ultimate 9-week course

IT & Cybersecurity

The industry standard certification training for establishing a career in IT.

OR

includes courses from:
countdown to launch
  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

the industry

Why IT & Cybersecurity?

By 2021, there will be an estimated 2.1 million unfilled IT jobs making it the top 5 growth industry in the world.

Find what you enjoy and grow in it

  • Growth
  • Versatility
  • Reliability

The IT industry is constantly projected to grow on all fronts and shows no signs of slowing down.

With 44% of businesses planning to increase tech spend in 2020, up from 38% in 2019, IT budgets are consistently rising as businesses optimize their models and replace outdated technologies.

No one likes feeling pinned down and trapped in a role without any chance of change.

The tech industry, and more specifically Information Technology, has hundreds of specialities to choose from making it one of the easiest industries to start broad and then find a niche you enjoy to specialize in.

Demand for skilled tech workers is only growing as the industry continues to climb in size.

Jobs in IT not only have great job prospects and rank highly in satisfaction, but they also are in such high demand as businesses move more and more of their models to online infrastructures.

It doesn't take much to get started - just gotta put in the work!

Here are some jobs and salaries you can acquire with just a few basic certifications:

Help Desk Analyst:
$50,077 median salary

Technical Support:
$53,128 median salary

IT Support:
$54,737 median salary

Network Administrator:
$72,222 median salary

Companies that look for certifications offered in this course:

the skills

No Degree Required

A lot of people would say you’d have to get a college degree first. But in reality, that’s not exactly the case for most entry-level positions.

Think about it like this – a truck driver needs a CDL in order to legally operate an 18-wheeler and an HVAC technician needs to be HVAC certified before going to someone’s house to fix the A/C.

The same exact concept applies to the IT industry; you simply need to be certified in order to enter the field.

The Pathway to Success in IT

  • Get Certified

    Complete our 9-week, self-paced IT certification program and pass your certification exams for at least CompTIA A+ and Security+

  • Build Experience

    Using those certifications, land an entry-level IT position to start building valuable experience - most will pay $25-35/hour

  • Find Your Passion

    As you build experience, learn what type of work, such as networking, cybersecurity, cloud computing, etc., you most enjoy

  • Continue Education & Growth

    Learn what requirements there are for the job path you want to take, then continue gaining higher level certifications and education

The Pathway to Success in IT

  • Get Certified

    Complete our 9-week, self-paced IT certification program and pass your certification exams for at least CompTIA A+ and Security+

  • Build Experience

    Using those certifications, land an entry-level IT position to start building valuable experience - most will pay $25-35/hour

  • Find Your Passion

    As you build experience, learn what type of work, such as networking, cybersecurity, cloud computing, etc., you most enjoy

  • Continue Education & Growth

    Learn what requirements there are for the job path you want to take, then continue gaining higher level certifications and education

the program

Built for You to Win

We’ve worked in the tech education space for over a decade and know what it takes to get started and win in this industry.

Our course is built with career changers in mind and has all of the knowledge and tools necessary for you to succeed.

course curriculum

What You'll Learn in the Course

Unlock the knowledge to jumpstart your career in IT with just one master course

0
courses
0
videos
0
hours

course 1

CompTIA IT Fundamentals

The CompTIA IT Fundamentals course and exam focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.

  • Instructor Intro
  • Compare and Contrast Notational Systems
  • Compare and Contrast Notational Systems Demo
  • Compare and Contrast Fundamentals Data Types and Their Characteristics
  • Illustrate the Basics of Computing and Processing
  • Explain the Value of Data and Information
  • Compare and Contrast Common Units of Measures
  • Compare and Contrast Common Units of Measures Demo
  • Explain the Troubleshooting Methodology

  • Classify Common Types of Input-Output Device Interfaces
  • Given a scenario, set up & install Common Peripheral Devices to a PC
  • Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • Explain the Purpose of Common Internal Computing Components
  • Compare & Contrast Common Internet Service Types-
  • Compare & Contrast Storage Types
  • Compare & Contrast Common Computing Devices & Their Purposes
  • Explain Basic Networking Concepts
  • Explain Basic Networking Concepts Part 2
  • Explain Basic Networking Concepts Part 3
  • Explain Basic Networking Concepts Part 4
  • Explain Basic Networking Concepts Demo
  • Given a scenario Install, Configure & Secure a Basic Wireless Network
  • Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

