CompTIA Certification Training Series
Learn essential troubleshooting skills and gain practical knowledge to resolve diverse IT issues, preparing you for certification and real-world IT support.
When a help desk ticket says, “The laptop won’t connect,” that’s usually not one problem. It could be bad hardware, a broken driver, a DNS issue, a user account problem, or a security policy blocking access. That is exactly the kind of mess this are there courses that prepare you for comptia or other it certifications question is really about: you want training that teaches you how to untangle real IT problems and, if you choose, get ready for certifications that prove you can do the work.
I built this CompTIA® Certification Training Series to give you a practical path through the core certs employers recognize first. If you’re starting in IT, moving into support, or trying to build toward cybersecurity or cloud work, this bundle gives you a broad but structured foundation. It is self-paced, on-demand training, so you can buy it and start immediately, without waiting for a live class or an enrollment window. And yes, that matters when you’re trying to move quickly and affordably. People often search for things like are there courses that prepare you for comptia or other it certifications because they need one place that explains the path clearly instead of forcing them to stitch together random videos, notes, and practice questions.
Are there courses that prepare you for comptia or other it certifications?
Yes, and this bundle is built specifically for that purpose. The real question is not whether courses exist; it’s whether the training is organized around the way employers and exams actually think. CompTIA exams are not just “memorize this fact and move on” tests. They expect you to understand troubleshooting, recognize patterns, choose the right tool, and apply security and operational judgment. That is why a course series like this works better than isolated lessons. You learn the vocabulary, then the workflows, then the exam-style thinking that ties everything together.
This series is especially useful if you are comparing a single certification class against a broader pathway. For example, someone looking for a+ training and certification cost often realizes the better investment is a bundle that includes A+, Network+, Security+, and related tracks instead of paying separately for every topic one at a time. The same logic applies if you’re researching are comptia exams online; the exam delivery method matters, but your training should prepare you for both the content and the pressure of the test environment. I always tell students to think in terms of job readiness first and exam readiness second. If you can solve the problem, the exam gets much easier.
This training series helps you build that confidence across multiple certification areas:
- Foundational IT support and troubleshooting
- Networking concepts and device behavior
- Core security practices and incident response thinking
- Cloud concepts, business alignment, and infrastructure basics
- Advanced security architecture and risk management
- Technical vocabulary you will use in interviews and on the job
What this CompTIA certification series teaches you
At the heart of the series is a progression from basic support skills to more specialized technical decision-making. That progression is important. Too many new IT learners jump straight to advanced security ideas without understanding how operating systems, networking, and hardware behave in the real world. That is a mistake. Security problems, cloud problems, and escalation problems all rest on the same foundation: how systems actually work.
You’ll start with entry-level concepts like identifying hardware, understanding operating systems, configuring devices, and using common troubleshooting methods. From there, you move into networking, security, cloud fundamentals, and broader infrastructure topics. That makes the bundle useful not just for passing exams, but for preparing to take on roles where you are expected to support users, harden systems, and speak intelligently with engineers.
Here is the kind of skill progression I want you to take seriously:
- Understand the parts of a computer and how to diagnose common failures.
- Learn how operating systems, permissions, and updates affect stability and security.
- Build a working grasp of TCP/IP, routing, switching, and wireless basics.
- Recognize threats, use defensive controls, and respond to incidents with discipline.
- Learn cloud vocabulary well enough to support migration and operational discussions.
- Move into higher-level security reasoning, risk, and architecture decisions.
That’s the difference between “studied for an exam” and “built a skill set.” Employers notice the second one. And if you’re comparing options because you saw questions like compTIA network+ exam cost in south africa or you’re generally trying to keep your certification path affordable, this kind of bundled training can reduce the amount of trial and error in your study plan.
Course breakdown: from IT fundamentals to advanced security
This series includes a wide range of CompTIA certifications, which is exactly why it’s so useful. It doesn’t assume you already know where you belong. It gives you a path to test the waters, then go deeper where your career goals make sense. The beginner-level content, such as IT Fundamentals, is there for people who need to understand the language of technology before tackling more demanding topics. The A+ material focuses on the support work that every organization depends on. Network+, Security+, Cloud Essentials+, Cloud+, CySA+, and CASP push you into more specialized territory.
Let me be blunt: if you want to get hired in IT, you need more than enthusiasm. You need context. You need to know why a printer fails, why a VPN drops, why a cloud deployment misbehaves, and why a security control exists in the first place. This training gives you that context across multiple domains, not just one isolated certification.
