Information Technology & Cybersecurity

Get industry-leading certification training and pioneer a career in IT and Cybersecurity.

INDUSTRY TRAINING that covers

THE INDUSTRY

Why IT & Cybersecurity?

The IT industry is expected to grow by 13% from 2020-2030, over twice as fast as the national average. Find your career in a growing field.

The global IT industry is worth $5.2 trillion

Over 51% of the IT industry is dedicated to Cybersecurity

Average salary among IT professionals over $85,000

Huge opportunity for upward career mobility

Ranked #2 in Best Technology Jobs

75% of organizations are in need of Cybersecurity pros

How to Get Started

Entering the IT & Cybersecurity industry isn’t as difficult as it may seem:

Get Trained

You don’t need a ton of technical knowledge. You’ll be learning from the ground up, starting with the basic foundations.

Work and Learn

You don’t need to quit your job. You can follow our self-paced program and work to get your certifications on your own time.

Level Up

You can move to a new career in a matter of a few months. Our programs can get you trained and certification exam-ready.

Companies that hire people with the certifications you’re about to earn.

THE Skills

No Degree Required

Most people believe that your first technical job requires a degree, experience or some combination of both. 

Check out this video outlining how one can get started in the IT industry quickly and then build on their skills as they go.

The Pathway to Success in IT

Get Certified

Complete our 9-week, self-paced IT certification exams in CompTia A+ and Security+ to get started fast.

Gain Experience

Leverage your training and certifications to attract high-paying, entry-level positions starting at $25-35/hr or more.

Discover Your Passion

Will you enjoy cybersecurity most? Or another in-demand area like networking, cloud computing, or tech support?

Grow Even More

Build an extremely profitable, rewarding career by upgrading your certifications to reach higher levels.

Your Self-Paced Solution

Our course bundle makes it super easy for you to step into your career by giving you everything you need to get started:

Complete Certification Training Platform

You’ll begin your journey in our online training platform, where you’ll get everything you need to ace your first few industry certifications - and access for a year to continue education!

Interactive Learning Tools

As you approach testing day, you’ll have interactive learning tools and comprehensive workbooks with pages of notes to review to ensure you pass with flying colors.

Career Changer Community

During your certification training & your IT job search, you’ll have access to our online student & alumni group, where you can connect with folks to pair study or find new opportunities out in the field.

Course Curriculum

What You'll Learn in the Course

Unlock the knowledge to jumpstart your new IT career today!

9

Courses

1,007

Videos

217

Hours of Content

Course 1

CompTIA IT Fundamentals

The CompTIA IT Fundamentals course and exam focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.

Lesson 1 - IT Concepts and Terminology

  • Instructor Intro
  • Compare and Contrast Notational Systems
  • Compare and Contrast Notational Systems Demo
  • Compare and Contrast Fundamentals Data Types and Their Characteristics
  • Illustrate the Basics of Computing and Processing
  • Explain the Value of Data and Information
  • Compare and Contrast Common Units of Measures
  • Compare and Contrast Common Units of Measures Demo
  • Explain the Troubleshooting Methodology

Lesson 2 - Infrastructure

  • Classify Common Types of Input-Output Device Interfaces
  • Given a scenario, set up & install Common Peripheral Devices to a PC
  • Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • Explain the Purpose of Common Internal Computing Components
  • Compare & Contrast Common Internet Service Types-
  • Compare & Contrast Storage Types
  • Compare & Contrast Common Computing Devices & Their Purposes
  • Explain Basic Networking Concepts
  • Explain Basic Networking Concepts Part 2
  • Explain Basic Networking Concepts Part 3
  • Explain Basic Networking Concepts Part 4
  • Explain Basic Networking Concepts Demo
  • Given a scenario Install, Configure & Secure a Basic Wireless Network
  • Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

Lesson 3 - Applications and Software

  • Explain the Purpose of Operating Systems
  • Explain the Purpose of Operating Systems Demo
  • Compare & Contrast Components of an Operating System
  • Compare & Contrast Components of an Operating System Demo
  • Explain the Purpose & Proper Use of Software
  • Explain Methods of Application Architecture & Delivery Models
  • Given a Scenario Configure & Use Web Browsers
  • Given a Scenario Configure & Use Web Browsers FireFox
  • Given a Scenario Configure & Use Web Browsers Demo Chrome
  • Given a Scenario Configure & Use Web Browsers Demo Edge
  • Compare & Contrast General Application Concepts & Uses

Lesson 4 - Software Development

  • Compare & Contrast Programming Language Categories-
  • Given a Scenario Use Programming Organizational Techniques & Interpret
  • Logic
  • Explain the Purpose & Use of Programming Concepts
  • HTML Demo

Lesson 5 - Database Fundamentals

  • Explain Database Concepts and the Purpose of Databases
  • Compare and Contrast Various Database Structures
  • Summarize Methods Used to Interface with Databases
  • Summarize Methods Used to Interface with Databases Demo

Lesson 6 - Security

  • Summarize Confidentiality, Integrity, and Availability Concerns
  • Explain Methods to Secure Devices and Best Practices
  • Summarize Behavioral Security Concepts
  • Compare & Contrast Authentication, Authorization, Accounting, &
  • Repudiation Concepts
  • Explain Password Best Practices
  • Explain Common Uses of Encryption
  • Explain Business Continuity Concepts
  • Takeaways
  • ITF Fundamentals Conclusion

Course 2

CompTIA A+ Core 1 (220-1001) & Core 2 (220-1002)

The CompTIA A+ certified professionals support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. 

Core 1: Lesson 1 - Devices, Setups, and Installs

  • Introduction to the Course, Meet the Instructor
  • Appropriate Safety Procedures
  • PC Components
  • Guidlines for PC Disassembly
  • Motherboards
  • CPU Sockets
  • PCI Bus
  • Storage Bus (SATA and IDE)
  • Discussing PC Components
  • Common Connection Interfaces
  • Wired and Wireless Connection Standards
  • Install Peripheral Devices
  • Guidelines and Discussion for Installing Peripheral Devices

Core 1: Lesson 2 - Displays and Multimedia Devices

  • Displays and Multimedia
  • Display Device Connections and Cables
  • Discussing Display Device Installation and Configuration
  • Troubleshoot Display Devices
  • Guidelines for Troubleshooting Display Devices
  • Discussing Display Device Troubleshooting
  • Install and Configure Multimedia Devices
  • Discussing Multimedia Device Installation and Configuration