  • Explain the Purpose of Operating Systems
  • Explain the Purpose of Operating Systems Demo
  • Compare & Contrast Components of an Operating System
  • Compare & Contrast Components of an Operating System Demo
  • Explain the Purpose & Proper Use of Software
  • Explain Methods of Application Architecture & Delivery Models
  • Given a Scenario Configure & Use Web Browsers
  • Given a Scenario Configure & Use Web Browsers FireFox
  • Given a Scenario Configure & Use Web Browsers Demo Chrome
  • Given a Scenario Configure & Use Web Browsers Demo Edge
  • Compare & Contrast General Application Concepts & Uses

  • Compare & Contrast Programming Language Categories-
  • Given a Scenario Use Programming Organizational Techniques & Interpret
  • Logic
  • Explain the Purpose & Use of Programming Concepts
  • HTML Demo

  • Explain Database Concepts and the Purpose of Databases
  • Compare and Contrast Various Database Structures
  • Summarize Methods Used to Interface with Databases
  • Summarize Methods Used to Interface with Databases Demo

  • Summarize Confidentiality, Integrity, and Availability Concerns
  • Explain Methods to Secure Devices and Best Practices
  • Summarize Behavioral Security Concepts
  • Compare & Contrast Authentication, Authorization, Accounting, &
  • Repudiation Concepts
  • Explain Password Best Practices
  • Explain Common Uses of Encryption
  • Explain Business Continuity Concepts
  • Takeaways
  • ITF Fundamentals Conclusion

course 2

CompTIA A+ Core 1 (220-1001) & Core 2 (220-1002)

The CompTIA A+ certified professionals support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. 

  • Intro to A+ Core 1 Instructor
  • CompTIA A+ Course Intro
  • Mobile Devices Part 1
  • Mobile Devices Part 2
  • Mobile Devices Part 3
  • Installing Components in Laptop
  • Laptop Features Part 1
  • Laptop Features Part 2
  • Compare and Contrast Types of Mobile Devices
  • Accessories and Ports of Other Mobile Devices Part 1
  • Accessories and Ports of Other Mobile Devices Part 2
  • Configure Basic Device Network Connectivity and Application Support Part 1
  • Configure Basic Device Network Connectivity and Application Support Part 2
  • Use Methods to Perform Mobile Device Synchronization
  • Laptop Disassemble and Assemble

  • Networking Part 1
  • Networking Part 2
  • Compare and Contrast Common Networking Hardware Devices Part 1
  • Compare and Contrast Common Networking Hardware Devices Part 2
  • Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  • Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  • Setting Up a Wireless Router
  • Compare and Contrast Wireless Networking Protocols
  • Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  • Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  • Explain Common Network Configuration Concepts Part 1
  • Explain Common Network Configuration Concepts Part 2
  • Compare and Contrast Internet Connection Types Network Types and Features
  • Given a Scenario Using Appropriate Networking Tools

  • Hardware Part 1
  • Hardware Part 2
  • Hardware Part 3
  • Identify - Common Connector Types
  • Scenario - Install RAM Types
  • Scenario - Select Install and Configure Storage Devices Part 2
  • Scenario Select Install and Configure Storage Devices
  • Install and Configure Motherboards CPUs and Add-on Cards Part 1
  • Install and Configure Motherboards CPUs and Add-on Cards Part 2
  • Install and Configure Motherboards CPUs and Add-on Cards Part 3
  • Install and Configure Motherboards CPUs and Add-on Cards Part 4
  • Install Disassemble and Assemble a Desktop
  • Purposes for Peripherals and Types
  • Summarize Power Supplies
  • Scenario - Select and Configure Appropriate Components for Customers PCs
  • Scenario - Install and Configure Common Devices
  • Scenario - Configure SOHO Multifunction Devices Printers and Settings
  • Scenario - Install and Maintain Various Print Technologies Part 1
  • Scenario - Install and Maintain Various Print Technologies Part 2
  • Scenario - Install and Maintain Various Print Technologies Part 3

  • Virtualization Part 1
  • Virtualization Part 2
  • Scenario Setup and Configure Client-side Virtualization

  • Hardware and Networking Troubleshooting
  • Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  • Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  • Troubleshoot Hard Drives and RAID Arrays
  • Troubleshoot Video and Display Issues
  • Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  • Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  • Troubleshoot Printers
  • Troubleshoot Common Wired and Wireless Network Problems

