Cyber Security Practical Experience Programme (PEP) Freedom Package

Select an option below to show price

/ month for 5 months

Full Payment Discount - £599
Monthly installments - £649 (£129.80 x 5 months interest free)
Clear

cyber security freedom package comptia cyber specialist

Cyber Security Practical Experience Programme (PEP) Freedom Package

Limited Offer £2138, Now £599

Select an option below to show price

/ month for 5 months

Full Payment Discount - £599
Monthly installments - £649 (£129.80 x 5 months interest free)
Clear

Enquire Now

Make an impact immediately

   Nine essential  Cyber Security courses worth £1791

   Cyber Security Practical Experience with two Live Practise Labs worth £198

   Professional CV Consultation worth £149

   Freedom to take the exams of your choice

  All with 2 years access

The Cyber Security PEP Freedom package has been heavily discounted and is specifically designed to meet the growing demands of employers that urgently need to recruit Cyber Security employees.

You will first study CompTIA IT Fundamentals, CompTIA A +, CompTIA Network +, CompTIA Security +, Windows 7 and Windows 10. You'll then take the CompTIA A + Practise Lab and our professional CV consultation so that you can start applying for jobs as a 1st Line Support Technician to begin your career into Cyber Security. We haven't included the exam here so that you have complete freedom in choosing the exam you would like to certify in.

You will then start studying the CompTIA Linux +, CompTIA CySA + and Cisco CCENT and the CompTIA Security + practise Lab so that you can progress your career into a Cyber Security role.

Please note it is not possible to get a job straight away in a Cyber Security role. You will need to start in a 1st Line Support role first to build up the experience. However this package will provide you with everything you need to get into a cyber security role after 2 years of starting the package.

Average Salary Indicator

Start applying for jobs in 5 easy steps

Step 1

Complete the following courses: CompTIA IT Fundamentals +, CompTIA A+, CompTIA Network +, CompTIA Security + Windows 7 and Windows 10 then pass our Mock Tests

Step 2

Complete the CompTIA A+ Practise Lab and our Professional CV consultation so you can apply for jobs

Step 3

Whilst applying for jobs decide which exam you would like to certify in: CompTIA A+, CompTIA Network + or CompTIA Security + (exam cost not included)

Step 4

Whilst you are in your 1st Line support/IT Technician role start studying the CompTIA Linux +, CompTIA CySA +, Cisco CCENT courses and CompTIA Security + Practise Lab

Step 5

Take the CompTIA CySA exam (exam cost not included) to complete your transition from an IT Technician to a Cyber Security Professional and start a career in Cyber Security offering a minimum of £35,000 p.a

Some of the skills you will learn with this Programme

Windows 7 and 10

Installing, Configuring and Migrating Windows 7 and Windows 10 Operating Systems

End User

Complete user management with finding users, unlocking accounts, resetting passwords and being a clear communicator with solutions

Cyber Security

leverage intelligence and threat detection techniques analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents

Security

Implementing and maintaining Network Security issues, Standard and Protocols.

Privacy and Policy

Comprehensive understanding of Privacy issues and Policies essential in every organisation

Enquire Now

Why Practise Labs are essential

Get Hands on Practical Experience

By broadening your understanding and skills in different networks, windows, servers and more with hands on practical experience

Increase productivity

Practise Labs actually increase your study productivity as they allow you to practice what you are studying

Make mistakes and break things

We are firm believers in one of the quickest ways to learn is to put into practice what you have just learnt. A Live Lab allows you to mistakes and learn from them and break things and fix them.

Over 100 Practise Labs available

Covering every area in IT ensures that we have you covered no matter which discipline you want to study in IT

Get your CV seen with the ITcertify Pro CV review service

- 1 hour consultation with a CV Specialist

- Guaranteed AST Robot Proof CV

- Skills Optimisation

- Experience Optimisation

- Layout and Keyword Optimisation

Real examples of Jobs advertised that the Cyber Security PEP Freedom Programme will get you interviews for

Courses included

CompTIA IT Fundamentals Module Outline

The CompTIA IT Fundamentals course is perfect for you if you’re considering a career in IT or if you work in a similar field that requires a broad
understanding of IT, like in a sales role at an IT company. CompTIA IT Fundamentals is a stepping stone to more advanced certifications such
as CompTIA A+, and then to CompTIA Network+ and CompTIA Security+.

The CompTIA IT Fundamentals course focuses on the essential IT skills and knowledge needed by advanced end-users and entry-level IT professionals:

  • Identifying and explaining computer components.
  • Setting up a workstation: including conducting software installations.
  • Establishing network connectivity.
  • Identifying compatibility issues and identifying and preventing security risks.
  • Managing the safety and preventative maintenance of computers.

