watch and discover

A Proven Path to Launching Your Tech Career

Click the Play button to start watching now!

Total Run Time: 15:14

What's inside the IT & Cybersecurity course?

0
courses
0
videos
0
hours

CompTIA IT Fundamentals

Introduction to basic IT knowledge and skills
$3,000 value

CompTIA A+

The industry standard for establishing a career in IT
$4,000 value

CompTIA Network+

Helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks
$3.000 value

CompTIA Security+

A global certification that opens the door to your cybersecurity career
$3,000 value

Cisco CCNA 200-301

Learn network fundamentals, network access, IP connectivity and more
$3,800 value

CompTIA Linux+

Validates the competencies required of an early career system administrator supporting Linux systems
$3,300 value

Microsoft MD-100: Windows 10

Installing and Configuring Windows 10
$3,000 value

Certified Ethical Hacker

A solid foundation to pursue advanced cybersecurity studies
$3,000 value

CompTIA CySA+

An IT workforce certification that combats cybersecurity threats
$3,400 value

PLUS...

One Full Year of Access

You'll have access to all course material and practice labs for an entire year. Plenty of time to master each skill!

Course Outlines

Every module comes with an outline of the topics and areas that will be covered in the video lessons.

Module Workbooks

Within each course, there are individual module workbooks that are provided giving you pages of pre-made notes.

Interactive Study Materials

Inside of each course, there are pre-built, interactive study tools to help you go over every topic.

Private Facebook Community

You can also join us on Facebook so you can connect with other students going through the same program as you.

Get all of this...

Pricing Plans

Most Popular

One-Time Payment

Save 11% $1,997

$1,777

Interest-free

10-Month Payment Plan

0% Interest

$197

per month

Still unsure?

View The Full Curriculum

Course 1

CompTIA IT Fundamentals

The CompTIA IT Fundamentals course and exam focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.

  • Instructor Intro
  • Compare and Contrast Notational Systems
  • Compare and Contrast Notational Systems Demo
  • Compare and Contrast Fundamentals Data Types and Their Characteristics
  • Illustrate the Basics of Computing and Processing
  • Explain the Value of Data and Information
  • Compare and Contrast Common Units of Measures
  • Compare and Contrast Common Units of Measures Demo
  • Explain the Troubleshooting Methodology

  • Classify Common Types of Input-Output Device Interfaces
  • Given a scenario, set up & install Common Peripheral Devices to a PC
  • Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • Explain the Purpose of Common Internal Computing Components
  • Compare & Contrast Common Internet Service Types-
  • Compare & Contrast Storage Types
  • Compare & Contrast Common Computing Devices & Their Purposes
  • Explain Basic Networking Concepts
  • Explain Basic Networking Concepts Part 2
  • Explain Basic Networking Concepts Part 3
  • Explain Basic Networking Concepts Part 4
  • Explain Basic Networking Concepts Demo
  • Given a scenario Install, Configure & Secure a Basic Wireless Network
  • Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

  • Explain the Purpose of Operating Systems
  • Explain the Purpose of Operating Systems Demo
  • Compare & Contrast Components of an Operating System
  • Compare & Contrast Components of an Operating System Demo
  • Explain the Purpose & Proper Use of Software
  • Explain Methods of Application Architecture & Delivery Models
  • Given a Scenario Configure & Use Web Browsers
  • Given a Scenario Configure & Use Web Browsers FireFox
  • Given a Scenario Configure & Use Web Browsers Demo Chrome
  • Given a Scenario Configure & Use Web Browsers Demo Edge
  • Compare & Contrast General Application Concepts & Uses

  • Compare & Contrast Programming Language Categories-
  • Given a Scenario Use Programming Organizational Techniques & Interpret
  • Logic
  • Explain the Purpose & Use of Programming Concepts
  • HTML Demo

  • Explain Database Concepts and the Purpose of Databases
  • Compare and Contrast Various Database Structures
  • Summarize Methods Used to Interface with Databases
  • Summarize Methods Used to Interface with Databases Demo

  • Summarize Confidentiality, Integrity, and Availability Concerns
  • Explain Methods to Secure Devices and Best Practices
  • Summarize Behavioral Security Concepts
  • Compare & Contrast Authentication, Authorization, Accounting, &
  • Repudiation Concepts
  • Explain Password Best Practices
  • Explain Common Uses of Encryption
  • Explain Business Continuity Concepts
  • Takeaways
  • ITF Fundamentals Conclusion

Course 2

CompTIA A+ Core 1 (220-1001) & Core 2 (220-1002)

The CompTIA A+ certified professionals support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. 

