CompTIA Secure Infrastructure Specialist (CSIS) - ITU Online

Your Last Chance for Lifetime Learning!  Elevate your skills forever with our All-Access Lifetime Training. 
Only $249! Our Lowest Price Ever!

Days
Hours
Minutes
Seconds

CompTIA Secure Infrastructure Specialist (CSIS)

The CompTIA CSIS is a progressive certification in the IT field that was crafted by CompTIA. It is ideal for those with 0-2 years of experience who are looking to upskill. At ITU, we offer an extensive Certification Path which comes bundled with educative materials and preparing you to pass the three exams;CompTIA A+, Comptia Network+ and Comptia Security+.

Included In This Course

Included In This Course

Total Hours
104  Training Hours
CompTIA Secure Infrastructure Specialist (CSIS)
478 On-demand Videos
Closed Caption

Closed Captions

Course Topics
54  Topics
Prep Questions
824 Prep Questions
CompTIA Secure Infrastructure Specialist (CSIS)

Certificate of Completion

Course Description

You can get these courses and more in our  Master CompTIA Certification training series.  The Master CompTIA training series contains 12 courses and is available for a limited time at an exceptionally low price.  Now on sale for a limited time.  Get serious about your training and elevate your career!

The CompTIA CSIS is a stackable certification by CompTIA. It is designed for IT professionals with 0 to 2 years of experience. The ITU Certification Path for the CompTIA CSIS certification consists of the learning materials to allow you to study for and pass the CompTIA A+, CompTIA Network+ and CompTIA Security+ exams.

Special Offer!Take advantage of this incredible offer and get this IT course and more with our  Master CompTIA Training Series that contains 12 courses

About CompTIA Stackable Certifications

They are an excellent way to progress in your career and acquire the necessary qualifications you need. Not only does this program provide guidance on how to master particular skills, but it also respects that everyone’s journey is different. We have divided our pathways into three distinct categories:

  • Specialist: IT professionals who have just started their careers and have 0-2 years of experience
  • Professional: For those IT professionals with 2-5 years of experience, there are numerous opportunities to advance in the field.
  • Expert: IT professionals who have mastered the field and boast at least five years of experience.

Completing this path and passing the four exams means you end of with three CompTIA certifications and are a designated a CompTIA Secure Infrastructure Specialist (CSIS). The three courses contained in this path are:

  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+

About The Exams for CompTIA CSIS

For the CompTIA A+ certification, you must pass two exams. The current exams for CompTIA A+ are:

For CompTIA Network+ certification, you are required to pass one exam:

For CompTIA Security+ certification, you are required to pass one exam:

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSIS certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

Frequently Asked Questions About CompTIA Secure Infrastructure Specialist (CSIS)

What is the CompTIA Secure Infrastructure Specialist (CSIS) certification?

The CompTIA CSIS is a progressive certification in the IT field. It is designed for IT professionals with 0 to 2 years of experience. CSIS certification holders have the knowledge and skills required to support hardware and software systems, and protect an organization’s assets from internal and external threats.

What is included in the ITU Online training for the CompTIA CSIS certification?

The ITU Online training for the CompTIA CSIS certification includes 103 training hours, 469 videos, 55 topics, and 824 practice questions. The training prepares you to pass the CompTIA A+, CompTIA Network+, and CompTIA Security+ exams, which are necessary for the CSIS certification.

How can I access the CompTIA CSIS training on ITU Online?

You can access the training through the All Access Monthly Subscription. This subscription not only gives you access to the CompTIA CSIS training but also to over 2,500 hours of on-demand content. You can start a 7-day free trial with no obligation, and you can cancel at any time​.

What are the key skills covered in the CompTIA CSIS certification?

The CSIS certification covers skills in various areas including access control, cloud networking, cryptography, hardware configuration, help desk, Linux, Mac support, mobile device support, network management, network security, operating systems, routing and switching, software troubleshooting, system backup and recovery, technical support, and virtualization.

What are the prerequisites for the CompTIA CSIS certification?

To earn the CompTIA CSIS certification, you need to pass three exams: CompTIA A+ ce Certification, CompTIA Network+ ce Certification, and CompTIA Security+ ce Certification.

Is the CompTIA CSIS certification suitable for beginners in the IT field?

