– Web server, web application, and database hacking
– System hacking using various forms of malware and tools
– Wireless network and mobile device hacking
– Evading IDS, Firewalls, and Honeypots
– Cryptography
– Cloud computing and Internet of Things hacking

The topics in this course cover a broad range of ethical hacking concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

Module 1 - Introduction to Ethical Hacking

• 1.1 Information Security Overview
• 1.2 Information Security Threats and Attack Vectors
• 1.3 Hacking Concepts, Types, and Phases
• 1.4 Ethical Hacking Concepts and Scope
• 1.5 Information Security Controls
• 1.6 Penetration Testing Concepts
• 1.7 Information Security Laws and Standards

Module 2 - Footprinting and Reconnaissance.

• 2.1 Footprinting Concepts
• 2.2 Footprinting Methodology
• 2.3 Footprinting Tools
• 2.4 Footprinting Countermeasures
• 2.5 Footprinting Penetration Testing

Module 3 - Network Scanning

• 3.1 Scanning Concepts
• 3.2 Discovery Scans
• 3.3 Port Scans
• 3.4 Nmap
• 3.5 Nmap Stealth Scans
• 3.6 Nmap Options
• 3.7 Hping and Other Scanners
• 3.8 SSDP Scanning
• 3.9 Scanning Beyond IDS and Firewall
• 3.10 Banner Grabbing
• 3.11 Scanning Penetration Testing

Module 4 - Enumeration

• 4.1 Enumeration Concepts
• 4.2 NetBIOS Enumeration
• 4.3 SNMP Enumeration
• 4.4 LDAP Enumeration
• 4.5 NTP Enumeration
• 4.6 SMTP and DNS Enumeration
• 4.7 Enumeration Countermeasures
• 4.8 Enumeration Penetration Testing

Module 5 - Vulnerability Analysis

• 5.1 Vulnerability Assessment Concepts
• 5.2 Vulnerability Assessment Solutions
• 5.3 Vulnerability Scoring Systems
• 5.4 Vulnerability Assessment Tools and Reports

Module 6 - Malware Threats

• 6.1 Introduction to Malware
• 6.2 Trojan Concepts
• 6.3 Virus and Worm Concepts
• 6.4 Malware Reverse Engineering
• 6.5 Malware Detection
• 6.6 Countermeasures
• 6.7 Anti-malware Software
• 6.8 Malware Penetration Testing

Module 7 - Sniffing

• 7.1 Sniffing Concepts
• 7.2 DHCP Attacks
• 7.3 MAC Attacks
• 7.4 ARP Poisoning
• 7.5 DNS Poisoning
• 7.7 Sniffing Tools
• 7.8 Countermeasures
• 7.9 Sniffing Detection Techniques
• 7.10 Sniffing Penetration Testing

Module 8 - Social Engineering

• 8.1 Social Engineering Concepts
• 8.2 Social Engineering Techniques
• 8.3 Impersonation on Social Media Sites
• 8.4 Identity Theft
• 8.5 Social Engineering Countermeasures
• 8.6 Social Engineering Penetration Testing

Module 9 - Denial of Service

• 9.1 DoS/DDoS Concepts
• 9.2 Common DoS/DDoS Attack Techniques
• 9.3 Additional DoS Attack Types
• 9.4 Botnets
• 9.5 DoS Countermeasures
• 9.6 DoS Penetration Testing

Module 10 - Session Hijacking

• 10.1 Session Hijacking Concepts
• 10.2 Browser Session Hijacking
• 10.3 Ways to Compromise a Session Token
• 10.4 Client Side Attacks
• 10.5 Session Hijacking at the Network Level
• 10.6 Session Hijacking Tools
• 10.7 Session Hijacking Countermeasures
• 10.8 Session Hijacking Penetration Testing

Module 11 - Hacking Webservers

• 11.1 Webserver Concepts
• 11.2 Webserver Attacks
• 11.3 Methodology of Webserver Attacks
• 11.4 Webserver Attack Tools
• 11.5 Webserver Attack Countermeasures
• 11.6 Webserver Patch Management
• 11.7 Webserver Security Tools
• 11.8 Webserver Pen Testing

Module 12 - Hacking Web Applications

• 12.1 Web Application Concepts
• 12.2 Web App Vulnerabilities and Exploits
• 12.3 Web Application Threats
• 12.4 Injection Attacks
• 12.5 Hidden Fields and Clickjacking
• 12.6 Cross Site Attacks
• 12.7 Additional Web App Attacks
• 12.8 Web App Hacking Methodology
• 12.9 Web App Hacking Countermeasures
• 12.10 Web App Security Tools
• 12.11 Web Application Pen Testing

Module 13 - SQL Injection

• 13.1 SQL Injection Concepts
• 13.2 Types of SQL Injections
• 13.3 SQL Injection Methodology
• 13.4 SQL Injection Tools
• 13.5 SQL Injection Countermeasures

Module 14 - Hacking Wireless Networks

• 14.1 Wireless Concepts
• 14.2 Wireless Discovery and Mapping
• 14.3 Wi-Fi Sniffers
• 14.4 Wi-Fi Attacks
• 14.5 Wi-Fi Cracking
• 14.6 Wireless Hacking Tools
• 14.7 Bluetooth Hacking
• 14.8 Wireless Hacking Countermeasures
• 14.9 Wireless Security Tools
• 14.10 Wireless Penetration Testing

