IT & Cybersecurity

Get industry-leading certification training and pioneer a career in IT and Cybersecurity.

$1,997.00

Your Self-Paced Solution

Our course bundle makes it super easy for you to step into your career by giving you everything you need to get started:

Complete Certification Training Platform

You’ll begin your journey in our online training platform, where you’ll get everything you need to ace your first few industry certifications - and access for a year to continue education!

Interactive Learning Tools

As you approach testing day, you’ll have interactive learning tools and comprehensive workbooks with pages of notes to review to ensure you pass with flying colors.

Career Changer Community

During your certification training & your IT job search, you’ll have access to our online student & alumni group, where you can connect with folks to pair study or find new opportunities out in the field.

Course Curriculum

What You'll Learn in the Course

Unlock the knowledge to jumpstart your new IT career today!

9

Modules

1,007

Videos

217

Hours of Content

Course 1

CompTIA IT Fundamentals

The CompTIA IT Fundamentals course and exam focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.

  • Instructor Intro
  • Compare and Contrast Notational Systems
  • Compare and Contrast Notational Systems Demo
  • Compare and Contrast Fundamentals Data Types and Their Characteristics
  • Illustrate the Basics of Computing and Processing
  • Explain the Value of Data and Information
  • Compare and Contrast Common Units of Measures
  • Compare and Contrast Common Units of Measures Demo
  • Explain the Troubleshooting Methodology

  • Classify Common Types of Input-Output Device Interfaces
  • Given a scenario, set up & install Common Peripheral Devices to a PC
  • Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • Explain the Purpose of Common Internal Computing Components
  • Compare & Contrast Common Internet Service Types-
  • Compare & Contrast Storage Types
  • Compare & Contrast Common Computing Devices & Their Purposes
  • Explain Basic Networking Concepts
  • Explain Basic Networking Concepts Part 2
  • Explain Basic Networking Concepts Part 3
  • Explain Basic Networking Concepts Part 4
  • Explain Basic Networking Concepts Demo
  • Given a scenario Install, Configure & Secure a Basic Wireless Network
  • Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

  • Explain the Purpose of Operating Systems
  • Explain the Purpose of Operating Systems Demo
  • Compare & Contrast Components of an Operating System
  • Compare & Contrast Components of an Operating System Demo
  • Explain the Purpose & Proper Use of Software
  • Explain Methods of Application Architecture & Delivery Models
  • Given a Scenario Configure & Use Web Browsers
  • Given a Scenario Configure & Use Web Browsers FireFox
  • Given a Scenario Configure & Use Web Browsers Demo Chrome
  • Given a Scenario Configure & Use Web Browsers Demo Edge
  • Compare & Contrast General Application Concepts & Uses

  • Compare & Contrast Programming Language Categories-
  • Given a Scenario Use Programming Organizational Techniques & Interpret
  • Logic
  • Explain the Purpose & Use of Programming Concepts
  • HTML Demo

  • Explain Database Concepts and the Purpose of Databases
  • Compare and Contrast Various Database Structures
  • Summarize Methods Used to Interface with Databases
  • Summarize Methods Used to Interface with Databases Demo

  • Summarize Confidentiality, Integrity, and Availability Concerns
  • Explain Methods to Secure Devices and Best Practices
  • Summarize Behavioral Security Concepts
  • Compare & Contrast Authentication, Authorization, Accounting, &
  • Repudiation Concepts
  • Explain Password Best Practices
  • Explain Common Uses of Encryption
  • Explain Business Continuity Concepts
  • Takeaways
  • ITF Fundamentals Conclusion

Course 2

CompTIA A+ Core 1 (220-1001) & Core 2 (220-1002)

The CompTIA A+ certified professionals support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. 

  • Intro to A+ Core 1 Instructor
  • CompTIA A+ Course Intro
  • Mobile Devices Part 1
  • Mobile Devices Part 2
  • Mobile Devices Part 3
  • Installing Components in Laptop
  • Laptop Features Part 1
  • Laptop Features Part 2
  • Compare and Contrast Types of Mobile Devices
  • Accessories and Ports of Other Mobile Devices Part 1
  • Accessories and Ports of Other Mobile Devices Part 2
  • Configure Basic Device Network Connectivity and Application Support Part 1
  • Configure Basic Device Network Connectivity and Application Support Part 2
  • Use Methods to Perform Mobile Device Synchronization
  • Laptop Disassemble and Assemble

