CompTIA Secure Infrastructure Specialist (CSIS)

$139.00

SKU comptia-csis Categories , ,
 

Course overview

89  HOURS OF TRAINING
364 VIDEOS
20  SKILLS
833 PRACTICE QUESTIONS

The CompTIA CSIS is a stackable certification by CompTIA. It is designed for IT professionals with 0 to 2 years of experience. The ITU Certification Path for the CompTIA CSIS certification consists of the learning materials to allow you to study for and pass the CompTIA A+, CompTIA Network+ and CompTIA Security+ exams.

Get an exceptional deal on this course at a lower price.  View our Master CompTIA Training Series which includes this course.

Completing this path and passing the four exams means you end of with three CompTIA certifications and are a designated a CompTIA Secure Infrastructure Specialist (CSIS). The three courses contained in this path are:

About The Exams for CompTIA CSIS

For the CompTIA A+ certification, you must pass two exams. The current exams for CompTIA A+ are:

For CompTIA Network+ certification, you are required to pass one exam:

For CompTIA Security+ certification, you are required to pass one exam:

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSIS certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

CompTIA A+ 220-1002 (Core 2) Course Outline

Module 1 - Operating Systems
  •    Module 1 Workbook
  •    0.1 Intro to A+ Core2 Instructor
  •    1.0 Intro to A+ Core2
  •    1.1 Operating Systems Part1
  •    1.1 Operating Systems Part2
  •    1.2 Compare and Contrast features of Microsoft Windows Versions
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  •    1.4 Scenario use appropriate Microsoft Command Line Tools Part1
  •    1.4 Scenario use appropriate Microsoft Command Line Tools Part2
  •    1.4 Scenario use appropriate Microsoft Command Line Tools Demo
  •    1.5 Microsoft Operating System and Tools Part1
  •    1.5 Microsoft Operating System and Tools Part1 Demo
  •    1.5 Microsoft Operating System and Tools Part2
  •    1.5 Microsoft Operating System and Tools Part2 Demo
  •    1.5 Microsoft Operating System and Tools Part3
  •    1.5 Microsoft Operating System and Tools Part3 Demo
  •    1.5 Microsoft Operating System and Tools Part4
  •    1.5 Microsoft Operating System and Tools Part4 Demo
  •    1.6 Microsoft Windows Control Panel Utilities
  •    1.6 Microsoft Windows Control Panel Utilities Demo
  •    1.7 Summerize Application Installation and Configuration Concepts
  •    1.8 Configure Windows Networking on a Client Desktop
  •    1.8 Configure Windows Networking on a Client Desktop Demo
  •    1.9 Features and Tools of MAC OS and Linux Client Desktop
Module 2 - Security
  •    Module 2 Workbook
  •    2.1 Security - Physical Security Measures
  •    2.2 Explain Logical Security Concepts
  •    2.2 Explain Logical Security Concepts Part2
  •    2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  •    2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
  •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  •    2.6 Compare Contrast the different Microsoft Windows Security Settings
  •    2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  •    2.7 Implement Security Best Practices to Secure a Workstation
  •    2.7 Implement Security Best Practices to Secure a Workstation Part2
  •    2.8 Implement Methods for Securing Mobile Devices
  •    2.9 Implement Appropriate Data Destruction & Disposal Methods
  •    2.10 Configure Security on SOHO Wireless and Wired Networks
  •    2.10 Configure Security on SOHO Wireless and Wired Networks Demo
Module 3 - Software Troubleshooting
  •    Module 3 Workbook
  •    3.1 Software Troubleshooting Part1
  •    3.1 Software Troubleshooting Part2
  •    3.1 Software Troubleshooting Demo
  •    3.2 Troubleshoot and Resolve PC Security Issues
  •    3.2 Troubleshoot and Resolve PC Security Issues Part2
  •    3.2 Troubleshoot and Resolve PC Security Issues Demo
  •    3.3 Best Practice Procedures for Malware Removal
  •    3.4 Troubleshoot Mobile OS and Application
  •    3.5 Troubleshoot Mobile OS and Application Security Issue
Module 4 - Operational Procedures
  •    Module 4 Workbook
  •    4.1 Operational Procedures
  •    4.2 Implement Basic Change Management Best Practices
  •    4.3 Implement Basic Disaster Prevention and Recovery Methods
  •    4.4 Explain Common Safety Procedures
  •    4.5 Explain Environmental Impacts and Appropriate Controls
  •    4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  •    4.7 Using Proper Communication Techniques and Professionalism
  •    4.8 Identify the Basic of Scripting
  •    4.8 Identify the Basic of Scripting Demo
  •    4.9 Use Remote Access Technologies

