BLACK FRIDAY 50% OFF SALE

IT & Cybersecurity

The industry standard certification training for establishing a career in IT.

$998

was $1,997

use code “blackfriday2020” at checkout

OR

use code “blackfriday2020pp” at checkout

50% OFF Black friday sale ends:
  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds
includes courses from:

the industry

Why IT & Cybersecurity?

By 2021, there will be an estimated 2.1 million unfilled IT jobs making it the top 5 growth industry in the world.

use code “blackfriday2020” at checkout

Find what you enjoy and grow in it

  • Growth
  • Versatility
  • Reliability

The IT industry is constantly projected to grow on all fronts and shows no signs of slowing down.

With 44% of businesses planning to increase tech spend in 2020, up from 38% in 2019, IT budgets are consistently rising as businesses optimize their models and replace outdated technologies.

No one likes feeling pinned down and trapped in a role without any chance of change.

The tech industry, and more specifically Information Technology, has hundreds of specialities to choose from making it one of the easiest industries to start broad and then find a niche you enjoy to specialize in.

Demand for skilled tech workers is only growing as the industry continues to climb in size.

Jobs in IT not only have great job prospects and rank highly in satisfaction, but they also are in such high demand as businesses move more and more of their models to online infrastructures.

It doesn't take much to get started - just gotta put in the work!

Here are some jobs and salaries you can acquire with just a few basic certifications:

Help Desk Analyst:
$50,077 median salary

Technical Support:
$53,128 median salary

IT Support:
$54,737 median salary

Network Administrator:
$72,222 median salary

Companies that look for certifications offered in this course:

the skills

No Degree Required

A lot of people would say you’d have to get a college degree first. But in reality, that’s not exactly the case for most entry-level positions.

Think about it like this – a truck driver needs a CDL in order to legally operate an 18-wheeler and an HVAC technician needs to be HVAC certified before going to someone’s house to fix the A/C.

The same exact concept applies to the IT industry; you simply need to be certified in order to enter the field.

The Pathway to Success in IT

  • Get Certified

    Complete our 9-week, self-paced IT certification program and pass your certification exams for at least CompTIA A+ and Security+

  • Build Experience

    Using those certifications, land an entry-level IT position to start building valuable experience - most will pay $25-35/hour

  • Find Your Passion

    As you build experience, learn what type of work, such as networking, cybersecurity, cloud computing, etc., you most enjoy

  • Continue Education & Growth

    Learn what requirements there are for the job path you want to take, then continue gaining higher level certifications and education

The Pathway to Success in IT

  • Get Certified

    Complete our 9-week, self-paced IT certification program and pass your certification exams for at least CompTIA A+ and Security+

  • Build Experience

    Using those certifications, land an entry-level IT position to start building valuable experience - most will pay $25-35/hour

  • Find Your Passion

    As you build experience, learn what type of work, such as networking, cybersecurity, cloud computing, etc., you most enjoy

  • Continue Education & Growth

    Learn what requirements there are for the job path you want to take, then continue gaining higher level certifications and education

use code “blackfriday2020” at checkout

the program

Built for You to Win

We’ve worked in the tech education space for over a decade and know what it takes to get started and win in this industry.

Our course is built with career changers in mind and has all of the knowledge and tools necessary for you to succeed.

use code “blackfriday2020” at checkout

course curriculum

What You'll Learn in the Course

Unlock the knowledge to jumpstart your career in IT with just one master course

0
courses
0
videos
0
hours

course 1

CompTIA IT Fundamentals

The CompTIA IT Fundamentals course and exam focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.

  • Instructor Intro
  • Compare and Contrast Notational Systems
  • Compare and Contrast Notational Systems Demo
  • Compare and Contrast Fundamentals Data Types and Their Characteristics
  • Illustrate the Basics of Computing and Processing
  • Explain the Value of Data and Information
  • Compare and Contrast Common Units of Measures
  • Compare and Contrast Common Units of Measures Demo
  • Explain the Troubleshooting Methodology

  • Classify Common Types of Input-Output Device Interfaces
  • Given a scenario, set up & install Common Peripheral Devices to a PC
  • Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • Explain the Purpose of Common Internal Computing Components
  • Compare & Contrast Common Internet Service Types-
  • Compare & Contrast Storage Types
  • Compare & Contrast Common Computing Devices & Their Purposes
  • Explain Basic Networking Concepts
  • Explain Basic Networking Concepts Part 2
  • Explain Basic Networking Concepts Part 3
  • Explain Basic Networking Concepts Part 4
  • Explain Basic Networking Concepts Demo
  • Given a scenario Install, Configure & Secure a Basic Wireless Network
  • Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