Core 1: Lesson 3 - Supporting Multiple Drive Types

  • Supporting Multiple Drive Types and Memory

  • Memory Types

  • RAM Types

  • Memory Modules

  • DIMM and SO-DIMM Technologies

  • Parity and ECC RAM

  • Memory Compatibility Issues

  • Discussing System Memory Installation

  • Install and Configure Mass Storage Devices

  • Storage Adapters and Cables

  • Solid State Drives

  • Guidelines for Installing Mass Storage Devices

  • Discussing Mass Storage Device Installation and Configuration

  • Install and Configure Removable Storage

  • Discussing Removable Storage Device Installation and Configuration

  • Configure RAID

  • RAID Configuration Options

  • Discussing RAID Configuration

  • Troubleshoot Storage Devices

  • Boot Failures

  • Discussing Storage Device Troubleshooting

Core 1: Lesson 4 - Accounting for CPUs and Internal Components

  • Install Upgrade CPUs
  • Multiprocessing and Multicore Processors
  • Discussing CPU Upgrades
  • Configure and Update BIOS UEFI
  • Discussing BOIS-UEFI Configuration and Updates
  • Install Power Supplies
  • Discussing Power Supply Installation
  • Troubleshoot Internal System Components
  • POST and Boot Problems
  • Boot Troubleshooting and Log Entries
  • Motherboard Component Problems
  • Discussing System Component Troubleshooting

Core 1: Lesson 5 - All About Network Theories

  • Wired Networks

  • Common Ethernet Network Implementations

  • Taps and Mirrors

  • Discussing Wired Networks

  • Network Hardware Devices

  • Switches

  • Power Over Ethernet

  • Discussing Network Hardware Devices

  • Wireless Networks

  • Access Points and Wireless Network Modes

  • Discussing Wireless Networks

  • Internet Connection Types

  • Wireless Internet Service Providers WISP

  • Discussing Internet Connection Types

  • Network Configuration Concepts

  • The TCIP-IP Protocol Suite

  • Internet Protocol and IP Addressing

  • Public and Private IP Addresses

  • IPv6

  • Discussing Network Configuration Concepts

  • Network Services

  • DNS

  • Dynamic and Static IP Configurations

  • DNS Records MX and A

  • Web Servers and HTTP-HTTPS

  • Discussing Network Services

Core 1: Lesson 6 - Network Operations and Diagnostics

  • Configuring and Troubleshooting Networks

  • Network Connections in Windows

  • Install and Configure SOHO Networks

  • Configure SOHO Network Security

  • Firewalls

  • Port Fowarding and Port Triggering

  • Windows Firewall

  • Network Security and Embedded Appliances

  • Configure Remote Access

  • Discussing Remote Access Configuration

  • Troubleshoot Network Connections

  • IP Configuration Issues

  • Routing Issues

  • Discussing Network Connection Troubleshooting

Core 1: Lesson 7 -Cloud and Virtualization Computing

  • Configure Client-Side Virtualization

  • Hypervisors

  • Processor Support and Resource Requirements

  • Virtual Networks

  • Client-Side Virtualization

  • Cloud Computing Concepts

  • Internal and External Shared Resources

  • Cloud Service Options

  • Virtual Desktops

  • Software-Defined Networking (SDN)

  • Discussing Cloud Computing Concepts

Core 1: Lesson 8 - Laptop Features and Troubleshooting

  • Use Laptop Features

  • Expansion Options

  • Discussing Laptop Features

  • Install and Configure Laptop Hardware

  • Discussing Laptop Hardware Installation and Configuration

  • Troubleshoot Common Laptop Issues

  • Discussing Troubleshooting Common laptop Issues

Core 1: Lesson 9 - Syncing and Setup of Mobile Devices

  • Syncing and Setup of Mobile Devices

  • Connect and Configure Mobile Devices

  • Configure Mobile Device Network Connectivity

  • Mobile VPN Configuration

  • Email Configuration Options

  • Discussing Mobile Device Network Connectivity Configuration

  • Support Mobile Apps

  • Discussing Mobile App Support

Core 1: Lesson 10 - All Things Printing

  • All Things Printing

  • Discussing Laser Printer Maintenance

  • Maintain Inkjet Printers

  • Discussing Inkjet Printer Maintenance

  • Maintain Impact, Thermal, and 3D Printers

  • Discussing Impact, Thermal, and 3D Printer Maintenance

  • Install and Configure Printers

  • Discussing Printer Installation and Configuration

  • Troubleshoot Print Device Issues

  • Install and Configure Imaging Devices

  • Discussing Device Installation and Configuration

Core 2: Lesson 1 - Operating System Management

  • Introduction to the Course, Meet the Instructor
  • Identify Common Operating Systems
  • Microsoft Windows
  • Work and Education Features
  • Windows System Limits
  • Apple Operating Systems
  • Linux Disk and File Management
  • Discussing OS Types
  • Use Windows Features and Tools
  • Administrative Tools
  • Manage Files in Windows
  • System Hierarchies
  • File Attributes
  • Discussing Windows Features and Tools
  • Manage Disks in Windows
  • Discussing File Management in Windows
  • The Windows Disk Management Console
  • Discussing Windows Disk Management
  • Manage Devices in Windows
  • Device Manager
  • Discussing Windows Device Manager

Core 2: Lesson 2 - Security

  • Configuring and Installing the OS
  • Installation Boot Methods
  • Disk Formatting and Partitioning
  • Networking Considerations
  • Post Installation Tasks
  • OS Installation Types
  • Unattended Installations
  • Maintain OSs
  • OS Updates
  • Anti-Malware Updates
  • Scheduled Backups
  • Task Schedulers part 1
  • Task Schedulers part 2
  • Install Windows 10 Demonstration
  • Discussing OS Maintenance

Core 2: Lesson 3 - Tools to Troubleshoot and Maintain the OS

  • Install and Manage Windows Applications
  • Windows OS Tools
  • Application and Print Services
  • Task Manager
  • Manage Windows Performance
  • Windows Performance Management Tools
  • Troubleshoot Windows
  • Event Viewer
  • The System Configuration Utility
  • Troubleshooting Tips Boot Process
  • Troubleshooting Tips for Windows System Issues
  • Blue Screens and Spontaneous Shutdowns
  • Troubleshooting Tips for File and Memory Corruption
  • Safe Boot
  • System Repair Disc
  • System Restore
  • Guidelines for Troubleshooting Windows Issues

Core 2: Lesson 4 - Network Management Tools

  • Network Management Tools
  • Network Connectivity
  • IP Addressing and Connection Types
  • Proxy Settings
  • Windows Client Configuration
  • Location Services
  • Firewalls
  • Network Troubleshooting
  • Remote Desktop Tools
  • Desktop Management and Remote Monitoring Tools
  • Discussion Topics