Yes, the CompTIA CSIS certification is ideal for individuals with 0-2 years of experience in the IT field. It is a progressive certification that helps these professionals upskill and secure their infrastructure​.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Course Outline

CompTIA A+ 220-1101 (Core 1) Course Content

Module 1 - Devices, Setups, and Installs

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Appropriate Safety Procedures

  •    1.3 PC Components

  •    1.4 Guidlines for PC Disassembly

  •    1.5 Motherboards

  •    1.6 CPU Sockets

  •    1.7 PCI Bus

  •    1.8 Storage Bus (SATA and IDE)

  •    1.9 Discussing PC Components

  •    1.10 Common Connection Interfaces

  •    1.11 Wired and Wireless Connection Standards

  •    1.12 Install Peripheral Devices

  •    1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices

  •    2.1 Displays and Multimedia

  •    2.2 Display Device Connections and Cables

  •    2.3 Discussing Display Device Installation and Configuration

  •    2.4 Troubleshoot Display Devices

  •    2.5 Guidelines for Troubleshooting Display Devices

  •    2.6 Discussing Display Device Troubleshooting

  •    2.7 Install and Configure Multimedia Devices

  •    2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types

  •    3.1 Supporting Multiple Drive Types and Memory

  •    3.2 Memory Types

  •    3.3 RAM Types

  •    3.4 Memory Modules

  •    3.5 DIMM and SO-DIMM Technologies

  •    3.6 Parity and ECC RAM

  •    3.7 Memory Compatibility Issues

  •    3.8 Discussing System Memory Installation

  •    3.9 Install and Configure Mass Storage Devices

  •    3.10 Storage Adapters and Cables

  •    3.11 Solid State Drives

  •    3.12 Guidlines for Installing Mass Storage Devices

  •    3.13 Discussing Mass Storage Device Installation and Configuration

  •    3.14 Install and Configure Removable Storage

  •    3.15 Discussing Removable Storage Device Istallation and Configuration

  •    3.16 Configure RAID

  •    3.17 RAID Configuration Options

  •    3.18 Discussing RAID Configuration

  •    3.19 Troubleshoot Storage Devices

  •    3.20 Boot Failures

  •    3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components

  •    4.1 Install Upgrade CPUs

  •    4.2 Multiprocessing and Multicore Processors

  •    4.3 Discussing CPU Upgrades

  •    4.4 Configure and Update BIOS UEFI

  •    4.5 Discussing BOIS-UEFI Configuration and Updates

  •    4.6 Install Power Supplies

  •    4.7 Discussing Power Supply Installation

  •    4.8 Troubleshoot Internal System Components

  •    4.9 POST and Boot Problems

  •    4.10 Boot Troubleshooting and Log Entries

  •    4.11 Motherboard Component Problems

  •    4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories

  •    5.1 Wired Networks

  •    5.2 Common Ethernet Network Implementations

  •    5.3 Taps and Mirrors

  •    5.4 Discussing Wired Networks

  •    5.5 Network Hardware Devices

  •    5.6 Switches

  •    5.7 Power Over Ethernet

  •    5.8 Discussing Network Hardware Devices

  •    5.9 Wireless Networks

  •    5.10 Access Points and Wireless Network Modes

  •    5.11 Discussing Wireless Networks

  •    5.12 Internet Connection Types

  •    5.13 Wireless Internet Service Providers WISP

  •    5.14 Discussing Internet Connection Types

  •    5.15 Network Configuration Concepts

  •    5.16 The TCIP-IP Protocol Suite

  •    5.17 Internet Protocol and IP Addressing

  •    5.18 Public and Private IP Addresses

  •    5.19 IPv6

  •    5.20 Discussing Network Configuration Concepts

  •    5.21 Network Services

  •    5.22 DNS

  •    5.23 Dynamic and Static IP Configurations

  •    5.24 DNS Records MX and A

  •    5.25 Web Servers and HTTP-HTTPS

  •    5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics

  •    6.1 Configuring and Troubleshooting Networks

  •    6.2 Network Connections in Windows

  •    6.3 Install and Configure SOHO Networks

  •    6.4 Configure SOHO Network Security

  •    6.5 Firewalls

  •    6.6 Port Fowarding and Port Triggering

  •    6.7 Windows Firewall

  •    6.8 Network Security and Embedded Appliances

  •    6.9 Configure Remote Access

  •    6.10 Discussing Remote Access Configuration

  •    6.11 Troubleshoot Network Connections

  •    6.12 IP Configuration Issues

  •    6.13 Routing Issues

  •    6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing

  •    7.1 Configure Client-Side Virtulaization

  •    7.2 Hypervisors

  •    7.3 Processor Support and Resource Requirements

  •    7.4 Virtual Networks

  •    7.5 Client-Side Virtualization

  •    7.6 Cloud Computing Concepts

  •    7.7 Internal and External Shared Resources

  •    7.8 Cloud Service Options

  •    7.9 Virtual Desktops

  •    7.10 Software-Defined Networking (SDN)