  • Explain the Purpose of Operating Systems
  • Explain the Purpose of Operating Systems Demo
  • Compare & Contrast Components of an Operating System
  • Compare & Contrast Components of an Operating System Demo
  • Explain the Purpose & Proper Use of Software
  • Explain Methods of Application Architecture & Delivery Models
  • Given a Scenario Configure & Use Web Browsers
  • Given a Scenario Configure & Use Web Browsers FireFox
  • Given a Scenario Configure & Use Web Browsers Demo Chrome
  • Given a Scenario Configure & Use Web Browsers Demo Edge
  • Compare & Contrast General Application Concepts & Uses

  • Compare & Contrast Programming Language Categories-
  • Given a Scenario Use Programming Organizational Techniques & Interpret
  • Logic
  • Explain the Purpose & Use of Programming Concepts
  • HTML Demo

  • Explain Database Concepts and the Purpose of Databases
  • Compare and Contrast Various Database Structures
  • Summarize Methods Used to Interface with Databases
  • Summarize Methods Used to Interface with Databases Demo

  • Summarize Confidentiality, Integrity, and Availability Concerns
  • Explain Methods to Secure Devices and Best Practices
  • Summarize Behavioral Security Concepts
  • Compare & Contrast Authentication, Authorization, Accounting, &
  • Repudiation Concepts
  • Explain Password Best Practices
  • Explain Common Uses of Encryption
  • Explain Business Continuity Concepts
  • Takeaways
  • ITF Fundamentals Conclusion

course 2

CompTIA A+ Core 1 (220-1001) & Core 2 (220-1002)

The CompTIA A+ certified professionals support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. 

  • Intro to A+ Core 1 Instructor
  • CompTIA A+ Course Intro
  • Mobile Devices Part 1
  • Mobile Devices Part 2
  • Mobile Devices Part 3
  • Installing Components in Laptop
  • Laptop Features Part 1
  • Laptop Features Part 2
  • Compare and Contrast Types of Mobile Devices
  • Accessories and Ports of Other Mobile Devices Part 1
  • Accessories and Ports of Other Mobile Devices Part 2
  • Configure Basic Device Network Connectivity and Application Support Part 1
  • Configure Basic Device Network Connectivity and Application Support Part 2
  • Use Methods to Perform Mobile Device Synchronization
  • Laptop Disassemble and Assemble

  • Networking Part 1
  • Networking Part 2
  • Compare and Contrast Common Networking Hardware Devices Part 1
  • Compare and Contrast Common Networking Hardware Devices Part 2
  • Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  • Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  • Setting Up a Wireless Router
  • Compare and Contrast Wireless Networking Protocols
  • Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  • Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  • Explain Common Network Configuration Concepts Part 1
  • Explain Common Network Configuration Concepts Part 2
  • Compare and Contrast Internet Connection Types Network Types and Features
  • Given a Scenario Using Appropriate Networking Tools

  • Hardware Part 1
  • Hardware Part 2
  • Hardware Part 3
  • Identify - Common Connector Types
  • Scenario - Install RAM Types
  • Scenario - Select Install and Configure Storage Devices Part 2
  • Scenario Select Install and Configure Storage Devices
  • Install and Configure Motherboards CPUs and Add-on Cards Part 1
  • Install and Configure Motherboards CPUs and Add-on Cards Part 2
  • Install and Configure Motherboards CPUs and Add-on Cards Part 3
  • Install and Configure Motherboards CPUs and Add-on Cards Part 4
  • Install Disassemble and Assemble a Desktop
  • Purposes for Peripherals and Types
  • Summarize Power Supplies
  • Scenario - Select and Configure Appropriate Components for Customers PCs
  • Scenario - Install and Configure Common Devices
  • Scenario - Configure SOHO Multifunction Devices Printers and Settings
  • Scenario - Install and Maintain Various Print Technologies Part 1
  • Scenario - Install and Maintain Various Print Technologies Part 2
  • Scenario - Install and Maintain Various Print Technologies Part 3

  • Virtualization Part 1
  • Virtualization Part 2
  • Scenario Setup and Configure Client-side Virtualization

  • Hardware and Networking Troubleshooting
  • Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  • Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  • Troubleshoot Hard Drives and RAID Arrays
  • Troubleshoot Video and Display Issues
  • Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  • Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  • Troubleshoot Printers
  • Troubleshoot Common Wired and Wireless Network Problems