  • Intro to A+ Core2 Instructor
  • Intro to A+ Core2
  • Operating Systems Part1
  • Operating Systems Part2
  • Copare and Contrast features of Microsoft Windows Versions
  • Summarize General OS Installation Considerations Upgrade Methods Demo
  • Summarize General OS Installation Considerations Upgrade Methods Part2
  • Summarize General OS Installation Considerations Upgrade Methods Part3
  • Summarize General OS Installation Considerations Upgrade Methods
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Demo
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Part1
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Part2
  • Microsoft Operating System and Tools Part1 Demo
  • Microsoft Operating System and Tools Part1
  • Microsoft Operating System and Tools Part2 Demo
  • Microsoft Operating System and Tools Part2
  • Microsoft Operating System and Tools Part3 Demo
  • Microsoft Operating System and Tools Part3
  • Microsoft Operating System and Tools Part4 Demo
  • Microsoft Operating System and Tools Part4
  • Microsoft Windows Control Panel Utilities Demo
  • Microsoft Windows Control Panel Utilities
  • Summerize Application Installation and Configuration Concepts
  • Configure Windows Networking on a Client Desktop Demo
  • Configure Windows Networking on a Client Desktop
  • Features and Tools of MAC OS and Linux Client Desktop

  • Security - Physical Security Measures
  • Explain Logical Security Concepts Part2
  • Explain Logical Security Concepts
  • Compare, Contrast Wireless Security Protocols & Authentication Methods
  • Detect, Remove, and Prevent Malware using Appropriate Tools
  • Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • Compare Contrast the different Microsoft Windows Security Settings- Demo
  • Compare Contrast the different Microsoft Windows Security Settings
  • Implement Security Best Practices to Secure a Workstation Part2
  • Implement Security Best Practices to Secure a Workstation
  • Implement Methods for Securing Mobile Devices
  • Implement Appropriate Data Destruction & Disposal Methods
  • Configure Security on SOHO Wireless and Wired Networks Demo
  • Configure Security on SOHO Wireless and Wired Networks

  • Software Troubleshooting Demo
  • Software Troubleshooting Part1
  • Software Troubleshooting Part2
  • Troubleshoot and Resolve PC Security Issues Demo
  • Troubleshoot and Resolve PC Security Issues Part2
  • Troubleshoot and Resolve PC Security Issues
  • Best Practice Procedures for Malware Removal
  • Troubleshoot Mobile OS and Application
  • Troubleshoot Mobile OS and Application Security Issue

  • Operational Procedures
  • Implement Basic Change Management Best Practices
  • Implement Basic Disaster Prevention and Recovery Methods
  • Explain Common Safety Procedures
  • Explain Environmental Impacts and Appropriate Controls
  • Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • Using Proper Communication Techniques and Professionalism
  • Identify the Basic of Scripting Demo
  • Identify the Basic of Scripting
  • Use Remote Access Technologies

module 3

CompTIA Network+

The CompTIA Network+ course and exam is a mid-level certification for network technicians. It’s designed to test the competency of a mid-level network technician and their ability to support and configure TCP/IP clients through network design, cabling, hardware setup, configuration, installation, support, and troubleshooting.

  • Intro Network Plus N10 007
  • Basic Networking
  • Activity Basic Networking
  • OSI Model
  • Exploring the OSI Model- Act
  • Protocol and Ports
  • Activity Examining Protocols and Ports
  • Connection-oriented vs. connectionless
  • Activity Comparing TCP and UDP
  • Internet Protocol (IP)
  • Activity Examining the Lower Layer Protocols
  • Layer 7 Remote Control Protocols
  • Layer 7 File Transfer Protocols
  • Layer 7 Messaging Protocols
  • Activity Examining Messaging Protocols
  • Layer 7 Web Traffic Protocols
  • Layer 7 Streaming Media Protocols
  • Layer 7 Infrastructure Management Protocols
  • Switching
  • Activity Creating Collision and Broadcast Domains
  • Interface Properties and Segmentation
  • Activity Creating a Basic Network Segment
  • Switching Part 2
  • Activity Switching
  • Switching Loop Management
  • Activity Managing Switching Loops
  • VLANs
  • Activity Creating VLANs
  • Routing
  • Activity Examining ARP
  • IP Addressing Basics
  • Activity Configuring IP
  • Routers
  • Activity Setting Up a Router
  • Routing Basics
  • Activity Adding Static Routes
  • VLAN Routing
  • Activity Routing Between VLANs
  • NAT/PAT
  • Activity Configuring NAT/PAT
  • Routing Protocols
  • Activity Configuring a Routing Protocol
  • Firewalls
  • Activity Configuring Firewalls
  • Advanced Switching and Routing Concepts
  • Activity Exploring IPv6
  • Performance Concepts
  • IP Addressing
  • Subnetting
  • Activity Learning to Subnet
  • Address Assignments
  • Network Types and Topologies
  • Wireless Topologies
  • Network Types
  • Technologies that Facilitate the Internet Of Things (IoT)
  • Wireless Technologies
  • 802.11 Standards
  • Wi-Fi Frequencies
  • Wi-Fi Antenna Concepts
  • Bluetooth
  • Cellular
  • Activity Using an RF Spectrum Analyzer
  • Cloud Concepts
  • Activity Exploring Cloud Services
  • Network Services
  • Activity Setting up DNS
  • DHCP Service
  • Activity Setting Up DHCP
  • NTP