  • Networking Part 1
  • Networking Part 2
  • Compare and Contrast Common Networking Hardware Devices Part 1
  • Compare and Contrast Common Networking Hardware Devices Part 2
  • Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  • Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  • Setting Up a Wireless Router
  • Compare and Contrast Wireless Networking Protocols
  • Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  • Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  • Explain Common Network Configuration Concepts Part 1
  • Explain Common Network Configuration Concepts Part 2
  • Compare and Contrast Internet Connection Types Network Types and Features
  • Given a Scenario Using Appropriate Networking Tools

  • Hardware Part 1
  • Hardware Part 2
  • Hardware Part 3
  • Identify - Common Connector Types
  • Scenario - Install RAM Types
  • Scenario - Select Install and Configure Storage Devices Part 2
  • Scenario Select Install and Configure Storage Devices
  • Install and Configure Motherboards CPUs and Add-on Cards Part 1
  • Install and Configure Motherboards CPUs and Add-on Cards Part 2
  • Install and Configure Motherboards CPUs and Add-on Cards Part 3
  • Install and Configure Motherboards CPUs and Add-on Cards Part 4
  • Install Disassemble and Assemble a Desktop
  • Purposes for Peripherals and Types
  • Summarize Power Supplies
  • Scenario - Select and Configure Appropriate Components for Customers PCs
  • Scenario - Install and Configure Common Devices
  • Scenario - Configure SOHO Multifunction Devices Printers and Settings
  • Scenario - Install and Maintain Various Print Technologies Part 1
  • Scenario - Install and Maintain Various Print Technologies Part 2
  • Scenario - Install and Maintain Various Print Technologies Part 3

  • Virtualization Part 1
  • Virtualization Part 2
  • Scenario Setup and Configure Client-side Virtualization

  • Hardware and Networking Troubleshooting
  • Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  • Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  • Troubleshoot Hard Drives and RAID Arrays
  • Troubleshoot Video and Display Issues
  • Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  • Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  • Troubleshoot Printers
  • Troubleshoot Common Wired and Wireless Network Problems

  • Intro to A+ Core2 Instructor
  • Intro to A+ Core2
  • Operating Systems Part1
  • Operating Systems Part2
  • Copare and Contrast features of Microsoft Windows Versions
  • Summarize General OS Installation Considerations Upgrade Methods Demo
  • Summarize General OS Installation Considerations Upgrade Methods Part2
  • Summarize General OS Installation Considerations Upgrade Methods Part3
  • Summarize General OS Installation Considerations Upgrade Methods
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Demo
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Part1
  • Scenario use aÌŠppropriate Microsoft Command Line Tools Part2
  • Microsoft Operating System and Tools Part1 Demo
  • Microsoft Operating System and Tools Part1
  • Microsoft Operating System and Tools Part2 Demo
  • Microsoft Operating System and Tools Part2
  • Microsoft Operating System and Tools Part3 Demo
  • Microsoft Operating System and Tools Part3
  • Microsoft Operating System and Tools Part4 Demo
  • Microsoft Operating System and Tools Part4
  • Microsoft Windows Control Panel Utilities Demo
  • Microsoft Windows Control Panel Utilities
  • Summerize Application Installation and Configuration Concepts
  • Configure Windows Networking on a Client Desktop Demo
  • Configure Windows Networking on a Client Desktop
  • Features and Tools of MAC OS and Linux Client Desktop

  • Security - Physical Security Measures
  • Explain Logical Security Concepts Part2
  • Explain Logical Security Concepts
  • Compare, Contrast Wireless Security Protocols & Authentication Methods
  • Detect, Remove, and Prevent Malware using Appropriate Tools
  • Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • Compare Contrast the different Microsoft Windows Security Settings- Demo
  • Compare Contrast the different Microsoft Windows Security Settings
  • Implement Security Best Practices to Secure a Workstation Part2
  • Implement Security Best Practices to Secure a Workstation
  • Implement Methods for Securing Mobile Devices
  • Implement Appropriate Data Destruction & Disposal Methods
  • Configure Security on SOHO Wireless and Wired Networks Demo
  • Configure Security on SOHO Wireless and Wired Networks

  • Software Troubleshooting Demo
  • Software Troubleshooting Part1
  • Software Troubleshooting Part2
  • Troubleshoot and Resolve PC Security Issues Demo
  • Troubleshoot and Resolve PC Security Issues Part2
  • Troubleshoot and Resolve PC Security Issues
  • Best Practice Procedures for Malware Removal
  • Troubleshoot Mobile OS and Application
  • Troubleshoot Mobile OS and Application Security Issue

  • Operational Procedures
  • Implement Basic Change Management Best Practices
  • Implement Basic Disaster Prevention and Recovery Methods
  • Explain Common Safety Procedures
  • Explain Environmental Impacts and Appropriate Controls
  • Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • Using Proper Communication Techniques and Professionalism
  • Identify the Basic of Scripting Demo
  • Identify the Basic of Scripting
  • Use Remote Access Technologies

Course 3

CompTIA Network+

The CompTIA Network+ course and exam is a mid-level certification for network technicians. It’s designed to test the competency of a mid-level network technician and their ability to support and configure TCP/IP clients through network design, cabling, hardware setup, configuration, installation, support, and troubleshooting.