  •    7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting

  •    8.1 Use Laptop Features

  •    8.2 Expansion Options

  •    8.3 Discussing Laptop Features

  •    8.4 Install and Configure Laptop Hardware

  •    8.5 Discussing Laptop Hardware Installation and Configuration

  •    8.6 Troubleshoot Common Laptop Issues

  •    8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices

  •    9.1 Syncing and Setup of Mobile Devices

  •    9.2 Connect and Configure Mobile Devices

  •    9.3 Configure Mobile Device Network Connectivity

  •    9.4 Mobile VPN Configuration

  •    9.5 Email Configuration Options

  •    9.6 Discussing Mobile Device Network Connectivity Configuration

  •    9.7 Support Mobile Apps

  •    9.8 Discussing Mobile App Support

Module 10 - All Things Printing

  •    10.1 All Things Printing

  •    10.2 Discussing Laser Printer Maintenance

  •    10.3 Maintain Inkjet Printers

  •    10.4 Discussing Inkjet Printer Maintenance

  •    10.5 Maintain Impact, Thermal, and 3D Printers

  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance

  •    10.7 Install and Configure Printers

  •    10.8 Discussing Printer Installation and Configuration

  •    10.9 Troubleshoot Print Device Issues

  •    10.10 Install and Configure Imaging Devices

  •    10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

CompTIA A+ 220-1102 (Core 2) Course Content

Module 1 - Operating System Management

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Identify Common Operating Systems