  • Infrastructure
  • Activity Testing a Fiber Optic Cable
  • Plenum vs. PVC
  • Activity Crimping on an RJ-45 Connector
  • Transceivers
  • Activity Terminating Cable to a 110 Block
  • Copper Cable Standards
  • Activity Creating a Crossover Cable
  • Ethernet Deployment Standards
  • Network Device Placement and Installation
  • Repeater
  • Router
  • Modem
  • Activity Setting up a WAP
  • Firewall
  • Media Converter
  • Advanced Network Devices
  • Wireless Controller
  • Proxy Server
  • Activity Configuring Proxy Settings
  • VPN Concentrator
  • Virtual Networking Components
  • Network Storage Types
  • WAN Technologies
  • Transmission Mediums
  • Activity Configuring WAN Links
  • Termination

  • Change Management
  • IDF-MDF Documentation
  • Labeling
  • Logical vs Physical Diagrams
  • Network Operations Documentation
  • Rack Diagrams
  • Standard Operation Procedures
  • Using Documentation Act
  • Wiring and Ports Locations
  • Continuity and Disaster
  • MTTR Mean Time Repair
  • Recovery
  • Backing Up Your Data Act
  • Event Management
  • Metrics
  • Scanning Monitoring Patching
  • Testing the Network Act
  • HTTPS-Management
  • Out-of-Band Management
  • RDP
  • Remote Access Methods
  • Remote File Access
  • Making Remote Connections Act
  • SSH
  • VNC
  • Policies and Best Practices
  • Creating Policies and Procedures Act

  • Physical Security Devices
  • Examining Security Devices Act
  • Authentication and Access
  • Access Controls Methods Act
  • Multifactor Authentication
  • Basic Wireless Network Security
  • Demonstrating the Need for Wireless Act
  • Common Network Attacks
  • Conducting a Phishing Campaign Act
  • Network Device Hardening
  • Supporting Secure Authentication Encryption Act
  • Updating Firmware
  • Explain Common Mitigation Techniques
  • Implementing a Honey Pot Act

  • Network Troubleshoot
  • Hardware Tools Analyzers
  • Troubleshooting With Hardware Tools Act
  • Software Tools Command Line
  • Troubleshooting with Command Line Tools Act
  • Software Tools
  • Troubleshooting with Software Tools Act
  • Using the Appropriate Tools
  • Physical Issues
  • Traffic Flow Issues
  • Transceiver Issues
  • Troubleshoot Common Wired Connectivity
  • Troubleshooting Signal Problems
  • Troubleshooting Transceiver Problems
  • Incorrect WAP Types
  • Latency and Jitter
  • Troubleshoot Common Wireless Connectivity
  • Troubleshooting WAP Issues
  • Advanced Network Issues
  • Case Study Troubleshooting
  • DHCP Issues
  • Firewall ACL Issues
  • Troubleshooting Common Network
  • Unresponsive Services
  • Outro

module 4

CompTIA Security+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Types Of Malware-Part 1
  • Types Of Malware-Part 2
  • Types Of Attacks-Part 1
  • Types Of Attacks-Part 2
  • Types Of Attacks-Part 3
  • Types Of Attacks-Part 4
  • Types Of Attacks-Part 5
  • Threat Actors-Part 1
  • Threat Actors-Part 2
  • Penetration Testing And Vulnerability Scanning-Part 1
  • Penetration Testing And Vulnerability Scanning-Part 2
  • Impact Of Vulnerabilities-Part 1
  • Impact Of Vulnerabilities-Part 2