  • Intro to A+ Core2 Instructor
  • Intro to A+ Core2
  • Operating Systems Part1
  • Operating Systems Part2
  • Copare and Contrast features of Microsoft Windows Versions
  • Summarize General OS Installation Considerations Upgrade Methods Demo
  • Summarize General OS Installation Considerations Upgrade Methods Part2
  • Summarize General OS Installation Considerations Upgrade Methods Part3
  • Summarize General OS Installation Considerations Upgrade Methods
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Demo
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Part1
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Part2
  • Microsoft Operating System and Tools Part1 Demo
  • Microsoft Operating System and Tools Part1
  • Microsoft Operating System and Tools Part2 Demo
  • Microsoft Operating System and Tools Part2
  • Microsoft Operating System and Tools Part3 Demo
  • Microsoft Operating System and Tools Part3
  • Microsoft Operating System and Tools Part4 Demo
  • Microsoft Operating System and Tools Part4
  • Microsoft Windows Control Panel Utilities Demo
  • Microsoft Windows Control Panel Utilities
  • Summerize Application Installation and Configuration Concepts
  • Configure Windows Networking on a Client Desktop Demo
  • Configure Windows Networking on a Client Desktop
  • Features and Tools of MAC OS and Linux Client Desktop

  • Security - Physical Security Measures
  • Explain Logical Security Concepts Part2
  • Explain Logical Security Concepts
  • Compare, Contrast Wireless Security Protocols & Authentication Methods
  • Detect, Remove, and Prevent Malware using Appropriate Tools
  • Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • Compare Contrast the different Microsoft Windows Security Settings- Demo
  • Compare Contrast the different Microsoft Windows Security Settings
  • Implement Security Best Practices to Secure a Workstation Part2
  • Implement Security Best Practices to Secure a Workstation
  • Implement Methods for Securing Mobile Devices
  • Implement Appropriate Data Destruction & Disposal Methods
  • Configure Security on SOHO Wireless and Wired Networks Demo
  • Configure Security on SOHO Wireless and Wired Networks

  • Software Troubleshooting Demo
  • Software Troubleshooting Part1
  • Software Troubleshooting Part2
  • Troubleshoot and Resolve PC Security Issues Demo
  • Troubleshoot and Resolve PC Security Issues Part2
  • Troubleshoot and Resolve PC Security Issues
  • Best Practice Procedures for Malware Removal
  • Troubleshoot Mobile OS and Application
  • Troubleshoot Mobile OS and Application Security Issue

  • Operational Procedures
  • Implement Basic Change Management Best Practices
  • Implement Basic Disaster Prevention and Recovery Methods
  • Explain Common Safety Procedures
  • Explain Environmental Impacts and Appropriate Controls
  • Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • Using Proper Communication Techniques and Professionalism
  • Identify the Basic of Scripting Demo
  • Identify the Basic of Scripting
  • Use Remote Access Technologies

module 3

CompTIA Network+

The CompTIA Network+ course and exam is a mid-level certification for network technicians. It’s designed to test the competency of a mid-level network technician and their ability to support and configure TCP/IP clients through network design, cabling, hardware setup, configuration, installation, support, and troubleshooting.

  • Intro Network Plus N10 007
  • Basic Networking
  • Activity Basic Networking
  • OSI Model
  • Exploring the OSI Model- Act
  • Protocol and Ports
  • Activity Examining Protocols and Ports
  • Connection-oriented vs. connectionless
  • Activity Comparing TCP and UDP
  • Internet Protocol (IP)
  • Activity Examining the Lower Layer Protocols
  • Layer 7 Remote Control Protocols
  • Layer 7 File Transfer Protocols
  • Layer 7 Messaging Protocols
  • Activity Examining Messaging Protocols
  • Layer 7 Web Traffic Protocols
  • Layer 7 Streaming Media Protocols
  • Layer 7 Infrastructure Management Protocols
  • Switching
  • Activity Creating Collision and Broadcast Domains
  • Interface Properties and Segmentation
  • Activity Creating a Basic Network Segment
  • Switching Part 2
  • Activity Switching
  • Switching Loop Management
  • Activity Managing Switching Loops
  • VLANs
  • Activity Creating VLANs
  • Routing
  • Activity Examining ARP
  • IP Addressing Basics
  • Activity Configuring IP
  • Routers
  • Activity Setting Up a Router
  • Routing Basics
  • Activity Adding Static Routes
  • VLAN Routing
  • Activity Routing Between VLANs
  • NAT/PAT
  • Activity Configuring NAT/PAT
  • Routing Protocols
  • Activity Configuring a Routing Protocol
  • Firewalls
  • Activity Configuring Firewalls
  • Advanced Switching and Routing Concepts
  • Activity Exploring IPv6
  • Performance Concepts
  • IP Addressing
  • Subnetting
  • Activity Learning to Subnet
  • Address Assignments
  • Network Types and Topologies
  • Wireless Topologies
  • Network Types
  • Technologies that Facilitate the Internet Of Things (IoT)
  • Wireless Technologies
  • 802.11 Standards
  • Wi-Fi Frequencies
  • Wi-Fi Antenna Concepts
  • Bluetooth
  • Cellular
  • Activity Using an RF Spectrum Analyzer
  • Cloud Concepts
  • Activity Exploring Cloud Services
  • Network Services
  • Activity Setting up DNS
  • DHCP Service
  • Activity Setting Up DHCP
  • NTP

