+2349030839084, +2342014545754 solutions@fibertrain.net
Full 1
Some of Our Tutorials
Click The Button Below To Watch Our Free
Training Videos...
Full 1
Some of Our Tutorials
Click The Button Below To Watch Our Free
Training Videos...
Full 1
Some of Our Tutorials
Click The Button Below To Watch Our Free
Training Videos...

Why Take CompTIA Courses?

CompTIA (The Computing Technology Industry Association) is the leading provider of vendor-neutral IT certifications in the world. With more than 2 million IT certifications issued worldwide. CompTIA certifications test your knowledge in areas such as hardware, software, networking, security, and more.

Whether you are an IT pro with years of experience, or still relatively new to the field, continuing your tech education is a must if you want to remain competitive in the job market.

CompTIA certifications align with IT infrastructure and cybersecurity career paths, with each added certification representing a deepening of your expertise. Core certifications, like CompTIA A+, lay the groundwork for the specialized pathway certifications, and additional professional certifications cover necessary IT skills like project management. Fibertrain runs a comprehensive range of CompTIA training programmes, aimed at helping individuals and organizations to effectively develop and manage their technology skills, competencies and capabilities.

CompTIA training will also help you with the fundamental skill set needed to take your IT career to another level. Here are some of the CompTIA training courses offered by Fibertrain;

CompTia Network+ (N10-008) –  This course teaches you Computer Networking (LAN, VLAN, Routing, WAN, Cloud, VPN, etc.) At the end of this training, You will learn how to install, configure and troubleshoot an Enterprise Computer network.

CompTia Security+ (Sy0-701) – This training is for Network defenders tasked with the responsibility of protecting IT infrastructure from Cyber attacks. In this training, you will learn best practices in IT security, Network Security,  compliance, risk management, disaster recovery, application security, and EDR (Endpoint Detection and Response).

CompTia Server+ (SK0-005) This Course is for System/Server Administrators that want learn to use Server Operating System to manage access to Network resources. You will learn RAID Configuration, Server OS installation and Configuration, Server maintenance, File Storage, and troubleshooting.

CompTia Cyber Security Analyst (CySa+), CS0-003) – This training Covers Security Monitoring, Threat detection, Analysis, and Response. You will learn how to use SIEM  tools to detect and respond to a security incident.

CompTIA Network+ N10-008

Network+ certification assures that the successful candidate has the mandatory skill sets to manage fundamental network infrastructure and maintain it efficiently.

Course code: N10-008
Course duration: 4 weeks

Course Outline:
• Identify basic network concepts and major network communications methods.
• Describe bounded network media.
• Describe unbounded network media.
• Identify the major types of network implementations.
• Identify TCP/IP addressing and data delivery methods.
• Analyze routing and switching technologies.
• Identify the components of a TCP/IP implementation.
• Analyze network security.
• Implement network security.
• Identify the components of a WAN implementation.
• Identify the components used in cloud computing and virtualization.
• Identify the components of a remote network implementation.
• Manage networks.
• Troubleshoot network issues.


CompTIA Server+ SK0-005

Obtaining the Server+ certification will validate you have the skills to build, maintain, support and troubleshoot server hardware and Operating System. You will be able to provide advanced and complete server solutions.

Course code: SK0-005
Course duration: 4 weeks

Course Outline:
• Understanding server hardware.
• Install server hardware and operating systems.
• Configure networking hardware and protocols.
• Perform basic server configuration tasks.
• Create a virtual server environment.
• Administer servers.
• Implement server storage solutions.
• Securing the server.
• Plan and test disaster recovery.
• Troubleshoot server issues.

CompTIA Security+ Sy0-701

CompTIA Security+ is Compliant with ISO 17024 Standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Security+ focuses on the latest trends and techniques in Network defense (Next Generation Firewall), Data Loss Prevention, risk management, risk mitigation, threat management and intrusion detection and Prevention. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.