  • Networking Hardware And Software-Part 1
  • Networking Hardware And Software-Part 2
  • Networking Hardware And Software-Part 3
  • Networking Hardware And Software-Part 4
  • Networking Hardware And Software-Part 5
  • Networking Hardware And Software-Part 6
  • Security Assessment-Part 1
  • Security Assessment-Part 2
  • Troubleshooting Issues-Part 1
  • Troubleshooting Issues-Part 2
  • Securing Mobile Devices-Part 1
  • Securing Mobile Devices-Part 2
  • Securing Mobile Devices-Part 3
  • Securing Mobile Devices-Part 4
  • Secure Protocols-Part 1
  • Secure Protocols-Part 2

  • Secure Network Architecture-Part 1
  • Secure Network Architecture-Part 2
  • Secure System Designs-Part 1
  • Secure System Designs-Part 2
  • Secure Staging Deployment Concepts
  • Embedded Systems-Part 1
  • Embedded Systems-Part 2
  • Application Development And Deployment-Part 1
  • Application Development And Deployment-Part 2
  • Application Development And Deployment-Part 3
  • Physical Security Controls-Part 1
  • Physical Security Controls-Part 2
  • Physical Security Controls-Part 3
  • Cloud Virtualization-Part 1
  • Cloud Virtualization-Part 2

  • Identity And Access Management-Part 1
  • Identity And Access Management-Part 2
  • Identity And Access Services-Part 1
  • Identity And Access Services-Part 2
  • Management Controls-Part 1
  • Management Controls-Part 2
  • Account Management Practices-Part 1
  • Account Management Practices-Part 2
  • Account Management Practices-Part 3

  • Organizational Security-Part 1
  • Organizational Security-Part 2
  • Business Impact Analysis Concepts-Part 1
  • Business Impact Analysis Concepts-Part 2
  • Risk Management-Part 1
  • Risk Management-Part 2
  • Incident Response Procedures-Part 1
  • Incident Response Procedures-Part 2
  • Forensics-Part 1
  • Forensics-Part 2
  • Disaster Recovery-Part 1
  • Disaster Recovery-Part 2
  • Types Of Control-Part 1
  • Types Of Control-Part 2
  • Data Security And Privacy Practices-Part 1
  • Data Security And Privacy Practices-Part 2

  • Cryptographic Basics-Part 1
  • Cryptographic Basics-Part 2
  • Cryptographic Basics-Part 3
  • Cryptographic Algorithms-Part 1
  • Cryptographic Algorithms-Part 2
  • Wireless Security-Part 1
  • Wireless Security-Part 2
  • Implementing PKI-Part 1
  • Implementing PKI-Part 2
  • Implementing PKI-Part 3
  • Conclusion

module 5

Cisco CCNA 200-301

This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.

After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

What will you learn?

CCNA exam objectives and topics include the following:

  • Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
  • VLANs, STP, and EtherChannel (static, PAGP, and LACP)
  • WAN technologies
  • Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
  • Device monitoring protocols, including SNMPv2 and SNMPv3
  • Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS

module 6

CompTIA Linux+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials

  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary

  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary

  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials

  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary

  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities

  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary

  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary

  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary

  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary

module 7

Microsoft MS 70-698: Installing and Configuring Windows 10

The Microsoft 70-698 course focuses on the implementation of Windows, configuring and supporting core services and managing and maintain Windows as laid out by Microsoft on their certification criteria.

  • Prep for Installation Windows 10
  • Clean Install or Upgrade Windows 10
  • Editions of Windows 10
  • What Features Do You Want
  • Installation Media
  • Looking at MS Application Compatibility Toolkit (ACT)

  • Installing Windows
  • Clean installation of Windows 10-Demo
  • Upgrade using Installation Media
  • Configure Native Boot and VHD
  • Migrating to Windows 10
  • Chp2 Booting from VHD
  • Creating a VHD-Demo
  • Installing Windows 10 to a VHD-Demo
  • Installing on Bootable USB
  • Using USMT User State Migration Tool-Demo
  • Additional Windows Features
  • Create an MBR-Partitioned VHD-Demo
  • Additional Regional and Language Support
  • Putting Win 10 on a VHD with DISM-Demo