  •    1.3 Microsoft Windows

  •    1.4 Work and Education Features

  •    1.5 Windows System Limits

  •    1.6 Apple Operating Systems

  •    1.7 Linux Disk and File Management

  •    1.8 Discussing OS Types

  •    1.9 Use Windows Features and Tools

  •    1.10 Administrative Tools

  •    1.11 Manage Files in Windows

  •    1.12 System Hierarchies

  •    1.13 File Attributes

  •    1.14 Discussing Windows Features and Tools

  •    1.15 Manage Disks in Windows

  •    1.16 Discussing File Management in Windows

  •    1.17 The Windows Disk Management Console

  •    1.18 Discussing Windows Disk Management

  •    1.19 Manage Devices in Windows

  •    1.20 Device Manager

  •    1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS

  •    2.1 Configuring and Installing the OS

  •    2.2 Installation Boot Methods

  •    2.3 Disk Formatting and Partitioning

  •    2.4 Networking Considerations

  •    2.5 Post Installation Tasks

  •    2.6 OS Installation Types

  •    2.7 Unattended Installations

  •    2.8 Maintain OSs

  •    2.9 OS Updates

  •    2.10 Anti-Malware Updates

  •    2.11 Scheduled Backups

  •    2.12 Task Schedulers part 1

  •    2.13 Task Schedulers part 2

  •    2.14 Install Windows 10 Demonstration

  •    2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS

  •    3.1 Install and Manage Windows Applications

  •    3.2 Windows OS Tools

  •    3.3 Application and Print Services

  •    3.4 Task Manager

  •    3.5 Manage Windows Performance

  •    3.6 Windows Performance Management Tools

  •    3.7 Troubleshoot Windows

  •    3.8 Event Viewer

  •    3.9 The System Configuration Utility

  •    3.10 Troubleshooting Tips Boot Process

  •    3.11 Troubleshooting Tips for Windows System Issues

  •    3.12 Blue Screens and Spontaneous Shutdowns

  •    3.13 Troubleshooting Tips for File and Memory Corruption

  •    3.14 Safe Boot

  •    3.15 System Repair Disc

  •    3.16 System Restore

  •    3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools

  •    4.1 Network Management Tools

  •    4.2 Network Connectivity

  •    4.3 IP Addressing and Connection Types

  •    4.4 Proxy Settings

  •    4.5 Windows Client Configuration

  •    4.6 Location Services

  •    4.7 Firewalls

  •    4.8 Network Troubleshooting

  •    4.9 Remote Desktop Tools

  •    4.10 Desktop Management and Remote Monitoring Tools

  •    4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management

  •    5.1 Sharing Resources and Wrights Management

  •    5.2 User Group Accounts

  •    5.3 Local Secutity Policy

  •    5.4 SSO and Credential Manager

  •    5.5 Workgroups and Homegroups

  •    5.6 Network and Sharing Center

  •    5.7 Network Share Configuration

  •    5.8 NTSF File and Folder Permissions

  •    5.9 Configure Active Directory Accounts and Policies

  •    5.10 Domain Membership and Group Policy Objects

  •    5.11 Basic AD Functions

  •    5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures

  •    6.1 Threats and Security Measures

  •    6.2 Logical Security Concepts

  •    6.3 Encryption

  •    6.4 PKI and Certificates

  •    6.5 Execution Control

  •    6.6 NAC

  •    6.7 Discussing Logical Decurity Concepts

  •    6.8 Threats and Vulnerablilities

  •    6.9 Types of Password Attacks

  •    6.10 Discussing Threats and Vulnerabilities

  •    6.11 Physical Security Controls

  •    6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data

  •    7.1 Policies to Protect Data

  •    7.2 Implement Security Best Practices

  •    7.3 Guidlines for Implementing Security Best Practices

  •    7.4 Discussing Security Best Practices Implementation

  •    7.5 Implement Data Protection Policies

  •    7.6 ACLs and Directory Permissions

  •    7.7 Full Disk Encryption

  •    7.8 Guildlines for Implementing Data Protection Policies

  •    7.9 Discussing Data Protection Policies

  •    7.10 Protect Data During Incident Response

  •    7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats

  •    8.1 Prevent Malware and Security Threats

  •    8.2 Detect, Remove, and Prevent Malware

  •    8.3 Trojan Horses and Spyware

  •    8.4 Sources of Malware Infection

  •    8.5 Best Practices for Malware Removal