  • Introduction to the Course, Meet the Instructor
  • Appropriate Safety Procedures
  • PC Components
  • Guidlines for PC Disassembly
  • Motherboards
  • CPU Sockets
  • PCI Bus
  • Storage Bus (SATA and IDE)
  • Discussing PC Components
  • Common Connection Interfaces
  • Wired and Wireless Connection Standards
  • Install Peripheral Devices
  • Guidelines and Discussion for Installing Peripheral Devices

  • Displays and Multimedia
  • Display Device Connections and Cables
  • Discussing Display Device Installation and Configuration
  • Troubleshoot Display Devices
  • Guidelines for Troubleshooting Display Devices
  • Discussing Display Device Troubleshooting
  • Install and Configure Multimedia Devices
  • Discussing Multimedia Device Installation and Configuration

  • Supporting Multiple Drive Types and Memory

  • Memory Types

  • RAM Types

  • Memory Modules

  • DIMM and SO-DIMM Technologies

  • Parity and ECC RAM

  • Memory Compatibility Issues

  • Discussing System Memory Installation

  • Install and Configure Mass Storage Devices

  • Storage Adapters and Cables

  • Solid State Drives

  • Guidelines for Installing Mass Storage Devices

  • Discussing Mass Storage Device Installation and Configuration

  • Install and Configure Removable Storage

  • Discussing Removable Storage Device Installation and Configuration

  • Configure RAID

  • RAID Configuration Options

  • Discussing RAID Configuration

  • Troubleshoot Storage Devices

  • Boot Failures

  • Discussing Storage Device Troubleshooting

  • Install Upgrade CPUs
  • Multiprocessing and Multicore Processors
  • Discussing CPU Upgrades
  • Configure and Update BIOS UEFI
  • Discussing BOIS-UEFI Configuration and Updates
  • Install Power Supplies
  • Discussing Power Supply Installation
  • Troubleshoot Internal System Components
  • POST and Boot Problems
  • Boot Troubleshooting and Log Entries
  • Motherboard Component Problems
  • Discussing System Component Troubleshooting

  • Wired Networks

  • Common Ethernet Network Implementations

  • Taps and Mirrors

  • Discussing Wired Networks

  • Network Hardware Devices

  • Switches

  • Power Over Ethernet

  • Discussing Network Hardware Devices

  • Wireless Networks

  • Access Points and Wireless Network Modes

  • Discussing Wireless Networks

  • Internet Connection Types

  • Wireless Internet Service Providers WISP

  • Discussing Internet Connection Types

  • Network Configuration Concepts

  • The TCIP-IP Protocol Suite

  • Internet Protocol and IP Addressing

  • Public and Private IP Addresses

  • IPv6

  • Discussing Network Configuration Concepts

  • Network Services

  • DNS

  • Dynamic and Static IP Configurations

  • DNS Records MX and A

  • Web Servers and HTTP-HTTPS

  • Discussing Network Services

  • Configuring and Troubleshooting Networks

  • Network Connections in Windows

  • Install and Configure SOHO Networks

  • Configure SOHO Network Security

  • Firewalls

  • Port Fowarding and Port Triggering

  • Windows Firewall

  • Network Security and Embedded Appliances

  • Configure Remote Access

  • Discussing Remote Access Configuration

  • Troubleshoot Network Connections

  • IP Configuration Issues

  • Routing Issues

  • Discussing Network Connection Troubleshooting

  • Configure Client-Side Virtualization

  • Hypervisors

  • Processor Support and Resource Requirements

  • Virtual Networks

  • Client-Side Virtualization

  • Cloud Computing Concepts

  • Internal and External Shared Resources

  • Cloud Service Options

  • Virtual Desktops

  • Software-Defined Networking (SDN)

  • Discussing Cloud Computing Concepts

  • Use Laptop Features

  • Expansion Options

  • Discussing Laptop Features

  • Install and Configure Laptop Hardware

  • Discussing Laptop Hardware Installation and Configuration

  • Troubleshoot Common Laptop Issues

  • Discussing Troubleshooting Common laptop Issues

  • Syncing and Setup of Mobile Devices

  • Connect and Configure Mobile Devices

  • Configure Mobile Device Network Connectivity

  • Mobile VPN Configuration

  • Email Configuration Options

  • Discussing Mobile Device Network Connectivity Configuration

  • Support Mobile Apps

  • Discussing Mobile App Support

  • All Things Printing

  • Discussing Laser Printer Maintenance

  • Maintain Inkjet Printers

  • Discussing Inkjet Printer Maintenance

  • Maintain Impact, Thermal, and 3D Printers

  • Discussing Impact, Thermal, and 3D Printer Maintenance

  • Install and Configure Printers

  • Discussing Printer Installation and Configuration

  • Troubleshoot Print Device Issues

  • Install and Configure Imaging Devices

  • Discussing Device Installation and Configuration

  • Introduction to the Course, Meet the Instructor
  • Identify Common Operating Systems
  • Microsoft Windows
  • Work and Education Features
  • Windows System Limits
  • Apple Operating Systems
  • Linux Disk and File Management
  • Discussing OS Types
  • Use Windows Features and Tools
  • Administrative Tools
  • Manage Files in Windows
  • System Hierarchies
  • File Attributes
  • Discussing Windows Features and Tools
  • Manage Disks in Windows
  • Discussing File Management in Windows
  • The Windows Disk Management Console
  • Discussing Windows Disk Management
  • Manage Devices in Windows
  • Device Manager
  • Discussing Windows Device Manager

  • Configuring and Installing the OS
  • Installation Boot Methods
  • Disk Formatting and Partitioning
  • Networking Considerations
  • Post Installation Tasks
  • OS Installation Types
  • Unattended Installations
  • Maintain OSs
  • OS Updates
  • Anti-Malware Updates
  • Scheduled Backups
  • Task Schedulers part 1
  • Task Schedulers part 2
  • Install Windows 10 Demonstration
  • Discussing OS Maintenance