Some of the key course areas in the bundle include:
- CompTIA A+ Core 1 and Core 2 for hardware, operating systems, troubleshooting, and support workflows
- CompTIA Network+ for networking principles, address management, infrastructure, and troubleshooting
- CompTIA Security+ for core security controls, risk, access management, and incident response basics
- CompTIA Cloud Essentials+ and Cloud+ for cloud business value, deployment, operations, and security considerations
- CompTIA CySA+ for threat detection, vulnerability management, and analyst-level thinking
- CompTIA CASP for advanced enterprise security architecture and technical integration
Each of those tracks reinforces the others. That’s important because real jobs do not arrive in neat little certification-shaped boxes. A support technician may be asked to troubleshoot a network issue and explain the security impact. A junior analyst may need to understand endpoint behavior. A cloud technician may need to interpret an access problem. The overlap is the job.
CompTIA A+ and the support skills employers actually need
The A+ path is where a lot of IT careers begin, and for good reason. It covers the day-to-day realities of technical support: identifying components, installing operating systems, resolving boot issues, working with printers and mobile devices, and dealing with user problems that are rarely as simple as they sound. If you can explain why a machine won’t start, why a profile won’t load, or why a wireless connection keeps failing, you are already useful.
The Core 1 portion builds hardware and device knowledge. The Core 2 portion shifts toward operating systems, security basics, and administrative troubleshooting. That combination is valuable because entry-level support staff are often the first line of defense in an organization. You are the person who notices the symptom before it becomes a bigger outage.
This is also where many students begin asking about a+ training and certification cost. My advice is always the same: look beyond the exam fee and consider the total value of the path. If you spend less on scattered study materials but still fail to build confidence, you have not saved money. A structured, affordable training bundle can be the smarter route because it reduces guesswork and helps you study with purpose.
Networking, security, and the logic behind the work
Network+ and Security+ are where students stop thinking like a device user and start thinking like an IT professional. Networking is the bloodstream of every organization. If you don’t understand subnets, ports, protocols, wireless behavior, switching, or routing concepts, you will struggle to support anything beyond the most basic endpoint issues. Network troubleshooting is not about guessing; it is about narrowing the failure domain until the cause becomes obvious.
Security is the same story. Security+ introduces the habits and controls that protect systems without making everything unusable. You learn about authentication, authorization, encryption, vulnerability awareness, secure configuration, and incident response. Those topics are not academic decorations. They are how organizations keep attackers out and reduce damage when something goes wrong.
For many students, this is the point where certification starts to feel career-shaping. A help desk technician with networking and security knowledge can move into roles such as:
- Technical support specialist
- Desktop support technician
- Junior network technician
- Security operations support assistant
- Systems support analyst
Salary ranges vary by region and experience, but in many markets, these roles can move from entry-level compensation into stronger mid-tier earnings as your troubleshooting range widens. The point is not just to collect titles. The point is to become the person who can solve the problem without panic.
Cloud and cybersecurity paths for the next step in your career
Cloud Essentials+ and Cloud+ help you understand how cloud services fit into business operations, infrastructure, and support. This matters because cloud is not just a buzzword for “someone else’s computer.” It changes how you think about uptime, access, scaling, security, and ownership. If you work in IT long enough, you will be asked to support cloud-adjacent decisions whether your title says cloud or not.
CySA+ pushes you toward analyst thinking. That means looking at logs, understanding threat patterns, evaluating vulnerabilities, and responding to incidents with discipline. It is the shift from “I know the system” to “I know when the system is behaving strangely.” CASP goes even deeper into enterprise security architecture and risk management, which is where more experienced professionals start making design-level decisions.
These certifications are valuable because they map to recognizable job functions. If you want to move toward roles like cybersecurity analyst, SOC support, security administrator, cloud support specialist, or infrastructure technician, this series helps you build the right base. And if you are comparing options because you want something affordable but still serious, this bundle gives you more breadth than a single-topic course without forcing you into a disconnected study path.
My rule for students is simple: don’t study security as if it exists in a vacuum. Security is easier to understand once you know networking, operating systems, and support workflows. That is why this series is structured the way it is.
Who should take this training
This course series is for you if you want a practical entry into IT or a structured way to expand your certification portfolio. It works especially well for career changers, help desk staff, college students, military transitioners, and working professionals who need self-paced training they can fit around their schedule.
You do not need to be an expert to begin. If you are comfortable using a computer but need to learn how systems fit together, start with the foundational material. If you already work in support and want to prove your skills, move into A+ and Network+. If you are aiming at security, build toward Security+, CySA+, or CASP. That flexibility is one of the strongest reasons students search for are there courses that prepare you for comptia or other it certifications in the first place: they want a path that adapts to their level instead of forcing everyone through the same narrow doorway.