  • Infrastructure
  • Activity Testing a Fiber Optic Cable
  • Plenum vs. PVC
  • Activity Crimping on an RJ-45 Connector
  • Transceivers
  • Activity Terminating Cable to a 110 Block
  • Copper Cable Standards
  • Activity Creating a Crossover Cable
  • Ethernet Deployment Standards
  • Network Device Placement and Installation
  • Repeater
  • Router
  • Modem
  • Activity Setting up a WAP
  • Firewall
  • Media Converter
  • Advanced Network Devices
  • Wireless Controller
  • Proxy Server
  • Activity Configuring Proxy Settings
  • VPN Concentrator
  • Virtual Networking Components
  • Network Storage Types
  • WAN Technologies
  • Transmission Mediums
  • Activity Configuring WAN Links
  • Termination

  • Change Management
  • IDF-MDF Documentation
  • Labeling
  • Logical vs Physical Diagrams
  • Network Operations Documentation
  • Rack Diagrams
  • Standard Operation Procedures
  • Using Documentation Act
  • Wiring and Ports Locations
  • Continuity and Disaster
  • MTTR Mean Time Repair
  • Recovery
  • Backing Up Your Data Act
  • Event Management
  • Metrics
  • Scanning Monitoring Patching
  • Testing the Network Act
  • HTTPS-Management
  • Out-of-Band Management
  • RDP
  • Remote Access Methods
  • Remote File Access
  • Making Remote Connections Act
  • SSH
  • VNC
  • Policies and Best Practices
  • Creating Policies and Procedures Act

  • Physical Security Devices
  • Examining Security Devices Act
  • Authentication and Access
  • Access Controls Methods Act
  • Multifactor Authentication
  • Basic Wireless Network Security
  • Demonstrating the Need for Wireless Act
  • Common Network Attacks
  • Conducting a Phishing Campaign Act
  • Network Device Hardening
  • Supporting Secure Authentication Encryption Act
  • Updating Firmware
  • Explain Common Mitigation Techniques
  • Implementing a Honey Pot Act

  • Network Troubleshoot
  • Hardware Tools Analyzers
  • Troubleshooting With Hardware Tools Act
  • Software Tools Command Line
  • Troubleshooting with Command Line Tools Act
  • Software Tools
  • Troubleshooting with Software Tools Act
  • Using the Appropriate Tools
  • Physical Issues
  • Traffic Flow Issues
  • Transceiver Issues
  • Troubleshoot Common Wired Connectivity
  • Troubleshooting Signal Problems
  • Troubleshooting Transceiver Problems
  • Incorrect WAP Types
  • Latency and Jitter
  • Troubleshoot Common Wireless Connectivity
  • Troubleshooting WAP Issues
  • Advanced Network Issues
  • Case Study Troubleshooting
  • DHCP Issues
  • Firewall ACL Issues
  • Troubleshooting Common Network
  • Unresponsive Services
  • Outro

module 4

CompTIA Security+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Types Of Malware-Part 1
  • Types Of Malware-Part 2
  • Types Of Attacks-Part 1
  • Types Of Attacks-Part 2
  • Types Of Attacks-Part 3
  • Types Of Attacks-Part 4
  • Types Of Attacks-Part 5
  • Threat Actors-Part 1
  • Threat Actors-Part 2
  • Penetration Testing And Vulnerability Scanning-Part 1
  • Penetration Testing And Vulnerability Scanning-Part 2
  • Impact Of Vulnerabilities-Part 1
  • Impact Of Vulnerabilities-Part 2

  • Networking Hardware And Software-Part 1
  • Networking Hardware And Software-Part 2
  • Networking Hardware And Software-Part 3
  • Networking Hardware And Software-Part 4
  • Networking Hardware And Software-Part 5
  • Networking Hardware And Software-Part 6
  • Security Assessment-Part 1
  • Security Assessment-Part 2
  • Troubleshooting Issues-Part 1
  • Troubleshooting Issues-Part 2
  • Securing Mobile Devices-Part 1
  • Securing Mobile Devices-Part 2
  • Securing Mobile Devices-Part 3
  • Securing Mobile Devices-Part 4
  • Secure Protocols-Part 1
  • Secure Protocols-Part 2