  • Install and Manage Windows Applications
  • Windows OS Tools
  • Application and Print Services
  • Task Manager
  • Manage Windows Performance
  • Windows Performance Management Tools
  • Troubleshoot Windows
  • Event Viewer
  • The System Configuration Utility
  • Troubleshooting Tips Boot Process
  • Troubleshooting Tips for Windows System Issues
  • Blue Screens and Spontaneous Shutdowns
  • Troubleshooting Tips for File and Memory Corruption
  • Safe Boot
  • System Repair Disc
  • System Restore
  • Guidelines for Troubleshooting Windows Issues

  • Network Management Tools
  • Network Connectivity
  • IP Addressing and Connection Types
  • Proxy Settings
  • Windows Client Configuration
  • Location Services
  • Firewalls
  • Network Troubleshooting
  • Remote Desktop Tools
  • Desktop Management and Remote Monitoring Tools
  • Discussion Topics

  • Sharing Resources and Wrights Management
  • User Group Accounts
  • Local Security Policy
  • SSO and Credential Manager
  • Workgroups and Homegroups
  • Network and Sharing Center
  • Network Share Configuration
  • NTSF File and Folder Permissions
  • Configure Active Directory Accounts and Policies
  • Domain Membership and Group Policy Objects
  • Basic AD Functions
  • Account Locks and Password Resets

  • Threats and Security Measures

  • Logical Security Concepts

  • Encryption

  • PKI and Certificates

  • Execution Control

  • NAC

  • Discussing Logical Security Concepts

  • Threats and Vulnerabilities

  • Types of Password Attacks

  • Discussing Threats and Vulnerabilities

  • Physical Security Controls

  • Discussing Physical Security Measures

  • Policies to Protect Data

  • Implement Security Best Practices

  • Guidelines for Implementing Security Best Practices

  • Discussing Security Best Practices Implementation

  • Implement Data Protection Policies

  • ACLs and Directory Permissions

  • Full Disk Encryption

  • Guidelines for Implementing Data Protection Policies

  • Discussing Data Protection Policies

  • Protect Data During Incident Response

  • Discussing Data Protection During Incident Response

  • Prevent Malware and Security Threats

  • Detect, Remove, and Prevent Malware

  • Trojan Horses and Spyware

  • Sources of Malware Infection

  • Best Practices for Malware Removal

  • Discussing Detecting, Removing, and Preventing Malware Infections

  • Troubleshoot Common Workstation Security Issues

  • Discussing Troubleshoot Common Workstation Security Issues

  • Supporting and Troubleshooting Mobile Devices

  • Secure Mobile Devices

  • IOT Internet of Things

  • Discussing Mobile Device Security

  • Troubleshoot Mobile Device Issues

  • Mobile Device Security Troubleshooting

  • Discussing Troubleshooting Mobile Devices

  • Implementing Operational Procedures

  • Environmental Impacts and Controls

  • Discussing Environmental Impact and Controls

  • Create and Maintain Documentation

  • Discussing Documentation Creation and Maintenance

  • Use Basic Change Management Best Practices

  • Discussing Change Management Best Practices

  • Implement Disaster Prevention and Recovery Methods

  • Discussing Implement Disaster Prevention and Recovery Methods

  • Basic Scripting Concepts

  • Discussing Scripting

  • Professionalism and Communication

  • Discussing Professionalism and Communication Skills

Course 3

CompTIA Network+

The CompTIA Network+ course and exam is a mid-level certification for network technicians. It’s designed to test the competency of a mid-level network technician and their ability to support and configure TCP/IP clients through network design, cabling, hardware setup, configuration, installation, support, and troubleshooting.

  • Intro to Networking
  • Activity: Creating a Network
  • Common Terminology
  • Activity: Examining Ports and Sockets
  • OSI Model
  • DoD Model
  • Activity: Examining Network Layers
  • TCP, UDP, IP
  • Activity: Examining TCP
  • Activity: Examining UDP
  • Activity: Examining IP
  • ICMP, IGMP, ARP
  • Activity: Examining ICMP
  • Activity: Examining ARP
  • Activity: Examining IGMP
  • Network Topologies
  • Network Types
  • Part 1: Network Characteristics
  • Part 2: Network Characteristics
  • Module 1 outro

  • Ethernet Standards
  • Copper Cable Types
  • Fiber Optic Cable Types
  • Connector Types
  • Activity: Selecting the Right Cable
  • Media Converters and Transceivers
  • Cable Management
  • Module 2 Outro

  • IPv4 Basics
  • IP Packet and Interface Types
  • Activity: Configuring Client IP Settings
  • Binary Numbering System
  • Classful and Classless Addressing
  • Understanding CIDR Notation
  • IPv4 Subnetting Method
  • Verifying with Binary
  • Finding Subnet IDs
  • Activity: Subnetting a Class C Network
  • The Delta in Action
  • Activity: Subnetting With the Delta
  • Subnetting Based on Hosts
  • Subnetting in Other Octets
  • Supernetting
  • Activity: Supernetting
  • IPv6
  • IPv4 - IPv6 Transition Mechanisms
  • Module 3 Outro