  •    8.6 Discussing Detecting, Removing, and Preventing Malware Infections

  •    8.7 Troubleshoot Common Workstation Security Issues

  •    8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices

  •    9.1 Supporting and Troubleshooting Mobile Devices

  •    9.2 Secure Mobile Devices

  •    9.3 IOT Internet of Things

  •    9.4 Discussing Mobile Device Security

  •    9.5 Troubleshoot Mobile Device Issues

  •    9.6 Mobile Device Security Troubleshooting

  •    9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures

  •    10.1 Implementing Operational Procedures

  •    10.2 Environmental Impacts and Controls

  •    10.3 Discussing Environmental Impact and Controls

  •    10.4 Create and Maintain Documentation

  •    10.5 Discussing Documentation Creation and Maintenance

  •    10.6 Use Basic Change Management Best Practices

  •    10.7 Discussing Change Management Best Practices

  •    10.8 Implement Disaster Prevention and Recovery Methods

  •    10.9 Discussing Implement Disaster Prevention and Recovery Methods

  •    10.10 Basic Scripting Concepts

  •    10.11 Discussing Scripting

  •    10.12 Professionalism and Communication

  •    10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

CompTIA Security+ SY0-601 (2022) Course Content

Module 1 - Introduction to Security

  •    1.1 Introduction to Security

Module 2 - Malware and Social Engineering Attacks

  •    2.1 Malware and Social Engineering Attacks

Module 3 - Basic Cryptography

  •    3.1 Basic Cryptography

Module 4 - Advanced Cryptography and PKI

  •    4.1 Advanced Cryptography and PKI

Module 5 - Networking and Server Attacks

  •    5.1 Networking and Server Attacks

Module 6 - Network Security Devices, Designs and Technology

  •    6.1 Network Security Devices, Designs and Technology

Module 7 - Administering a Secure Network

  •    7.1 Administering a Secure Network

Module 8 - Wireless Network Security

  •    8.1 Wireless Network Security

Module 9 - Client and Application Security

  •    9.1 Client and Application Security

Module 10 - Mobile and Embedded Device Security

  •    10.1 Mobile and Embedded Device Security

Module 11 - Authentication and Account Management

  •    11.1 Authentication and Account Management

Module 12 - Access Management

  •    12.1 Access Management

Module 13 - Vulnerability Assessment and Data Security

  •    13.1 Vulnerability Assessment and Data Security

Module 14 - Business Continuity

  •    14.1 Business Continuity

Module 15 - Risk Mitigation

  •    15.1 Risk Mitigation

Module 16 - Security Plus Summary and Review

  •    16.1 - Security Plus Summary and Review

Module 17 - Hands-On Training

  •    17.1 Hands-On Scanning Part 1

  •    17.2 Hands-On Scanning Part 2

  •    17.3 Hands-On Advanced Scanning

  •    17.4 Hands-On MetaSploit

  •    17.5 Hands-On BurpSuite

  •    17.6 Hands-On Exploitation Tools Part 1

  •    17.7 Hands-On Exploitation Tools Part 2

  •    17.8 Hands-On Invisibility Tools

  •    17.9 Hands-On Connect to Tor

CompTIA Network+ N10-008 Course Content

Module 0 - Course introduction

  •    0.1 Instructor Intro

  •    0.2 Course Overview

Module 1 - Networking Fundamentals

  •    1.1 Intro to Networking

  •    1.1.1 Activity: Creating a Network

  •    1.2 Common Terminology

  •    1.2.1 Activity: Examining Ports and Sockets

  •    1.3 OSI Model

  •    1.4 DoD Model

  •    1.4.1 Activity: Examining Network Layers

  •    1.5 TCP, UDP, IP

  •    1.5.1 Activity: Examining TCP

  •    1.5.2 Activity: Examining UDP

  •    1.5.3 Activity: Examining IP

  •    1.6 ICMP, IGMP, ARP

  •    1.6.1 Activity: Examining ICMP

  •    1.6.2 Activity: Examining ARP

  •    1.6.3 Activity: Examining IGMP

  •    1.7 Network Topologies

  •    1.8 Network Types

  •    1.9 Part 1: Network Characteristics

  •    1.9 Part 2: Network Characteristics

  •    1.10 Module 1 outro

Module 2 - Cables and Connectors

  •    2.1 Ethernet Standards

  •    2.2 Copper Cable Types

  •    2.3 Fiber Optic Cable Types

  •    2.4 Connector Types

  •    2.4.1 Activity: Selecting the Right Cable

  •    2.5 Media Converters and Transceivers

  •    2.6 Cable Management

  •    2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)

