CompTIA Security+

CompTIA Security+

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Domain 1

Security Fundamental

  • Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

Domain 3

ManagementManaging Data, Application, and Host Security

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security

Domain 5

Implementing Access Control, Authentication, and Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

Domain 7

Implementing Compliance and Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties

Domain 9

SecurityTroubleshooting and Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident

Domain 2

Identifying Security Threats and Vulnerabilities

  • Social Engineering
  • Malware
  • Physical Threats and Vulnerabilities
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

Domain 4

Implementing Network Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic

Domain 6

Managing Certificates

  • Install a Certificate Authority (CA) Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Revoke Certificates
  • Back Up and Restore Certificates and Private Keys
  • Restore Certificates and Private Keys

Domain 8

Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

Domain 10

Business Continuity and Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute Disaster Recovery Plans and Procedures

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

CompTIA Certified Technical Trainer (CTT+)

CompTIA Certified Technical Trainer (CTT+)

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Planning and preparation

  • Reviewing course objectives
  • Assessing learner and organization needs
  • Modifying content
  • Managing points of confusion and resistance
  • Creating an environment conducive to learning
  • Preparing yourself
  • Setting up the environment
  • Ensuring safety and comfort
  • Welcoming learners to the environment
  • Managing problems

Lesson 3

Credibility and communications

• Demonstrating professional conduct and content expertise
• Discussing classroom etiquette
• Demonstrating content expertise
• Maintaining professional conduct
• Using communication and presentation skills
• Using verbal communication skills
• Using non-verbal communication skills
• Using presentation skills

Lesson 2

Exploring delivery methods and media

• Selecting and implementing delivery methods
• Examining characteristics of adult learners
• Examining delivery methods
• Using activities to assess comprehension
• Using instructional media
• Discussing instructional media

Lesson 4

Group facilitation

• Creating a learner-centered environment
• Establishing a learner-centered environment
• Maintaining a learner-centered environment
• Using questions
• Examining question types
• Using question techniques
• Addressing learner needs
• Meeting learner needs
• Providing additional encouragement
• Motivating and reinforcing learners

Lesson 5

Evaluating a training event

• Evaluating learner performance
• Assessing performance
• Monitoring progress and promoting continued learning
• Evaluating trainer performance
• Evaluating training effectiveness
• Understanding methods of evaluation
• Performing an overall evaluation

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

CompTIA Network+

CompTIA Network+

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Computer Network Fundamental

  • Foundation Topics
  • Defining a Network
  • Networks Defined by Geography
  • Networks Defined by Topology
  • Networks Defined by Resource Location

Lesson 2

The OSI Reference Model

  • The Purpose of Reference Models
  • The OSI Layer
  • Layer 1: the Physical Layer
  • Layer 2: The Data Link Layer
  • Media Access Control
  • Logical Link Control
  • Layer 3: The Network Layer
  • Layer 4: The Transport Layer
  • Layer 5: The Session Layer
  • Layer 6: The Presentation Layer
  • Layer 7: The Application Layer
  • The TCP/IP Stack
  • Common Application Protocols in the TCP/IP Stack

Lesson 3

Network Components

  • Media
  • Network Infrastructure Devices
  • Specialized Network Devices
  • Virtual Network Devices
  • Voice Over IP Protocols and Components

Lesson 5

IPv4 and IPv6 Addresses

  • Binary Numbering
  • IPv4 Addresses
  • Assigning IPv4 Addresses
  • Subnetting
  • IP Version 6

Lesson 7

Wide-Area Networks

  • WAN Properties
  • WAN Technologies

Lesson 9

Network Optimization

  • High Availability
  • QoS Technologies
  • Case Study: SOHO Network Design

Lesson 11

Network Management

  • Maintenance Tools
  • Configuration Management
  • Monitoring Resources and Report

Lesson 13

Network Troubleshooting

  • Troubleshooting Basics
  • Physical Layer Troubleshooting
  • Data Link Layer Troubleshooting
  • Network Layer Troubleshooting
  • Wireless Troubleshooting
  • Specialized Networks

Lesson 4

Ethernet Technology

  • Principles of Ethernet
  • Ethernet Switch Features

Lesson 6

Routing IP Packets

  • Basic Routing Processes
  • Sources of Routing Information
  • Routing Protocol Examples
  • Address Translation
  • Multicast Routing

Lesson 8

Wireless LANs

  • Introduction Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs

Lesson 10

Command-Line Tools

  • Windows Commands
  • UNIX Commands

Lesson 12

Network Security

  • Security Fundamentals
  • Categories of Network Attacks
  • Defending Against Attacks
  • Remote-Access Security
  • Firewalls
  • Virtual Private Networks
  • Intrusion Detection and Prevention

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

CompTIA Pentest+

CompTIA Pentest+

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

1.0 Planning and Scoping

  • 1.1 Explain the importance of planning for an
    engagement
  • 1.2 Explain key legal concepts
  • 1.3 Explain the importance of scoping an engagement properly
  • 1.4 Explain the key aspects of compliance-based assessments

Lesson 2

2.0 Information Gathering and Vulnerability Identification

  • 2.1 Given a scenario, conduct information gathering using appropriate techniques
  • 2.2 Given a scenario, perform a vulnerability scan
  • 2.3 Given a scenario, analyze vulnerability scan
    results
  • 2.4 Explain the process of leveraging information to prepare for exploitation
  • 2.5 Explain weaknesses related to specialized systems