Course code: Sy0-701
Course duration: 4 weeks

Course Outline:
• Identify the fundamental components of information security
• Identify various threats to information security
• Conduct security assessments to detect vulnerabilities
• Analyze Security Assessment Results
• Implement security for hosts and software
• Implement Security for Networks
• Implement Identity And Access Management (IAM)
• Implement cryptographic solutions in the organization
• Implement Operational Security
• Addressing Security Incident
• Ensuring The Continuity of Business Operations in The Event of an Incident

 

CompTIA Cyber Security Analyst (CySA+) CS0-003

Obtaining the CySA+ certification will validate you have the skills to use different network monitoring tools to detect, analyze and report a security incident.

Course code: CS0-003
Course duration: 4 weeks

Course Outline:

Module 1 – Threat Management 1
◾Cyber security Analysts
• Cyber security Roles and Responsibilities
• Frameworks and Security Controls
• Risk Evaluation
• Penetration Testing Processes
◾Reconnaissance Techniques
• The Kill Chain
• Open Source Intelligence
• Social Engineering
• Topology Discovery
• Service Discovery
• OS Fingerprinting

Module 2 – Threat Management 2
◾Security Appliances
• Configuring Firewalls
• Intrusion Detection and Prevention
• Configuring IDS
• Malware Threats
• Configuring Anti-virus Software
• Sysinternals
• Enhanced Mitigation Experience Toolkit
◾Logging and Analysis
• Packet Capture
• Packet Capture Tools
• Monitoring Tools
• Log Review and SIEM
• SIEM Data Outputs
• SIEM Data Analysis
• Point-in-Time Data Analysis

Module 3 – Vulnerability Management
◾Managing Vulnerabilities
• Vulnerability Management Requirements
• Asset Inventory
• Data Classification
• Vulnerability Management Processes
• Vulnerability Scanners
• Microsoft Baseline Security Analyzer
• Vulnerability Feeds and SCAP
• Configuring Vulnerability Scans
• Vulnerability Scanning Criteria
• Exploit Frameworks
◾Remediating Vulnerabilities
• Analyzing Vulnerability Scans
• Remediation and Change Control
• Remediating Host Vulnerabilities
• Remediating Network Vulnerabilities
• Remediating Virtual Infrastructure Vulnerabilities
◾Secure Software Development
• Software Development Lifecycle
• Software Vulnerabilities
• Software Security Testing
• Interception Proxies
• Web Application Firewalls
• Source Authenticity
• Reverse Engineering

Module 4 – Cyber Incident Response
◾Incident Response
• Incident Response Processes
• Threat Classification
• Incident Severity and Prioritization
• Types of Data
◾Forensics Tools
• Digital Forensics Investigations
• Documentation and Forms
• Digital Forensics Crime Scene
• Digital Forensics Kits
• Image Acquisition
• Password Cracking
• Analysis Utilities
◾Incident Analysis and Recovery
• Analysis and Recovery Frameworks
• Analyzing Network Symptoms
• Analyzing Host Symptoms
• Analyzing Data Exfiltration
• Analyzing Application Symptoms
• Using Sysinternals
• Containment Techniques
• Eradication Techniques
• Validation Techniques
• Corrective Actions

Module 5 – Security Architecture
◾Secure Network Design
• Network Segmentation
• Blackholes, Sinkholes, and Honeypots
• System Hardening
• Group Policies and MAC
• Endpoint Security
◾Managing Identities and Access
• Network Access Control
• Identity Management
• Identity Security Issues
• Identity Repositories
• Context-based Authentication
• Single Sign On and Federations
• Exploiting Identities
• Exploiting Web Browsers and Applications
◾Security Frameworks and Policies
• Frameworks and Compliance
• Reviewing Security Architecture
• Procedures and Compensating Controls
• Verifications and Quality Control
• Security Policies and Procedures
• Personnel Policies and Training