  • Intro to Networking
  • Activity: Creating a Network
  • Common Terminology
  • Activity: Examining Ports and Sockets
  • OSI Model
  • DoD Model
  • Activity: Examining Network Layers
  • TCP, UDP, IP
  • Activity: Examining TCP
  • Activity: Examining UDP
  • Activity: Examining IP
  • ICMP, IGMP, ARP
  • Activity: Examining ICMP
  • Activity: Examining ARP
  • Activity: Examining IGMP
  • Network Topologies
  • Network Types
  • Part 1: Network Characteristics
  • Part 2: Network Characteristics
  • Module 1 outro

  • Ethernet Standards
  • Copper Cable Types
  • Fiber Optic Cable Types
  • Connector Types
  • Activity: Selecting the Right Cable
  • Media Converters and Transceivers
  • Cable Management
  • Module 2 Outro

  • IPv4 Basics
  • IP Packet and Interface Types
  • Activity: Configuring Client IP Settings
  • Binary Numbering System
  • Classful and Classless Addressing
  • Understanding CIDR Notation
  • IPv4 Subnetting Method
  • Verifying with Binary
  • Finding Subnet IDs
  • Activity: Subnetting a Class C Network
  • The Delta in Action
  • Activity: Subnetting With the Delta
  • Subnetting Based on Hosts
  • Subnetting in Other Octets
  • Supernetting
  • Activity: Supernetting
  • IPv6
  • IPv4 - IPv6 Transition Mechanisms
  • Module 3 Outro

  • Remote Control Protocols
  • File Sharing Protocols
  • Web Protcols
  • Email Protocols
  • Database Protocols
  • Voice Protocols
  • Security Protocols
  • Management Protocols
  • Module 4 Outro

  • DHCP
  • Activity: Configuring DHCP
  • Activity: Configuring a DHCP Relay Agent
  • DNS
  • Activity: Configuring DNS - Part 1
  • Activity: Configuring DNS - Part 2
  • NTP
  • Corporate and Datacenter Network Architecture
  • Cloud Concepts and Connectivity Options
  • Module 5 Outro

  • Introductory Concepts
  • Repeaters and Hubs
  • Activity: Connecting Devices with a Hub
  • Bridges and Switches
  • Activity: Connecting Devices with a Switch
  • Routers and Multilayer Switches
  • Security Devices
  • Modems
  • Module 6 Outro

  • IP Devices
  • IoT
  • Activity - Programming IoT Devices
  • ICS/SCADA
  • Module 7 Outro

  • Routing Basics
  • Activity: Configuring Static Routes
  • Packet Delivery on the Same Network
  • IP Routing Across a Single Router
  • IP Routing Across Multiple Hops
  • Activity: Static Routes - CHALLENGE
  • Route Selection
  • RIP
  • Activity: Configuring RIP - CHALLENGE
  • OSPF
  • EIGRP
  • BGP
  • NAT/PAT
  • Bandwidth Management (with Module 8 Outro)

  • Ethernet Basics
  • Switching Overview
  • Activity: Examining a MAC Table
  • VLANs
  • Activity: Creating VLANs
  • VLAN Trunking
  • Activity: Configuring VLAN Trunking
  • VLAN Routing
  • Activity: Configuring VLAN Routing
  • Contention Management
  • Switchport Configuration (with Module 9 Outro)

  • Wireless Overview
  • Radio Basics
  • Modulation
  • Wi-Fi Standards
  • Antennas
  • Wi-Fi Service Sets
  • Wi-Fi Security
  • Cellular

  • Monitoring Performance
  • Common Metrics
  • Activity: Examining Interface Statistics
  • SNMP
  • Netflow
  • Network Security Monitoring (with Module 11 Outro)

  • HA and DR Concepts
  • High Availability Mechanisms
  • Disaster Recovery Mechanisms
  • Facility and Infrastructure Support (with Module 12 Outro)