  • Secure Network Architecture-Part 1
  • Secure Network Architecture-Part 2
  • Secure System Designs-Part 1
  • Secure System Designs-Part 2
  • Secure Staging Deployment Concepts
  • Embedded Systems-Part 1
  • Embedded Systems-Part 2
  • Application Development And Deployment-Part 1
  • Application Development And Deployment-Part 2
  • Application Development And Deployment-Part 3
  • Physical Security Controls-Part 1
  • Physical Security Controls-Part 2
  • Physical Security Controls-Part 3
  • Cloud Virtualization-Part 1
  • Cloud Virtualization-Part 2

  • Identity And Access Management-Part 1
  • Identity And Access Management-Part 2
  • Identity And Access Services-Part 1
  • Identity And Access Services-Part 2
  • Management Controls-Part 1
  • Management Controls-Part 2
  • Account Management Practices-Part 1
  • Account Management Practices-Part 2
  • Account Management Practices-Part 3

  • Organizational Security-Part 1
  • Organizational Security-Part 2
  • Business Impact Analysis Concepts-Part 1
  • Business Impact Analysis Concepts-Part 2
  • Risk Management-Part 1
  • Risk Management-Part 2
  • Incident Response Procedures-Part 1
  • Incident Response Procedures-Part 2
  • Forensics-Part 1
  • Forensics-Part 2
  • Disaster Recovery-Part 1
  • Disaster Recovery-Part 2
  • Types Of Control-Part 1
  • Types Of Control-Part 2
  • Data Security And Privacy Practices-Part 1
  • Data Security And Privacy Practices-Part 2

  • Cryptographic Basics-Part 1
  • Cryptographic Basics-Part 2
  • Cryptographic Basics-Part 3
  • Cryptographic Algorithms-Part 1
  • Cryptographic Algorithms-Part 2
  • Wireless Security-Part 1
  • Wireless Security-Part 2
  • Implementing PKI-Part 1
  • Implementing PKI-Part 2
  • Implementing PKI-Part 3
  • Conclusion

module 5

Cisco CCNA 200-301

This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.

After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

What will you learn?

CCNA exam objectives and topics include the following:

  • Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
  • VLANs, STP, and EtherChannel (static, PAGP, and LACP)
  • WAN technologies
  • Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
  • Device monitoring protocols, including SNMPv2 and SNMPv3
  • Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS

module 6

CompTIA Linux+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials

  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary

  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary

  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials

  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary

  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities

  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary

  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary

  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary

  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary

module 7

Microsoft MD-100: Windows 10

The Microsoft 70-698 course focuses on how to install Windows 10 with a minimal amount of administrative effort. Preparation, the process, activation, and troubleshooting will be covered in this IT training session. You will also learn how to perform an in-place upgrade from Windows 8.1 to Windows 10, configure hardware devices, manage device drivers, and perform post-install configuration.

  • Instructor and Course Introduction
  • Exam Overview
  • Deploy Windows Intro
  • Deploy Windows 10
  • Deploy Windows 10 Pt 2
  • Preparing Virtual Lab Setup for the Client 1
  • Installation of Windows 10 Enterprise
  • Troubleshooting Failed Installations with Setup Logs
  • Configuring Locales
  • Perform Post-Installation Configuration
  • Navigating Microsoft Edge
  • Modifying Microsoft Edge Settings
  • Customizing Your Computer Setting

  • Manage devices and data intro
  • Manage local users, groups, and devices
  • Configure data access and protection
  • Adding and accessing local users and groups
  • Managing NTFS permissions in Windows 10
  • Configure devices by using local policies
  • Configuring Audit Policies on Windows 10
  • Manage Windows security
  • How to change user account settings

  • Maintain Windows intro
  • Configure system and data recovery
  • Backing up files in Windows 10
  • Using the recycle bin
  • Manage updates
  • Check for updates in Windows 10
  • Configuring hardware in Windows 10
  • Monitor and manage Windows
  • Configuring Windows 20 desktop options
  • Installing new features

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

module 8

Ethical Hacking Course (ECC 312-50)

An Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. The topics in this course cover a broad range of concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

  • Module 1 Notes
  •  Introduction
  •  Introduction to Hacking
  •  Information Security Threats and Attack Vectors
  •  Hacking Concepts
  •  Ethical Hacking Concepts and Scope
  •  Information Security Controls Part 1
  •  Information Security Controls Part 2
  •  Information Security Laws and Standards