The ideal learner is someone who:
- Wants structured training instead of random self-study
- Needs a certification path that aligns with real job roles
- Plans to enter IT support, networking, cloud, or security
- Values self-paced study and immediate access
- Wants to study efficiently without wasting money on fragmented resources
How this training supports exam prep and career planning
Certification is only useful if it changes what you can do next. That is why I like training that keeps one eye on the exam and the other on the job. This bundle includes the kind of instruction and practice that helps you prepare for CompTIA exams in a realistic way: understand the objective, learn the concept, apply it in a scenario, and test yourself until the logic feels natural.
Students often ask whether are comptia exams online when they are planning their certification timeline. That matters because exam delivery affects scheduling, but it does not change the need to know the material. If you’re studying for a remote exam, you still need to be ready for problem-solving under time pressure. You still need to understand the “why,” not just the correct answer.
That is where a strong training series pays off. You can study the concepts in order, revisit weak areas, and build the mental habits that employers value. For many learners, that also means better decisions about when to test, which cert to pursue first, and how to budget for the next step. If you’re comparing certification paths in different countries, including places where people look up things like comptia network+ exam cost in south africa, the practical value of the training becomes even more important. A smart study plan should protect your time and your money.
Why this bundle makes sense for serious learners
This is not a “watch some videos and hope for the best” collection. It is a deliberate certification pathway built to help you understand the material across multiple levels. That matters because IT careers reward breadth early on and specialization later. You need enough breadth to solve everyday problems and enough specialization to move into higher-value work.
What I like about this series is the progression. It starts where beginners actually are, then it extends into networking, security, cloud, and advanced defense. That means you can enter the path at a comfortable point and keep moving as your goals sharpen. If you are trying to answer the question are there courses that prepare you for comptia or other it certifications, this is one of the more practical answers because it gives you both entry-level support and advanced growth without making you rebuild your study strategy every time you want to move up.
Use this series if you want to:
- Start an IT career with a recognized foundation
- Prepare for multiple CompTIA certification areas
- Build confidence before a job interview or exam
- Study at your own pace without waiting for a class schedule
- Keep your training path affordable while still covering the essentials
CompTIA® and Security+™ are trademarks of CompTIA. This content is for educational purposes.
Domain 1.0 – Cloud Architecture
- 0.1 – CompTIA Cloud+ (CV0-004) – Course Intro
- 1.0 – Module Overview
- 1.1 – Cloud Service Models
- 1.2 – Shared Responsibility Model
- 1.3 – Resource Availability
- 1.4 – Disaster Recovery (DR)
- 1.5 – Public and Private Connections
- 1.6 – Network Functions, Components and Services
- 1.7 – Cloud Storage Types
- 1.8 – Cloud Native Design Concepts
- 1.9 – Containerization Concepts
- 1.10 – Virtualization Concepts
- 1.11 – Cloud Cost Conisderations
- 1.12 – Database Concepts
- 1.13 – Workload Optimization
- 1.14 – Evolving Technologies
- Demo – Examining Cloud Cost
- Demo – Examining IaaS
- Demo – Examining Resource Availability
- Demo – Examining SaaS
Domain 2.0 – Deployment
- 2.0 – Module Overview
- 2.1 – Cloud Deployment Models
- 2.2 – Deployment Strategies
- 2.3 – Cloud Migrations
- 2.4 – Application Migration Strategies
- 2.5 – Using Code to Deploy and Configure Cloud Resources
- 2.6 – Scripting Logic
- 2.7 – Provisioning Cloud Resources
Domain 3.0 – Operations
- 3.0 – Module Overview
- 3.1 – Achieving Observability
- 3.2 – Scaling Approaches
- 3.3 – Backup and Recovery Methods
- 3.4 – Backup Types
- 3.5 – Cloud Resource Lifecycle Management
Domain 4.0 – Security
- 4.0 – Module Overview
- 4.1 – Vulnerability Management Concepts
- 4.2 – Compliance and Regulation
- 4.3 – Secure Cloud Access – Management and Resources
- 4.4 – Authentication Models
- 4.5 – Authorization Models
- 4.6 – Security Best Practices
- 4.7 – Cloud Security Controls
- 4.8 – Identifying Common Attacks
- Demo – Examining Management Access using a CLI
- Demo – Examining Compliance and Regulations in the Cloud
Domain 5.0 – DevOps Fundamentals