  • Remote Control Protocols
  • File Sharing Protocols
  • Web Protcols
  • Email Protocols
  • Database Protocols
  • Voice Protocols
  • Security Protocols
  • Management Protocols
  • Module 4 Outro

  • DHCP
  • Activity: Configuring DHCP
  • Activity: Configuring a DHCP Relay Agent
  • DNS
  • Activity: Configuring DNS - Part 1
  • Activity: Configuring DNS - Part 2
  • NTP
  • Corporate and Datacenter Network Architecture
  • Cloud Concepts and Connectivity Options
  • Module 5 Outro

  • Introductory Concepts
  • Repeaters and Hubs
  • Activity: Connecting Devices with a Hub
  • Bridges and Switches
  • Activity: Connecting Devices with a Switch
  • Routers and Multilayer Switches
  • Security Devices
  • Modems
  • Module 6 Outro

  • IP Devices
  • IoT
  • Activity - Programming IoT Devices
  • ICS/SCADA
  • Module 7 Outro

  • Routing Basics
  • Activity: Configuring Static Routes
  • Packet Delivery on the Same Network
  • IP Routing Across a Single Router
  • IP Routing Across Multiple Hops
  • Activity: Static Routes - CHALLENGE
  • Route Selection
  • RIP
  • Activity: Configuring RIP - CHALLENGE
  • OSPF
  • EIGRP
  • BGP
  • NAT/PAT
  • Bandwidth Management (with Module 8 Outro)

  • Ethernet Basics
  • Switching Overview
  • Activity: Examining a MAC Table
  • VLANs
  • Activity: Creating VLANs
  • VLAN Trunking
  • Activity: Configuring VLAN Trunking
  • VLAN Routing
  • Activity: Configuring VLAN Routing
  • Contention Management
  • Switchport Configuration (with Module 9 Outro)

  • Wireless Overview
  • Radio Basics
  • Modulation
  • Wi-Fi Standards
  • Antennas
  • Wi-Fi Service Sets
  • Wi-Fi Security
  • Cellular

  • Monitoring Performance
  • Common Metrics
  • Activity: Examining Interface Statistics
  • SNMP
  • Netflow
  • Network Security Monitoring (with Module 11 Outro)

  • HA and DR Concepts
  • High Availability Mechanisms
  • Disaster Recovery Mechanisms
  • Facility and Infrastructure Support (with Module 12 Outro)

  • Plans and Procedures
  • Security Policies
  • Loss Prevention
  • Common Agreements
  • Common Documentation
  • Structured Cabling - MDF and IDF
  • Horizontal and Vertical Cabling
  • Activity - Implementing Cable Management
  • Labeling
  • Surveys and Assessments (with Module 13 Outro)

  • Common Security Concepts
  • Common Attack Types
  • Spoofing-based Attacks
  • Hijacking and MITM
  • Social Engineering
  • Network Segmentation
  • Private VLANs
  • Single Organization Authentication
  • Extending Authentication
  • Authorization
  • Network Device Hardening
  • Wireless Security
  • Remote Access Security
  • IoT Security
  • Physical Security (with Module 14 Outro)

  • Troubleshooting Methodology
  • Physical Connectivity Issues
  • Hardware Testing Tools
  • Activity - Testing an Ethernet Cable
  • Activity - Crimping on an RJ-45 Connector
  • Activity - Punching Down Twisted Pair
  • Activity - Using a Telephone Toner
  • Understanding Electricity
  • Activity - Checking Cable Continuity
  • Activity - Testing DC Voltage
  • Activity - Testing AC Voltage
  • Twisted Pair Pinout Problems
  • Twisted Pair Termination Problems
  • Repairing Damaged Twisted Pair Cable
  • Fiber Optic Connectivity Issues
  • Activity - Testing a Fiber Optic Cable
  • Common Port Problems
  • Working with Ports and Their Devices
  • Common Software Testing Tools
  • Activity - Scanning for Open Ports
  • Common Command Line Utilities
  • Troubleshooting Basic IP Networking Issues
  • Common Switching Issues
  • Switching Test Tools and Techniques
  • Common IP Routing Issues
  • Wi-Fi Access Point Issues
  • Wireless Interference
  • Activity - Using a Spectrum Analyzer
  • Wireless Antenna Issues
  • Activity - Configuring a Wi-Fi Router
  • WAP Placement Strategies
  • Infrastructure Service Issues (DHCP)
  • Infrastructure Service Issues (DNS)
  • Infrastructure Service Issues (NTP)
  • Firewall / ACL Issues
  • VPN Issues
  • Additional Network Security Troubleshooting and Tips
  • Advanced Networking Issues
  • Troubleshooting Server Services (with Module 15 Outro)
  • CompTIA Network+ N10-008 Course Outro

Course 4

CompTIA Security+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction and Overview
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Module Summary

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Module Summary

  • Assess Organizational Security with Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Module Summary

  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
  • Module Summary

  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
  • Module Summary

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Implementing a PKI Demo
  • Module Summary

  • Summarize Authentication Design Concepts
  • Implement Knowledge-based Authentication
  • Password Cracker Demo
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
  • Module Summary

  • Implement Identity and Account Types
  • Implement Account Policies
  • Account Types and Polices Demo
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
  • Module Summary