  •    3.1 IPv4 Basics

  •    3.2 IP Packet and Interface Types

  •    3.2.1 Activity: Configuring Client IP Settings

  •    3.3 Binary Numbering System

  •    3.4 Classful and Classless Addressing

  •    3.5 Understanding CIDR Notation

  •    3.6 IPv4 Subnetting Method

  •    3.7 Verifying with Binary

  •    3.8 Finding Subnet IDs

  •    3.8.1 Activity: Subnetting a Class C Network

  •    3.9 The Delta in Action

  •    3.9.1 Activity: Subnetting With the Delta

  •    3.10 Subnetting Based on Hosts

  •    3.11 Subnetting in Other Octets

  •    3.12 Supernetting

  •    3.12.1 Activity: Supernetting

  •    3.13 IPv6

  •    3.14 IPv4 - IPv6 Transition Mechanisms

  •    3.15 Module 3 Outro

Module 4 - Layer 7 Protocols

  •    4.1 Remote Control Protocols

  •    4.2 File Sharing Protocols

  •    4.3 Web Protcols

  •    4.4 Email Protocols

  •    4.5 Database Protocols

  •    4.6 Voice Protocols

  •    4.7 Security Protocols

  •    4.8 Management Protocols

  •    4.9 Module 4 Outro

Module 5 - Network Services

  •    5.1 DHCP

  •    5.1.1 Activity: Configuring DHCP

  •    5.1.2 Activity: Configuring a DHCP Relay Agent

  •    5.2 DNS

  •    5.2.1 Activity: Configuring DNS - Part 1

  •    5.2.2 Activity: Configuring DNS - Part 2

  •    5.3 NTP

  •    5.4 Corporate and Datacenter Network Architecture

  •    5.5 Cloud Concepts and Connectivity Options

  •    5.6 Module 5 Outro

Module 6 - Networking Devices

  •    6.1 Introductory Concepts

  •    6.2 Repeaters and Hubs

  •    6.2.1 Activity: Connecting Devices with a Hub

  •    6.3 Bridges and Switches

  •    6.3.1 Activity: Connecting Devices with a Switch

  •    6.4 Routers and Multilayer Switches

  •    6.5 Security Devices

  •    6.6 Modems

  •    6.7 Module 6 Outro

Module 7 - Networked Devices

  •    7.1 IP Devices

  •    7.2 IoT

  •    7.2.1 Activity - Programming IoT Devices

  •    7.3 ICS/SCADA

  •    7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management

  •    8.1 Routing Basics

  •    8.1.1 Activity: Configuring Static Routes

  •    8.2 Packet Delivery on the Same Network

  •    8.3 IP Routing Across a Single Router

  •    8.4 IP Routing Across Multiple Hops

  •    8.4.1 Activity: Static Routes - CHALLENGE

  •    8.5 Route Selection

  •    8.6 RIP

  •    8.6.1 Activity: Configuring RIP - CHALLENGE

  •    8.7 OSPF

  •    8.8 EIGRP

  •    8.9 BGP

  •    8.10 NAT/PAT

  •    8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching

  •    9.1 Ethernet Basics

  •    9.2 Switching Overview

  •    9.2.1 Activity: Examining a MAC Table

  •    9.3 VLANs

  •    9.3.1 Activity: Creating VLANs

  •    9.4 VLAN Trunking

  •    9.4.1 Activity: Configuring VLAN Trunking

  •    9.5 VLAN Routing

  •    9.5.1 Activity: Configuring VLAN Routing

  •    9.6 Contention Management

  •    9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies

  •    10.1 Wireless Overview

  •    10.2 Radio Basics

  •    10.3 Modulation

  •    10.4 Wi-Fi Standards

  •    10.5 Antennas

  •    10.6 Wi-Fi Service Sets

  •    10.7 Wi-Fi Security

  •    10.8 Cellular

Module 11 Network Performance

  •    11.1 Monitoring Performance

  •    11.2 Common Metrics

  •    11.2.1 Activity: Examining Interface Statistics

  •    11.3 SNMP

  •    11.4 Netflow

  •    11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery

  •    12.1 HA and DR Concepts

  •    12.2 High Availability Mechanisms

  •    12.3 Disaster Recovery Mechanisms

  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents

  •    13.1 Plans and Procedures

  •    13.2 Security Policies

  •    13.3 Loss Prevention

  •    13.4 Common Agreements

  •    13.5 Common Documentation

  •    13.6 Structured Cabling - MDF and IDF

  •    13.7 Horizontal and Vertical Cabling

  •    13.7.1 Activity - Implementing Cable Management

  •    13.8 Labeling

  •    13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security

  •    14.1 Common Security Concepts

  •    14.2 Common Attack Types

  •    14.3 Spoofing-based Attacks

  •    14.4 Hijacking and MITM

  •    14.5 Social Engineering

  •    14.6 Network Segmentation

  •    14.7 Private VLANs

  •    14.8 Single Organization Authentication

  •    14.9 Extending Authentication

  •    14.10 Authorization

  •    14.11 Network Device Hardening

  •    14.12 Wireless Security

  •    14.13 Remote Access Security

  •    14.14 IoT Security

  •    14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting

  •    15.1 Troubleshooting Methodology

  •    15.2 Physical Connectivity Issues

  •    15.3 Hardware Testing Tools

  •    15.3.1 Activity - Testing an Ethernet Cable

  •    15.3.2 Activity - Crimping on an RJ-45 Connector

  •    15.3.3 Activity - Punching Down Twisted Pair

  •    15.3.4 Activity - Using a Telephone Toner

  •    15.4 Understanding Electricity

  •    15.4.1 Activity - Checking Cable Continuity

  •    15.4.2 Activity - Testing DC Voltage

  •    15.4.3 Activity - Testing AC Voltage

  •    15.5 Twisted Pair Pinout Problems

  •    15.6 Twisted Pair Termination Problems

  •    15.7 Repairing Damaged Twisted Pair Cable

  •    15.8 Fiber Optic Connectivity Issues

  •    15.8.1 Activity - Testing a Fiber Optic Cable

  •    15.9 Common Port Problems

  •    15.9.1 Working with Ports and Their Devices

  •    15.10 Common Software Testing Tools

  •    15.10.1 Activity - Scanning for Open Ports

  •    15.11 Common Command Line Utilities

  •    15.12 Troubleshooting Basic IP Networking Issues

  •    15.13 Common Switching Issues

  •    15.14 Switching Test Tools and Techniques

  •    15.15 Common IP Routing Issues

  •    15.16 Wi-Fi Access Point Issues

  •    15.17 Wirelss Interference

  •    15.17.1 Activity - Using a Spectrum Analyzer

  •    15.18 Wireless Antenna Issues

  •    15.18.1 Activity - Configuring a Wi-Fi Router

  •    15.19 WAP Placement Strategies

  •    15.20 Infrastructure Service Issues (DHCP)