- 5.0 – Module Overview
- 5.1 – Source Control Concepts
- 5.2 – CI-CD Pipelines
- 5.3 – Systems Integration
- 5.4 – DevOps Tools
Domain 6.0 – Troubleshooting
- 6.0 – Module 6 – Overview
- 6.1 – Troubleshooting Deployment Issues
- 6.2 – Troubleshooting Network Issues
- 6.3 – Troubleshooting Network Service Issues
- 6.4 – Troubleshooting Security Issues
- 6.5 – CompTIA Cloud+ (CV0-004) – Course Outro
Module 1 – Mobile Devices
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Device Hardware and Components
- 1.2 Mobile Device Connections and Accessories
- 1.3 Mobile Device Operating Systems
- 1.4 Troubleshooting Mobile Devices
- 1.5 Mobile Device,OS and Application Issues
- 1.6 Mobile Device,OS and Application Security
- 1.7 Identifying Connection Settings in Android
- 1.8 Identifying Connection Settings in iOS
Module 2 – Networking
- 2.1 Network Architecture
- 2.2 Ports and Protocols
- 2.3 Wireless Networking
- 2.4 Network Hosts and Services
- 2.5 DNS and DHCP
- 2.5.1 Demo – Working with DNS and DHCP
- 2.6 VPNs and VLANs
- 2.7 Network Devices
- 2.8 Basic SOHO Configuration
- 2.9 Internet Connections and Network Types
- 2.10 Networking Tools
- 2.11 Networking in Windows
- 2.11.1 Demo – Configuring Networking in Windows
- 2.12 Networking Commands
- 2.12.1 Demo – Working with Networking Commands
- 2.13 Troubleshooting Network Issues
Module 3 – Hardware
- 3.1 Display Components and Attributes
- 3.2 Basic Cables and Connections
- 3.3 Network Cables and Connections
- 3.4 Storage Devices and Connections
- 3.5 Introduction to RAID
- 3.6 Motherboards and Form Factors
- 3.7 Motherboard Connections
- 3.8 BIOS and UEFI
- 3.9 CPUs and CPU Architecture
- 3.10 Expansion Cards
- 3.11 System Cooling
- 3.12 Power Supply Units
- 3.13 Printers and Multifunction Devices
- 3.14 Printer Maintenance
- 3.15 Troubleshooting Computer Components
- 3.16 Troubleshooting Storage and RAID Issues
- 3.17 Troubleshooting Video and Display Issues
- 3.18 Troubleshooting Printer Issues
Module 4 – Operating Systems
- 4.1 Workstation Operating Systems
- 4.2 Common File System Types
- 4.3 Operating System Installation Types
- 4.4 Operating System Boot Methods
- 4.5 Storage Partitioning
- 4.5.1 Demo – Working with Storage Partitions
- 4.6 Identifying Windows Editions
- 4.7 Windows Upgrades
- 4.8 Windows OS Installations
- 4.9 Using Windows Task Manager
- 4.9.1 Demo – Working with Windows Task Manager
- 4.10 MMC Snap-ins
- 4.10.1 Demo – Working with MMC Snap-ins
- 4.11 Windows Operating System Tools
- 4.12 Microsoft Command Line Tools
- 4.12.1 Demo – Working with Microsoft Command Prompt
- 4.13 Configuring Microsoft Windows Settings
- 4.14 Configuring Windows Power Options
- 4.14.1 Demo – Working with Windows Power Options
- 4.15 Windows File Explorer
- 4.15.1 Demo – Working with File Explorer
- 4.16 Windows Domains vs Workgroups
- 4.17 macOS System Configuration
- 4.17.1 Demo – macOS Features and Tools
- 4.18 Linux Components
- 4.19 Linux Tools
- 4.20 Common Application Installation
Module 5 – Virtualization and Cloud Computing
- 5.1 Virtualization Concepts
- 5.1.1 Demo – Working with Virtual Machines
- 5.2 Cloud Computing
- 5.2.1 Demo – Working with the Cloud
- 5.3 Cloud Productivity Tools
Module 6 – Security
- 6.1 Physical Security
- 6.2 Physical Access Security
- 6.3 Logical Security
- 6.4 Windows Security – Firewalls and Antivirus
- 6.4.1 Demo – Working with the Windows Firewalls and Antivirus
- 6.5 Windows Security Users and Groups
- 6.6 Windows Security – NTFS and Share Permissions
- 6.6.1 Demo – Working with NTFS and Share Permissions
- 6.7 Windows Security – Active Directory
- 6.8 Windows Security – Data Encryption
- 6.9 Wireless Security
- 6.10 Malware Types
- 6.11 Malware Detection and Prevention
- 6.12 Social Engineering
- 6.13 Security Threats
- 6.13.1 Demo – Security Vulnerabilities
- 6.14 Malware Removal Process
- 6.15 Workstation Security
- 6.16 Data Destruction Concepts
- 6.17 SOHO Network Security
- 6.18 Browser Security Settings
- 6.19 Troubleshooting PC Security Issues
Module 7 – Operational Procedures
- 7.1 Ticketing Systems
- 7.2 Asset Management
- 7.3 Document Types
- 7.4 Change Management
- 7.5 Workstation Backup and Recovery
- 7.6 Common Safety Procedures
- 7.7 Environmental Impact and Controls
- 7.8 Licensing and Policy Concepts
- 7.9 Communication and Professionalism
- 7.10 Basics of Scripting
- 7.11 Remote Access Technologies
- 7.12 Basics of Artificial Intelligence
- 7.13 Troubleshooting Methodology
- 7.14 CompTIA A+ Course Closeout
Module 1 – Engagement Management
- 1.1 Pre Engagement Activities
- 1.2 Collaboration and Communication Activities
- 1.3 Testing Frameworks and Methodologies
- 1.3.1 Examining MITRE ATT&CK
- 1.4 Engagement Management Review
Module 2 – Reconnaissance and Enumeration
- 2.1 Passive Reconnaissance