  • Implement Secure Network Designs

  • Implement Secure Switching and Routing

  • Various Types of Network Attacks Demo

  • Implement Secure Wireless Infrastructure

  • Implement Load Balancers

  • Module Summary

  • Implement Firewalls and Proxy Servers

  • Implement Network Security Monitoring

  • Summarize the Use of SIEM

  • Module Summary

  • Implement Secure Network Operations Protocols

  • Implement Secure Application Protocols

  • Implement Secure Remote Access Protocols

  • Module Summary

  • Implement Secure Firmware

  • Implement Endpoint Security

  • Endpoint Protection Demo

  • Explain Embedded System Security Implications

  • Module Summary

  • Implement Mobile Device Management

  • Implement Secure Mobile Device Connections

  • Module Summary

  • Analyze Indicators of Application Attacks

  • Analyze Indicators of Web Application Attacks

  • Summarize Secure Coding Practices

  • Implement Secure Script Environments

  • Summarize Deployment and Automation Concepts

  • Module Summary

  • Summarize Secure Cloud and Virtualization Services

  • Apply Cloud Security Solutions

  • Summarize Infrastructure as Code Concepts

  • Module Summary

  • Explain Privacy and Data Sensitivity Concepts

  • Explain Privacy and Data Protection Controls

  • Module Summary

  • Summarize Incident Response Procedures

  • Utilize Appropriate Data Sources for Incident Response

  • Apply Mitigation Controls

  • Module Summary

  • Explain Key Aspects of Digital Forensics Documentation

  • Explain Key Aspects of Digital Forensics Evidence Acquisition

  • Module Summary

  • Explain Risk Management Processes and Concepts

  • Explain Business Impact Analysis Concepts

  • Module Summary

  • Implement Redundancy Strategies

  • Implement Backup Strategies

  • Implement Cyber Security Resiliency Strategies

  • Module Summary

  • Explain the Importance of Physical Site Controls

  • Explain the Importance of Physical Host Security Controls

  • Module Summary

  • Conclusion and General Exam Tips

Course 5

Cisco CCNA 200-301

This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.

After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

What will you learn?

CCNA exam objectives and topics include the following:

  • Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
  • VLANs, STP, and EtherChannel (static, PAGP, and LACP)
  • WAN technologies
  • Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
  • Device monitoring protocols, including SNMPv2 and SNMPv3
  • Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS

Course 6

CompTIA Linux+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials

  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary

  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary

  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials

  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary

  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities

  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary

  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary

  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary

  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary

Course 7

Microsoft MD-100: Windows 10

The Microsoft 70-698 course focuses on how to install Windows 10 with a minimal amount of administrative effort. Preparation, the process, activation, and troubleshooting will be covered in this IT training session. You will also learn how to perform an in-place upgrade from Windows 8.1 to Windows 10, configure hardware devices, manage device drivers, and perform post-install configuration.

  • Instructor and Course Introduction
  • Exam Overview
  • Deploy Windows Intro
  • Deploy Windows 10
  • Deploy Windows 10 Pt 2
  • Preparing Virtual Lab Setup for the Client 1
  • Installation of Windows 10 Enterprise
  • Troubleshooting Failed Installations with Setup Logs
  • Configuring Locales
  • Perform Post-Installation Configuration
  • Navigating Microsoft Edge
  • Modifying Microsoft Edge Settings
  • Customizing Your Computer Setting

  • Manage devices and data intro
  • Manage local users, groups, and devices
  • Configure data access and protection
  • Adding and accessing local users and groups
  • Managing NTFS permissions in Windows 10
  • Configure devices by using local policies
  • Configuring Audit Policies on Windows 10
  • Manage Windows security
  • How to change user account settings

  • Maintain Windows intro
  • Configure system and data recovery
  • Backing up files in Windows 10
  • Using the recycle bin
  • Manage updates
  • Check for updates in Windows 10
  • Configuring hardware in Windows 10
  • Monitor and manage Windows
  • Configuring Windows 20 desktop options
  • Installing new features

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

Course 8

Ethical Hacking Course (ECC 312-50)

An Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. The topics in this course cover a broad range of concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

Part 1: Foundations

  • About this course: CEH Foundations
  • About the Instructor

  • Networking Overview
  • Network Scope
  • Network Addressing
  • Activity - Examining Network Addressing

  • Protocols, Ports, Sockets
  • Network Topologies
  • LAN Devices
  • LAN Devices Part 2
  • VLANs
  • Activity - Examining Ports and Sockets
  • Activity - Examining Switches and VLANs

  • Routers
  • Layer 3 Switches
  • Modems and Remote Access
  • Firewalls and Proxies
  • Activity - Examining Routing
  • Activity - Examining VLAN Routing
  • Activity - Examining Firewall Rules

  • IDS and IPS
  • OSI Model
  • TCP-IP
  • Activity - Examining Network Layers

  • Layer 4 Protocols
  • Layer 3 Protocols
  • Layer 2 Protocols
  • IP Addressing
  • Subnetting
  • DHCP
  • Activity - Examining TCP
  • Activity - Examining UDP
  • Activity - Examining IP
  • Activity - Examining ICMP
  • Activity - Examining ARP

  • DNS
  • DNS Records
  • NTP
  • Authentication
  • Biometrics
  • Activity - Examining DNS
  • Activity - Examining DNS Records