  • Module 2 Notes
  •  Footprinting and Reconnaissance
  •  Footprinting Methodology
  •  Google Hacking
  •  FootPrinting Through Social Networking
  •  Website Foot Printing
  •  Email Foot Printing
  •  Competitive Intelligence Gathering
  •  WhoIs Foot Printing
  •  DNS Logical and Geographical Foot Printing
  •  Network Footprinting
  •  Foot Printing
  •  Foot Printing Tools
  •  Foot Printing Penetration Testing
  •  Conduct Recon with Ping Act
  •  Query DNS with NSLookUp Act
  •  Discover Website Subdomain with Sublist3r Act
  •  Obtain OSINT Information About a Person wit Pipl Act
  •  Gather Contact and Host Information with theHarvester Act
  •  Automate OSINT Research with Recon-ng Act
  •  Get Started with Metasploit Act
  •  Conduct Open Source Intelligence with OSR Framework Act
  •  Obtain Whois Information with Smart Whois Act
  •  Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
  •  Create an Offline Copy of a Website with HTTrack Act
  •  Trace an Email with eMail Tracker Pro Act

  • Module 3 Notes
  •  Network Scanning
  •  Discovery Scans
  •  Port Scans
  •  Nmap
  •  Nmap Stealth Scans
  •  Nmap Options
  •  H-ping and Other Scanners
  •  SSDP Scanning
  •  Scanning Beyond IDS and Firewall
  •  Banner Grabbing
  •  Scanning Pen Testing
  •  Checking for Live Systems with Angry IP Scanner Act
  •  Network Scanning with MegaPing Act
  •  Advanced Scanning with nmap Act
  •  Packet Crafting with Hping3 Act
  •  Packet Crafting with Colasoft Packet Builder Act

  • Module 4 Notes
  •  Enumeration
  •  Enumeration Technicques Tools
  •  NetBIOS Enumeration
  •  SNMP Enumeration
  •  LDAP Enumeration
  •  NTP Enumeration
  •  SMTP and DNS Enumeration
  •  Enumeration Countermeasures
  •  Enumeration Penetration Testing
  •  Enumerate NetBIOS Information with SuperScan Act
  •  Enumerate NetBIOS Information with NetBIOS Enumerator Act
  •  Enumerate NetBIOS and LDAP Information with Hyena Act
  •  Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act

  • Module 5 Notes
  •  Vulnerability Analysis
  •  Vulnerability Assessment Solutions
  •  Vulnerability Scoring Systems
  •  Vulnerability Assessment Tools and Reports
  •  Perform a Vulnerability Scan and Analysis with Nessus Act

  • Module 6 Notes
  •  Malware Threats
  •  Trojan Concepts
  •  Trojan Types
  •  Trojan Tools
  •  Virus and Worm Concepts
  •  Virus Types
  •  Malware Analysis
  •  Malware Reverse Engineering
  •  Malware Detection
  •  Malware Countermeasures
  •  Malware Penetration Testing
  •  Infect a Victim with a Remote Access Trojan Act

  • Module 7 Notes
  • Sniffing Concepts
  • DHCP Attacks
  • MAC Attacks
  • ARP Poisoning
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Sniff a Clear Text HTTP Session with Wireshark Act
  • Intercept and Crack a Network Login Act

  • Module 8 Notes
  •  Social Engineering
  •  Human Based Social Engineering
  •  Computer Based Social Engineering
  •  Additional Types of Social Engineering
  •  Social Engineering Countermeasures
  •  Social Engineering Penetration Testing
  •  Fool a User with a Baited USB Stick Act
  •  Harvest Credentials with Spear Phishing Act

  • Module 9 Notes
  •  Denial of Service
  •  Common Dos-DDoS Attack Types
  •  Additional DoS Attack Types
  •  BotNets
  •  DoS Countermeasures
  •  Additional DoS Countermeasures
  •  DoS Penetration Testing
  •  Perform a DoS Attack With the Low Orbit ION Cannon Act
  •  Step Up the DoS Attack With the High Orbit ION Cannon Act
  •  Perform a Slowloris DoS Attack Act

  • Module 10 Notes
  •  Session Hijacking
  •  Browser Session Hijacking
  •  Way to Compromise a Session Token
  •  Client Side Attacks
  •  Hijacking at the Network Level
  •  Session Hijacking Tools
  •  Session Hijacking Countermeasures
  •  Session Hijacking Testing
  •  Perform a MITM Attack with Ettercap Act