Module 1 Software

1.1 Course And Instructor Introduction
1.2 Software Operating Systems-Part1
1.3 Software Operating Systems-Part2
1.4 Software Operating Systems-Part3
1.5 Software Operating Systems-Part4
1.6 Software Operating Systems-Part5
1.7 Common File Types-Part1
1.8 Common File Types-Part2
1.9 Software Management Best Practices-Part1
1.10 Software Management Best Practices-Part2
1.11 Alternative Software Technologies
1.12 Basic Software Features And Functions

Module 2 Hardware

2.1 Basic Wired And Wireless Peripherals-Part1
2.2 Basic Wired And Wireless Peripherals-Part2
2.3 Basic Wired And Wireless Peripherals-Part3
2.4 Common Computer Connector Types-Part1
2.5 Common Computer Connector Types-Part2
2.6 Internal Computer Components-Part1
2.7 Internal Computer Components-Part2

Module 3 Security

3.1 Basic Security Threats-Part1
3.2 Basic Security Threats-Part2
3.3 Basic Security Threats-Part3
3.4 Security Best Practices-Part1
3.5 Security Best Practices-Part2
3.6 Web-Browsing Best Practices
3.7 Web-Browsing Best Practices Demo-Part1
3.8 Web-Browsing Best Practices Demo-Part2
3.9 Web-Browsing Best Practices Demo-Part3

Module 4 Networking

4.1 Setup And Configure Basic SOHO Router
4.2 Wireless Router Demo
4.3 Compare And Contrast Cellular Wireless And Wire Data Connections
4.5 Compare And Contrast Different Methods Of Sharing And Storage-Part1
4.6 Compare And Contrast Different Methods Of Sharing And Storage-Part2
4.7 Compare And Contrast Different Methods Of Sharing And Storage-Part3

Module 5 Basic IT Literacy

5.1 Setting Up A Basic Workstation-Part1
5.2 Setting Up A Basic Workstation-Part2
5.3 Setting Up A Basic Workstation Demo-Part1
5.4 Setting Up A Basic Workstation Demo-Part2
5.5 Setting Up A Basic Workstation Demo-Part3
5.6 Basic Methods Of Navigating An Operating System-Part1
5.7 Basic Methods Of Navigating An Operating System-Part2
5.8 Basic Methods Of Navigating An Operating System Demo-Part1
5.9 Basic Methods Of Navigating An Operating System Demo-Part2
5.10 Basic Support Concepts
5.11 Basic Backup Concepts
5.12 Environmental And Safety Concepts-Part1
5.13 Environmental And Safety Concepts-Part2

Module 6 Course Review

6.1 Software Domain Review
6.2 Hardware Domain Review
6.3 Security Domain Review
6.4 Networking Domain Review
6.5 Basic IT Literacy Review
6.6 Course Review Question
6.7 Test Taking Tips
6.8 Course Outro

CompTIA A+ Module Outline

The CompTIA A+ is in two parts Core 1 and Core 2. You must complete Core 1 before you attempt Core 2. This course includes both parts and is the new course which covers the update in 2019. CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting.

CompTIA A+ 220-1002 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.

CompTIA A + 220-1001 Core 1

1.0 – Mobile Devices
• What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile
devices
• 1.5 Given a scenario, connect and configure accessories and ports of other
mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and
application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization
2.0 Networking
• What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO
network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by
networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their
features
• 2.8 Given a scenario, use appropriate networking tools
3.0 Hardware
• What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on
cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a
custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and
settings
• 3.11 Given a scenario, install and maintain various print technologies
4.0 Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization
5.0 Hardware and Network Troubleshooting
• What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while
adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network
problems

CompTIA A + 220-1002 Core 2

Module 1 – Operation Systems
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
Module 2 – Security
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
Module 3 – Software Troubleshooting
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
Module 4 – Operational Procedures
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies

CompTIA Network + Module Outline

The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:

• Networking concepts
• Network infrastructure and deploying common network components
• Network operations and supporting a production network
• Network security concepts and implementing basic network security
• Network troubleshooting

Network Concepts

  • Intro Network Plus N10-007
  • Basic networking
  • Activity basic networking
  • OSI model
  • Exploring the OSI model act
  • Protocol and ports
  • Activity examining protocols and ports
  • Connection oriented vs connectionless
  • Activity comparing TCP and UDP
  • Internet protocol (IP)
  • Activity examining the lower layer protocols
  • Layer 7 remote control protocols
  • Layer 7 file transfer protocols
  • Layer 7 file transfer protocols
  • Layer 7 messaging protocols
  • Activity examining messaging protocols
  • Layer 7 web traffic protocols
  • layer 7 streaming media protocols
  • Layer 7 infrastructure management protocols
  • Switching
  • Activity creating collision and broadcast domains
  • Interface properties and segmentation
  • Activity creating a basic network segment
  • Switching part 2
  • Activity switching
  • Switching loop management
  • Activity managing switching loops
  • VLANs
  • Activity creating VLANs
  • Routing
  • Activity examining ARP
  • IP addressing basics
  • Activity configuring IP
  • Routers
  • Activity setting up a router
  • Routing basics
  • Activity adding static routes
  • VLAN routing
  • Activity routing between VLANs
  • NAT/PAT
  • Activity configuring NAT/PAT
  • Routing protocols
  • Activity configuring a routing protocol
  • Firewalls
  • Activity configuring firewalls
  • Advanced switching and routing concepts
  • Activity exploring IPv6
  • Performance concepts
  • IP addressing
  • Subnetting
  • Activity learning to subnet
  • Address assignments
  • Network types and topologies
  • Wireless topologies
  • Network types
  • Technologies that facilitate the internet of things (IoT)
  • Wireless technologies
  • 802.11 standards
  • Wi-Fi frequencies
  • Wi-Fi antenna concepts
  • Bluetotoh
  • Cellular
  • Activity using an RF spectrum analyzer
  • Cloud concepts
  • Activity exploring cloud services
  • Network services
  • Activity setting up DNS
  • DHCP service
  • Activity setting up DHCP
  • NTP