  • Configure Devices and Device Drivers
  • Resolve Driver Issues
  • Configuring Driver Settings
  • Manage Driver Packages
  • Download and Import Driver Packages
  • Using DISM
  • Installing o Updating Drivers using Device Manager-Demo
  • Roll Back Drivers-Demo
  • Using Sigverif-Demo
  • More on Device Manager-Demo

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

  • Implement Windows in an Enterprise Enviornment
  • Implementing Active Directory
  • Implement Volume Activation Using a Key Mgmt Service
  • Query and Configure Activation State using Command line
  • Configure Active Directory Including Group Policies
  • Configure and Optimize User Account Control UAC
  • Using Software Licensing Manager; slmgr.vbs -dli-Demo
  • Taking a look at UAC-Demo

  • Configuring Networking
  • Configuring Name Resolution
  • Connect to a Network
  • Configure Network Locations
  • Configure Windows Firewall
  • Configure Windows Firewall with Advance Security
  • Configure Network Discovery
  • Configuring Wi-Fi Settings
  • Troubleshoot Network Issues
  • Configure VPNs
  • Configure IPsec
  • Configure DirectAccess
  • Configure IP Addresses Manually-Demo
  • DNS Settings-Demo
  • Looking at Network Locations and where to make Chpanges-Demo
  • Windows Firewall – Basic Settings-Demo
  • Windows Firewall – Advanced Settings-Demo
  • Troubleshooting Tools-Demo
  • Create a VPN Connection-Demo

  • Configure Storage
  • Create and Configure VHD
  • Configure Removable Devices
  • Create and Configure Storage Spaces
  • Troubleshoot Storage and Removable Device Issue
  • Steps to create a simple volume-Demo
  • Create VHD with Hyper-V Manager-Demo
  • Create VHD with PowerShell-Demo
  • Bitlocker to Go-Demo

  • Configure Data Access and Usage File-Printer
  • Configure File System Permissions
  • Configure File Share Public Folders and OneDrive
  • Configure OneDrive usage including Files On Demand
  • Troubleshoot Data Access and Usage
  • File Sharing-Demo
  • Printer Sharing-Demo
  • Set Printer Security-Demo
  • File system permissions-Demo
  • Public Folder Sharing-Demo
  • OneDrive-Demo
  • Storage Sense-Demo
  • Disk Quotas-Demo

  • Implement Apps
  • Configure Startup Options
  • Configure Windows Features
  • Configure Windows Stores
  • Implementing Windows Store Apps
  • Implement Windows Store for Business and Education
  • Provision Packages
  • Create Packages
  • Change Default Apps-Demo
  • Application Startup Options-Demo
  • Looking at Windows Features-Demo
  • Windows Store-Demo
  • Windows Imaging and Configuration Designer Tool ICD-Demo

  • Configuring Remote Management
  • Configure Remote Management Settings
  • Configure Remote Desktop
  • Configure Remote Assistance
  • Modifying Using MMC or PS
  • Configure Remote PowerShell
  • Remote Management Settings-Demo
  • Allow through Windows Firewall-Demo
  • Remote Desktop-Demo
  • Remote Assistance-Demo
  • Remote with MMC-Demo
  • Windows PowerShell Remoting-Demo

  • Configure Update Windows 10
  • Manage Update History
  • Roll Back Updates
  • Implement Insider Preview CB CBB and LTSB
  • Update Windows Store Apps
  • Windows Update Options-Demo
  • Update History-Demo
  • Rolling Back Updates-Demo
  • Update Windows Store apps-Demo

  • Monitor Windows
  • Configure Event Subscriptions
  • Monitor Performance Using Task Manager
  • Monitor System
  • Monitor and Manage Printers
  • Monitor Performance Using Performance Monitor Data Collectors
  • Monitor and Manage Printers
  • Configure Indexing Options
  • Manage Client Security by Using Windows Defender
  • Evaluate System Stability by Using Reliaability Monitor
  • Troubleshoot Performance Issues
  • Manage Security Using Windows Defender Security Center
  • Configure Windows Defender Advanced Threat Detection
  • Event Viewer-Demo
  • Creating Event Subscriptions-Demo
  • Task Manager-Demo
  • Performance Monitor-Demo
  • Resource Monitor-Demo
  • Managing the Printers with Print Management-Demo
  • Indexing-Demo
  • Windows Defender-Demo
  • Reliability Monitor-Demo