  • Local Authentication
  • Directory Service Authentication
  • Extending Authentication
  • Authorization
  • Activity - Testing Access Control

  • Linux Overview
  • Linux File System
  • Linux Core Commands
  • Linux Search and Read Commands
  • Activity - Exploring Linux
  • Activity - Using Linux Core Commands
  • Activity - Using Linux Search Commands
  • Activity - Using Linux Read Commands

  • Linux File Permissions
  • Linux Special Permissions
  • Linux Configuration
  • Linux Packages
  • Linux User Management

  • Activity - Setting Linux Permissions
  • Activity - Setting Linux Special Permissions
  • Activity - Managing Packages in Kali Linux
  • Activity - Managing Users and Groups in Linux

  • Linux Job Scheduling
  • Linux File, Directory, and Download Commands
  • Linux System Commands
  • Linux Network Management
  • Linux Firewall

  • Activity - Scheduling Tasks in Linux
  • Activity - Using Linux File, Directory, and Download Commands
  • Activity - Compiling Malicious Code
  • Activity - Using Linux Process and System Commands
  • Activity - Using Linux Disk Management and Hardware Commands
  • Activity - Using Linux Networking Commands

  • Windows Overview
  • Windows Registry
  • Windows Security

  • Windows Commands
  • Windows Admin Commands
  • Windows Network Commands
  • Windows Run Line Commands
  • Windows PowerShell

  • Activity - Using Windows Built-in Commands
  • Activity - Using Windows Task Commands
  • Activity - Using Windows Admin Commands
  • Activity - Using Windows Network Commands
  • Activity - Using Windows PowerShell
  • Networking and OS Penetration Testing
  • Review

  • Information Security Overview

  • Hacking Concepts

  • Ethical Hacking Concepts

     

  • Penetration Testing

  • Penetration Testing Part 2

  • Activity - Performing a Static Code Review

  • Cyber Kill Chain Concepts
  • Activity - Performing Weaponization
  • Information Security
  • Security Policies
  • Security Controls
  • Access Control

  • Data Protection
  • Backup Sites
  • Vulnerability Management
  • SIEM
  • Risks

  • Risk Management
  • Incident Handling
  • Information Security Laws and Standards
  • Activity - Assessing Risk
  • Ethical Hacking Penetration Testing
  • Review
  • Conclusion

Part 2: Ethical Hacker

  • About this course - Ethical Hacker
  • About the Instructor

  • Footprinting Concepts
  • Footprinting Methodology
  • OSINT Tools
  • Advanced Google Search
  • Whois Footprinting
  • Activity - Performing a Whois Lookup

  • DNS Footprinting
  • Website Footprinting
  • Email Footprinting
  • Network Footprinting
  • Footprinting through Social Networking Sites

  • Competitive Intelligence Gathering
  • Footprinting Countermeasures
  • Footprinting Penetration Testing
  • Review

  • Scanning Concepts
  • ICMP Discovery Scans
  • Other Discovery Scans

  • Ports

  • TCP Flags and Handshakes

  • TCP Scan Types

  • Other Scanning Techniques

  • Banner Grabbing
  • Vulnerability Scanning
  • SSDP Scanning

  • Nmap
  • Common Nmap Scans
  • Nmap Options
  • Nmap Stealth Scans
  • Hping and Other Scanners

  • Firewall Types
  • Firewall Features
  • Firewall Features Part 2
  • Firewall Configurations
  • Intrusion Detection and Prevention

  • Firewall and IDS Evasion
  • Firewall and IDS Evasion Part 2
  • Firewalking
  • Probing a Firewall
  • Probing a Firewall Part 2

  • Proxies
  • VPNs
  • Tor
  • Scanning Countermeasures
  • Scanning Penetration Testing
  • Review

  • Vulnerability Assessment Overview
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools

  • Scanner Output and Reports

  • Vulnerability Research

  • Review

  • Enumeration Concepts
  • Enumeration Techniques and Tools
  • Service and Application Enumeration
  • SMB and NetBIOS Enumeration

  • SNMP Enumeration
  • LDAP Enumeration
  • DNS Enumeration
  • SMTP Enumeration
  • NTP Enumeration

  • Remote Connection Enumeration
  • File Transfer Enumeration
  • VoIP Enumeration
  • IPSEC Enumeration
  • IPv6 Enumeration
  • BGP Enumeration

  • Windows Command Line Enumeration
  • Linux Command Line Enumeration
  • Linux Command Line Enumeration Part 2

  • Enumeration Countermeasures
  • Enumeration Countermeasures Part 2
  • Enumeration Penetration Testing
  • Review

  • System Hacking Concepts
  • System Hacking Tools and Frameworks
  • Searchsploit
  • Compiling and Running Exploits