CompTIA A+ 220-1001 (Core 1) Course Outline

Module 1 - Mobile Devices
  •    Module 1 Workbook
  •    0.1 Intro to A+ Core1 Instructor
  •    1.0 CompTIA A+ Course Intro
  •    1.1 Mobile Devices Part 1
  •    1.1 Mobile Devices Part 2
  •    1.1 Mobile Devices Part 3
  •    1.2 Installing Components in Laptop
  •    1.3 Laptop Features Part 1
  •    1.3 Laptop Features Part 2
  •    1.4 Compare and Contrast Types of Mobile Devices
  •    1.5 Accessories and Ports of Other Mobile Devices Part 1
  •    1.5 Accessories and Ports of Other Mobile Devices Part 2
  •    1.6 Configure Basic Device Network Connectivity and Application Support Part 1
  •    1.6 Configure Basic Device Network Connectivity and Application Support Part 2
  •    1.7 Use Methods to Perform Mobile Device Synchronization
  •    1.8 Laptop Disassemble and Assemble
Module 2 - Networking
  •    Module 2 Workbook
  •    2.1 Networking Part 1
  •    2.1 Networking Part 2
  •    2.2 Compare and Contrast Common Networking Hardware Devices Part 1
  •    2.2 Compare and Contrast Common Networking Hardware Devices Part 2
  •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  •    2.3 Setting Up a Wireless Router
  •    2.4 Compare and Contrast Wireless Networking Protocols
  •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  •    2.6 Explain Common Network Configuration Concepts Part 1
  •    2.6 Explain Common Network Configuration Concepts Part 2
  •    2.7 Compare and Contrast Internet Connection Types Network Types and Features
  •    2.8 Given a Scenario Using Appropriate Networking Tools
Module 3 - Hardware
  •    Module 3 Workbook
  •    3.1 Hardware Part 1
  •    3.1 Hardware Part 2
  •    3.1 Hardware Part 3
  •    3.2 Identify Common Connector Types
  •    3.3 Scenario Install RAM Types
  •    3.4 Scenario Select Install and Configure Storage Devices
  •    3.4 Scenario Select Install and Configure Storage Devices Part 2
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
  •    3.5 Install Disassemble and Assemble a Desktop
  •    3.6 Purposes for Peripherals and Types
  •    3.7 Summarize Power Supplies
  •    3.8 Scenario Select and Configure Appropriate Components for Customers PCs
  •    3.9 Scenario Installand Configure Common Devices
  •    3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
  •    3.11 Scenario Install and Maintain Various Print Technologies Part 1
  •    3.11 Scenario Install and Maintain Various Print Technologies Part 2
  •    3.11 Scenario Install and Maintain Various Print Technologies Part 3
Module 4 - Virtualization and Cloud Computing
  •    Module 4 Workbook
  •    4.1 Virtualization Part 1
  •    4.1 Virtualization Part 2
  •    4.2 Scenario Setup and Configure Client-side Virtualization
Module 5 - Hardware and Network Troubleshooting
  •    Module 5 Workbook
  •    5.1 Hardware and Networking Troubleshooting
  •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  •    5.3 Troubleshoot Hard Drives and RAID Arrays
  •    5.4 Troubleshoot Video and Display Issues
  •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  •    5.6 Troubleshoot Printers
  •    5.7 Troubleshoot Common Wired and Wireless Network Problems

