CompTIA Training Courses

CompTIA is recognized worldwide as one of the leading trusted and recognized IT certifications. CompTIA certifications test your knowledge in areas such as hardware, software, networking, security, and more.

Whether you are an IT pro with years of experience, or still relatively new to the field, continuing your tech education is a must if you want to remain competitive in the job market.

CompTIA certifications align with IT infrastructure and cybersecurity career paths, with each added certification representing a deepening of your expertise. Core certifications, like CompTIA A+, lay the groundwork for the specialized pathway certifications, and additional professional certifications cover necessary IT skills like project management. We run a comprehensive range of CompTIA training programmes, aimed at helping individuals and organizations to effectively develop and manage their technology skills, competencies and capabilities.

CompTIA training will also help you with the fundamental skill set needed to take your IT career to another level. Here are some of the CompTIA training courses that we offer;

CompTia Network+ is of course about networking (wired and wireless), -In this course you will learn how to install, configure and troubleshoot a Computer network.
CompTia Security+ is about best practices in IT security, -Here you will Learn compliance, risk management, disaster recovery, and application security.
CompTia Server+ -You will learn Server deployment, installation, maintenance, Storage, and troubleshooting.
CompTia Cyber Security Analyst (CySa+) is about security reporting and analysis. You will learn how to use different network monitoring tools to detect and report a security incident.

CompTIA Network+

Network+ certification assures that the successful candidate has the mandatory skill sets to manage fundamental network infrastructure and maintain it efficiently.

Course code: N10-007
Course duration: 4 weeks

Course Outline:
• Identify basic network theory concepts and major network communications methods.
• Describe bounded network media.
• Describe unbounded network media.
• Identify the major types of network implementations.
• Identify TCP/IP addressing and data delivery methods.
• Analyze routing and switching technologies.
• Identify the components of a TCP/IP implementation.
• Analyze network security.
• Implement network security.
• Identify the components of a WAN implementation.
• Identify the components used in cloud computing and virtualization.
• Identify the components of a remote network implementation.
• Manage networks.
• Troubleshoot network issues.

CompTIA Server+

Obtaining the Server+ certification will validate you have the skills to build, maintain, support and troubleshoot server hardware and software. You will be able to provide advanced and complete server solutions.

Course code: SK0-004
Course duration: 4 weeks

Course Outline:
• Understanding server hardware.
• Install server hardware and operating systems.
• Configure networking hardware and protocols.
• Perform basic server configuration tasks.
• Create a virtual server environment.
• Administer servers.
• Implement server storage solutions.
• Securing the server.
• Plan and test disaster recovery.
• Troubleshoot server issues.

CompTIA Security+

Security+ is Compliant with ISO 17024 Standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Security+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.

Course code: Sy0-501
Course duration: 4 weeks

Course Outline:
• Identify the fundamental components of information security
• Analyze risk
• Identify various threats to information security
• Conduct security assessments to detect vulnerabilities
• Implement security for hosts and software
• Implement security for networks
• Manage identity and access
• Implement cryptographic solutions in the organization
• Implement security at the operational level
• Address security incident
• Ensure the continuity of business operations in the event of an incident


CompTIA Cyber Security Analyst (CySA+)

Obtaining the CySA+ certification will validate you have the skills to use different network monitoring tools to detect, analyse and report a security incident.

Course code: CS0-001
Course duration: 4 weeks

Course Outline:

Module 1 – Threat Management 1
◾Cyber security Analysts
• Cyber security Roles and Responsibilities
• Frameworks and Security Controls
• Risk Evaluation
• Penetration Testing Processes
◾Reconnaissance Techniques
• The Kill Chain
• Open Source Intelligence
• Social Engineering
• Topology Discovery
• Service Discovery
• OS Fingerprinting

Module 2 – Threat Management 2
◾Security Appliances
• Configuring Firewalls
• Intrusion Detection and Prevention
• Configuring IDS
• Malware Threats
• Configuring Anti-virus Software
• Sysinternals
• Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
• Packet Capture
• Packet Capture Tools
• Monitoring Tools
• Log Review and SIEM
• SIEM Data Outputs
• SIEM Data Analysis
• Point-in-Time Data Analysis

Module 3 – Vulnerability Management
◾Managing Vulnerabilities
• Vulnerability Management Requirements
• Asset Inventory
• Data Classification
• Vulnerability Management Processes
• Vulnerability Scanners
• Microsoft Baseline Security Analyzer
• Vulnerability Feeds and SCAP
• Configuring Vulnerability Scans
• Vulnerability Scanning Criteria
• Exploit Frameworks
◾Remediating Vulnerabilities
• Analyzing Vulnerability Scans
• Remediation and Change Control
• Remediating Host Vulnerabilities
• Remediating Network Vulnerabilities
• Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
• Software Development Lifecycle
• Software Vulnerabilities
• Software Security Testing
• Interception Proxies
• Web Application Firewalls
• Source Authenticity
• Reverse Engineering

Module 4 – Cyber Incident Response
◾Incident Response
• Incident Response Processes
• Threat Classification
• Incident Severity and Prioritization
• Types of Data
◾Forensics Tools
• Digital Forensics Investigations
• Documentation and Forms
• Digital Forensics Crime Scene
• Digital Forensics Kits
• Image Acquisition
• Password Cracking
• Analysis Utilities
◾Incident Analysis and Recovery
• Analysis and Recovery Frameworks
• Analyzing Network Symptoms
• Analyzing Host Symptoms
• Analyzing Data Exfiltration
• Analyzing Application Symptoms
• Using Sysinternals
• Containment Techniques
• Eradication Techniques
• Validation Techniques
• Corrective Actions

Module 5 – Security Architecture
◾Secure Network Design
• Network Segmentation
• Blackholes, Sinkholes, and Honeypots
• System Hardening
• Group Policies and MAC
• Endpoint Security
◾Managing Identities and Access
• Network Access Control
• Identity Management
• Identity Security Issues
• Identity Repositories
• Context-based Authentication
• Single Sign On and Federations
• Exploiting Identities
• Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
• Frameworks and Compliance
• Reviewing Security Architecture
• Procedures and Compensating Controls
• Verifications and Quality Control
• Security Policies and Procedures
• Personnel Policies and Training