Infrastructure

  • Infrastructure
  • Activity testing a fiber optic cable
  • Plenum vs. PVC
  • Activity crimping on an RJ-45 connector
  • Transceivers
  • Activity terminating cable to a 110 block
  • Copper cable standards
  • Activity creating a crossover cable
  • Ethernet deployment standards
  • Network device placement and installation
  • Repeater
  • Router
  • Modem
  • Activity setting up a WAP
  • Firewall
  • Media converter
  • Advanced network devices
  • Wireless controller
  • Proxy server
  • Activity configuring proxy settigns
  • VPN concentrator
  • Virtual networking components
  • Network storage types
  • WAN technologies
  • Transmission mediums
  • Activity configuring WAN links
  • Termination

Network Operation

  • Change management
  • IDF-MDF documentation
  • Labeling
  • Logical vs physical diagrams
  • Network operations documentation
  • Rack diagrams
  • Standard operation procedures
  • Using documentation act
  • Wiring and ports locations
  • Continuity and disaster
  • MTTR mean time repair
  • Recovery
  • Backing up your data act
  • Event management
  • Metrics
  • Scanning monitoring patching
  • Testing the network act
  • HTTPS management
  • Out of band management
  • RDP
  • Remote access methods
  • Remote file access
  • making remote connections act
  • SSH
  • VNC
  • Policies and best practices
  • Creating policies and procedures act

Network Security

Physical Security Devices
• Detection
• Prevention
Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot

Network Troubleshooting and Tools

Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
Troubleshoot Wired Connectivity and Performance
• Signal Issues:
• Attenuation
• Latency
• Jitter
• Crosstalk
• EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
• Open/short
• Incorrect pin-out
• Incorrect Cable Type
• Bad Port
• Damaged cable
• Bent pins
• Transceiver Issues:
• Transceiver mismatch
• TX/RX reverse
• Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
• Bottleneck
• VLAN mismatch
• Network connection LED status indicators
Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
• Attenuation
• Reflection
• Refraction
• Absorption
• Latency & Jitter
• Antenna Issues:
• Incorrect antenna type
• Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
• Interference
• Channel overlap
• Overcapacity
• Distance limitations
• Frequency mismatch
• Power levels
• Signal-to-noise ratio
• WAP Misconfiguration:
• Wrong SSID
• Wrong passphrase
• Security type mismatch
• Activity Troubleshooting WAP Issues
Troubleshoot Common Network Service Issues
• Common Network Issues:
• Physical Connectivity
• Incorrect IP Address
• Incorrect Gateway
• Incorrect Netmask
• Names Not Resolving
• Untrusted SSL Certificate
• DCP Issues:
• Duplicate IP Addresses
• Expired IP Address
• Rogue DHCP
• Exhausted DHCP Scope
• Firewall/ACL Issues:
• Blocked TCP/UDP Ports
• Incorrect Host-based Firewall Settings
• Incorrect ACL Settings
• Advanced Network Issues:
• DNS Server Issues
• Duplicate MAC Addresses
• Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue

CompTIA Security + Module Outline

The CompTIA Security+ course will prepare you to become CompTIA Security+ certified. ITcertify covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes with Cryptography and Public Key Infrastructure.

You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company. 

Threats, Attacks, and Vulnerabilities

1.1 Introduction
1.2 Types Of Malware- Part 1
1.3 Types Of Malware- Part 2
1.4 Types Of Attacks- Part 1
1.5 Types Of Attacks- Part 2
1.6 Types Of Attacks- Part 3
1.7 Types Of Attacks- Part 4
1.8 Types Of Attacks- Part 5
1.9 Threat Actors- Part 1
1.10 Threat Actors- Part 2
1.11 Penetration Testing And Vulnerability Scanning- Part 1
1.12 Penetration Testing And Vulnerability Scanning- Part 2
1.13 Impact Of Vulnerabilities- Part 1
1.14 Impact Of Vulnerabilities- Part 2