- 2.1.1 Google Hacking
- 2.2 Active Reconnaissance
- 2.2.1 Port Scanning and Fingerprinting
- 2.2.2 Tracing a Network Path with Traceroute
- 2.2.3 Intercepting Data with Wireshark
- 2.2.4 Web Scraping
- 2.3 Enumeration Techniques
- 2.3.1 Directory Enumeration
- 2.3.2 Email Enumeration
- 2.4 Reconnaissance and Enumeration Scripts
- 2.4.1 Using Scripts
- 2.5 Reconnaissance and Enumeration Tools
- 2.5.1 Perform OSINT with Recon ng
- 2.5.2 Adding an API Key to Recon ng
- 2.5.3 Discovering IoT with Shodan
- 2.5.4 Performing WHOIS Lookups
- 2.5.5 Performing DNS Lookups
- 2.5.6 Using NMAP Scripts
- 2.5.7 Performing OSINT with theHarvester
- 2.6 Reconnaissance and Enumeration Review
Module 3 – Vulnerability Discovery and Analysis
- 3.1 Vulnerability Discovery
- 3.1.1 Performing a Vulnerability Scan with OpenVAS
- 3.1.2 Performing Static Code Analysis
- 3.2 Reconnaissance, Scanning and Enumeration Output Analysis
- 3.3 Physical Security
- 3.3.1 Cloning an RFID Badge
- 3.3.2 Cloning NFC with Flipper Zero
- 3.4 Vulnerability Discover and Analysis Review
Module 4 – Attacks and Exploits
- 4.1 Prioritize and Prepare Attacks
- 4.2 Network Attacks
- 4.2.1 Performing an On Path Attack
- 4.2.2 Executing a Network Attack with Metasploit
- 4.2.3 Migrating Meterpreter to Another Process
- 4.2.4 Creating a Malware Dropper with Msfvenom
- 4.2.5 Using Netcat
- 4.2.6 Capturing Files with Wireshark
- 4.3 Authentication Attacks
- 4.3.1 Brute Forcing with Medusa
- 4.3.2 Pass the Hash
- 4.3.3 Password Spraying with Hydra
- 4.3.4 Pass the Token Attack
- 4.3.5 Spoofing Authentication with Responder
- 4.3.6 Cracking Linux Passwords with John the Ripper
- 4.3.7 Hashcat Password Cracking
- 4.4 Host Based Attacks
- 4.4.1 Privilege Escalation with Eternal Blue
- 4.4.2 Log Tampering
- 4.4.3 Pwn a Linux Target from Start to Finish
- 4.5 Web Application Attacks
- 4.5.1 Performing Directory Traversal
- 4.5.2 Grabbing Passwords with SQL Injection
- 4.5.3 SQLi on a Live Website Part 1
- 4.5.4 SQLi on a Live Website Part 2
- 4.5.5 Command Injection
- 4.5.6 Injecting an iFrame with Stored XSS
- 4.5.7 Busting the DOM
- 4.5.8 IDOR Abuse with Burp Suite
- 4.5.9 Web Session Hijacking
- 4.5.10 Parameter Tampering with Burp Suite
- 4.6 Cloud Based Attacks
- 4.6.1 Hacking S3 Buckets
- 4.7 Wireless Attacks
- 4.7.1 WiFi Pumpkin Evil Twin
- 4.7.2 WPA2 Crack Attack
- 4.8 Social Engineering Attacks
- 4.8.1 Phishing for Credentials
- 4.8.2 OMG Cable Baiting
- 4.9 Specialized System Attacks
- 4.9.1 Pwn a Mobile Device
- 4.10 Automated Script Attacks
- 4.11 Attacks and Exploits Review
Module 5 – Post-exploitation and Lateral Movement
- 5.1 Establishing and Maintaining Persistence
- 5.1.1 Creating a Persistent Netcat Back Door
- 5.1.2 Exfiltrating Data with a Scheduled Task
- 5.2 Lateral Movement
- 5.2.1 Preparing to Pivot
- 5.2.2 Lateral Movement through Pivoting
- 5.3 Staging and Exfiltration
- 5.3.1 Hiding Data with Steganography
- 5.3.2 Automatically Exfiltrating Data
- 5.4 Cleanup and Restoration
- 5.5 Post-Exploitation and Lateral Movement Review
Module 6 – Deliverables
- 6.1 Penetration Test Report Components
- 6.2 Report Findings and Recommendations
- 6.2.1 Examining Pentest Reports
- 6.3 Deliverables Review
- 6.4 Course Conclusion
Module 1: Networking Concepts
- 1.1 Networking Overview
- 1.1.1-Activity-Creating a Network
- 1.2 OSI and DOD Model
- 1.2.1-Activity-Examining the OSI Layers
- 1.3 Networking Appliances, Applications and Functions
- 1.3.1-Activity-Using Online Proxies
- 1.4 Cloud Concepts and Connectivity
- 1.4.1-Activity-Creating Cloud Resources
- 1.5 Ports, Protocols, Services and Traffic Types
- 1.5.1-Activity-Examining ARP and ICMP
- 1.5.2-Activity-Examining DNS and Ports
- 1.6 Wireless Transmission Media
- 1.6.1-Activity-Configuring-WiFi
- 1.7 Wired Transmission Media and Transceivers
- 1.8 Network Topologies, Architectures and Types
- 1.9a IPv4 Network Addressing – Part 1
- 1.9b IPv4 Network Addressing – Part 2
- 1.9.1-Activity-Configuring Client IP Settings
- 1.9.2-Activity-Subnetting – Delta 128
- 1.9.3-Activity-Subnetting-Delta-64
- 1.9.4-Activity-Subnetting WAN Links
- 1.10a Modern Network Environments – Part 1
- 1.10b Modern Network Environments – Part 2
Module 2: Network Implementation
- 2.1 Implementing Routing Technologies
- 2.1.1-Activity-Setting Up Basic Routing
- 2.1.2-Activity-Adding Static Routes
- 2.1.3-Activity- Configuring Routing Protocols
- 2.1.4-Activity-Configuring Port Address Translation
- 2.2 Configuring Switching Technologies and Features
- 2.2.1-Activity-Connecting Devices with a Switch
- 2.2.2-Activity-Creating VLANs
- 2.2.3-Activity-Voice and Data VLANs
- 2.2.4-Activity-VLAN-Trunking
- 2.2.5-Activity-VLAN Routing
- 2.3 Selecting and Configuring Wireless Devices and Technologies
- 2.3.1-Activity-Creating a WLAN