CompTIA Network+ N10-007 Course Outline

Module 1 - Networking Concepts
  •    Module 1 Workbook
  •    Intro Network Plus N10 007
  •    Basic Networking
  •    Activity Basic Networking
  •    OSI Model
  •    Exploring the OSI Model- Act
  •    Protocol and Ports
  •    Activity Examining Protocols and Ports
  •    Connection-oriented vs. connectionless
  •    Activity Comparing TCP and UDP
  •    Internet Protocol (IP)
  •    Activity Examining the Lower Layer Protocols
  •    Layer 7 Remote Control Protocols
  •    Layer 7 File Transfer Protocols
  •    Layer 7 Messaging Protocols
  •    Activity Examining Messaging Protocols
  •    Layer 7 Web Traffic Protocols
  •    Layer 7 Streaming Media Protocols
  •    Layer 7 Infrastructure Management Protocols
  •    Switching
  •    Activity Creating Collision and Broadcast Domains
  •    Interface Properties and Segmentation
  •    Activity Creating a Basic Network Segment
  •    Switching prt 2
  •    Activity Switching
  •    Switching Loop Management
  •    Activity Managing Switching Loops
  •    VLANs
  •    Activity Creating VLANs
  •    routing
  •    Activity Examining ARP
  •    IP Addressing Basics
  •    Activity Configuring IP
  •    Routers
  •    Activity Setting Up a Router
  •    Routing Basics
  •    Activity Adding Static Routes
  •    VLAN Routing
  •    Activity Routing Between VLANs
  •    NAT/PAT
  •    Activity Configuring NAT/PAT
  •    Routing Protocols
  •    Activity Configuring a Routing Protocol
  •    Firewalls
  •    Activity Configuring Firewalls
  •    Advanced Switching and Routing Concepts
  •    Activity Exploring IPv6
  •    Performance Concepts
  •    IP Addressing
  •    Subnetting
  •    Activity Learning to Subnet
  •    Address Assignments
  •    Network Types and Topologies
  •    Wireless Topologies
  •    Network Types
  •    Technologies that Facilitate the Internet Of Things (IoT)
  •    Wireless Technologies
  •    802.11 Standards
  •    Wi-Fi Frequencies
  •    Wi-Fi Antenna Concepts
  •    Bluetooth
  •    Cellular
  •    Activity Using an RF Spectrum Analyzer
  •    cloud concepts
  •    Activity Exploring Cloud Services
  •    Network Services
  •    Activity Setting up DNS
  •    DHCP Service
  •    Activity Setting Up DHCP
  •    NTP
Module 2 - Infrastructure
  •    Module 2 Workbook
  •    Module 2 – Infrastructure
  •    Activity Testing a Fiber Optic Cable
  •    Plenum vs. PVC
  •    Activity Crimping on an RJ-45 Connector
  •    Transceivers
  •    Activity Terminating Cable to a 110 Block
  •    Copper Cable Standards
  •    Activity Creating a Crossover Cable
  •    Ethernet Deployment Standards
  •    Network Device Placement and Installation
  •    Repeater
  •    Router
  •    Modem
  •    Activity Setting up a WAP
  •    Firewall
  •    Media Converter
  •    Advanced Network Devices
  •    Wireless Controller
  •    Proxy Server
  •    Activity Configuring Proxy Settings
  •    VPN Concentrator
  •    Virtual Networking Components
  •    Network Storage Types
  •    WAN Technologies
  •    Transmission Mediums
  •    Activity Configuring WAN Links
  •    Termination
Module 3 - Network Operation
  •    Module 3 Workbook
  •    Network Operations Documentation
  •    Standard Operation Procedures
  •    Logical vs Physical Diagrams
  •    Rack Diagrams
  •    Change Management
  •    Wiring and Ports Locations
  •    IDF-MDF Documentation
  •    Labeling
  •    Using Documentation Act
  •    Continuity and Disaster
  •    MTTR Mean Time Repair
  •    Recovery
  •    Backing Up Your Data Act
  •    Event Management
  •    Metrics
  •    Scanning Monitoring Patching
  •    Testing the Network Act
  •    HTTPS-Management
  •    Out-of-Band Management
  •    RDP
  •    Remote Access Methods
  •    Remote File Access
  •    Making Remote Connections Act
  •    SSH
  •    VNC
  •    Policies and Best Practices
  •    Creating Policies and Procedures Act
Module 4 - Network Security
  •    Module 4 Workbook
  •    Physical Security Devices
  •    Examining Security Devices Act
  •    Authentication and Access
  •    Access Controls Methods Act
  •    Multifactor Authentication
  •    Basic Wireless Network Security
  •    Demonstrating the Need for Wireless Act
  •    Common Network Attacks
  •    Conducting a Phishing Campaign Act
  •    Network Device Hardening
  •    Supporting Secure Authentication Encryption Act
  •    Updating Firmware
  •    Explain Common Mitigation Techniques
  •    Implementing a Honey Pot Act
Module 5 - Network Troubleshooting and Tools
  •    Module 5 Workbook
  •    Network Troubleshoot
  •    Using the Appropriate Tools
  •    Hardware Tools Analyzers
  •    Troubleshooting With Hardware Tools Act
  •    Software Tools
  •    Troubleshooting with Software Tools Act
  •    Software Tools Command Line
  •    Troubleshooting with Command Line Tools Act
  •    Troubleshoot Common Wired Connectivity
  •    Troubleshooting Signal Problems
  •    Physical Issues
  •    Transceiver Issues
  •    Troubleshooting Transceiver Problems
  •    Traffic Flow Issues
  •    Troubleshoot Common Wireless Connectivity
  •    Latency and Jitter
  •    Incorrect WAP Types
  •    Troubleshooting WAP Issues
  •    Troubleshooting Common Network
  •    DHCP Issues
  •    Firewall ACL Issues
  •    Advanced Network Issues
  •    Unresponsive Services
  •    Case Study Troubleshooting
  •    Outro N10 007