Technologies and Tools

2.1 Networking Hardware And Software- Part 1
2.2 Networking Hardware And Software- Part 2
2.3 Networking Hardware And Software- Part 3
2.4 Networking Hardware And Software- Part 4
2.5 Networking Hardware And Software- Part 5
2.6 Networking Hardware And Software- Part 6
2.7 Security Assessment- Part 1
2.8 Security Assessment- Part 2
2.9 Troubleshooting Issues- Part 1
2.10 Troubleshooting Issues- Part 2
2.11 Securing Mobile Devices- Part 1
2.12 Securing Mobile Devices- Part 2
2.13 Securing Mobile Devices- Part 3
2.14 Securing Mobile Devices- Part 4
2.15 Secure Protocols- Part 1
2.16 Secure Protocols- Part 2

Architecture and Design

3.1 Secure Network Architecture- Part 1
3.2 Secure Network Architecture- Part 2
3.3 Secure System Designs- Part 1
3.4 Secure System Designs- Part 2
3.5 Secure Staging Deployment Concepts
3.6 Embedded Systems- Part 1
3.7 Embedded Systems- Part 2
3.8 Application Development And Deployment- Part 1
3.9 Application Development And Deployment- Part 2
3.10 Application Development And Deployment- Part 3
3.11 Physical Security Controls- Part 1
3.12 Physical Security Controls- Part 2
3.13 Physical Security Controls- Part 3
3.14 Cloud Virtualization- Part 1
3.15 Cloud Virtualization- Part 2

Identity and Access Management

4.1 Identity And Access Management- Part 1
4.2 Identity And Access Management- Part 2
4.3 Identity And Access Services- Part 1
4.4 Identity And Access Services- Part 2
4.5 Management Controls- Part 1
4.6 Management Controls- Part 2
4.7 Account Management Practices- Part 1
4.8 Account Management Practices- Part 2
4.9 Account Management Practices- Part 3

Risk Management

5.1 Organizational Security- Part 1
5.2 Organizational Security- Part 2
5.3 Business Impact Analysis Concepts- Part 1
5.4 Business Impact Analysis Concepts- Part 2
5.5 Risk Management- Part 1
5.6 Risk Management- Part 2
5.7 Incident Response Procedures- Part 1
5.8 Incident Response Procedures- Part 2
5.9 Forensics- Part 1
5.10 Forensics- Part 2
5.11 Disaster Recovery- Part 1
5.12 Disaster Recovery- Part 2
5.13 Types Of Control- Part 1
5.14 Types Of Control- Part 2
5.15 Data Security And Privacy Practices- Part 1
5.16 Data Security And Privacy Practices- Part 2

Cryptography and PKI

6.1 Cryptographic Basics- Part 1
6.2 Cryptographic Basics- Part 2
6.3 Cryptographic Basics- Part 3
6.4 Cryptographic Algorithms- Part 1
6.5 Cryptographic Algorithms- Part 2
6.6 Wireless Security- Part 1
6.7 Wireless Security- Part 2
6.8 Implementing PKI- Part 1
6.9 Implementing PKI- Part 2
6.10 Implementing PKI- Part 3
6.11 Conclusion

Microsoft 70-680: Configuring Windows 7

This Windows 7 course by Microsoft will help you install, support and maintain a windows 7 operating system which still form a key set of skills for you when working for any organisation. Windows 7, although an older operating system is still present in many companies and as such required for many positions.

Modules 1 - 3

Module 01 Installing,Upgrading and Migrating Windows 7
1.1 Course And Instructor Introduction
1.2 Introducing Windows 7 – Part 1
1.3 Introducing Windows 7- Part 2
1.4 PreInstallation Requirements- Part 1
1.5 PreInstallation Requirements- Part 2
1.6 Installing Windows 7- Part 1
1.7 Installing Windows 7- Part 2
1.8 Upgrading Windows 7
1.9 Migrating Windows7

Module 02 Deploying Windows 7 in the Enterprise
2.1 Overview Of Image Based Installations- Part 1
2.2 Overview Of Image Based Installations- Part 2
2.3 Overview Of Image Based Installations Demo
2.4 Capturing System Images-Part 1
2.5 Capturing System Images-Part 2
2.6 Capturing System Images-Part 3
2.7 Preparing Images For Deployment- Part1
2.8 Preparing Images For Deployment- Part2
2.9 Working With User State
2.10 Working With Virtual Drives
2.11 Activating Windows7

Module 03 Enterprise Management in Windows 7
3.1 Automating Management Using Group Policy-Part1
3.2 Automating Management Using Group Policy-Part2
3.3 Automating Management Using Group Policy-Part3
3.4 Using Windows Powershell2.0- Part1
3.5 Using Windows Powershell2.0- Part2
3.6 Using Windows Powershell2.0- Part3

Modules 4 - 6

Module 04 Configuring Hardware and Applications
4.1 WorkingWithDeviceDrivers-Part1
4.2 WorkingWithDeviceDrivers-Part2
4.3 WorkingWithHardDisks-Part1
4.4 WorkingWithHardDisks-Part2
4.5 ConfiguringApplicationCompatiblty
4.6 ConfiguringInternetExplorer-Part1
4.7 ConfiguringInternetExplorer-Part2
4.8 ConfiguringApplicationRestrictions
Module 05 Configuring Network Connectivity
5.1 Configuring TCP/IP-Part1
5.2 Configuring TCP/IP-Part2
5.3 IP Address Assignment-Part1
5.4 IP Address Assignment-Part2
5.5 Name Resolution Services-Part1
5.6 Name Resolution Services-Part2
5.7 Wireless Networking-Part1
5.8 Wireless Networking-Part2
5.9 Remote Management
5.10 Troubleshooting Connectivity Issues
Module 06 Configuring Access to Resources
6.1 Authentication And Authorization
6.2 Managing Access To Files Using NTFS
6.3 Managing Sharing
6.4 Managing Shared Printers
6.5 Configuring Branch Cache

Modules 7 - 10

Module 07 Configuring Mobile Computing
7.1 Configuring Mobile Computer And Device Settings-Part1
7.2 Configuring Mobile Computer And Device Settings-Part2
7.3 Configuring Remote Access-Part1
7.4 Configuring Remote Access-Part2
Module 08 Configuring Security Options
8.1 User Account Control
8.2 Encrypting File Systems
8.3 Bit Locker Drive Encryption-Part1
8.4 Bit Locker Drive Encryption-Part2
8.5 Network Access Protection
8.6 Windows Firewall With Advanced Security
8.7 Configuring Anti-Malware
8.8 Auditing Network Access
Module 09 Monitoring And Maintaining Systems
9.1 Configuring Windows Updates
9.2 Event Monitoring
9.3 Performance Monitoring
MICROSOFT 70-680 TS: CONFIGURING WINDOWS 7
Module 10 Configuring Backup and Recovery Options
10.1 Troubleshooting Startup Issues
10.2 Using Windows Backup
10.3 Using System Restore
10.4 Course Outro

Microsoft 70-697: Configuring Windows Devices Windows 10

The Windows 10 course will equip you building solid identities, protection of content (data loss protection), mobile device management policy, virtualization with Hyper-V, application management using the Company Portal and the Windows Store. You’ll also understand Windows 10 security and integrated Azure features as well as below:

– Manage identity in Windows 10
– Plan Windows 10 desktop and device deployment
– Plan and implement a Microsoft 365 solution
– Configure Windows 10 networking and storage
– Manage data access and protection
– Manage remote access, apps and updates and recovery

Modules 1 - 3

Module 1: Introducing Windows 10
– Course Introduction
– What Makes Windows 10 Different
– Overview Of Windows 10 Features
– Navigating And Using Windows 10-Part1
– Navigating And Using Windows 10-Part2
Module 2: Installing Windows 10
– Preparing For Installation
– Installation Options
– Upgrading And Migrating-Part1
– Upgrading And Migrating-Part2
Module 3: Configuring Devices
– Overview Of Configuration Tools
– Common Configuration Options
– Managing User Accounts-Part1
– Managing User Accounts-Part2
– Using Control Panel
– Using Windows Administration Tools-Part1
– Using Windows Administration Tools-Part2
-Using Windows PowerShell-Part1
– Using Windows PowerShell-Part2

Modules 4 - 6

Module 4: Configuring Network Connectivity
– TCP IP Network Connectivity-Part1
– TCP IP Network Connectivity-Part2
– TCP IP Network Connectivity-Part3
– Name Resolution
– Wireless
– Remote Access Overview-Part1
– Remote Access Overview-Part2
– Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
– Managing Hard Disks-Part1
– Managing Hard Disks-Part2
– Managing Hard Disks-Part3
– Creating And Managing Storage Spaces
– Overview Of Data Access
– Configuring And Managing File Access
– Managing Shared Folder
– Understanding Work Folder
– Managing Printers
Module 6: Managing Apps
– Installing And Configuring Applications
– Managing Apps From The Windows Store
– Managing Microsoft Edge Web Browser

Modules 7 - 10

Module 7: Managing Device Security
– Configuring Network Security-Part1
– Configuring Network Security-Part2
– Configuring Local Security
– Configuring Data Security-Part1
– Configuring Data Security-Part2
– Configuring Device Security
Module 8: Maintaining Windows 10
– Updating Windows 10
– Monitoring And Optimizing Windows 10-Part1
– Monitoring And Optimizing Windows 10-Part2
Module 9: Troubleshooting And Recovery
– Managing Devices And Drives
– Recovery Files
– Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
– Overview Of Image Based Deployment
– Automating Installations
– Windows Activation

Modules 11 - 13

Module 11: Managing User Profiles And User State
Virtualization
– Managing User Profiles-Part1
– Managing User Profiles-Part2
– User State Virtualization
– User Profile Migration
Module 12: Managing Desktop And Application Settings
Using Group policy
– Using Group Policy To Manage Windows 10 Devices-Part1
– Using Group Policy To Manage Windows 10 Devices-Part2
– Using Group Policy To Manage Windows 10 Devices-Part3
– Using Group Policy To Manage Windows 10 Devices-Part4
– Using Group Policy To Manage Applications-Part1
– Using Group Policy To Manage Applications-Part2
Module 13: Configuring And Managing Client Hyper-V
– Introduction To Client Hyper-V
– Creating Virtual Machines
– Managing Virtual Machine Storage And Snapshot
– Conclusion

CompTIA Linux + Module Outline

CompTIA Linux+ validates the competencies required of an early career system administrator supporting Linux systems. Here you will learn how to be able to perform maintenance tasks with the command line, install & configure a workstation and be able to configure a basic network

Intro and Instructions

Intro

1. Introduction

2. Introduction to Building Labs

3. Things You Need To Do

4. Install Demo Virtual Box

Instructions 

1. Navigation

2. Commands with Lab Demo

3. Internal and External Commands

4. Overview of Shell Commands Tricks

5. Exploring Shell Configuration

6. Stream Redirection

7. Overview of Processing Text Using Filters

8. Overview File-Viewing Commands

9. Overview Using Grep

10. Syntax and Summary

11. Overview of Exam Essentials

Managing Software and Configuring hardware

2.1 Managing Software
2.2 Overview Using RPM
2.3 RPM Part 2
2.4 Overview Using Cpio
2.5 Overview Using Debian and Apt_cache
2.6 Using Apt-get
2.7 Debian Tools
2.8 Managing Shared Libraries
2.9 Overview Locating Library Files
2.10 Foreground and Background Processes
2.11 Managing Software Summary

3.1 Configuring Hardware
3.2 Configuring Devices
3.3 Configuring USB
3.4 Configuring Hard Disk
3.5 Designing Hard Disk Layout
3.6 Logical Volume Management
3.7 Creating Partitions Filesystems
3.8 Overview Using Fdisk
3.9 Overview Common Filesystem Types
3.10 Creating Filesystem
3.11 Maintaining Filesystem Health
3.12 Configuring Hardware Summary

Managing Files and Booting Files

4.1 Managing Files
4.2 File Archiving Commands
4.3 Managing Files Ownership
4.4 Managing Disk Quotas
4.5 Directories and Content
4.6 Overview Tools for Locating Files
4.7 Overview of Exam Essentials

5.1 Booting Linux and Editing Files
5.2 Boot and Reboot
5.3 Understanding the Boot Process
5.4 Runlevels Process
5.5 Managing Runlevel Services
5.6 Editing with Vi
5.7 Booting Summary

X and Admin

6.1 X Windows Systems
6.2 X Configuration Options
6.3 X Configuration Options part 2
6.4 Configuring X Fonts
6.5 Configuring Xft Fonts
6.6 Overview Managing GUI Logins
6.7 Using X for Remote Access
6.8 X Accessibility
6.9 Addition Assistive Technologies
6.10 Configuring Localization and Internationalization
6.11 Querying and Setting Your Locale
6.12 Configuring Printing
6.13 Configuring Printing part 2
6.14 Using Web-based CUPS Utilities

7.1 Administering
7.2 Directly Modifying Account Configuration
7.3 Components of Account
7.4 Adding Groups
7.5 Tuning User and System Environments
7.6 Reviewing Log File Contents
7.7 Maintaining System Time
7.8 Admin Summary

Basic Networking and Scripts

8.1 Basic Networking
8.2 Network Addressing
8.3 Network Addressing Part 2
8.4 DNS Data Flow Zone and Resolution
8.5 Network Ports
8.6 Connections
8.7 Testing Connectivity
8.8 Wireshark Demo
8.9 Basic Networking Summary

9.1 Scripts E-mail and Databases
9.2 Writing Scripts
9.3 Writing Scripts Part 2
9.4 Managing E-mail
9.5 Managing Data with SQL
9.6 Advantages of Database
9.7 Scripts Summary

Security

10.1 Security
10.2 Controlling Access Via TCP Wrappers
10.3 Configuring Xinetd
10.4 Uninstalling Or Reconfiguring Servers
10.5 Tools for Managing Passwords
10.6 Configuring SSH
10.7 SSH Keys
10.8 Controlling SSH Access
10.9 Using GPG
10.10 Security Summary

CompTIA Cyber Security Analyst CySA +

The CompTIA Cyber Security Analyst CySA+ focuses on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’s applications and systems.
The CompTIA Cyber Security Analyst CySA+ is a vendor neutral certification that expects three to four years of experience in a related field as well as a Security+ or equivalent knowledge.
The CompTIA Cyber Security Analyst CySA+ lies between the CompTIA Security + as well as the CompTIA Advanced Security Practitioner (CASP) exams and is an excellent go between to tackle before diving into the CASP, but when the Security+ isn’t enough.
Here you will gain an understanding of security best practices and protocols beyond that which is provided by the CompTIA Security + and will prove a level of expertise beyond that of basic security practices that are followed when using a computer. This allows any employee to prove a better understanding of enterprise security practices, and the necessary tools needed to protect a company network. The modules of this course align with the official objects of the certification and will expand past the scope of the certification to provide real life examples.

Threat Management

Module 1: Threat Management
1.1 Introduction
1.2 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 1
1.3 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes
1.4 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes
1.5 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 4
1.6 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 5
1.7 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 6
1.8 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 7
1.9 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 8
1.10 Given a scenario, apply environmental reconnaissance
techniques using appropriate tools and processes Part 9
1.11 Given a scenario, analyze the results of a network
reconnaissance Part 1
1.12 Given a scenario, analyze the results of a network
reconnaissance Part 2
1.13 Given a scenario, analyze the results of a network
reconnaissance Part 3
1.14 Given a scenario, analyze the results of a network
reconnaissance Part 4
1.15 Given a scenario, analyze the results of a network
reconnaissance Part 5
1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
1.20 Explain the purpose of practices used to secure a corporate environment Part 1
1.21 Explain the purpose of practices used to secure a corporate environment Part 2
1.22 Explain the purpose of practices used to secure a corporate environment Part 3
1.23 Explain the purpose of practices used to secure a corporate environment Part 4

Vulnerability Management

2.1 Given a scenario, implement an information security
vulnerability management process Part 1
2.2 Given a scenario, implement an information security
vulnerability management process Part 2
2.3 Given a scenario, implement an information security
vulnerability management process Part 3
2.4 Given a scenario, implement an information security
vulnerability management process Part 4
2.5 Given a scenario, implement an information security
vulnerability management process Part 5
2.6 Given a scenario, implement an information security
vulnerability management process Part 6
2.7 Given a scenario, implement an information security
vulnerability management process Part 7
2.8 Given a scenario, analyze the output resulting from a
vulnerability scan Part 1
2.9 Given a scenario, analyze the output resulting from a
vulnerability scan Part 2
2.10 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 1
2.11 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 2
2.12 Compare and contrast common vulnerabilities found in
the following targets within an organization Part 3

Cyber Incident Response

3.1 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 1
3.2 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 2
3.3 Given a scenario, distinguish threat data or behavior to
determine the impact of an incident Part 3
3.4 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 1
3.5 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 2
3.6 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 3
3.7 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 4
3.8 Given a scenario, prepare a toolkit and use appropriate
forensic tools during an investigation Part 5
3.9 Explain the importance of communications during the
incident response process
3.10 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 1
3.11 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 2
3.12 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 3
3.13 Given a scenario, analyze common symptoms to select
the best course of action to support incident response Part 4
3.14 Summarize the incident recovery and post-incident response process Part 1
3.15 Summarize the incident recovery and post-incident response process Part 2
3.16 Summarize the incident recovery and post-incident response process Part 3
3.17 Summarize the incident recovery and post-incident response process Part 4

Security Architecture and Tool Sets

4.1 Explain the relationship between frameworks, common
policies, controls, and procedures Part 1
4.2 Explain the relationship between frameworks, common
policies, controls, and procedures Part 2
4.3 Explain the relationship between frameworks, common
policies, controls, and procedures Part 3
4.4 Explain the relationship between frameworks, common
policies, controls, and procedures Part 4
4.5 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 1
4.6 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 2
4.7 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 3
4.8 Given a scenario, use data to recommend remediation of
security issues related to identity and access management
Part 4
4.9 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 1
4.10 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 2
4.11 Given a scenario, review security architecture and make
recommendations to implement compensating controls Part 3
4.12 Given a scenario, use applications security best practices
while participating in the Software Development Life Cycle
(SDLC) Part 1
4.13 Given a scenario, use applications security best practices
while participating in the Software Development Life Cycle
(SDLC) Part 2
4.14 Overview
4.15 Conclusion

CISCO Certified Entry Network Technician CCENT

The CCENT course is the first step in ultimately achieving the CCNA Routing and Switching Certification. Here you will develop skills installing, configuring, and troubleshooting small networks as well as working with Cisco routers and switches which form the heart of any IT Network career

Module 1 Networking Fundamentals

1.1 Introduction

1.2 Introduction To TCPIP Networking Part 1

1.3 Introduction To TCPIP Networking Part 2

1.4 Introduction To TCPIP Networking Part 3

1.5 Introduction To TCPIP Networking Part 4

1.6 Ethernet LAN Fundamentals Part 1

1.7 Ethernet LAN Fundamentals Part 2

1.8 Ethernet LAN Fundamentals Part 3

1.9 Wide Area Networks Part 1

1.10 Wide Area Networks Part 2

1.11 IPv4 Addressing And Routing Fundamentals Part 1

1.12 IPv4 Addressing And Routing Fundamentals Part 2

1.13 IPv4 Addressing And Routing Fundamentals Part 3

1.14 TCPIP Transport And Applications Part 1

1.15 TCPIP Transport And Applications Part 2

Module 2 - Basic Ethernet LAN Implementation

2.1 Command Line Essentials Part 1

2.2 Command Line Essentials Part 2

2.3 Command Line Essentials Part 3

2.4 Ethernet LAN Switching

2.5 Managing Ethernet Switches Part 1

2.6 Managing Ethernet Switches Part 2

2.7 Configuring Switch Interfaces

Module 3 - Designing Ethernet LANS

3.1 Understanding LAN Design Options Part 1

3.2 Understanding LAN Design Options Part 2

3.3 Understanding LAN Design Options Part 3

3.4 Implementing And Configuring Ethernet VLANS Part 1

3.5 Implementing And Configuring Ethernet VLANS Part 2

Module 4 - Understanding IPv4

4.1 IPv4 Subnetting Part 1

4.2 IPv4 Subnetting Part 2

4.3 IPv4 Subnetting Part 3

4.4 IPv4 Subnetting Part 4

4.5 Analyzing Classful IPv4 Networks Part 1

4.6 Analyzing Classful IPv4 Networks Part 2

4.7 Analyzing Classful IPv4 Networks Part 3

4.8 Analyzing Subnet Masks Part 1

4.9 Analyzing Subnet Masks Part 2

4.10 Analyzing existing Subnets

Module 5 - Working with Cisco Routers

5.1 Implementing IPv4 Part 1
5.2 Implementing IPv4 Part 2
5.3 Configuring IPv4 Address And Static Routes Part 1
5.4 Configuring IPv4 Address And Static Routes Part 2
5.5 Configuring IPv4 Address And Static Routes Part 3
5.6 Using Dynamic Routing Protocols Part 1
5.7 Using Dynamic Routing Protocols Part 2
5.8 Configuring IPv4 Hosts Part 1
5.9 Configuring IPv4 Hosts Part 2

Module 6 - IPv4 Design and Troubleshooting

6.1 Designing IP Subnets Part 1

6.2 Designing IP Subnets Part 2

6.3 Using VLAN Part 1

6.4 Using VLAN Part 2

6.5 Troubleshooting IPv4

Module 7 - IPv4 Design and Troubleshooting

7.1 Access Control Lists Part 1

7.2 Access Control Lists Part 2

7.3 Access Control Lists Part 3

7.4 Access Control Lists Part 4

7.5 Network Address Translation Part 1

7.6 Network Address Translation Part 2

Module 8 - Implementing IPv6

8.1 IPv6 Fundamentals Part 1

8.2 IPv6 Fundamentals Part 2

8.3 IPv6 Fundamentals Part 3

8.4 IPv6 Fundamentals Part 4

8.5 IPv6 Addressing And Subnetting Part 1

8.6 IPv6 Addressing And Subnetting Part 2

8.7 Implementing IPv6 Part 1

8.8 Implementing IPv6 Part 2

8.9 Implementing IPv6 Part 3

8.10 Implementing IPv6 Part 4

8.11 Course Conclusion

Additional information

Package

Cyber Security Practical Experience Programme (PEP) Freedom Package

Course Code

Cyber _PEP_Free

Awarded By

CompTIA, Microsoft and Cisco

Hours

183

Included In Bundles

This is the Cyber Security PEP Freedom Bundle, This is the PEP Complete Bundle

Access

2 years

Prior courses / experience needed

No previous experience required. Open to everyone

Exam Code

Exam of your choice to be taken in your own time

Practise Lab Available

Yes: CompTIA A+ 220-1002, Yes: CompTIA Security+ SY0-501

Part of a Badge with multiple courses

x 9 courses, ITcertify Pro CV Review and 2 x Practise Labs: CompTIA A+ and CompTIA Security + included

Enquire Now

Example of Completion Certificate awarded when each course is finished

The two year programme

This two year programme will provide you with everything you need short, medium and long term:
IT Technician Role Year 1
Courses, CV and Practical Experience to get an IT Technician role with the flexibility of purchasing the exam you want
Cyber Security Role Year 2
Courses and Practical Experience to go from an IT Technician role to a Cyber Security Role with the flexibility of purchasing the exam you want

Enquire Now

All delivered through our world class learning portal

Navigation and Controls

Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.

Expert instructor led training

Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise

Visual demonstrations and multimedia presentations

Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios

Quizzes and exam simulators

Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.

Flash cards and educational games

ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.

Related Courses

Just some of our clients

Additional information

Package

Cyber Security Practical Experience Programme (PEP) Freedom Package

Course Code

Cyber _PEP_Free

Awarded By

CompTIA, Microsoft and Cisco

Hours

183

Included In Bundles

This is the Cyber Security PEP Freedom Bundle, This is the PEP Complete Bundle

Access

2 years

Prior courses / experience needed

No previous experience required. Open to everyone

Exam Code

Exam of your choice to be taken in your own time

Practise Lab Available

Yes: CompTIA A+ 220-1002, Yes: CompTIA Security+ SY0-501

Part of a Badge with multiple courses

x 9 courses, ITcertify Pro CV Review and 2 x Practise Labs: CompTIA A+ and CompTIA Security + included