- 2.4 Physical Installations
- 2.4.1-Activity-Managing Cable
- 2.4.2-Activity-Punching Down Twisted Pair
Module 3: Network Operations
- 3.1 Organizational Processes and Procedures
- 3.2 Network Monitoring Technologies
- 3.2.1-Activity-Exploring SNMP
- 3.3 Disaster Recovery (DR)
- 3.4 IPv4 and IPv6 Network Services
- 3.4.1-Activity-Implementing a DHCP Relay Agent-Part 1
- 3.4.2-Activity-Implementing a DHCP Relay Agent-Part 2
- 3.4.3-Activity-DNS-Part 1
- 3.4.4-Activity-DNS-Part 2
- 3.5 Network Access and Management
Module 4: Network Security
- 4.1a Network Security Concepts – Part 1
- 4.1b Network Security Concepts – Part 2
- 4.1.1-Activity-Exploring Encryption
- 4.1.2-Activity-Applying Authorization
- 4.1.3-Activity-Testing a Honeypot
- 4.2 Network Attacks
- 4.2.1-Activity-Launching a Denial of Service Attack
- 4.2.2-Activity-Phishing for Credentials
- 4.2.3-Activity-Deploying a Malicious Charging Cable
- 4.3 Network Defense
- 4.3.1-Activity-Implementing ACLs
Module 5: Network Troubleshooting
- 5.1 Troubleshooting Methodology
- 5.2 Common Cabling and Physical Interface Issues
- 5.2.1-Activity-Selecting the Right Cable
- 5.2.2-Activity-Crimping an RJ-45 End on a Cable
- 5.3 Network Service Issues
- 5.3.1-Activity-Troubleshooting a Routed Network
- 5.4 Performance Issues
- 5.5 Troubleshooting Tools and Protocols
- 5.5.1-Activity-Using Command Line Commands
- 5.5.2-Activity-Using NSLOOKUP and DIG
- 5.5.3-Activity-Using NMAP
- 5.5.4-Activity-Troubleshooting Using CDP and LLDP
- 5.5.5-Activity-Testing a cable
- 5.5.6-Activity-Toning a cable
- 5.5.7-Activity-Using a Spectrum Analyzer
- 5.5.8-Activity-Testing a Fiber Optic Cable
- 5.5.9-Activity-Using Network Device Commands
- 5.6 Course Closeout
Module 1: Performing Basic Linux Tasks
- 1.1 Introduction to Linux XK0-005
- 1.2 Instructor Introduction
- 1.3 Course Introduction
- 1.4 Identify the Linux Design Philosophy
- 1.5 Enter Shell Commands
- 1.6 Shell Commands Activity
- 1.7 Get Help with Linux
Module 2: Managing Users and Groups
- 2.1 Assume Superuser Privileges
- 2.2 Create, Modify, and Delete Users
- 2.3 Create, Modify, and Delete Groups
- 2.4 Query Users and Groups
- 2.5 Configure Account Profiles
Module 3: Managing Permissions and Ownership
- 3.1 Modify File and Directory Permissions
- 3.2 Modify File and Directory Ownership
- 3.3 Configure Special Permissions and Attributes
- 3.4 Troubleshoot Permissions Issues
Module 4: Managing Storage
- 4.1 Create Partitions
- 4.2 Manage Logical Volumes
- 4.3 Mount File Systems
- 4.4 Manage File Systems
- 4.5 Navigate the Linux Directory Structure
- 4.6 Troubleshoot Storage Issues
- 4.7 Container Storage Management
- 4.8 Advanced Data Management and Security for Containers
Module 5: Managing Files and Directories
- 5.1 Create and Edit Text Files
- 5.2 Search for Files
- 5.3 Perform Operations on Files and Directories
- 5.4 Process Text Files
- 5.5 Manipulate File Output
Module 6: Managing Kernel Modules
- 6.1 Explore the Linux Kernel
- 6.2 Install and Configure Kernel Modules
- 6.3 Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- 7.1 Configure Linux Boot Components
- 7.2 Configure GRUB
Module 8: Managing System Components
- 8.1 Configure Localization Options
- 8.2 Configure GUIs
- 8.3 Manage Services
- 8.4 Troubleshoot Process Issues
- 8.5 Troubleshoot CPU and Memory Issues
- 8.6 – Troubleshooting With systemd
Module 9: Managing Devices
- 9.1 Identify the Types of Linux Devices
- 9.2 Configure Devices
- 9.3 Monitor Devices
- 9.4 Troubleshoot Hardware Issues
Module 10: Managing Networking
- 10.1 Identify TCP-IP Fundamentals
- 10.2 Identify Linux Server Roles
- 10.3 Connect to a Network
- 10.4 Configure DHCP and DNS Client Services
- 10.5 Configure Cloud and Virtualization Technologies
- 10.6 Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- 11.1 Identify Package Managers
- 11.2 Manage RPM Packages with YUM
- 11.3 Manage Debian Packages with APT
- 11.4 Configure Repositories
- 11.5 Acquire Software
- 11.6 Build Software from Source Code
- 11.7 Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- 12.1 Implement Cybersecurity Best Practices
- 12.2 Implement Identity and Access Management Methods
- 12.3 Configure SELinux or AppArmor
- 12.4 Configure Firewalls
- 12.5 Implement Logging Services
- 12.6 Back Up, Restore, and Verify Data
- 12.7 NFTables – Setting Up Advanced Firewalls
Module 13: Working with Bash Scripts
- 13.1 Customize the Bash Shell Environment
- 13.2 Identify Scripting and Programming Fundamentals
- 13.3 Write and Execute a Simple Bash Script
- 13.4 Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- 14.1 Schedule Jobs
- 14.2 Implement Version Control Using Git
- 14.3 Identify Orchestration Concepts
Module 15: Installing Linux
- 15.1 Prepare for Linux Installation
- 15.2 Perform the Installation