Lesson 3

3.0 Attacks and Exploits

  • 3.1 Compare and contrast social engineering attacks
  • 3.2 Given a scenario, exploit network-based vulnerabilities
  • 3.3 Given a scenario, exploit wireless and RF-based vulnerabilities
  • 3.4 Given a scenario, exploit application-based vulnerabilities
  • 3.5 Given a scenario, exploit local host vulnerabilities.
  • 3.6 Summarize physical security attacks related to facilities
  • 3.7 Given a scenario, perform post-exploitation techniques

Lesson 5

5.0 Reporting and Communication

  • 5.1 Given a scenario, use report writing and handling best practices
  • 5.2 Explain post-report delivery activities
  • 5.3 Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • 5.4 Explain the importance of communication during the penetration testing process

Lesson 4

4.0 Penetration Testing Tools

  • 4.1 Given a scenario, use Nmap to conduct information gathering exercises
  • 4.2 Compare and contrast various use cases of tools
  • 4.3 Given a scenario, analyze tool output or data related to a penetration test.
  • 4.4 Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell).

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

CompTIA Cybersecurity Analyst CySA

CompTIA Cybersecurity Analyst CySA

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

1.0 Threat Management

1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.

  • Procedures/common tasks
  • Variables
  • Tools

Lesson 2

1.2 Given a scenario, analyze the results of a network reconnaissance.

  • Point-in-time data analysis
  • Data correlation and analytics
  • Data output
  • Tools

Lesson 3

1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.

  • Network segmentation
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs
  • Hardening
  • Network Access Control (NAC)

Lesson 5

2.0 Vulnerability Management

2.1 Given a scenario, implement an information
security vulnerability management process.

  • Identification of requirements
  • Establish scanning frequency
  • Configure tools to perform scans according to specification
  • Execute scanning
  • Generate reports
  • Remediation
  • Ongoing scanning and continuous monitoring

Lesson 7

2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.

  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices

Lesson 9

3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.

  • Forensics kit
  • Forensic investigation suite

Lesson 11

3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.

  • Common network-related symptoms
  • Common host-related symptoms
  • Common application-related symptoms

Lesson 13

4.0 Security Architecture and Tool Sets

4.1 Explain the relationship between frameworks, common policies, controls, and procedures.

  • Regulatory compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and quality control

Lesson 15

4.4 Given a scenario, use application security best practices while
participating in the Software Development Life Cycle (SDLC).

  • Best practices during software development frameworks
  • Secure coding best practices

Lesson 4

1.4 Explain the purpose of practices used to secure a corporate environment.

  • Penetration testing
  • Reverse engineering
  •  Software/malware
  • Training and exercises
  • Risk evaluation

Lesson 6

2.2 Given a scenario, analyze the output resulting from a vulnerability scan.

  • Analyze reports from a vulnerability scan
  • Validate results and correlate other data points

Lesson 8

3.0 Cyber Incident Response

3.1 Given a scenario, distinguish threat data or behaviour to determine the impact of an incident.

  • Threat classification
  • Factors contributing to incident severity and prioritization

Lesson 10

3.3 Explain the importance of communication during the
incident response process.

  • Stakeholders
  • Purpose of communication processes
  • Role-based responsibilities

Lesson 12

3.5 Summarize the incident recovery and post-incident response process.

  • Containment techniques
  • Eradication techniques
  • Validation
  • Corrective actions
  • Incident summary report

Lesson 14

4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.

  • Security issues associated with context-based
    authentication
  • Security issues associated with identities
  • Security issues associated with identity repositories
  • Security issues associated with the federation and single sign-on
  • Exploits

Lesson 16

4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.

  • Security data analytics
  • Manual review

Lesson 17

4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. (**The intent of this objective is NOT to test specific vendor feature sets.)

  • Preventative
  • Collective
  • Vulnerability scanning
  • Analytical
  • Exploit
  • Forensics

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

CompTIA Advanced Security Practitioner

CompTIA Advanced Security Practitioner

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Supporting IT Governance & Risk Management

  • Identify the Importance of IT Governance & Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Lesson 2

Leveraging Collaboration to Support Security

  • Facilitate Collaboration across Business Units
  • Secure Communications & Collaboration Solutions

Lesson 3

Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Their Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

Lesson 5

Implementing Cryptographic Techniques

  • Select Cryptographic Techniques
  • Implement Cryptography

Lesson 7

Implementing Security Controls for Mobile Devices

  • Implement Mobile Device Management
  • Address Security & Privacy Concerns for Mobile Devices

Lesson 9

Implementing Security in the Systems & Software Development Lifecycle

  • Implement Security throughout the Technology Lifecycle
  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

Lesson 11

Conducting Security Assessments

  • Select Security Assessment Methods
  • Perform Security Assessments with Appropriate Tools

Lesson 4

Integrating Advanced Authentication and Authorization Techniques

  • Implement Authentication & Authorization Technologies
  • Implement Advanced Identity & Access Management

Lesson 6

Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Protect Boot Loaders

Lesson 8

Implementing Network Security

  • Plan Deployment of Network Security Components & Devices
  • Plan Deployment of Network-Enabled Devices
  • Implement Advanced Network Design
  • Implement Network Security Controls

Lesson 10

Integrating Assets in a Secure Enterprise Architecture

  • Integrate Standards & Best Practices in Enterprise Security
  • Select Technical Deployment Models
  • Integrate Cloud-Augmented Security Services
  • Secure the Design of the Enterprise Infrastructure
  • Integrate Data Security in the Enterprise Architecture
  • Integrate Enterprise Applications in a Secure Architecture

Lesson 12

Responding to and Recovering from Incidents

  • Prepare for Incident Response & Forensic Investigations
  • Conduct Incident Response & Forensic Analysis

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.