Core 2: Lesson 5 - Sharing Resources and Wrights Management

  • Sharing Resources and Wrights Management
  • User Group Accounts
  • Local Security Policy
  • SSO and Credential Manager
  • Workgroups and Homegroups
  • Network and Sharing Center
  • Network Share Configuration
  • NTSF File and Folder Permissions
  • Configure Active Directory Accounts and Policies
  • Domain Membership and Group Policy Objects
  • Basic AD Functions
  • Account Locks and Password Resets

Core 2: Lesson 6 - Threats and Security Measures

  • Threats and Security Measures

  • Logical Security Concepts

  • Encryption

  • PKI and Certificates

  • Execution Control

  • NAC

  • Discussing Logical Security Concepts

  • Threats and Vulnerabilities

  • Types of Password Attacks

  • Discussing Threats and Vulnerabilities

  • Physical Security Controls

  • Discussing Physical Security Measures

Core 2: Lesson 7 - Policies to Protect Data

  • Policies to Protect Data

  • Implement Security Best Practices

  • Guidelines for Implementing Security Best Practices

  • Discussing Security Best Practices Implementation

  • Implement Data Protection Policies

  • ACLs and Directory Permissions

  • Full Disk Encryption

  • Guidelines for Implementing Data Protection Policies

  • Discussing Data Protection Policies

  • Protect Data During Incident Response

  • Discussing Data Protection During Incident Response

Core 2: Lesson 8 - Prevent Malware and Security Threats

  • Prevent Malware and Security Threats

  • Detect, Remove, and Prevent Malware

  • Trojan Horses and Spyware

  • Sources of Malware Infection

  • Best Practices for Malware Removal

  • Discussing Detecting, Removing, and Preventing Malware Infections

  • Troubleshoot Common Workstation Security Issues

  • Discussing Troubleshoot Common Workstation Security Issues

Core 2: Lesson 9 - Supporting and Troubleshooting Mobile Devices

  • Supporting and Troubleshooting Mobile Devices

  • Secure Mobile Devices

  • IOT Internet of Things

  • Discussing Mobile Device Security

  • Troubleshoot Mobile Device Issues

  • Mobile Device Security Troubleshooting

  • Discussing Troubleshooting Mobile Devices

Core 2: Lesson 10 - Implementing Operational Procedures

  • Implementing Operational Procedures

  • Environmental Impacts and Controls

  • Discussing Environmental Impact and Controls

  • Create and Maintain Documentation

  • Discussing Documentation Creation and Maintenance

  • Use Basic Change Management Best Practices

  • Discussing Change Management Best Practices

  • Implement Disaster Prevention and Recovery Methods

  • Discussing Implement Disaster Prevention and Recovery Methods

  • Basic Scripting Concepts

  • Discussing Scripting

  • Professionalism and Communication

  • Discussing Professionalism and Communication Skills

Course 3

CompTIA Network+

The CompTIA Network+ course and exam is a mid-level certification for network technicians. It’s designed to test the competency of a mid-level network technician and their ability to support and configure TCP/IP clients through network design, cabling, hardware setup, configuration, installation, support, and troubleshooting.

Lesson 1 - Networking Fundamentals

  • Intro to Networking
  • Activity: Creating a Network
  • Common Terminology
  • Activity: Examining Ports and Sockets
  • OSI Model
  • DoD Model
  • Activity: Examining Network Layers
  • TCP, UDP, IP
  • Activity: Examining TCP
  • Activity: Examining UDP
  • Activity: Examining IP
  • ICMP, IGMP, ARP
  • Activity: Examining ICMP
  • Activity: Examining ARP
  • Activity: Examining IGMP
  • Network Topologies
  • Network Types
  • Part 1: Network Characteristics
  • Part 2: Network Characteristics
  • Module 1 outro

Lesson 2 - Cables and Connectors

  • Ethernet Standards
  • Copper Cable Types
  • Fiber Optic Cable Types
  • Connector Types
  • Activity: Selecting the Right Cable
  • Media Converters and Transceivers
  • Cable Management
  • Module 2 Outro

Lesson 3 - Internet Protocol (IP)

  • IPv4 Basics
  • IP Packet and Interface Types
  • Activity: Configuring Client IP Settings
  • Binary Numbering System
  • Classful and Classless Addressing
  • Understanding CIDR Notation
  • IPv4 Subnetting Method
  • Verifying with Binary
  • Finding Subnet IDs
  • Activity: Subnetting a Class C Network
  • The Delta in Action
  • Activity: Subnetting With the Delta
  • Subnetting Based on Hosts
  • Subnetting in Other Octets
  • Supernetting
  • Activity: Supernetting
  • IPv6
  • IPv4 - IPv6 Transition Mechanisms
  • Module 3 Outro

Lesson 4 - Layer 7 Protocols

  • Remote Control Protocols
  • File Sharing Protocols
  • Web Protcols
  • Email Protocols
  • Database Protocols
  • Voice Protocols
  • Security Protocols
  • Management Protocols
  • Module 4 Outro

Lesson 5 - Network Services

  • DHCP
  • Activity: Configuring DHCP
  • Activity: Configuring a DHCP Relay Agent
  • DNS
  • Activity: Configuring DNS - Part 1
  • Activity: Configuring DNS - Part 2
  • NTP
  • Corporate and Datacenter Network Architecture
  • Cloud Concepts and Connectivity Options
  • Module 5 Outro

Lesson 6 - Networking Devices

  • Introductory Concepts
  • Repeaters and Hubs
  • Activity: Connecting Devices with a Hub
  • Bridges and Switches
  • Activity: Connecting Devices with a Switch
  • Routers and Multilayer Switches
  • Security Devices
  • Modems
  • Module 6 Outro

Lesson 7 - Networked Devices

  • IP Devices
  • IoT
  • Activity - Programming IoT Devices
  • ICS/SCADA
  • Module 7 Outro

Lesson 8 - Routing and Bandwidth Management

  • Routing Basics
  • Activity: Configuring Static Routes
  • Packet Delivery on the Same Network
  • IP Routing Across a Single Router
  • IP Routing Across Multiple Hops
  • Activity: Static Routes - CHALLENGE
  • Route Selection
  • RIP
  • Activity: Configuring RIP - CHALLENGE
  • OSPF
  • EIGRP
  • BGP
  • NAT/PAT
  • Bandwidth Management (with Module 8 Outro)

Lesson 9 - Ethernet Switching

  • Ethernet Basics
  • Switching Overview
  • Activity: Examining a MAC Table
  • VLANs
  • Activity: Creating VLANs
  • VLAN Trunking
  • Activity: Configuring VLAN Trunking
  • VLAN Routing
  • Activity: Configuring VLAN Routing
  • Contention Management
  • Switchport Configuration (with Module 9 Outro)

Lesson 10 - Wireless Technologies

  • Wireless Overview
  • Radio Basics
  • Modulation
  • Wi-Fi Standards
  • Antennas
  • Wi-Fi Service Sets
  • Wi-Fi Security
  • Cellular