  • Module 11 Notes
  •  Hacking Web Servers
  •  Webserver Attacks
  •  Methodology of Webserver Attacks
  •  Webserver Attack and Defense Tools
  •  Webserver General Defense
  •  Webserver Specific Attack Countermeasures
  •  Webserver Patch Management
  •  Webserver Pen Testing
  •  Footprint a Web Server with IDServe Act
  •  Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
  •  Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
  •  Brute Force a Web Server with Medusa Act

  • Module 12 Notes
  •  Hacking Web Applications
  •  Web App Vulnerabilities and Exploits
  •  Web Application Threats
  •  Injection Attacks
  •  Hidden Fields and Clickjacking
  •  Cross Site Attacks
  •  Additional Web App Attacks
  •  Web Hacking Methodology
  •  Web App Hacking Countermeasures
  •  Web App Security Tools
  •  Web Application Penetration Testing
  •  Conduct a Simple Command Injection Attack Act
  •  Inject a Malicious Link with Cross Site Scripting Act
  •  Conduct a Cross Site Request Forgery Attack

  • Module 13 Notes
  •  SQL Injection
  •  Types of SQL Injection
  •  SQL Injection Methodology
  •  SQL Injection Tools
  •  SQL Injection Countermeasures
  •  SQL Injection Penetration Testing
  •  SQL Injection Act

  • Module 14 Notes
  •  Hacking Wireless Networks
  •  Wireless Discovery and Mapping
  •  WiFi Sniffers
  •  WiFi Attacks
  •  WiFi Cracking
  •  Wireless Hacking Tools
  •  Bluetooth Hacking
  •  Wireless Hacking Countermeasures
  •  Wireless Security Tools
  •  Wireless Penetration Testing
  •  Crack a WEP Key with Aircrack-ng Act
  •  Crack a WPA Key with Aircrack-ng Act

  • Module 15 Notes
  •  System Hacking Methodology
  •  Windows System Vulnerabilities and Exploits
  •  Linux System Vulnerablities and Exploits
  •  Password Cracking Methods
  •  Network Service Password Cracking
  •  Windows Password Cracking
  •  Linux Password Cracking
  •  Password Cracking Tools
  •  Other Methods of Obtaining Passwords
  •  Keylogging
  •  Spyware
  •  RootKits
  •  Hiding Files
  •  Steganography
  •  Privilege Escalation
  •  Creating and Maintaining Remote Access
  •  Hiding Evidence
  •  System Hacking Penetration Testing
  •  Spoof Name Resolution and Capture Credentials with Responder Act
  •  Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
  •  Crack Passwords with L0pht7 Act
  •  Exploit Client Side Vulnerabilities Act
  •  Track User Activity with Spyware Act
  •  View and Clear Audit Policies with Auditpol Act
  •  Hide Data Using Whitespace Steganography Act
  •  Hide Data Using Least Significant Bit Steganography Act
  •  Cover Your Tracks Act

  • Module 16 Notes
  •  Hacking Mobile Platforms
  •  Hacking Android OS
  •  Rooting Android
  •  Securing Android
  •  Hacking iOS
  •  Jailbreaking iOS
  •  Securing iOS
  •  Hacking Windows Phone OS
  •  Hacking Blackberry
  •  Mobile Device Management
  •  Mobile Security Guidelines and Tools
  •  Mobile Penetration Testing
  •  Prepare Your Wireless Email Environment Act
  •  Pwn a Mobile Device with Metasploit Act
  •  Use a Mobile Device in a DDoS Campaign Act
  •  Return Your VMs to Original Configuration Act
  •  Uninstall Main Activity Malware from Android Act

  • Module 17 Notes
  •  Evading IDS Firewalls and Honeypots
  •  Firewalls
  •  Honeypots
  •  IDS Firewalls and Honeypots Tools
  •  Evasion
  •  Evasion Countermeasures
  •  IDS Firewall Honeypot Penetration Testing
  •  Fly Below IDS Radar Act
  •  Test and Analyze a Honey Pot Act
  •  Bypass Windows Firewall Act

  • Module 18 Notes
  •  Cryptography
  •  Encryption Algorithms
  •  Cryptography Tools
  •  Public key Infrastructure
  •  Email Encryption
  •  Disk Encryption
  •  Cryptography Attacks
  •  Crytography Penetration Testing
  •  Examine Hashing Algorithms Act
  •  Protect Data with Symmetric Encryption Act
  •  Protect Data with Asymmetric Encryption Act

