CompTIA Training Courses

CompTIA certifications align with IT infrastructure and cybersecurity career paths, with each added certification representing a deepening of your expertise. Core certifications, like CompTIA A+, lay the groundwork for the specialized pathway certifications, and additional professional certifications cover necessary IT skills like project management. We run a comprehensive range of CompTIA training programmes, aimed at helping individuals and organizations to effectively develop and manage their technology skills, competencies and capabilities. Here is a list of CompTIA training courses we offer;

CompTIA Network+

Network+ certification assures that the successful candidate has the mandatory skill sets to manage fundamental network infrastructure and maintain it efficiently.

Course code: N10-007
Course duration: 4 weeks

Course Outline:
• Identify basic network theory concepts and major network communications methods.
• Describe bounded network media.
• Describe unbounded network media.
• Identify the major types of network implementations.
• Identify TCP/IP addressing and data delivery methods.
• Analyze routing and switching technologies.
• Identify the components of a TCP/IP implementation.
• Analyze network security.
• Implement network security.
• Identify the components of a WAN implementation.
• Identify the components used in cloud computing and virtualization.
• Identify the components of a remote network implementation.
• Manage networks.
• Troubleshoot network issues.

CompTIA Server+

Obtaining the Server+ certification will validate you have the skills to build, maintain, support and troubleshoot server hardware and software. You will be able to provide advanced and complete server solutions.

Course code: SK0-004
Course duration: 4 weeks

Course Outline:
• Understanding server hardware.
• Install server hardware and operating systems.
• Configure networking hardware and protocols.
• Perform basic server configuration tasks.
• Create a virtual server environment.
• Administer servers.
• Implement server storage solutions.
• Securing the server.
• Plan and test disaster recovery.
• Troubleshoot server issues.

CompTIA Security+

Security+ is Compliant with ISO 17024 Standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Security+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.

Course code: Sy0-501
Course duration: 4 weeks

Course Outline:
• Identify the fundamental components of information security
• Analyze risk
• Identify various threats to information security
• Conduct security assessments to detect vulnerabilities
• Implement security for hosts and software
• Implement security for networks
• Manage identity and access
• Implement cryptographic solutions in the organization
• Implement security at the operational level
• Address security incident
• Ensure the continuity of business operations in the event of an incident


CompTIA Cyber Security Analyst (CySA+)

Obtaining the CySA+ certification will validate you have the skills to use different network monitoring tools to detect, analyse and report a security incident.

Course code: CS0-001
Course duration: 4 weeks

Course Outline:

Module 1 – Threat Management 1
◾Cyber security Analysts
• Cyber security Roles and Responsibilities
• Frameworks and Security Controls
• Risk Evaluation
• Penetration Testing Processes
◾Reconnaissance Techniques
• The Kill Chain
• Open Source Intelligence
• Social Engineering
• Topology Discovery
• Service Discovery
• OS Fingerprinting

Module 2 – Threat Management 2
◾Security Appliances
• Configuring Firewalls
• Intrusion Detection and Prevention
• Configuring IDS
• Malware Threats
• Configuring Anti-virus Software
• Sysinternals
• Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
• Packet Capture
• Packet Capture Tools
• Monitoring Tools
• Log Review and SIEM
• SIEM Data Outputs
• SIEM Data Analysis
• Point-in-Time Data Analysis

Module 3 – Vulnerability Management
◾Managing Vulnerabilities
• Vulnerability Management Requirements
• Asset Inventory
• Data Classification
• Vulnerability Management Processes
• Vulnerability Scanners
• Microsoft Baseline Security Analyzer
• Vulnerability Feeds and SCAP
• Configuring Vulnerability Scans
• Vulnerability Scanning Criteria
• Exploit Frameworks
◾Remediating Vulnerabilities
• Analyzing Vulnerability Scans
• Remediation and Change Control
• Remediating Host Vulnerabilities
• Remediating Network Vulnerabilities
• Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
• Software Development Lifecycle
• Software Vulnerabilities
• Software Security Testing
• Interception Proxies
• Web Application Firewalls
• Source Authenticity
• Reverse Engineering

Module 4 – Cyber Incident Response
◾Incident Response
• Incident Response Processes
• Threat Classification
• Incident Severity and Prioritization
• Types of Data
◾Forensics Tools
• Digital Forensics Investigations
• Documentation and Forms
• Digital Forensics Crime Scene
• Digital Forensics Kits
• Image Acquisition
• Password Cracking
• Analysis Utilities
◾Incident Analysis and Recovery
• Analysis and Recovery Frameworks
• Analyzing Network Symptoms
• Analyzing Host Symptoms
• Analyzing Data Exfiltration
• Analyzing Application Symptoms
• Using Sysinternals
• Containment Techniques
• Eradication Techniques
• Validation Techniques
• Corrective Actions

Module 5 – Security Architecture
◾Secure Network Design
• Network Segmentation
• Blackholes, Sinkholes, and Honeypots
• System Hardening
• Group Policies and MAC
• Endpoint Security
◾Managing Identities and Access
• Network Access Control
• Identity Management
• Identity Security Issues
• Identity Repositories
• Context-based Authentication
• Single Sign On and Federations
• Exploiting Identities
• Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
• Frameworks and Compliance
• Reviewing Security Architecture
• Procedures and Compensating Controls
• Verifications and Quality Control
• Security Policies and Procedures
• Personnel Policies and Training