Lesson 11 - Network Performance

  • Monitoring Performance
  • Common Metrics
  • Activity: Examining Interface Statistics
  • SNMP
  • Netflow
  • Network Security Monitoring (with Module 11 Outro)

Lesson 12 - High Availability and Disaster Recovery

  • HA and DR Concepts
  • High Availability Mechanisms
  • Disaster Recovery Mechanisms
  • Facility and Infrastructure Support (with Module 12 Outro)

Lesson 13 - Organizational Documents

  • Plans and Procedures
  • Security Policies
  • Loss Prevention
  • Common Agreements
  • Common Documentation
  • Structured Cabling - MDF and IDF
  • Horizontal and Vertical Cabling
  • Activity - Implementing Cable Management
  • Labeling
  • Surveys and Assessments (with Module 13 Outro)

Lesson 14 - Network Security

  • Common Security Concepts
  • Common Attack Types
  • Spoofing-based Attacks
  • Hijacking and MITM
  • Social Engineering
  • Network Segmentation
  • Private VLANs
  • Single Organization Authentication
  • Extending Authentication
  • Authorization
  • Network Device Hardening
  • Wireless Security
  • Remote Access Security
  • IoT Security
  • Physical Security (with Module 14 Outro)

Lesson 15 - Network Troubleshooting

  • Troubleshooting Methodology
  • Physical Connectivity Issues
  • Hardware Testing Tools
  • Activity - Testing an Ethernet Cable
  • Activity - Crimping on an RJ-45 Connector
  • Activity - Punching Down Twisted Pair
  • Activity - Using a Telephone Toner
  • Understanding Electricity
  • Activity - Checking Cable Continuity
  • Activity - Testing DC Voltage
  • Activity - Testing AC Voltage
  • Twisted Pair Pinout Problems
  • Twisted Pair Termination Problems
  • Repairing Damaged Twisted Pair Cable
  • Fiber Optic Connectivity Issues
  • Activity - Testing a Fiber Optic Cable
  • Common Port Problems
  • Working with Ports and Their Devices
  • Common Software Testing Tools
  • Activity - Scanning for Open Ports
  • Common Command Line Utilities
  • Troubleshooting Basic IP Networking Issues
  • Common Switching Issues
  • Switching Test Tools and Techniques
  • Common IP Routing Issues
  • Wi-Fi Access Point Issues
  • Wireless Interference
  • Activity - Using a Spectrum Analyzer
  • Wireless Antenna Issues
  • Activity - Configuring a Wi-Fi Router
  • WAP Placement Strategies
  • Infrastructure Service Issues (DHCP)
  • Infrastructure Service Issues (DNS)
  • Infrastructure Service Issues (NTP)
  • Firewall / ACL Issues
  • VPN Issues
  • Additional Network Security Troubleshooting and Tips
  • Advanced Networking Issues
  • Troubleshooting Server Services (with Module 15 Outro)
  • CompTIA Network+ N10-008 Course Outro

Course 4

CompTIA Security+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
Lesson 1 - Information Security Roles Security Control and Framework Types

  • Introduction and Overview
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Module Summary

Lesson 2 - Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Module Summary

Lesson 3 - Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  • Assess Organizational Security with Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Module Summary

Lesson 4 - Social Engineering, Indicators of Malware Attacks

  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
  • Module Summary

Lesson 5 - Cryptography

  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
  • Module Summary

Lesson 6 - Certificates and PKI

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Implementing a PKI Demo
  • Module Summary

Lesson 7 - Authentication

  • Summarize Authentication Design Concepts
  • Implement Knowledge-based Authentication
  • Password Cracker Demo
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
  • Module Summary

Lesson 8 - Identity and Accounts, Authorization, Personnel Polices

  • Implement Identity and Account Types
  • Implement Account Policies
  • Account Types and Polices Demo
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
  • Module Summary

Lesson 9 - Network Design and Hardware (Part 1)

  • Implement Secure Network Designs

  • Implement Secure Switching and Routing

  • Various Types of Network Attacks Demo

  • Implement Secure Wireless Infrastructure

  • Implement Load Balancers

  • Module Summary

Lesson 10 - Network Hardware (Part 2)

  • Implement Firewalls and Proxy Servers

  • Implement Network Security Monitoring

  • Summarize the Use of SIEM

  • Module Summary

Lesson 11 - Network Protocols

  • Implement Secure Network Operations Protocols

  • Implement Secure Application Protocols

  • Implement Secure Remote Access Protocols

  • Module Summary

Lesson 12 - Endpoint Security

  • Implement Secure Firmware

  • Implement Endpoint Security

  • Endpoint Protection Demo

  • Explain Embedded System Security Implications

  • Module Summary

Lesson 13 - Mobile Devices

  • Implement Mobile Device Management

  • Implement Secure Mobile Device Connections

  • Module Summary

Lesson 14 - Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  • Analyze Indicators of Application Attacks

  • Analyze Indicators of Web Application Attacks

  • Summarize Secure Coding Practices

  • Implement Secure Script Environments

  • Summarize Deployment and Automation Concepts

  • Module Summary

Lesson 15 - Secure Coding, Scripting, Deployment, Cloud and Virtualization

  • Summarize Secure Cloud and Virtualization Services

  • Apply Cloud Security Solutions

  • Summarize Infrastructure as Code Concepts

  • Module Summary

Lesson 16 - Privacy and Data Protection

  • Explain Privacy and Data Sensitivity Concepts

  • Explain Privacy and Data Protection Controls

  • Module Summary

Lesson 17 - Incident Response

  • Summarize Incident Response Procedures

  • Utilize Appropriate Data Sources for Incident Response

  • Apply Mitigation Controls

  • Module Summary

Lesson 18 - Forensics

  • Explain Key Aspects of Digital Forensics Documentation

  • Explain Key Aspects of Digital Forensics Evidence Acquisition

  • Module Summary

Lesson 19 - Risk Management, Business Impact Analysis

  • Explain Risk Management Processes and Concepts

  • Explain Business Impact Analysis Concepts

  • Module Summary

Lesson 20 - Redundancy and Backup Strategies

  • Implement Redundancy Strategies

  • Implement Backup Strategies

  • Implement Cyber Security Resiliency Strategies

  • Module Summary

Lesson 21 - Physical Security

  • Explain the Importance of Physical Site Controls

  • Explain the Importance of Physical Host Security Controls

  • Module Summary

Lesson 22 - Afterword

  • Conclusion and General Exam Tips

Course 5

Cisco CCNA 200-301

This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.

After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

What will you learn?