Module 15 - System Hacking

• 15.1 System Hacking Methodology
• 15.2 Windows System Vulnerabilities and Exploits
• 15.3 Linux System Vulnerabilities and Exploits
• 15.4 Password Cracking Methods
• 15.5 Network Service Password Cracking
• 15.6 Windows Password Cracking
• 15.7 Linux Password Cracking
• 15.8 Password Cracking Tools
• 15.9 Other Methods for Obtaining Passwords
• 15.10 Keylogging
• 15.11 Spyware
• 15.12 Rootkits
• 15.13 Hiding Files
• 15.14 Steganography
• 15.15 Privilege Escalation
• 15.16 Creating and Maintaining Remote Access
• 15.17 Hiding Evidence
• 15.18 System Hacking Penetration Testing

Module 16 - Hacking Mobile Platforms

• 16.1 Mobile Platform Attack Vectors
• 16.2 Hacking Android OS
• 16.3 Rooting Android
• 16.4 Securing Android
• 16.5 Hacking iOS
• 16.6 Jailbreaking iOS
• 16.7 Securing iOS
• 16.8 Hacking Windows Phone OS
• 16.9 Hacking Blackberry
• 16.10 Mobile Device Management
• 16.11 Mobile Security Guidelines and Tools
• 16.12 Mobile Penetration Testing

Module 17 - Evading IDS, Firewalls, and Honeypots

• 17.1 Intrusion Detection
• 17.2 Firewalls
• 17.3 Honeypots
• 17.4 IDS, Firewall, and Honeypot Tools
• 17.5 Evasion
• 17.6 Evasion Countermeasures
• 17.7 IDS/Firewall/ Honeypot Penetration Testing

Module 18 - Crytopgraphy

• 18.1 Cryptography Concepts
• 18.2 Encryption Algorithms
• 18.3 Cryptography Tools
• 18.4 Public Key Infrastructure (PKI)
• 18.5 Email Encryption
• 18.6 Disk Encryption
• 18.7 Cryptography Attacks
• 18.8 Cryptography Penetration Testing

Module 19 - Cloud Computing

• 19.1 Introduction to Cloud Computing
• 19.2 Virtualization
• 19.3 Cloud Computing Threats
• 19.4 Countermeasures to Cloud Computing Threats
• 19.5 Cloud Computing Attacks
• 19.6 Cloud Security
• 19.7 Cloud Security Best Practices
• 19.8 Cloud Penetration Testing

Module 20 - IoT Hacking

• 20.1 IoT Concepts
• 20.2 IoT Vulnerabilities and Attacks
• 20.3 IoT Hacking Methodology and Tools
• 20.4 IoT Hacking Countermeasures
• 20.5 IoT Penetration Testing

Additional information

Package

Cyber Security Practical Experience Programme (PEP) Complete Package

Course Code

Cyber_PEP_COMPLETE

Awarded By

CompTIA, Microsoft and Cisco

Hours

193

Included In Bundles

This is the Cyber Security PEP Complete Bundle

Access

12 Months

Prior courses / experience needed

No previous experience required. Open to everyone

Exam Code

CompTIA A + Exam included 220-1001 and 220-1002 (both parts)

Practise Lab Available

Yes: CompTIA A+ 220-1002, Yes: CompTIA Security+ SY0-501

Part of a Badge with multiple courses

x 11 courses, ITcertify Pro CV Review and 2 x Practise Labs: CompTIA A+ and CompTIA Security + included

Enquire Now

Example of Completion Certificate awarded when each course is finished

The Programme

This Cyber Security Programme gives you full support in the courses, exams, practical experience and CV you need to get you into cyber security. Once you begin your entry level Cyber Security career £25k to £30k you can then certify further by taking either the CompTIA Security + Exam or Cyber Security Analyst Exam (not included) and command a salary of £35k +. Hint: It is worth knowing once you start work with your new employer and prove yourself to them they will want to invest in you and will be able to cover any exams that you will want to take.

Enquire Now

All delivered through our world class learning portal

Navigation and Controls

Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.

Expert instructor led training

Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise

Visual demonstrations and multimedia presentations

Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios

Quizzes and exam simulators

Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.

Flash cards and educational games

ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.

Related Courses

Just some of our clients

Additional information

Package

Cyber Security Practical Experience Programme (PEP) Complete Package

Course Code

Cyber_PEP_COMPLETE

Awarded By

CompTIA, Microsoft and Cisco

Hours

193

Included In Bundles

This is the Cyber Security PEP Complete Bundle

Access

12 Months

Prior courses / experience needed

No previous experience required. Open to everyone

Exam Code

CompTIA A + Exam included 220-1001 and 220-1002 (both parts)

Practise Lab Available

Yes: CompTIA A+ 220-1002, Yes: CompTIA Security+ SY0-501

Part of a Badge with multiple courses

x 11 courses, ITcertify Pro CV Review and 2 x Practise Labs: CompTIA A+ and CompTIA Security + included