  • Plans and Procedures
  • Security Policies
  • Loss Prevention
  • Common Agreements
  • Common Documentation
  • Structured Cabling - MDF and IDF
  • Horizontal and Vertical Cabling
  • Activity - Implementing Cable Management
  • Labeling
  • Surveys and Assessments (with Module 13 Outro)

  • Common Security Concepts
  • Common Attack Types
  • Spoofing-based Attacks
  • Hijacking and MITM
  • Social Engineering
  • Network Segmentation
  • Private VLANs
  • Single Organization Authentication
  • Extending Authentication
  • Authorization
  • Network Device Hardening
  • Wireless Security
  • Remote Access Security
  • IoT Security
  • Physical Security (with Module 14 Outro)

  • Troubleshooting Methodology
  • Physical Connectivity Issues
  • Hardware Testing Tools
  • Activity - Testing an Ethernet Cable
  • Activity - Crimping on an RJ-45 Connector
  • Activity - Punching Down Twisted Pair
  • Activity - Using a Telephone Toner
  • Understanding Electricity
  • Activity - Checking Cable Continuity
  • Activity - Testing DC Voltage
  • Activity - Testing AC Voltage
  • Twisted Pair Pinout Problems
  • Twisted Pair Termination Problems
  • Repairing Damaged Twisted Pair Cable
  • Fiber Optic Connectivity Issues
  • Activity - Testing a Fiber Optic Cable
  • Common Port Problems
  • Working with Ports and Their Devices
  • Common Software Testing Tools
  • Activity - Scanning for Open Ports
  • Common Command Line Utilities
  • Troubleshooting Basic IP Networking Issues
  • Common Switching Issues
  • Switching Test Tools and Techniques
  • Common IP Routing Issues
  • Wi-Fi Access Point Issues
  • Wireless Interference
  • Activity - Using a Spectrum Analyzer
  • Wireless Antenna Issues
  • Activity - Configuring a Wi-Fi Router
  • WAP Placement Strategies
  • Infrastructure Service Issues (DHCP)
  • Infrastructure Service Issues (DNS)
  • Infrastructure Service Issues (NTP)
  • Firewall / ACL Issues
  • VPN Issues
  • Additional Network Security Troubleshooting and Tips
  • Advanced Networking Issues
  • Troubleshooting Server Services (with Module 15 Outro)
  • CompTIA Network+ N10-008 Course Outro

Course 4

CompTIA Security+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Types Of Malware-Part 1
  • Types Of Malware-Part 2
  • Types Of Attacks-Part 1
  • Types Of Attacks-Part 2
  • Types Of Attacks-Part 3
  • Types Of Attacks-Part 4
  • Types Of Attacks-Part 5
  • Threat Actors-Part 1
  • Threat Actors-Part 2
  • Penetration Testing And Vulnerability Scanning-Part 1
  • Penetration Testing And Vulnerability Scanning-Part 2
  • Impact Of Vulnerabilities-Part 1
  • Impact Of Vulnerabilities-Part 2

  • Networking Hardware And Software-Part 1
  • Networking Hardware And Software-Part 2
  • Networking Hardware And Software-Part 3
  • Networking Hardware And Software-Part 4
  • Networking Hardware And Software-Part 5
  • Networking Hardware And Software-Part 6
  • Security Assessment-Part 1
  • Security Assessment-Part 2
  • Troubleshooting Issues-Part 1
  • Troubleshooting Issues-Part 2
  • Securing Mobile Devices-Part 1
  • Securing Mobile Devices-Part 2
  • Securing Mobile Devices-Part 3
  • Securing Mobile Devices-Part 4
  • Secure Protocols-Part 1
  • Secure Protocols-Part 2

  • Secure Network Architecture-Part 1
  • Secure Network Architecture-Part 2
  • Secure System Designs-Part 1
  • Secure System Designs-Part 2
  • Secure Staging Deployment Concepts
  • Embedded Systems-Part 1
  • Embedded Systems-Part 2
  • Application Development And Deployment-Part 1
  • Application Development And Deployment-Part 2
  • Application Development And Deployment-Part 3
  • Physical Security Controls-Part 1
  • Physical Security Controls-Part 2
  • Physical Security Controls-Part 3
  • Cloud Virtualization-Part 1
  • Cloud Virtualization-Part 2

  • Identity And Access Management-Part 1
  • Identity And Access Management-Part 2
  • Identity And Access Services-Part 1
  • Identity And Access Services-Part 2
  • Management Controls-Part 1
  • Management Controls-Part 2
  • Account Management Practices-Part 1
  • Account Management Practices-Part 2
  • Account Management Practices-Part 3

