

CompTIA Computer Technician Specialist with Practice Labs & Exams
WE-IT-721
This CompTIA Computer Technician training program is for anyone who wants to learn how necessary information technology (IT) skills are for a career as a network professional or security professional. So, even if you have zero experience in IT, you can create career opportunities for yourself in this field.
Through this interactive program, you’ll learn how to:
• Identify basic elements of PC Hardware and its configurations
• Troubleshoot hardware, which also includes mobile devices, networking, and printers
• Install and configure operating systems and software
• Apply the principles of networking, which include IP Addressing, Troubleshooting, Subnetting,Topology, Backbones, Segments, and Selection
• Install and configure various network types
• Identify hardware, software, and troubleshooting tools
This CompTIA Computer Technician training program features a plethora of multi-media presentations to help make the learning process more engaging and informative. Thus, after you complete the program and secure a CompTIA A+ certification, you can expect to secure employment positions in the following areas:
• Network technologies
• Media and topologies
• Installation and configuration
• Security
• Management
Countless companies are looking for IT professionals that are familiar with CompTIA standards. This means that there are countless career opportunities for you. Thus, this program will help you get closer to securing those opportunities for yourself.
12 months
630
English
Required: None.
Recommended: Some previous experience or training in computer fundamentals.
CompTIA A+ - 1001
Module 1: Internal hardware
• Configuring BIOS
• Motherboards, expansion slots, RAM types and features
• Iinstall and configure PC expansion cards, install and configure storage devices
• CPU's and cooling methods, PC connection interfaces, power supplies, custom computer specifications
Module 2: External hardware
• Installing displays, PC connectors
• Installing peripherals, installing multifunction devices and SOHO networks
• Printer technologies, printer maintenance
Module 3: Network hardware
• Intro to networking, properties and characteristics of TCP/IP, TCP vs. UDP
• Wi-Fi networking standards and encryption types
• Install and configure SOHO wireless/wired router, architecture and internet connection types, networking tools
Module 4: Laptops and Mobile Devices
• Laptop hardware components
• Mobile devices, mobile device ports and accessories
Module 5: Troubleshooting
• Troubleshooting theory
• Troubleshooting RAID arrays, hard drives, video, network issues, and printers
CompTIA A+ - 1002:
Module 1: Windows Operating Systems
• Command line tools
• Microsoft operating system features and tools, control panel utilities
• Windows networking on client desktops, preventative maintenance
Module 2: Features and Functionality of the Mac OS and Linux Operating Systems
Module 3: Client-Side Virtualization
Module 4: Cloud-based Concepts
Module 5: Network Host Properties
Module 6: Mobile Devices
• Mobile operating systems
• Mobile device network and E-mail
• Mobile security and prevention methods
Module 7: Windows Security
• Settings, security best practices, securing mobile devices
Module 8: Troubleshooting
• Common PC tools, common PC security issues
• Common mobile operating systems, common safety practices
• Maintenance tools and techniques
Module 9: Privacy and Licensing Concepts
CompTIA Network+
Module 1
Networking Concepts
• Introduction to Networks
• Physical Network Topologies
• Topology Selection, Backbones, and Segments
• Open Systems Interconnection Specifications
• Internetworking Models
• OSI Reference Model
• Introduction to Encapsulation
• Modulation Techniques
Module 2
Networking Topologies and Ethernet Specifications
• Physical Media
• Cable Properties
• Wiring Standards
• Installing Wiring Distributions
• Network Basics
• Ethernet Basics
• Ethernet at the Data Link Layer
• Ethernet at the Physical Layer
• Ethernet over Other Standards
Module 3
Networking Devices and Internet Protocol
• Common Network Connectivity Devices
• Specialized Devices
• Planning and Implementing a Basic SOHO Network
• Switches and Bridges at the Data Link Layer
• Hubs at the Physical Layer
• Environmental Considerations
• Introducing TCP/IP
• TCP/IP and the DoD Model
• The Host-to-Host Layer Protocols
• The Internet Layer Protocols
• Data Encapsulation
Module 4
IP Addressing, Subnetting and Troubleshooting
• IP Terminology
• The Hierarchical IP Addressing Scheme
• IPv4 Address Types
• Internet Addressing
• Internet Protocol Version 6 (IPv6)
• Subnetting Basics
• Troubleshooting IP Addressing
• Introduction to Network Address Translation (NAT)
• How NAT Works
Module 5
IP Routing and Routing Protocols
• Routing Basics
• The IP Routing Process
• Testing Your IP Routing Understanding
• Static and Dynamic Routing
• Routing Protocol Basics
• Distance Vector Routing Protocols
• Link State Routing Protocols
• High Availability
• Hot Standby Router Protocol (HSRP)
• IPv6 Routing Protocols
Module 6
Virtual LANs and Wireless Networking
• Networking Before Layer 2 Switching
• Switching Services
• Spanning Tree Protocol
• Virtual LANs
• VLAN Trunking Protocol
• Introduction to Wireless Technology
• The 802.11 Standards
• Comparing 802.11 Standards
• Wireless Network Components
• Installing a Wireless Network
Module 7
Authentication and Network Threats
• Security Filtering
• Managing User Account and Password Security
• Single Sign-On
• Multifactor Authentication
• User-Authentication Methods
• Recognizing Security Threats
• Vulnerabilities
• Understanding Mitigation Techniques
• Policies and Procedures
• Anti-Malware Software
Module 8
Physical Security and Wide Area Networks
• Using Hardware and Software Security Devices
• Defining Firewalls
• Firewall Technologies
• Firewalls at the Application Layer vs the Network Layer
• Scanning Services
• Intrusion Detection
• VPN Concentrators
• What’s a WAN?