CompTIA Security+ SY0-501 Course Outline

Module 1: Threats, Attacks and Vulnerabilities
  •    Module 1 Workbook
  •    Introduction
  •    Types Of Malware-Part 1
  •    Types Of Malware-Part 2
  •    Types Of Attacks-Part 1
  •    Types Of Attacks-Part 2
  •    Types Of Attacks-Part 3
  •    Types Of Attacks-Part 4
  •    Types Of Attacks-Part 5
  •    Threat Actors-Part 1
  •    Threat Actors-Part 2
  •    Penetration Testing And Vulnerability Scanning-Part 1
  •    Penetration Testing And Vulnerability Scanning-Part 2
  •    Impact Of Vulnerabilities-Part 1
  •    Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  •    Module 2 Workbook
  •    Networking Hardware And Software-Part 1
  •    Networking Hardware And Software-Part 2
  •    Networking Hardware And Software-Part 3
  •    Networking Hardware And Software-Part 4
  •    Networking Hardware And Software-Part 5
  •    Networking Hardware And Software-Part 6
  •    Security Assessment-Part 1
  •    Security Assessment-Part 2
  •    Troubleshooting Issues-Part 1
  •    Troubleshooting Issues-Part 2
  •    Securing Mobile Devices-Part 1
  •    Securing Mobile Devices-Part 2
  •    Securing Mobile Devices-Part 3
  •    Securing Mobile Devices-Part 4
  •    Secure Protocols-Part 1
  •    Secure Protocols-Part 2
Module 3: Architecture and Design
  •    Module 3 Workbook
  •    Secure Network Architecture-Part 1
  •    Secure Network Architecture-Part 2
  •    Secure System Designs-Part 1
  •    Secure System Designs-Part 2
  •    Secure Staging Deployment Concepts
  •    Embedded Systems-Part 1
  •    Embedded Systems-Part 2
  •    Application Development And Deployment-Part 1
  •    Application Development And Deployment-Part 2
  •    Application Development And Deployment-Part 3
  •    Physical Security Controls-Part 1
  •    Physical Security Controls-Part 2
  •    Physical Security Controls-Part 3
  •    Cloud Virtualization-Part 1
  •    Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  •    Module 4 Workbook
  •    Identity And Access Management-Part1
  •    Identity And Access Management-Part2
  •    Identity And Access Services-Part1
  •    Identity And Access Services-Part2
  •    Management Controls-Part1
  •    Management Controls-Part2
  •    Account Management Practices-Part1
  •    Account Management Practices-Part2
  •    Account Management Practices-Part3
Module 5: Risk Management
  •    Module 5 Workbook
  •    Organizational Security-Part1
  •    Organizational Security-Part2
  •    Business Impact Analysis Concepts-Part1
  •    Business Impact Analysis Concepts-Part2
  •    Risk Management-Part1
  •    Risk Management-Part2
  •    Incident Response Procedures-Part1
  •    Incident Response Procedures-Part2
  •    Forensics-Part1
  •    Forensics-Part2
  •    Disaster Recovery-Part1
  •    Disaster Recovery-Part2
  •    Types Of Control-Part1
  •    Types Of Control-Part2
  •    Data Security And Privacy Practices-Part1
  •    Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  •    Module 6 Workbook
  •    Cryptographic Basics-Part1
  •    Cryptographic Basics-Part2
  •    Cryptographic Basics-Part3
  •    Cryptographic Algorithms-Part1
  •    Cryptographic Algorithms-Part2
  •    Wireless Security-Part1
  •    Wireless Security-Part2
  •    Implementing PKI-Part1
  •    Implementing PKI-Part2
  •    Implementing PKI-Part3
  •    Conclusion
ITU Learning Management System Image