  • Metasploit

  • Metasploit Search

  • Metasploit Exploits and Payloads

  • Metasploit Meterpreter

  • Metasploit Connectivity

  • Metasploit Impersonation and Migration

  • Netcat

  • Pivoting

  • Netcat Relays

  • Metasploit Post Exploitation Modules

  • Common Operating System Exploits

  • Hacking Windows

  • Hacking Linux

  • Network Service Exploits

  • Password Attacks

  • Dictionary Attack

  • Brute Force Attack

  • Password Spraying

  • Rainbow Tables

  • Network Service Password Attacks

  • Password Cracking Tools

  • Online Password Cracking Sites

  • Windows Password Cracking

  • Linux Password Cracking

  • Other Methods for Obtaining Passwords

  • Keylogging

  • Spyware

  • Rootkits

  • Buffer Overflows

  • Privilege Escalation

  • Hiding Files

  • Alternate Data Streams

  • Steganography

  • Creating and Maintaining Remote Access

     

  • Hiding Evidence

  • Covering Tracks in Windows

  • Covering Tracks in Linux

  • System Hacking Counter-Measures

  • System Hacking Penetration Testing

  • Review

  • Intro to Malware

  • Virus Overview

  • Virus Types

  • Self-Hiding Viruses

  • Worms

  • Trojans

  • Trojan Types

  • RATS

  • Ransomware

  • Botnets

  • Covert Channel Trojans

  • Banking Trojans

  • Rootkits

  • Other Malware

  • Malware Makers

  • Dropper and Stage Creation

  • Exploit Kits

  • Malware Detection

  • Malware Detection Part 2

  • Malware Analysis

  • Malware Reverse Engineering

  • Malware Countermeasures

  • Malware Penetration Testing

  • Review

  • Sniffing Concepts

  • Types of Sniffing

  • Sniffing Protocols

  • Sniffing Tools

  • ARP

  • ARP Spoofing

  • MITM

  • MAC Attacks

  • MAC Spoofing

  • DHCP Attacks

  • Name Resolution Poisoning

  • VLAN Hopping

  • Sniffing Counter Measures

  • Sniffing Penetration Testing

  • Review

  • Social Engineering Concepts

  • Social Engineering Techniques

  • Social Engineering Examples

  • Social Engineering Tools

  • Social Media

  • Identity Theft

  • Insider Threats

  • Social Engineering Countermeasures

  • Social Engineering Penetration Testing

  • Review

  • DoS-DDoS Concepts

  • Volumetric Attacks

  • Fragmentation Attacks

  • State Exhaustion Attacks

  • Application Layer Attacks

  • Protocol Attacks

  • Other Attacks

  • Botnets

  • DoS-DDoS Attack Tools

  • DoS-DDoS Countermeasures

  • Dos Penetration Testing

  • Review

Part 3: Advanced Ethical Hacker

  • About This Course: Advanced Ethical Hacker
  • About the Instructor

  • Session Hijacking Concepts
  • Token-based Authentication
  • Compromising a Session Token
  • XSS
  • CSRF
  • Other Attacks

  • Network Level Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Session Penetration Hijacking
  • Review

  • IDS-IPS
  • Snort
  • Snort Rules
  • Syslog

  • WIPS
  • IDS Considerations
  • IDS Tools
  • IDS Evasion
  • IDS-Firewall Evasion Tools
  • IDS Scenerios

  • Firewalls
  • Packet Filtering Rules
  • Firewall Deployments
  • Traffic Flow through Firewalls
  • Split DNS

  • Firewall Tools
  • Firewall Evasion
  • Firewall Scenarios

  • Honeypots
  • Honeypot Detection
  • IDS-Firewall Evasion Countermeasures
  • IDS-Firewall Honeypot Penetration Testing
  • Review

  • Webserver Security Overview
  • Common Webservers
  • Webserver Attacks
  • Misconfiguration Attack Examples

  • Webserver Attack Tools
  • Attack Countermeasures
  • Webserver Penetration Testing
  • Review

  • Web Application Concepts
  • Attacking Web Apps

  • A01 - Broken Access Control
  • A02 - Cryptographic Failures
  • A03 - Injection
  • A04 - Insecure Design
  • A05 - Security Misconfiguration

  • A06 - Vulnerable and Outdated Components
  • A07 - Identification and Authentication Failures
  • A08 - Software and Data Integrity Failures
  • A09 - Security Logging and Monitoring
  • A10 - Server Side Request Forgery

  • XSS Attacks
  • CSRF
  • Parameter Tampering
  • Clickjacking
  • SQL Injection

  • Insecure Deserialization Attacks
  • IDOR
  • Directory Traversal
  • Session Management Attacks
  • Response Splitting

  • Denial of Service
  • Overflow Attacks
  • XXE Attacks
  • Soap Attacks
  • Ajax Attacks

  • Web App Hacking Tools
  • Web Hacking Countermeasures
  • Web Application Penetration Testing
  • Review

  • SQL Overview
  • SQL Injection Concepts
  • Basic SQL Injection

  • Finding Vulnerable Websites
  • Error-based SQL Injection
  • Union SQL Injection
  • Blind SQL Injection
  • SQL Injection Scenarios
  • Evading Detection

  • SQL Injection Tools
  • SQL Injection Countermeasures
  • Safe Coding Examples
  • SQL Wildcards
  • SQL Injection Penetration Testing
  • Review

  • Wireless Concepts
  • Wireless Signal Encoding
  • Wi-Fi Standards
  • Wi-Fi Antennas
  • Wireless Authentication

  • Wi-Fi Security Standards
  • Wireless Network Troubleshooting Tools
  • Wi-Fi Discovery Tools
  • Sniffing Wi-Fi