  • Configure System and Data Recovery
  • Configure System Restore
  • Configure Restore Points
  • Perform a Refresh or Recycle
  • Restore Previous Versions of Files and Folders
  • Configure File History
  • Recover Files from OneDrive
  • Use Windows Backup and Restore
  • Perform a Backup and Restore with WBAdmin
  • Perform Recovery Operations Windows Recovery
  • Configure a Recovery Drive-Demo
  • Configure System Restore-Demo
  • Configure Restore Points-Demo
  • Performing a Refresh or Recycle-Demo
  • Configure File History-Demo
  • Use Windows Backup & Restore-Demo

  • Configure Authorization and Authentication
  • Configure Pictures Passwords and Biometrics
  • Configure Workgroups
  • Configure Domain Settings
  • Configure Homegroup Settings
  • Configure Credential Manager
  • Configure Local Accounts
  • Configure Microsoft Accounts
  • Configure Device Registration
  • Configure Windows Hello for Business
  • Configure Device Guard
  • Credential Guard
  • Configure Device Health Attestation
  • Configure UAC Behavior
  • Configure Dynamic Look
  • Picture Passwords-Demo
  • Workgroups-Demo
  • Domains-Demo
  • Credential Manager-Demo
  • Configure Local Accounts-Demo
  • Dynamic Lock-Demo

  • Configure Advanced Management Tools
  • Configure Device Manager
  • Configure and use the MMC
  • Configure Task Schedule
  • Configure Automation of Mgmt Task Using Windows PowerShell
  • Convert Group Policy Objects to MDM Policies using the MDM
  • Services-Demo
  • Using the MMC-Demo
  • Task Scheduler-Demo
  • Opening PowerShell and the Integrated Scripting Environment-Demo

module 8

Microsoft MS 70-410: Installing and Configuring Windows Server 2012

This course covers the following topics in order to prepare for the exam: Install and configure servers. Configure server roles and features. Configure Hyper-V. Deploy and configure core network services. Install and administer Active Directory. Create and manage Group Policy.

  • Course And Instructor Introduction
  • Overview-Part1
  • Overview-Part2
  • Overview-Part3
  • Management-Part1
  • Management-Part2
  • Management-Part3
  • Management-Part4
  • Management-Part5
  • Installation-Part1
  • Installation-Part2
  • Installation-Part3
  • Questions-Part1
  • Questions-Part2

  • Active Directory Design-Part1
  • Active Directory Design-Part2
  • Active Directory Design-Part3
  • Installing Active Directory Domain Services-Part1
  • Installing Active Directory Domain Services-Part2
  • Installing Active Directory Domain Services-Part3
  • Installing Active Directory Domain Services-Part4
  • Questions

  • Design And Create An Active Directory Hierarchy-Part1
  • Design And Create An Active Directory Hierarchy-Part2
  • Manage Users-Part1
  • Manage Users-Part2
  • Manage Users-Part3
  • Manage Computers-Part1
  • Manage Computers-Part2
  • Manage Computers-Part3
  • Questions

  • Powershell Overview And Object Command-Part1
  • Powershell Overview And Object Command-Part2
  • Powershell Overview And Object Command-Part3
  • Command Line Object Management And Bulk Operations-Part1
  • Command Line Object Management And Bulk Operations-Part2
  • Questions

  • TCP IP Overview
  • IPv4 Addressing-Part1
  • IPv4 Addressing-Part2
  • Subnetting And Supernetting
  • Configure And Troubleshoot IPv4-Part1
  • Configure And Troubleshoot IPv4-Part2
  • Questions-Part1
  • Questions-Part2

  • Configuring IPV6-Part1
  • Configuring IPV6-Part2
  • Questions

  • DHCP Overview Database Security-Part1
  • DHCP Overview Database Security-Part2
  • Questions

  • Installing And Configuring DNS-Part1
  • Installing And Configuring DNS-Part2
  • Installing And Configuring DNS-Part3
  • Installing And Configuring DNS-Part4
  • Installing And Configuring DNS-Part5
  • Questions

  • Design And Implement Storage Spaces-Part1
  • Design And Implement Storage Spaces-Part2
  • Design And Implement Storage Spaces-Part3
  • Secure Files And Folders Configure Offline Files And Shadow Copies
  • Implement Network Printing
  • Questions