• T-Series Connections
• Transmission Media
Module 9
Troubleshooting Tools, Software and Hardware
• Protocol Analyzers
• Throughput Testers
• Connectivity Software
• Using the Address Resolution Protocol
• Understanding Network Scanners
• Port Scanners
• Wi-Fi Analyzer
• Baseline
• Network Monitoring and Logging
• Identifying Hardware Tools
Module 10
Network Troubleshooting, Management and Monitoring
• Narrowing Down the Problems
• Troubleshooting Steps
• Troubleshooting Tips
• Establish a Theory
• Software Configuration
• Viruses
• Managing Network Documentation
• Network Monitoring
• Network Optimization
CompTIA Security+
Module 1
Risk, Monitoring, and Diagnosing Networks
• Risk Related Concepts
• Control Types
• False Positives and Negatives
• Risk Management
• Implementing Policies
• Understanding Control Types
• Alarms
• Alerts
• Trends
• Security Posture
Module 2
Devices, Infrastructure, and Access Control
• Mastering TCP/IP
• OSI Resilience
• Working with TCP/IP Suite
• IPv4 and IPv5
• Encapsulation
• Protocols and Services
• Securing Workstations
• Access Control Basics
• Identity Management
• Network Access Control
Module 3
Protecting the Wireless Networks and Securing the Cloud
• Wireless Systems
• Lightweight Extensible Authentication Protocol
• Wireless Attacks
• Access Points
• Classifying Information
• Private Cloud
• Security and the Cloud
• Host Availability
• Sandboxing
• Cloud Storage
Module 4
Host, Data, Cryptography and Application Security
• Application Hardening
• Fuzzing
• Secure Coding
• Host Security
• Database Technologies
• Cryptography Overview
• Modern Cryptography
• Rainbow Tables and Salt
• Key Stretching
• Wi-Fi Encryption
Module 5
Malware, Vulnerabilities, Social Engineering and Threats
• Understanding Malware
• Surviving Viruses
• Types of Viruses
• Spoofing Attacks
• Understanding Social Engineering
• Types of Social Engineering Attacks
• What Motivates an Attack?
• The Principles Behind Social Engineering
• Social Engineering Attack Examples
• Understanding Physical Security
Module 6
Security Administration and Disaster Recovery
• Understanding Physical Security
• Third-Party Integration
• Transitioning
• Understanding Business Continuity
• Impact Analysis
• The Health Insurance Portability and Accountability Act
• The Gramm-Leach-Bliley Act
• The Computer Fraud and Abuse Act
• Penetration Testing
• Vulnerability Scanning
In today’s world of complex IT systems and technologies it is essential that IT professionals and those new to IT are able to demonstrate how to use and understand vendor products and software. This complete training program is ideal for those individuals who are seeking the necessary knowledge and skills to pursue a career as a security professional or network professional. This program does not require any previous experience in information technology.
CompTIA A+ 220-1001 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.
CompTIA A+ 220-1002 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.
CompTIA Network+ covers the configuration, management, and troubleshooting of common wired and wireless network devices. Also included are emerging technologies such as unified communications, mobile, cloud, and virtualization technologies.
CompTIA Security+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.
Though this program is a self-paced program it is supported by an educational mentor. Educational mentors are subject matter experts who have years of experience in their field as well as the necessary educational training and credentials to work as an expert. The mentor is available to answer any questions a learner may have including questions on course content, course material, certifications, and even industry questions. Mentors also monitor the progress of learners to ensure training retention and program advancement. In eLearning, motivation is a key tool to success. Because of this, mentors provide encouraging comments, feedback, and coaching to motivate learners throughout the duration of the program to support completion and success!
All required reference materials are provided with this program. Technical requirements:
Internet Connection
• Broadband or High-Speed (DSL, Cable, Wireless)
Hardware Requirements
• Processor - 2GHz Processor or Higher
• Memory - 1 GB RAM Minimum Recommended
Software Requirements
• Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher
• Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
• Internet Browsers - Google Chrome is highly recommended
• Cookies MUST be enabled
• Pop-ups MUST be allowed (Pop-up Blocker disabled)
• Adobe PDF Reader
No customer reviews for the moment.