Module 16 – Working With Modern IT Infrastruture
- 16.1 – Infrastruture As Code (IAC)
- 16.2 – Containers, Cloud, and Orchestration Concepts
- 16.3 – Container Management
- 16.4 – Container and Cloud Networking Basics
Module 1 – SY0-701 General Security Concepts
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY – Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY – Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY – Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY – Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY – O.MG Cable Baiting
- 2.2.2 O.MG-No Cable
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY – Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY – Abusing Unsanitized Input
- 2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY – Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY – Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY – Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY – Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY – Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY – Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY – Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications – Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
Module 4 – SY0-701 Security Operations
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY – Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY – Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY – Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY – Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY – Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY – Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY – Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY – Conducting OSINT
- 5.5.2 ACTIVITY – Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
Module 1 – CompTIA CySA+ CS0-003 Basics
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certfication
Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
- 2.1 Domain 1 – Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion – Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration – IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
- 3.1 Domain 2 – Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and Management
- 4.1 Domain 3 – Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Reponse
- 4.6 Detection and Analysis
- 4.7 Post Incident Activities
- 4.8 Containment, Eradication and Recovery
- 4.9 Module 4 Review
Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
- 5.1 Domain 4 – Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPI's
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
Module 1 – CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud + Exam
- 1.3 Cloud + Domain Obectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
Module 2 – General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration – AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration – AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration -AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
Module 3 – Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDSIPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration – Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion – CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
Module 4 – Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration – Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration – Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration – AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to The Cloud
- 4.20 Network Protocols
- 4.21 VPNS, VPC and Connectivity
- 4.22 Whiteboard – AWS VPC Connectivity
- 4.23 Demonstration – AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
Module 5 – Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration – SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration or Automation
- 5.13 DevOps, IaC and CICD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
Module 6 – Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLS
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion Site Connectivity Issues
- 6.9 Discussion – Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration – GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
Module 7 – Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
Module 1 – IT Concepts and Terminology
- Module 1 Notes
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
Module 2 – Infrastructure
- Module 2 Notes
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 – Applications and Software
- Module 3 Notes
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
Module 4 – Software Development
- Module 4 Notes
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
Module 5 – Database Fundamentals
- Module 5 Notes
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 – Security