  • Organizational Security-Part 1
  • Organizational Security-Part 2
  • Business Impact Analysis Concepts-Part 1
  • Business Impact Analysis Concepts-Part 2
  • Risk Management-Part 1
  • Risk Management-Part 2
  • Incident Response Procedures-Part 1
  • Incident Response Procedures-Part 2
  • Forensics-Part 1
  • Forensics-Part 2
  • Disaster Recovery-Part 1
  • Disaster Recovery-Part 2
  • Types Of Control-Part 1
  • Types Of Control-Part 2
  • Data Security And Privacy Practices-Part 1
  • Data Security And Privacy Practices-Part 2

  • Cryptographic Basics-Part 1
  • Cryptographic Basics-Part 2
  • Cryptographic Basics-Part 3
  • Cryptographic Algorithms-Part 1
  • Cryptographic Algorithms-Part 2
  • Wireless Security-Part 1
  • Wireless Security-Part 2
  • Implementing PKI-Part 1
  • Implementing PKI-Part 2
  • Implementing PKI-Part 3
  • Conclusion

Course 5

Cisco CCNA 200-301

This CCNA training is considered associate-level Cisco training, which means it is designed for junior network administrators. this 200-301 CCNA course is valuable for new IT professionals with at least a year of experience with networks and experienced network administrators looking to validate their Cisco skills.

After taking this course, the exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

What will you learn?

CCNA exam objectives and topics include the following:

  • Routing protocols, including OSPFv2 for IPv4 and OSPFv3 for IPv6
  • VLANs, STP, and EtherChannel (static, PAGP, and LACP)
  • WAN technologies
  • Quality of service (QoS), including marketing, shaping, and prioritization of voice, video, and data
  • Device monitoring protocols, including SNMPv2 and SNMPv3
  • Device management using AAA (authentication, authorization, and accounting) with TACACS+ and RADIUS

Course 6

CompTIA Linux+

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials

  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary

  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary

  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials

  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary

  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities

  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary

  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary

  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary

  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary

Course 7

Microsoft MD-100: Windows 10

The Microsoft 70-698 course focuses on how to install Windows 10 with a minimal amount of administrative effort. Preparation, the process, activation, and troubleshooting will be covered in this IT training session. You will also learn how to perform an in-place upgrade from Windows 8.1 to Windows 10, configure hardware devices, manage device drivers, and perform post-install configuration.

  • Instructor and Course Introduction
  • Exam Overview
  • Deploy Windows Intro
  • Deploy Windows 10
  • Deploy Windows 10 Pt 2
  • Preparing Virtual Lab Setup for the Client 1
  • Installation of Windows 10 Enterprise
  • Troubleshooting Failed Installations with Setup Logs
  • Configuring Locales
  • Perform Post-Installation Configuration
  • Navigating Microsoft Edge
  • Modifying Microsoft Edge Settings
  • Customizing Your Computer Setting

  • Manage devices and data intro
  • Manage local users, groups, and devices
  • Configure data access and protection
  • Adding and accessing local users and groups
  • Managing NTFS permissions in Windows 10
  • Configure devices by using local policies
  • Configuring Audit Policies on Windows 10
  • Manage Windows security
  • How to change user account settings

  • Maintain Windows intro
  • Configure system and data recovery
  • Backing up files in Windows 10
  • Using the recycle bin
  • Manage updates
  • Check for updates in Windows 10
  • Configuring hardware in Windows 10
  • Monitor and manage Windows
  • Configuring Windows 20 desktop options
  • Installing new features

  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo

Course 8

Ethical Hacking Course (ECC 312-50)

An Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. The topics in this course cover a broad range of concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

  • Module 1 Notes
  •  Introduction
  •  Introduction to Hacking
  •  Information Security Threats and Attack Vectors
  •  Hacking Concepts
  •  Ethical Hacking Concepts and Scope
  •  Information Security Controls Part 1
  •  Information Security Controls Part 2
  •  Information Security Laws and Standards

  • Module 2 Notes
  •  Footprinting and Reconnaissance
  •  Footprinting Methodology
  •  Google Hacking
  •  FootPrinting Through Social Networking
  •  Website Foot Printing
  •  Email Foot Printing
  •  Competitive Intelligence Gathering
  •  WhoIs Foot Printing
  •  DNS Logical and Geographical Foot Printing
  •  Network Footprinting
  •  Foot Printing
  •  Foot Printing Tools
  •  Foot Printing Penetration Testing
  •  Conduct Recon with Ping Act
  •  Query DNS with NSLookUp Act
  •  Discover Website Subdomain with Sublist3r Act
  •  Obtain OSINT Information About a Person wit Pipl Act
  •  Gather Contact and Host Information with theHarvester Act
  •  Automate OSINT Research with Recon-ng Act
  •  Get Started with Metasploit Act
  •  Conduct Open Source Intelligence with OSR Framework Act
  •  Obtain Whois Information with Smart Whois Act
  •  Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
  •  Create an Offline Copy of a Website with HTTrack Act
  •  Trace an Email with eMail Tracker Pro Act

  • Module 3 Notes
  •  Network Scanning
  •  Discovery Scans
  •  Port Scans
  •  Nmap
  •  Nmap Stealth Scans
  •  Nmap Options
  •  H-ping and Other Scanners
  •  SSDP Scanning
  •  Scanning Beyond IDS and Firewall
  •  Banner Grabbing
  •  Scanning Pen Testing
  •  Checking for Live Systems with Angry IP Scanner Act
  •  Network Scanning with MegaPing Act
  •  Advanced Scanning with nmap Act
  •  Packet Crafting with Hping3 Act
  •  Packet Crafting with Colasoft Packet Builder Act

  • Module 4 Notes
  •  Enumeration
  •  Enumeration Technicques Tools
  •  NetBIOS Enumeration
  •  SNMP Enumeration
  •  LDAP Enumeration
  •  NTP Enumeration
  •  SMTP and DNS Enumeration
  •  Enumeration Countermeasures
  •  Enumeration Penetration Testing
  •  Enumerate NetBIOS Information with SuperScan Act
  •  Enumerate NetBIOS Information with NetBIOS Enumerator Act
  •  Enumerate NetBIOS and LDAP Information with Hyena Act
  •  Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act

  • Module 5 Notes
  •  Vulnerability Analysis
  •  Vulnerability Assessment Solutions
  •  Vulnerability Scoring Systems
  •  Vulnerability Assessment Tools and Reports
  •  Perform a Vulnerability Scan and Analysis with Nessus Act

  • Module 6 Notes
  •  Malware Threats
  •  Trojan Concepts
  •  Trojan Types
  •  Trojan Tools
  •  Virus and Worm Concepts
  •  Virus Types
  •  Malware Analysis
  •  Malware Reverse Engineering
  •  Malware Detection
  •  Malware Countermeasures
  •  Malware Penetration Testing
  •  Infect a Victim with a Remote Access Trojan Act

  • Module 7 Notes
  • Sniffing Concepts
  • DHCP Attacks
  • MAC Attacks
  • ARP Poisoning
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Sniff a Clear Text HTTP Session with Wireshark Act
  • Intercept and Crack a Network Login Act

  • Module 8 Notes
  •  Social Engineering
  •  Human Based Social Engineering
  •  Computer Based Social Engineering
  •  Additional Types of Social Engineering
  •  Social Engineering Countermeasures
  •  Social Engineering Penetration Testing
  •  Fool a User with a Baited USB Stick Act
  •  Harvest Credentials with Spear Phishing Act

  • Module 9 Notes
  •  Denial of Service
  •  Common Dos-DDoS Attack Types
  •  Additional DoS Attack Types
  •  BotNets
  •  DoS Countermeasures
  •  Additional DoS Countermeasures
  •  DoS Penetration Testing
  •  Perform a DoS Attack With the Low Orbit ION Cannon Act
  •  Step Up the DoS Attack With the High Orbit ION Cannon Act
  •  Perform a Slowloris DoS Attack Act

  • Module 10 Notes
  •  Session Hijacking
  •  Browser Session Hijacking
  •  Way to Compromise a Session Token
  •  Client Side Attacks
  •  Hijacking at the Network Level
  •  Session Hijacking Tools
  •  Session Hijacking Countermeasures
  •  Session Hijacking Testing
  •  Perform a MITM Attack with Ettercap Act

  • Module 11 Notes
  •  Hacking Web Servers
  •  Webserver Attacks
  •  Methodology of Webserver Attacks
  •  Webserver Attack and Defense Tools
  •  Webserver General Defense
  •  Webserver Specific Attack Countermeasures
  •  Webserver Patch Management
  •  Webserver Pen Testing
  •  Footprint a Web Server with IDServe Act
  •  Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
  •  Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
  •  Brute Force a Web Server with Medusa Act

  • Module 12 Notes
  •  Hacking Web Applications
  •  Web App Vulnerabilities and Exploits
  •  Web Application Threats
  •  Injection Attacks
  •  Hidden Fields and Clickjacking
  •  Cross Site Attacks
  •  Additional Web App Attacks
  •  Web Hacking Methodology
  •  Web App Hacking Countermeasures
  •  Web App Security Tools
  •  Web Application Penetration Testing
  •  Conduct a Simple Command Injection Attack Act
  •  Inject a Malicious Link with Cross Site Scripting Act
  •  Conduct a Cross Site Request Forgery Attack

  • Module 13 Notes
  •  SQL Injection
  •  Types of SQL Injection
  •  SQL Injection Methodology
  •  SQL Injection Tools
  •  SQL Injection Countermeasures
  •  SQL Injection Penetration Testing
  •  SQL Injection Act

  • Module 14 Notes
  •  Hacking Wireless Networks
  •  Wireless Discovery and Mapping
  •  WiFi Sniffers
  •  WiFi Attacks
  •  WiFi Cracking
  •  Wireless Hacking Tools
  •  Bluetooth Hacking
  •  Wireless Hacking Countermeasures
  •  Wireless Security Tools
  •  Wireless Penetration Testing
  •  Crack a WEP Key with Aircrack-ng Act
  •  Crack a WPA Key with Aircrack-ng Act

  • Module 15 Notes
  •  System Hacking Methodology
  •  Windows System Vulnerabilities and Exploits
  •  Linux System Vulnerablities and Exploits
  •  Password Cracking Methods
  •  Network Service Password Cracking
  •  Windows Password Cracking
  •  Linux Password Cracking
  •  Password Cracking Tools
  •  Other Methods of Obtaining Passwords
  •  Keylogging
  •  Spyware
  •  RootKits
  •  Hiding Files
  •  Steganography
  •  Privilege Escalation
  •  Creating and Maintaining Remote Access
  •  Hiding Evidence
  •  System Hacking Penetration Testing
  •  Spoof Name Resolution and Capture Credentials with Responder Act
  •  Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
  •  Crack Passwords with L0pht7 Act
  •  Exploit Client Side Vulnerabilities Act
  •  Track User Activity with Spyware Act
  •  View and Clear Audit Policies with Auditpol Act
  •  Hide Data Using Whitespace Steganography Act
  •  Hide Data Using Least Significant Bit Steganography Act
  •  Cover Your Tracks Act

  • Module 16 Notes
  •  Hacking Mobile Platforms
  •  Hacking Android OS
  •  Rooting Android
  •  Securing Android
  •  Hacking iOS
  •  Jailbreaking iOS
  •  Securing iOS
  •  Hacking Windows Phone OS
  •  Hacking Blackberry
  •  Mobile Device Management
  •  Mobile Security Guidelines and Tools
  •  Mobile Penetration Testing
  •  Prepare Your Wireless Email Environment Act
  •  Pwn a Mobile Device with Metasploit Act
  •  Use a Mobile Device in a DDoS Campaign Act
  •  Return Your VMs to Original Configuration Act
  •  Uninstall Main Activity Malware from Android Act

  • Module 17 Notes
  •  Evading IDS Firewalls and Honeypots
  •  Firewalls
  •  Honeypots
  •  IDS Firewalls and Honeypots Tools
  •  Evasion
  •  Evasion Countermeasures
  •  IDS Firewall Honeypot Penetration Testing
  •  Fly Below IDS Radar Act
  •  Test and Analyze a Honey Pot Act
  •  Bypass Windows Firewall Act

  • Module 18 Notes
  •  Cryptography
  •  Encryption Algorithms
  •  Cryptography Tools
  •  Public key Infrastructure
  •  Email Encryption
  •  Disk Encryption
  •  Cryptography Attacks
  •  Crytography Penetration Testing
  •  Examine Hashing Algorithms Act
  •  Protect Data with Symmetric Encryption Act
  •  Protect Data with Asymmetric Encryption Act

  • Module 19 Notes
  •  Cloud Computing
  •  Virtualization
  •  Cloud Computing Threats
  •  Countermeasures to Cloud Computing Threats
  •  Cloud Computing Attacks
  •  Cloud Security
  •  Cloud Security Best Practices
  •  Cloud Penetration Testing

  • Module 20 Notes
  •  IoT Hacking
  •  IoT Vulnerabilities and Attacks
  •  IoT Hacking Methodology and Tools
  •  IoT Hacking Countermeasures
  •  oT Penetration Testing
  •  Search the Internet for Vulnerable IoT Devices Act
  •  Conclusion

Course 9

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

  • Introduction
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 1
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 2
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 3
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 4
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 5
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 6
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 7
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 8
  • Apply environmental reconnaissance techniques using appropriate tools and processes Part 9
  • Analyze the results of a network reconnaissance Part 1
  • Analyze the results of a network reconnaissance Part 2
  • Analyze the results of a network reconnaissance Part 3
  • Analyze the results of a network reconnaissance Part 4
  • Analyze the results of a network reconnaissance Part 5
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
  • Explain the purpose of practices used to secure a corporate environment Part 1
  • Explain the purpose of practices used to secure a corporate environment Part 2
  • Explain the purpose of practices used to secure a corporate environment Part 3
  • Explain the purpose of practices used to secure a corporate environment Part 4

  • Implement an information security vulnerability management process Part 1
  • Implement an information security vulnerability management process Part 2
  • Implement an information security vulnerability management process Part 3
  • Implement an information security vulnerability management process Part 4
  • Implement an information security vulnerability management process Part 5
  • Implement an information security vulnerability management process Part 6
  • Implement an information security vulnerability management process Part 7
  • Analyze the output resulting from a vulnerability scan Part 1
  • Analyze the output resulting from a vulnerability scan Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
  • Compare and contrast common vulnerabilities found in the following targets within an organization Part 3

  • Distinguish threat data or behavior to determine the impact of an incident Part 1
  • Distinguish threat data or behavior to determine the impact of an incident Part 2
  • Distinguish threat data or behavior to determine the impact of an incident Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 1
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 2
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 3
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 4
  • Prepare a toolkit and use appropriate forensic tools during an investigation Part 5
  • Explain the importance of communications during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response Part 1
  • Analyze common symptoms to select the best course of action to support incident response Part 2
  • Analyze common symptoms to select the best course of action to support incident response Part 3
  • Analyze common symptoms to select the best course of action to support incident response Part 4
  • Summarize the incident recovery and post-incident response process Part 1
  • Summarize the incident recovery and post-incident response process Part 2
  • Summarize the incident recovery and post-incident response process Part 3
  • Summarize the incident recovery and post-incident response process Part 4

  • Explain the relationship between frameworks, common policies, controls, and procedures Part 1
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 2
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 3
  • Explain the relationship between frameworks, common policies, controls, and procedures Part 4
  • Use data to recommend remediation of security issues related to identity and access management Part 1
  • Use data to recommend remediation of security issues related to identity and access management Part 2
  • Use data to recommend remediation of security issues related to identity and access management Part 3
  • Use data to recommend remediation of security issues related to identity and access management Part 4
  • Review security architecture and make recommendations to implement compensating controls Part 1
  • Review security architecture and make recommendations to implement compensating controls Part 2
  • Review security architecture and make recommendations to implement compensating controls Part 3
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
  • Use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
  • Overview
  • Conclusion

Coursework

What's Included

One Full Year of Access

Get an entire year to study the course materials, and use the practice labs to learn everything you need to know for certification.

Module Workbooks

Study comprehensive workbooks with hundreds of pages of notes covering every video topic to help you learn easily.

Instructor-led Training

Enjoy detailed lessons taught by experienced certified IT instructors who guide you every step of the way.

Interactive Learning

Discover interactive study materials in every course including flash cards and matching games to help you master every subject.

Useful Certifications

Learn exactly what you need to prepare yourself for the most powerful, in-demand, IT industry certifications in existence.

Exclusive Community

Join us in our free, private Facebook community to connect with other students who are starting new careers just like you.

Frequently Asked Questions

As soon as you purchase! After we receive payment, you’ll be sent a voucher code via email from KO Tech Academy with the subject line “You received a new voucher code”. It typically takes a couple hours for processing on our end, so don’t panic if you don’t receive your voucher code immediately. Once you’ve received your voucher code, follow the instructions in the email to setup your account and access your Learning Management System (LMS) Dashboard.

You get to work! Once you’ve created your account and accessed your dashboard, you’re free to start taking your courses and accessing all of your materials. Remember you have full access for an entire year!

There is no restriction on what order you take your courses in, but we definitely recommend taking the courses in order. They’re designed to build on each other as you progress and learn more and more.

For IT & Cybersecurity, we recommend the following order:

  • CompTIA ITF+
  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • Cisco CCNA 200-301
  • CompTIA Linux+
  • Microsoft MS 70-698
  • Microsoft MS 70-410
  • CompTIA CySA+
You can take all of the exams online through Pearson Vue. We’ve provided links below to additional information from the certification providers because each one will have different requirements for online exams like needing a webcam for monitoring during the exam, etc.
 

Complimentary career services for our heroes

All veterans, active duty military, first responders and their spouses

You can receive complimentary resume writing services and LinkedIn optimization with any course purchase.

Email any form of military or official, professional identification to support@kotechacademy.com for verification.