CCNA exam objectives and topics include the following:

  • Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
  • VLANs, STP, and EtherChannel (static, PAGP, and LACP)
  • WAN technologies
  • Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
  • Device monitoring protocols, including SNMPv2 and SNMPv3
  • Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS

Course 6

CompTIA Linux+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
Lesson 1 - Instructions

  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials

Lesson 2 - Managing Software

  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary

Lesson 3 - Configuring Hardware

  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary

Lesson 4 - Managing Files

  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials

Lesson 5 - Booting Files

  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary

Lesson 6 - X

  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities

Lesson 7 - Admin

  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary

Lesson 8 - Basic Networking

  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary

Lesson 9 - Scripts

  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary

Lesson 10 - Security

  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary

Course 7

Microsoft MD-100: Windows 10

The Microsoft 70-698 course focuses on how to install Windows 10 with a minimal amount of administrative effort. Preparation, the process, activation, and troubleshooting will be covered in this IT training session. You will also learn how to perform an in-place upgrade from Windows 8.1 to Windows 10, configure hardware devices, manage device drivers, and perform post-install configuration.

Lesson 1 - Introduction and Deploy Windows

  • Instructor and Course Introduction
  • Exam Overview
  • Deploy Windows Intro
  • Deploy Windows 10
  • Deploy Windows 10 Pt 2
  • Preparing Virtual Lab Setup for the Client 1
  • Installation of Windows 10 Enterprise
  • Troubleshooting Failed Installations with Setup Logs
  • Configuring Locales
  • Perform Post-Installation Configuration
  • Navigating Microsoft Edge
  • Modifying Microsoft Edge Settings
  • Customizing Your Computer Setting

Lesson 2 - Manage Devices and Data

  • Manage devices and data intro
  • Manage local users, groups, and devices
  • Configure data access and protection
  • Adding and accessing local users and groups
  • Managing NTFS permissions in Windows 10
  • Configure devices by using local policies
  • Configuring Audit Policies on Windows 10
  • Manage Windows security
  • How to change user account settings

Lesson 3 - Configure Connectivity

  • Maintain Windows intro
  • Configure system and data recovery
  • Backing up files in Windows 10
  • Using the recycle bin
  • Manage updates
  • Check for updates in Windows 10
  • Configuring hardware in Windows 10
  • Monitor and manage Windows
  • Configuring Windows 20 desktop options
  • Installing new features

Lesson 4 - Maintain Windows

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

Course 8

Ethical Hacking Course (ECC 312-50)

An Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. The topics in this course cover a broad range of concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

Part 1: Foundations

Lesson 1 - Foundations Course Introduction

  • About this course: CEH Foundations
  • About the Instructor

Lesson 2 - Introduction To Networking

  • Networking Overview
  • Network Scope
  • Network Addressing
  • Activity - Examining Network Addressing

Lesson 3 - Lan Components

  • Protocols, Ports, Sockets
  • Network Topologies
  • LAN Devices
  • LAN Devices Part 2
  • VLANs
  • Activity - Examining Ports and Sockets
  • Activity - Examining Switches and VLANs

Lesson 4 - Routing and Network Access

  • Routers
  • Layer 3 Switches
  • Modems and Remote Access
  • Firewalls and Proxies
  • Activity - Examining Routing
  • Activity - Examining VLAN Routing
  • Activity - Examining Firewall Rules

Lesson 5 - Intrusion Detection and Network Layers

  • IDS and IPS
  • OSI Model
  • TCP-IP
  • Activity - Examining Network Layers

Lesson 6 - Networking Protocols and Addressing

  • Layer 4 Protocols
  • Layer 3 Protocols
  • Layer 2 Protocols
  • IP Addressing
  • Subnetting
  • DHCP
  • Activity - Examining TCP
  • Activity - Examining UDP
  • Activity - Examining IP
  • Activity - Examining ICMP
  • Activity - Examining ARP

Lesson 7 - Network Services

  • DNS
  • DNS Records
  • NTP
  • Authentication
  • Biometrics
  • Activity - Examining DNS
  • Activity - Examining DNS Records

Lesson 8 - Access Control

  • Local Authentication
  • Directory Service Authentication
  • Extending Authentication
  • Authorization
  • Activity - Testing Access Control

Lesson 9 - Intro to Linux

  • Linux Overview
  • Linux File System
  • Linux Core Commands
  • Linux Search and Read Commands
  • Activity - Exploring Linux
  • Activity - Using Linux Core Commands
  • Activity - Using Linux Search Commands
  • Activity - Using Linux Read Commands

Lesson 10 - Configuring Linux

  • Linux File Permissions
  • Linux Special Permissions
  • Linux Configuration
  • Linux Packages
  • Linux User Management

Lesson 11 - Practicing Linux Configuration

  • Activity - Setting Linux Permissions
  • Activity - Setting Linux Special Permissions
  • Activity - Managing Packages in Kali Linux
  • Activity - Managing Users and Groups in Linux

Lesson 12 - Managing Linux

  • Linux Job Scheduling
  • Linux File, Directory, and Download Commands
  • Linux System Commands
  • Linux Network Management
  • Linux Firewall

Lesson 13 - Practicing Linux Management

  • Activity - Scheduling Tasks in Linux
  • Activity - Using Linux File, Directory, and Download Commands
  • Activity - Compiling Malicious Code
  • Activity - Using Linux Process and System Commands
  • Activity - Using Linux Disk Management and Hardware Commands
  • Activity - Using Linux Networking Commands

Lesson 14 - Intro to Windows

  • Windows Overview
  • Windows Registry
  • Windows Security

Lesson 15 - Windows Commands

  • Windows Commands
  • Windows Admin Commands
  • Windows Network Commands
  • Windows Run Line Commands
  • Windows PowerShell

Lesson 16 - Practicing Windows Commands

  • Activity - Using Windows Built-in Commands
  • Activity - Using Windows Task Commands
  • Activity - Using Windows Admin Commands
  • Activity - Using Windows Network Commands
  • Activity - Using Windows PowerShell
  • Networking and OS Penetration Testing
  • Review

Lesson 17 - Intro to Hacking

  • Information Security Overview

  • Hacking Concepts

  • Ethical Hacking Concepts

     

  • Penetration Testing

  • Penetration Testing Part 2

  • Activity - Performing a Static Code Review

Lesson 18 - Information Security

  • Cyber Kill Chain Concepts
  • Activity - Performing Weaponization
  • Information Security
  • Security Policies
  • Security Controls
  • Access Control

Lesson 19 - Protecting Data

  • Data Protection
  • Backup Sites
  • Vulnerability Management
  • SIEM
  • Risks

Lesson 20 - Managing Risk

  • Risk Management
  • Incident Handling
  • Information Security Laws and Standards
  • Activity - Assessing Risk
  • Ethical Hacking Penetration Testing
  • Review
  • Conclusion

