Get $1 credit for every $25 spent!

Ultimate CompTIA+ Lifetime Certification Bundle

Ending In:
Add to Cart - $49
Add to Cart ($49)
$2,530.72
98% off
wishlist
(411)
Courses
8
Enrolled
4,101

What's Included

Product Details

CompTIA A+ Study Guide

Prepare to Pass the Leading IT Professional Certification Exam

By iCollege | in Online Courses

The CompTIA A+ certification is the leader in professional IT certifications, and can open up a ton of career doors. These two courses will prepare you to pass the CompTIA A+ 220-901 and 220-902 certification exams. These exams focus on the fundamentals of computer technology, hardware, installing and configuring operating systems, and much more. With the materials contained in these courses, you'll be on the fast track to pass your CompTIA A+ certification with flying colors.
  • Access prep materials for both the CompTIA A+ 220-901 & 220-902 certification exams
  • Understand PC hardware, including motherboards, processors, memory & more
  • Study expansion cards, display devices, peripherals & custom configurations
  • Master networking, networking hardware & Internet Protocol
  • Learn how to install & configure operating systems
  • Discover operating tools, preventive maintenance, security, virtualization & more
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Domain 1.0 - PC Hardware
    • PC Hardware Overview
    • Computers Tour
    • In-House Computer
    • HP PC Computer
    • Dell PC Computer
    • Computer Cases
    • Kit Computer Case
    • In-House Case
    • HP PC Case
    • Dell PC Case
  • Domain 1.2 - Motherboard
    • Motherboard Overview
    • Motherboard Sizes
    • Expansion Slots
    • Peripheral Component Interconnect (PCI) Slots
    • RAM Slots
    • CPU Sockets
    • Legacy Chipsets
    • Newer Chipsets
    • Legacy MB Comparison
    • Motherboard Chipsets Demo
    • Jumpers
    • Switches
    • Connectors
    • Bus Speeds
    • Kit Computer Connectors
    • In-House Connectors
    • HP PC Connectors
    • Dell PC Connectors
    • Motherboard Review
  • Domain 1.6 - Processor
    • Central Processing Unit (CPU)
    • Socket Types
    • Pin Grid Array (PGA)
    • Land Grid Array (LGA)
    • AMD Processors
    • CPU Characteristics
    • Speeds, Cores and Cache
    • Hyperthreading and Virtualization
    • CPU Architecture
    • CPU Cooling
    • Kit Computer Processor
    • In-House Processor
    • HP PC Processor
    • Dell PC Processor
    • Processor Review
  • Domain 1.3 - Memory
    • Random Access Memory (RAM)
    • Memory Packages
    • Synchronous Dynamic (SDRAM)
    • Dual Inline Memory Module (DIMM)
    • Rambus DRAM
    • Read Only Memory (ROM)
    • Cache Memory
    • Page File
    • RAM Features
    • RAM Configurations
    • Registered Memory
    • RAM Types
    • Double Data Rate (DDR)
    • Compatibility and Speed
    • RAM Demonstration
    • Memory Review
  • Domain 1.8 - Power
    • Install a Power Supply
    • Power Connectors
    • Specifications
    • Calculate Power Needs
    • Online Power Usage Calculator
    • Power Supply Demo
    • Kit Computer Assembly
    • In-House Assembly
    • HP PC Assembly
    • Dell PC Assembly
    • Power Supply Review
  • Domain 1.1 - BIOS
    • Configure BIOS Settings
    • Basic Input/Output System
    • Power On Self Test (POST)
    • Complementary Metal Oxide Semiconductor (CMOS)
    • Components Managed
    • Configurations
    • Security
    • Diagnostics
    • Monitoring
    • Firmware Upgrades
    • Change BIOS Settings
    • Flash BIOS Demonstration
    • BIOS Review
  • Domain 1.7 - Connectors
    • Connection Interfaces
    • Universal Serial Bus (USB)
    • IEEE 1394 (Firewire)
    • Integrated Drive Electronics (IDE)
    • Serial ATA (SATA)
    • eSATA
    • Floppy Disk
    • Small Computer System Interface (SCSI)
    • Serial
    • Parallel
    • Video Graphics Array (VGA)
    • Digital Visual Interface (DVI)
    • High-Definition Multimedia Interface (HDMI)
    • Audio
    • RJ-45 Ethernet
    • RJ-11 Telephone
    • Bluetooth
    • IR Infrared
    • RF Wireless
    • DisplayPort
    • IBM Personal System/2 (PS/2)
    • RCA Phono Connector
    • Bayonet Neill-Concelman (BNC)
    • Composite Video
    • Component Video
    • Separate Video (S-Video)
    • Connectors Review
  • Domain 1.5 - Storage
    • Storage Devices and Media
    • Optical Drives
    • Hard Drives
    • Advanced Technology Attachment (ATA)
    • UltraDMA
    • Serial ATA (SATA)
    • SCSI Storage
    • Solid State Drives
    • Flash Memory
    • Memory Cards
    • USB Flash Drives
    • Floppy Drive
    • Tape Drive
    • Redundant Array of Independent Disks (RAID)
    • RAID-0 Disk Striping
    • RAID-1 Disk Mirroring
    • RAID-5 Striping and Parity
    • RAID-10 Striping Mirrored
    • RAID Review
    • RAID Demo
    • Connections
    • eSATA
    • SCSI
    • USB
    • Other
    • Memory Card Reader
    • USB Flash Drives Demo
    • IDE Cable Demo
    • ATAPI5/UDMA4 Demo
    • SATA Connect
    • SCSI Connect
    • USB Connect
    • Storage Review
  • Domain 1.4 - