SKU: comptia-csis Category:

CompTIA Secure Infrastructure Specialist (CSIS)

$139.00

The CompTIA CSIS is a stackable certification by CompTIA. It is designed for IT professionals with 0 to 2 years of experience. The ITU Certification Path for the CompTIA CSIS certification consists of the learning materials to allow you to study for and pass the CompTIA A+, CompTIA Network+ and CompTIA Security+ exams.

Get an exceptional deal on this course at a lower price.  View our Master CompTIA Training Series which includes this course.

Completing this path and passing the four exams means you end of with three CompTIA certifications and are a designated a CompTIA Secure Infrastructure Specialist (CSIS). The three courses contained in this path are:

About The Exams for CompTIA CSIS

For the CompTIA A+ certification, you must pass two exams. The current exams for CompTIA A+ are:

For CompTIA Network+ certification, you are required to pass one exam:

For CompTIA Security+ certification, you are required to pass one exam:

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSIS certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

Course Outline

Module 1: Threats, Attacks and Vulnerabilities
  •  Module 1 Workbook
  •  Introduction
  •  Types Of Malware-Part 1
  •  Types Of Malware-Part 2
  •  Types Of Attacks-Part 1
  •  Types Of Attacks-Part 2
  •  Types Of Attacks-Part 3
  •  Types Of Attacks-Part 4
  •  Types Of Attacks-Part 5
  •  Threat Actors-Part 1
  •  Threat Actors-Part 2
  •  Penetration Testing And Vulnerability Scanning-Part 1
  •  Penetration Testing And Vulnerability Scanning-Part 2
  •  Impact Of Vulnerabilities-Part 1
  •  Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  •  Module 2 Workbook
  •  Networking Hardware And Software-Part 1
  •  Networking Hardware And Software-Part 2
  •  Networking Hardware And Software-Part 3
  •  Networking Hardware And Software-Part 4
  •  Networking Hardware And Software-Part 5
  •  Networking Hardware And Software-Part 6
  •  Security Assessment-Part 1
  •  Security Assessment-Part 2
  •  Troubleshooting Issues-Part 1
  •  Troubleshooting Issues-Part 2
  •  Securing Mobile Devices-Part 1
  •  Securing Mobile Devices-Part 2
  •  Securing Mobile Devices-Part 3
  •  Securing Mobile Devices-Part 4
  •  Secure Protocols-Part 1
  •  Secure Protocols-Part 2
Module 3: Architecture and Design
  •  Module 3 Workbook
  •  Secure Network Architecture-Part 1
  •  Secure Network Architecture-Part 2
  •  Secure System Designs-Part 1
  •  Secure System Designs-Part 2
  •  Secure Staging Deployment Concepts
  •  Embedded Systems-Part 1
  •  Embedded Systems-Part 2
  •  Application Development And Deployment-Part 1
  •  Application Development And Deployment-Part 2
  •  Application Development And Deployment-Part 3
  •  Physical Security Controls-Part 1
  •  Physical Security Controls-Part 2
  •  Physical Security Controls-Part 3
  •  Cloud Virtualization-Part 1
  •  Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  •  Module 4 Workbook
  •  Identity And Access Management-Part1
  •  Identity And Access Management-Part2
  •  Identity And Access Services-Part1
  •  Identity And Access Services-Part2
  •  Management Controls-Part1
  •  Management Controls-Part2
  •  Account Management Practices-Part1
  •  Account Management Practices-Part2
  •  Account Management Practices-Part3
Module 5: Risk Management
  •  Module 5 Workbook
  •  Organizational Security-Part1
  •  Organizational Security-Part2
  •  Business Impact Analysis Concepts-Part1
  •  Business Impact Analysis Concepts-Part2
  •  Risk Management-Part1
  •  Risk Management-Part2
  •  Incident Response Procedures-Part1
  •  Incident Response Procedures-Part2
  •  Forensics-Part1
  •  Forensics-Part2
  •  Disaster Recovery-Part1
  •  Disaster Recovery-Part2
  •  Types Of Control-Part1
  •  Types Of Control-Part2
  •  Data Security And Privacy Practices-Part1
  •  Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  •  Module 6 Workbook
  •  Cryptographic Basics-Part1
  •  Cryptographic Basics-Part2
  •  Cryptographic Basics-Part3
  •  Cryptographic Algorithms-Part1
  •  Cryptographic Algorithms-Part2
  •  Wireless Security-Part1
  •  Wireless Security-Part2
  •  Implementing PKI-Part1
  •  Implementing PKI-Part2
  •  Implementing PKI-Part3
  •  Conclusion
CompTIA Secure Infrastructure Specialist (CSIS)

This Certification Path will enable you to study to obtain the CompTIA CSIS designation.


Save For Later
Add to Wishlist