Part 2: Ethical Hacker

Lesson 1 - Ethical Hacker Course Intro

  • About this course - Ethical Hacker
  • About the Instructor

Lesson 2 - Intro to Footprinting

  • Footprinting Concepts
  • Footprinting Methodology
  • OSINT Tools
  • Advanced Google Search
  • Whois Footprinting
  • Activity - Performing a Whois Lookup

Lesson 3 - Footprinting Network Services

  • DNS Footprinting
  • Website Footprinting
  • Email Footprinting
  • Network Footprinting
  • Footprinting through Social Networking Sites

Lesson 4 - Defend Against Footprinting

  • Competitive Intelligence Gathering
  • Footprinting Countermeasures
  • Footprinting Penetration Testing
  • Review

Lesson 5 - Intro to Scanning

  • Scanning Concepts
  • ICMP Discovery Scans
  • Other Discovery Scans

Lesson 6 - Port Scanning

  • Ports

  • TCP Flags and Handshakes

  • TCP Scan Types

  • Other Scanning Techniques

Lesson 7 - Vulnerability Scanning

  • Banner Grabbing
  • Vulnerability Scanning
  • SSDP Scanning

Lesson 8 - NMAP

  • Nmap
  • Common Nmap Scans
  • Nmap Options
  • Nmap Stealth Scans
  • Hping and Other Scanners

Lesson 9 - Firewalls and Intrusion Detection

  • Firewall Types
  • Firewall Features
  • Firewall Features Part 2
  • Firewall Configurations
  • Intrusion Detection and Prevention

Lesson 10 - Evading Detection

  • Firewall and IDS Evasion
  • Firewall and IDS Evasion Part 2
  • Firewalking
  • Probing a Firewall
  • Probing a Firewall Part 2

Lesson 11 - Proxies and VPNs

  • Proxies
  • VPNs
  • Tor
  • Scanning Countermeasures
  • Scanning Penetration Testing
  • Review

Lesson 12 - Accessing Vulnerability

  • Vulnerability Assessment Overview
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools

Lesson 13 - Vulnerability Research

  • Scanner Output and Reports

  • Vulnerability Research

  • Review

Lesson 14 - Intro to Enumeration

  • Enumeration Concepts
  • Enumeration Techniques and Tools
  • Service and Application Enumeration
  • SMB and NetBIOS Enumeration

Lesson 15 - Service Enumeration

  • SNMP Enumeration
  • LDAP Enumeration
  • DNS Enumeration
  • SMTP Enumeration
  • NTP Enumeration

Lesson 16 - Advanced Enumeration

  • Remote Connection Enumeration
  • File Transfer Enumeration
  • VoIP Enumeration
  • IPSEC Enumeration
  • IPv6 Enumeration
  • BGP Enumeration

Lesson 17 - Command Line Enumeration

  • Windows Command Line Enumeration
  • Linux Command Line Enumeration
  • Linux Command Line Enumeration Part 2

Lesson 18 - Defending Against Enumeration

  • Enumeration Countermeasures
  • Enumeration Countermeasures Part 2
  • Enumeration Penetration Testing
  • Review

Lesson 19 - Intro to System Hacking

  • System Hacking Concepts
  • System Hacking Tools and Frameworks
  • Searchsploit
  • Compiling and Running Exploits

Lesson 20 - System Hacking with Metasploit

  • Metasploit

  • Metasploit Search

  • Metasploit Exploits and Payloads

  • Metasploit Meterpreter

  • Metasploit Connectivity

  • Metasploit Impersonation and Migration

Lesson 21 - Further Attacking a Compromised System

  • Netcat

  • Pivoting

  • Netcat Relays

  • Metasploit Post Exploitation Modules

  • Common Operating System Exploits

Lesson 22 - Hacking an Operating System

  • Hacking Windows

  • Hacking Linux

  • Network Service Exploits

  • Password Attacks

Lesson 23 - Password Cracking Overview

  • Dictionary Attack

  • Brute Force Attack

  • Password Spraying

  • Rainbow Tables

Lesson 24 - Performing Password Attacks

  • Network Service Password Attacks

  • Password Cracking Tools

  • Online Password Cracking Sites

  • Windows Password Cracking

  • Linux Password Cracking

  • Other Methods for Obtaining Passwords

Lesson 25 - Using Exploits

  • Keylogging

  • Spyware

  • Rootkits

  • Buffer Overflows

  • Privilege Escalation

  • Hiding Files

Lesson 26 - Hiding Information

  • Alternate Data Streams

  • Steganography

  • Creating and Maintaining Remote Access

     

  • Hiding Evidence

Lesson 27 - Covering Tracks

  • Covering Tracks in Windows

  • Covering Tracks in Linux

  • System Hacking Counter-Measures

  • System Hacking Penetration Testing

  • Review

Lesson 28 - Malware Overview

  • Intro to Malware

  • Virus Overview

  • Virus Types

  • Self-Hiding Viruses

  • Worms

  • Trojans

  • Trojan Types

  • RATS

Lesson 29 - Hacking With Malware

  • Ransomware

  • Botnets

  • Covert Channel Trojans

  • Banking Trojans

  • Rootkits

Lesson 30 - Creating Malware

  • Other Malware

  • Malware Makers

  • Dropper and Stage Creation

  • Exploit Kits

Lesson 31 - Detecting Malware

  • Malware Detection

  • Malware Detection Part 2

  • Malware Analysis

Lesson 32 - Defending Against Malware

  • Malware Reverse Engineering

  • Malware Countermeasures

  • Malware Penetration Testing

  • Review

Lesson 33 - Sniffing

  • Sniffing Concepts

  • Types of Sniffing

  • Sniffing Protocols

  • Sniffing Tools

Lesson 34 - Spoofing and MITM

  • ARP

  • ARP Spoofing

  • MITM

  • MAC Attacks

  • MAC Spoofing

  • DHCP Attacks

Lesson 35 - Defending Against Poisoning and Sniffing

  • Name Resolution Poisoning

  • VLAN Hopping

  • Sniffing Counter Measures

  • Sniffing Penetration Testing

  • Review

Lesson 36 - Social Engineering

  • Social Engineering Concepts

  • Social Engineering Techniques

  • Social Engineering Examples

  • Social Engineering Tools

Lesson 37 - Defending Against Social Engineering

  • Social Media

  • Identity Theft

  • Insider Threats

  • Social Engineering Countermeasures

  • Social Engineering Penetration Testing

  • Review

Lesson 38 - System Hacking with Metasploit

  • DoS-DDoS Concepts

  • Volumetric Attacks

  • Fragmentation Attacks

  • State Exhaustion Attacks

  • Application Layer Attacks

Lesson 39 - Advanced DoS Attacks

  • Protocol Attacks

  • Other Attacks

  • Botnets

Lesson 40 - Defending Against Denial-of-Service

  • DoS-DDoS Attack Tools

  • DoS-DDoS Countermeasures

  • Dos Penetration Testing

  • Review

Part 3: Advanced Ethical Hacker

Lesson 1 - Advanced Ethical Hacker Course Intro

  • About This Course: Advanced Ethical Hacker
  • About the Instructor

Lesson 2 - Session Hijacking

  • Session Hijacking Concepts
  • Token-based Authentication
  • Compromising a Session Token
  • XSS
  • CSRF
  • Other Attacks