  •    15.21 Infrastructure Service Issues (DNS)

  •    15.22 Infrastructure Service Issues (NTP)

  •    15.23 Fireall / ACL Issues

  •    15.24 VPN Issues

  •    15.25 Additional Network Security Troubleshooting and Tips

  •    15.26 Advanced Networking Issues

  •    15.27 Troubleshooting Server Services (with Module 15 Outro)

  •    CompTIA Network+ N10-008 Course Outro

Add a review
Currently, we are not accepting new reviews
4.8
Based on 68 reviews
1-5 of 68 reviews
  1. MaryBeth is an awesome Rep!

Your Training Instructors

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.

When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.

Chrys lives by, and is fond of repeating, her professional creed:

“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”

Brian O'Hair

Brian O'Hair

IT Training Professor

Professor Brian O'Hare has over 25 years of experience in the IT industry. He started off in web design as a Corporate Webmaster but wanted to understand how the internet worked. While working towards his bachelor’s in computer science, he studied and got his MCSE (Microsoft Certified Systems Engineer) and his MCT (Microsoft Certified Trainer). Once certified he paid for his degree working as a Network Engineer and then a Trainer for others wanting to learn about Microsoft’s Desktop and Server products.

Anthony Santucci

Anthony Santucci

Technology Professional and Instructor

Anton Santucci is a seasoned IT instructor with over 20 years of experience in the field. He is currently serving as an ITU instructor for the A+ Certification Course and teaching both online and in-person computer training at Hillsborough Community College (HCC) in Florida. Anton holds an Associate's Degree in Information Systems Management and is skilled in delivering complex IT information to students in a way that is easy to understand and enjoy.

He started his career as a Microsoft Certified Trainer (MCT) and has since gained expertise in CompTIA certifications such as A+, Net+, and Security+. He also holds the CEH (Certified Ethical Hacker) certification. With five years as a Network Administrator for a career college in Florida and global experience as a corporate trainer, Anton brings a wealth of knowledge and experience to his classes.

With a belief that training can be both informative and entertaining, Anton uses humor, mnemonic devices, and questions to engage his students and ensure they retain the skills they need to succeed in the workplace. In his personal life, Anton is a passionate traveler and a fan of the Giants. He looks forward to helping you achieve your certification goals while getting to know you along the way.

CompTIA Secure Infrastructure Specialist (CSIS)
 

$59.00

OR

Subscribe To All-Access
Lock In $14.99 / Month Forever

Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.00 $14.99 Monthly

CompTIA Secure Infrastructure Specialist (CSIS)

CompTIA Stackable (CSIS)
CompTIA Secure Infrastructure Specialist (CSIS)
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.

Monthly All-Access Subscription
7 Days Free - $39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses

$49.00

Learn how to identify and respond to cybersecurity threats with our CompTIA CySA+ (CS0-002) Cybersecurity Analyst course. Enroll now!

In this course you will gain the CySA+ objectives to prepare for the CySA+ Cert.  You’ll learn how to apply behavioral analytics to networks and devices with the intention to prevent, detect, and combat cybersecurity threats via continuous security monitoring. At the conclusion of the course, you’ll have the knowledge needed to pass the CompTIA CySA+ (CS0-002) certification exam, which validates an IT professional’s ability to proactively defend and continuously improve the security of an organization.

Add To Cart

$49.00

Get certified in cloud computing with CompTIA Cloud Essentials CLO-002 course. Learn how to operate in cloud environments and get ahead in your career.

This course is designed to provide business analysts and IT professionals with the knowledge and skills needed to make strategic Cloud business decisions. The training covers all the objectives required to pass the CompTIA Cloud Essentials+ CLO-002 Certification including Cloud Concepts, Business Principles of Cloud Environments, cloud principles, Management, cloud networking concepts, Technical Operations, Governance, Risk, Compliance, and Security for the Cloud.

Add To Cart

$49.00

Get certified with the CompTIA Linux Certification Prep Course – LX0-101 & LX0-102. Learn the fundamentals of Linux and enroll now!

In this CompTIA Linux course you will learn how to perform maintenance with the command line, Linux Installation and Package Management, configure a workstation and be able to configure a basic network. This is a junior level Linux Administrator course.

Add To Cart