- Module 6 Notes
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
Module 1 – Risk Management
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
Module 2 – Enterprise Security Architecture
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 – Enterprise Security Operations
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
Module 4 – Technical Integration of Enterprise Security
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
Module 5 – Research, Development and Collaboration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
Module 1: Over-The-Air Technologies
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
Module 2: Network Infrastructure
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
Module 3: Mobile Device Manager
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
Module 4: Security
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
Module 5: Troubleshooting
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
Domain 1 – Characteristics of Cloud Services from a Business Perspect
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
Domain 2 – Cloud Computing and Business Value
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
Domain 3 – Technical Perspectives/Cloud Types
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
Domain 4 – Steps to Successful Adoption of Cloud
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
- Information Security Management System-Part1
- Information Security Management System-Part2
Domain 6 – Risks and Consequences of Cloud Computing
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
This course is included in all of our team and individual training plans. Choose the option that works best for you.
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.
Frequently Asked Questions.
What topics are covered in the CompTIA Certification Training Series?
The CompTIA Certification Training Series encompasses a broad range of IT fundamentals, troubleshooting skills, and security principles. It prepares students for certifications like CompTIA A+, Network+, and Security+. The courses focus on hardware, software, networking, and cybersecurity concepts essential for IT support roles.
Students learn through practical scenarios, such as diagnosing hardware failures, resolving network connectivity issues, and managing security policies. This hands-on approach ensures they develop problem-solving skills necessary for real-world IT environments and certification exams.
How does this training prepare me for real-world IT support issues?
This training emphasizes troubleshooting techniques by simulating common IT problems, such as connectivity issues, hardware failures, or security restrictions. Students learn to analyze symptoms, identify root causes, and implement effective solutions.
By working through these scenarios, learners develop critical thinking and diagnostic skills that are directly applicable to help desk and support technician roles. The course also covers best practices for documenting and communicating solutions, which are vital in professional IT support.
Is the CompTIA Certification Training Series suitable for beginners?
Yes, the series is designed to accommodate beginners with little or no prior IT experience. It starts with foundational concepts such as computer hardware, operating systems, and basic networking principles.
As the course progresses, it introduces more advanced topics like cybersecurity and network management. The training includes practical exercises, making it accessible for newcomers eager to enter the IT field or earn their first certification.
What is the benefit of obtaining a CompTIA certification after this training?
Achieving a CompTIA certification demonstrates verified skills and knowledge in IT support, networking, or security. It can enhance your resume, increase job prospects, and potentially lead to higher salaries in the IT industry.
The certifications are widely recognized by employers worldwide and serve as a validation of your ability to handle real-world IT challenges. The training prepares you not only to pass the exams but also to excel in practical support roles.
How does the CompTIA Certification Training Series differ from other IT training programs?
The CompTIA series is focused on vendor-neutral skills, ensuring versatility across different hardware and software environments. It emphasizes troubleshooting, problem resolution, and foundational security practices essential for IT support roles.
Unlike some programs that may focus solely on specific technologies, this training combines theoretical knowledge with practical application. It prepares students for industry-recognized certifications that validate their ability to solve diverse IT problems efficiently.