Lesson 3 - Defending Against Hijacking

  • Network Level Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Session Penetration Hijacking
  • Review

Lesson 4 - Implementing Intrusion Detection

  • IDS-IPS
  • Snort
  • Snort Rules
  • Syslog

Lesson 5 - Testing Intrusion Detection

  • WIPS
  • IDS Considerations
  • IDS Tools
  • IDS Evasion
  • IDS-Firewall Evasion Tools
  • IDS Scenerios

Lesson 6 - Implementing Firewalls

  • Firewalls
  • Packet Filtering Rules
  • Firewall Deployments
  • Traffic Flow through Firewalls
  • Split DNS

Lesson 7 - Testing Firewallls

  • Firewall Tools
  • Firewall Evasion
  • Firewall Scenarios

Lesson 8 - Implementing Honeypots

  • Honeypots
  • Honeypot Detection
  • IDS-Firewall Evasion Countermeasures
  • IDS-Firewall Honeypot Penetration Testing
  • Review

Lesson 9 - Attacker Webserver

  • Webserver Security Overview
  • Common Webservers
  • Webserver Attacks
  • Misconfiguration Attack Examples

Lesson 10 - Webserver Defense

  • Webserver Attack Tools
  • Attack Countermeasures
  • Webserver Penetration Testing
  • Review

Lesson 11 - Intro To Web Apps

  • Web Application Concepts
  • Attacking Web Apps

Lesson 12 - OWASP Top 5 Web App Vulnerabilities

  • A01 - Broken Access Control
  • A02 - Cryptographic Failures
  • A03 - Injection
  • A04 - Insecure Design
  • A05 - Security Misconfiguration

Lesson 13 - OWASP Additional Web App Vulnerabilities

  • A06 - Vulnerable and Outdated Components
  • A07 - Identification and Authentication Failures
  • A08 - Software and Data Integrity Failures
  • A09 - Security Logging and Monitoring
  • A10 - Server Side Request Forgery

Lesson 14 - Common Web App Attacks

  • XSS Attacks
  • CSRF
  • Parameter Tampering
  • Clickjacking
  • SQL Injection

Lesson 15 - Unauthorized Access Through Web Apps

  • Insecure Deserialization Attacks
  • IDOR
  • Directory Traversal
  • Session Management Attacks
  • Response Splitting

Lesson 16 - Web App Overflow Attacks

  • Denial of Service
  • Overflow Attacks
  • XXE Attacks
  • Soap Attacks
  • Ajax Attacks

Lesson 17 - Defending Web Apps

  • Web App Hacking Tools
  • Web Hacking Countermeasures
  • Web Application Penetration Testing
  • Review

Lesson 18 - Intro To SQL Injection

  • SQL Overview
  • SQL Injection Concepts
  • Basic SQL Injection

Lesson 19 - Performing SQL Injection

  • Finding Vulnerable Websites
  • Error-based SQL Injection
  • Union SQL Injection
  • Blind SQL Injection
  • SQL Injection Scenarios
  • Evading Detection

Lesson 20 - Defending Against SQL Injection

  • SQL Injection Tools
  • SQL Injection Countermeasures
  • Safe Coding Examples
  • SQL Wildcards
  • SQL Injection Penetration Testing
  • Review

Lesson 21 - Wireless Networking Overview

  • Wireless Concepts
  • Wireless Signal Encoding
  • Wi-Fi Standards
  • Wi-Fi Antennas
  • Wireless Authentication

Lesson 22 - Wi-Fi Security

  • Wi-Fi Security Standards
  • Wireless Network Troubleshooting Tools
  • Wi-Fi Discovery Tools
  • Sniffing Wi-Fi

Lesson 23 - Hacking Wi-Fi

  • Wi-Fi Attack Types
  • Wi-Fi Rogue Access Point Attacks
  • Wi-Fi Denial of Service Attacks
  • Wi-Fi Password Cracking Attacks
  • WEP Cracking

Lesson 24 - Advanced Wireless Attacks

  • WPA-WPA2 Cracking
  • WPA3 Attacks
  • WPS Cracking
  • Wi-Fi Attack Tools for Mobile Devices
  • Bluetooth Hacking
  • Other Wireless Hacking

Lesson 25 - Defending Wireless Networks

  • Wireless Hacking Countermeasures
  • Wireless Security Tools
  • Wireless Penetration Testing
  • Review

Lesson 26 - Mobile Platform Overview

  • Mobile Platform Overview

  • Mobile Device Vulnerabilities

  • Mobile Device Attacks

Lesson 27 - Hacking Android

  • Android
  • Android Vulnerabilities
  • Rooting Android
  • Android Exploits
  • Android Hacking Tools
  • Reverse Engineering an Android App
  • Securing Android

Lesson 28 - Hacking iOS

  • iOS
  • iOS Vulnerabilities
  • Jailbreaking iOS
  • iOS Exploits
  • iOS Hacking Tools
  • Securing iOS

Lesson 30 - IoT Hacking

  • loT Concepts
  • loT Infrastructure
  • Fog Computing
  • loT Vulnerabilities
  • loT Threats

Lesson 31 - IoT Defense

  • IoT Hacking Methodologies and Tools
  • IoT Hacking Methodologies and Tools Part 2
  • Hacking Countermeasures
  • IoT Penetration Testing
  • OT Concepts
  • Industrial IoT

Lesson 32 - Operational Technology Overview

  • IT-OT Convergence

  • ICS

     

  • SCADA

  • DCS

  • RTU

  • PLC

  • Addition OT Components

Lesson 33 - Hacking OT

  • OT Variables
  • Well-known OT attacks
  • OT Attack Methodology and Basic Tools
  • OT Reconnaissance
  • OT Penetration and Control

Lesson 34 - Defending OT

  • SQL Injection Tools
  • SQL Injection Countermeasures
  • Safe Coding Examples
  • SQL Wildcards
  • SQL Injection Penetration Testing
  • Review

Lesson 35 - Attacking The Cloud

  • Cloud Computing Concepts
  • Virtualization
  • Cloud Types
  • Cloud Benefits and Considerations
  • Cloud Risks and Vulnerablilities