  • Wi-Fi Attack Types
  • Wi-Fi Rogue Access Point Attacks
  • Wi-Fi Denial of Service Attacks
  • Wi-Fi Password Cracking Attacks
  • WEP Cracking

  • WPA-WPA2 Cracking
  • WPA3 Attacks
  • WPS Cracking
  • Wi-Fi Attack Tools for Mobile Devices
  • Bluetooth Hacking
  • Other Wireless Hacking

  • Wireless Hacking Countermeasures
  • Wireless Security Tools
  • Wireless Penetration Testing
  • Review

  • Mobile Platform Overview

  • Mobile Device Vulnerabilities

  • Mobile Device Attacks

  • Android
  • Android Vulnerabilities
  • Rooting Android
  • Android Exploits
  • Android Hacking Tools
  • Reverse Engineering an Android App
  • Securing Android

  • iOS
  • iOS Vulnerabilities
  • Jailbreaking iOS
  • iOS Exploits
  • iOS Hacking Tools
  • Securing iOS

  • loT Concepts
  • loT Infrastructure
  • Fog Computing
  • loT Vulnerabilities
  • loT Threats

  • IoT Hacking Methodologies and Tools
  • IoT Hacking Methodologies and Tools Part 2
  • Hacking Countermeasures
  • IoT Penetration Testing
  • OT Concepts
  • Industrial IoT

  • IT-OT Convergence

  • ICS

     

  • SCADA

  • DCS

  • RTU

  • PLC

  • Addition OT Components

  • OT Variables
  • Well-known OT attacks
  • OT Attack Methodology and Basic Tools
  • OT Reconnaissance
  • OT Penetration and Control

  • SQL Injection Tools
  • SQL Injection Countermeasures
  • Safe Coding Examples
  • SQL Wildcards
  • SQL Injection Penetration Testing
  • Review

  • Cloud Computing Concepts
  • Virtualization
  • Cloud Types
  • Cloud Benefits and Considerations
  • Cloud Risks and Vulnerablilities

  • Cloud Threats and Countermeasures
  • Cloud Security Tools
  • Cloud Security Best Practices
  • Cloud Penetration Testing
  • Review

  • Cryptography Concepts
  • Symmetric Encryption
  • Asymmetric Encryption
  • Public Key Exchange
  • PKI

  • Digital Certificates

  • Digital Signatures

  • Hashing

  • Email Encryption

     

  • Network Communication Encryption

  • Disk Encryption
  • VPN Encryption
  • Cryptography Tools

  • Cryptography Attacks
  • Cryptography Penetration Testing
  • Review
  • Conclusion

Course 9

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

  • Introduction
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Analyze the results of a network reconnaissance Part 1
  • Analyze the results of a network reconnaissance Part 2
  • Analyze the results of a network reconnaissance Part 3
  • Analyze the results of a network reconnaissance Part 4
  • Analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

  • Implement an information security vulnerability management process Part 1
  • Implement an information security vulnerability management process Part 2
  • Implement an information security vulnerability management process Part 3
  • Implement an information security vulnerability management process Part 4
  • Implement an information security vulnerability management process Part 5
  • Implement an information security vulnerability management process Part 6
  • Implement an information security vulnerability management process Part 7
  • Analyze the output resulting from a vulnerability scan Part 1
  • Analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

  • Distinguish threat data or behavior to determine the impact of an incident Part 1
  • Distinguish threat data or behavior to determine the impact of an incident Part 2
  • Distinguish threat data or behavior to determine the impact of an incident Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response Part 1
  • Analyze common symptoms to select the best course of action to support incident response Part 2
  • Analyze common symptoms to select the best course of action to support incident response Part 3
  • Analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Use data to recommend remediation of security issues related to identity and access management Part 1
  • Use data to recommend remediation of security issues related to identity and access management Part 2
  • Use data to recommend remediation of security issues related to identity and access management Part 3
  • Use data to recommend remediation of security issues related to identity and access management Part 4
  • Review security architecture and make recommendations to implement compensating controls Part 1
  • Review security architecture and make recommendations to implement compensating controls Part 2
  • Review security architecture and make recommendations to implement compensating controls Part 3
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

Frequently Asked Questions

As soon as you purchase! After we receive payment, you’ll be sent a voucher code via email from KO Tech Academy with the subject line “You received a new voucher code”. It typically takes a couple hours for processing on our end, so don’t panic if you don’t receive your voucher code immediately. Once you’ve received your voucher code, follow the instructions in the email to setup your account and access your Learning Management System (LMS) Dashboard.

You get to work! Once you’ve created your account and accessed your dashboard, you’re free to start taking your courses and accessing all of your materials. Remember you have full access for an entire year!

There is no restriction on what order you take your courses in, but we definitely recommend taking the courses in order. They’re designed to build on each other as you progress and learn more and more.

For IT & Cybersecurity, we recommend the following order:

  • CompTIA ITF+
  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • Cisco CCNA 200-301
  • CompTIA Linux+
  • Microsoft MS 70-698
  • Microsoft MS 70-410
  • CompTIA CySA+
You can take all of the exams online through Pearson Vue. We’ve provided links below to additional information from the certification providers because each one will have different requirements for online exams like needing a webcam for monitoring during the exam, etc.
 

© All rights reserved