  • Module 19 Notes
  •  Cloud Computing
  •  Virtualization
  •  Cloud Computing Threats
  •  Countermeasures to Cloud Computing Threats
  •  Cloud Computing Attacks
  •  Cloud Security
  •  Cloud Security Best Practices
  •  Cloud Penetration Testing

  • Module 20 Notes
  •  IoT Hacking
  •  IoT Vulnerabilities and Attacks
  •  IoT Hacking Methodology and Tools
  •  IoT Hacking Countermeasures
  •  oT Penetration Testing
  •  Search the Internet for Vulnerable IoT Devices Act
  •  Conclusion

module 9

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

  • Introduction
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Analyze the results of a network reconnaissance Part 1
  • Analyze the results of a network reconnaissance Part 2
  • Analyze the results of a network reconnaissance Part 3
  • Analyze the results of a network reconnaissance Part 4
  • Analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

  • Implement an information security vulnerability management process Part 1
  • Implement an information security vulnerability management process Part 2
  • Implement an information security vulnerability management process Part 3
  • Implement an information security vulnerability management process Part 4
  • Implement an information security vulnerability management process Part 5
  • Implement an information security vulnerability management process Part 6
  • Implement an information security vulnerability management process Part 7
  • Analyze the output resulting from a vulnerability scan Part 1
  • Analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

  • Distinguish threat data or behavior to determine the impact of an incident Part 1
  • Distinguish threat data or behavior to determine the impact of an incident Part 2
  • Distinguish threat data or behavior to determine the impact of an incident Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response Part 1
  • Analyze common symptoms to select the best course of action to support incident response Part 2
  • Analyze common symptoms to select the best course of action to support incident response Part 3
  • Analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Use data to recommend remediation of security issues related to identity and access management Part 1
  • Use data to recommend remediation of security issues related to identity and access management Part 2
  • Use data to recommend remediation of security issues related to identity and access management Part 3
  • Use data to recommend remediation of security issues related to identity and access management Part 4
  • Review security architecture and make recommendations to implement compensating controls Part 1
  • Review security architecture and make recommendations to implement compensating controls Part 2
  • Review security architecture and make recommendations to implement compensating controls Part 3
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

use code “blackfriday2020” at checkout

coursework

What's Included

You'll have access to all course material and practice labs for an entire year. Plenty of time to master each skill!

Every lesson is taught by a certified IT instructor that will walk you through each module and individual lesson. 

Every module comes with an outline of the topics and areas that will be covered in the video lessons, so that you can have a full overview of what each lesson will cover throughout the course.

Within each certification course, there are individual module workbooks that are provided giving you hundreds of pages of notes covering every topic in each video.

Inside of each course, there are pre-built, interactive study tools, such as flashcards and matching games, to help you go over terms and concepts until you've mastered every topic.

Included with certain modules will be online labs allowing you to not just learn the information necessary to earn your certification, but also get hands-on and complete the work required in a real-world experience.

You may watch the videos and do the labs on your own, but that doesn't mean you're in this by yourself. You'll also become a member of our private Facebook community so you can connect with other students going through the same program as you.

use code “blackfriday2020” at checkout

Frequently Asked Questions

As soon as you purchase! After we receive payment, you'll be sent a voucher code via email from KO Tech Academy with the subject line "You received a new voucher code". It typically takes a couple hours for processing on our end, so don't panic if you don't receive your voucher code immediately. Once you've received your voucher code, follow the instructions in the email to setup your account and access your Learning Management System (LMS) Dashboard.

You get to work! Once you've created your account and accessed your dashboard, you're free to start taking your courses and accessing all of your materials. Remember you have full access for an entire year!

There is no restriction on what order you take your courses in, but we definitely recommend taking the courses in order. They're designed to build on each other as you progress and learn more and more.

 

For IT & Cybersecurity, we recommend the following order:

  • CompTIA ITF+
  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • Cisco CCNA 200-301
  • CompTIA Linux+
  • Microsoft MS 70-698
  • Microsoft MS 70-410
  • CompTIA CySA+

You can take all of the exams online through Pearson Vue. We've provided links below to additional information from the certification providers because each one will have different requirements for online exams like needing a webcam for monitoring during the exam, etc.

online community

What Our Students Say

For me, I wanted this change for my life and family. I’m now a better father for my son and am on my way to providing an exceptional life for my family.

Joseph

It is a great way to learn the basics and to start a new career in IT in a short time period.

Ed

I would say this program is built for anyone who is transitioning and looking to get into the IT world. It’s going to give you a little taste of everything you need.

Adam

40% OFF HERO DISCOUNT

All veterans, active duty military, first responders and their spouses

Email any form of military or official, professional identification to support@kotechacademy.com for verification