  • Create Group Policy Objects
  • Configure Group Policy Settings-Part1
  • Configure Group Policy Settings-Part2
  • Implement A Central Store And Questions

  • Securing Windows Servers-Part1
  • Securing Windows Servers-Part2
  • Questions

  • Virtualization Solution
  • Hyper V-Part1
  • Hyper V-Part2
  • Network Virtualization And Questions-Part1
  • Network Virtualization And Questions-Part2
  • Conclusion

module 9

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

  • Introduction
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Analyze the results of a network reconnaissance Part 1
  • Analyze the results of a network reconnaissance Part 2
  • Analyze the results of a network reconnaissance Part 3
  • Analyze the results of a network reconnaissance Part 4
  • Analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

  • Implement an information security vulnerability management process Part 1
  • Implement an information security vulnerability management process Part 2
  • Implement an information security vulnerability management process Part 3
  • Implement an information security vulnerability management process Part 4
  • Implement an information security vulnerability management process Part 5
  • Implement an information security vulnerability management process Part 6
  • Implement an information security vulnerability management process Part 7
  • Analyze the output resulting from a vulnerability scan Part 1
  • Analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

  • Distinguish threat data or behavior to determine the impact of an incident Part 1
  • Distinguish threat data or behavior to determine the impact of an incident Part 2
  • Distinguish threat data or behavior to determine the impact of an incident Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response Part 1
  • Analyze common symptoms to select the best course of action to support incident response Part 2
  • Analyze common symptoms to select the best course of action to support incident response Part 3
  • Analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Use data to recommend remediation of security issues related to identity and access management Part 1
  • Use data to recommend remediation of security issues related to identity and access management Part 2
  • Use data to recommend remediation of security issues related to identity and access management Part 3
  • Use data to recommend remediation of security issues related to identity and access management Part 4
  • Review security architecture and make recommendations to implement compensating controls Part 1
  • Review security architecture and make recommendations to implement compensating controls Part 2
  • Review security architecture and make recommendations to implement compensating controls Part 3
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

coursework

What's Included

You'll have access to all course material and practice labs for an entire year. Plenty of time to master each skill!

Every lesson is taught by a certified IT instructor that will walk you through each module and individual lesson. 

Every module comes with an outline of the topics and areas that will be covered in the video lessons, so that you can have a full overview of what each lesson will cover throughout the course.

Within each certification course, there are individual module workbooks that are provided giving you hundreds of pages of notes covering every topic in each video.

Inside of each course, there are pre-built, interactive study tools, such as flashcards and matching games, to help you go over terms and concepts until you've mastered every topic.

You may watch the videos and do the labs on your own, but that doesn't mean you're in this by yourself. You'll also become a member of our private Facebook community so you can connect with other students going through the same program as you.

Frequently Asked Questions

As soon as you purchase! After we receive payment, you'll be sent a voucher code via email from KO Tech Academy with the subject line "You received a new voucher code". It typically takes a couple hours for processing on our end, so don't panic if you don't receive your voucher code immediately. Once you've received your voucher code, follow the instructions in the email to setup your account and access your Learning Management System (LMS) Dashboard.

You get to work! Once you've created your account and accessed your dashboard, you're free to start taking your courses and accessing all of your materials. Remember you have full access for an entire year!

There is no restriction on what order you take your courses in, but we definitely recommend taking the courses in order. They're designed to build on each other as you progress and learn more and more.

 

For IT & Cybersecurity, we recommend the following order:

  • CompTIA ITF+
  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • Cisco CCNA 200-301
  • CompTIA Linux+
  • Microsoft MS 70-698
  • Microsoft MS 70-410
  • CompTIA CySA+

You can take all of the exams online through Pearson Vue. We've provided links below to additional information from the certification providers because each one will have different requirements for online exams like needing a webcam for monitoring during the exam, etc.

online community

What Our Students Say

For me, I wanted this change for my life and family. I’m now a better father for my son and am on my way to providing an exceptional life for my family.

Joseph

It is a great way to learn the basics and to start a new career in IT in a short time period.

Ed

I would say this program is built for anyone who is transitioning and looking to get into the IT world. It’s going to give you a little taste of everything you need.

Adam

40% OFF HERO DISCOUNT

All veterans, active duty military, first responders and their spouses

Email any form of military or official, professional identification to support@kotechacademy.com for verification