Lesson 36 - Cloud Defense

  • Cloud Threats and Countermeasures
  • Cloud Security Tools
  • Cloud Security Best Practices
  • Cloud Penetration Testing
  • Review

Lesson 37 - Cryptography Overview

  • Cryptography Concepts
  • Symmetric Encryption
  • Asymmetric Encryption
  • Public Key Exchange
  • PKI

Lesson 38 - Protecting Data With Crytography

  • Digital Certificates

  • Digital Signatures

  • Hashing

  • Email Encryption

     

  • Network Communication Encryption

Lesson 39 - Protecting Data at Home and in Transit

  • Disk Encryption
  • VPN Encryption
  • Cryptography Tools

Lesson 40 - Pentesting Cryptography

  • Cryptography Attacks
  • Cryptography Penetration Testing
  • Review
  • Conclusion

Course 9

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

Lesson 1 - Threat Management

  • Introduction
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Analyze the results of a network reconnaissance Part 1
  • Analyze the results of a network reconnaissance Part 2
  • Analyze the results of a network reconnaissance Part 3
  • Analyze the results of a network reconnaissance Part 4
  • Analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

Lesson 2 - Vulnerability Management

  • Implement an information security vulnerability management process Part 1
  • Implement an information security vulnerability management process Part 2
  • Implement an information security vulnerability management process Part 3
  • Implement an information security vulnerability management process Part 4
  • Implement an information security vulnerability management process Part 5
  • Implement an information security vulnerability management process Part 6
  • Implement an information security vulnerability management process Part 7
  • Analyze the output resulting from a vulnerability scan Part 1
  • Analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

Lesson 3 - Cyber Incident Response

  • Distinguish threat data or behavior to determine the impact of an incident Part 1
  • Distinguish threat data or behavior to determine the impact of an incident Part 2
  • Distinguish threat data or behavior to determine the impact of an incident Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response Part 1
  • Analyze common symptoms to select the best course of action to support incident response Part 2
  • Analyze common symptoms to select the best course of action to support incident response Part 3
  • Analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

Lesson 4 - Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Use data to recommend remediation of security issues related to identity and access management Part 1
  • Use data to recommend remediation of security issues related to identity and access management Part 2
  • Use data to recommend remediation of security issues related to identity and access management Part 3
  • Use data to recommend remediation of security issues related to identity and access management Part 4
  • Review security architecture and make recommendations to implement compensating controls Part 1
  • Review security architecture and make recommendations to implement compensating controls Part 2
  • Review security architecture and make recommendations to implement compensating controls Part 3
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

Coursework

What's Included

One Full Year of Access

Get an entire year to study the course materials, and use the practice labs to learn everything you need to know for certification.

Course Workbooks

Study comprehensive workbooks with hundreds of pages of notes covering every video topic to help you learn easily.

Instructor-led Training

Enjoy detailed lessons taught by experienced certified IT instructors who guide you every step of the way.

Interactive Learning

Discover interactive study materials in every course including flash cards and matching games to help you master every subject.

Useful Certifications

Learn exactly what you need to prepare yourself for the most powerful, in-demand, IT industry certifications in existence.

Exclusive Community

Join us in our free, private Facebook community to connect with other students who are starting new careers just like you.

what's included

Certificates

At the end of each course, you will receive a Certificate of Completion from KO Tech Academy verifying that you have completed and passed the final test for that course.1

Pricing Plans

Most Popular

One-Time Payment

Save 11% $1,997

$1,777

with code “payinfull”

Interest-free

10-Month Payment Plan

0% Interest

$197

per month

Black friday deal!

One-Time Payment

Save 50% $1,997

$998.50

With Coupon Code: bf22

BLACK FRIDAY DEAL!

10-Month Payment Plan

No Interest + Save 30% $197

$137.90

per month

With Coupon Code: bf22_10months

Testimonial

What Students are Saying

I would say this program is built for anyone who is transitioning and looking to get into the IT world. It’s going to give you a little taste of everything you need.
Adam
For me, I wanted this change for my life and family. I’m now a better father for my son and am on my way to providing an exceptional life for my family.
Joseph
It is a great way to learn the basics and to start a new career in IT in a short time period.
Ed

What You Will Need

Commitment

Building a new career is never easy and won't just fall in your lap. We seek out the most committed students for our programs who are ready to give 110% to their career goals.

Determination

Starting a new career is fun, lucrative, and fulfilling - but it’s also hard work. We seek out students for our programs who want to learn and embrace the challenge.

Frequently Asked Questions

As soon as you purchase! After we receive payment, you’ll be sent a voucher code via email from KO Tech Academy with the subject line “You received a new voucher code”. It typically takes a couple hours for processing on our end, so don’t panic if you don’t receive your voucher code immediately. Once you’ve received your voucher code, follow the instructions in the email to setup your account and access your Learning Management System (LMS) Dashboard.

You get to work! Once you’ve created your account and accessed your dashboard, you’re free to start taking your courses and accessing all of your materials. Remember you have full access for an entire year!

There is no restriction on what order you take your courses in, but we definitely recommend taking the courses in order. They’re designed to build on each other as you progress and learn more and more.

For IT & Cybersecurity, we recommend the following order:

  • CompTIA ITF+
  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • Cisco CCNA 200-301
  • CompTIA Linux+
  • Microsoft MS 70-698
  • Microsoft MS 70-410
  • CompTIA CySA+
You can take all of the exams online through Pearson Vue. We’ve provided links below to additional information from the certification providers because each one will have different requirements for online exams like needing a webcam for monitoring during the exam, etc.
 

Sources:

  1. Network and Computer Systems Administrator. U.S. Bureau of Labor Statistics. https://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm. Publication date unavailable. Accessed November 17, 2021.
  2. Computer Support Specialists. U.S. Bureau of Labor Statistics. https://www.bls.gov/ooh/computer-and-information-technology/computer-support-specialists.htm. Publication date unavailable. Accessed November 17, 2021.
  3. Information Security Analyst. U.S. Bureau of Labor Statistics. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm. Publication date unavailable. Accessed November 17, 2021.
  4. Computer Systems Analyst. U.S. Bureau of Labor Statistics. https://www.bls.gov/ooh/computer-and-information-technology/computer-systems-analysts.htm. Publication date unavailable. Accessed November 17, 2021.


Notes:

  1. Certificates – Our Certificates of Completion do not take the place of any vendor-authorized certification exams. They’re simply a certificate of completion for our courses only.

save 25% on all courses

All veterans, active duty military, first responders and their spouses

You can receive 25% off of any course purchase.

Email any form of military or official, professional identification to support@kotechacademy.com for verification.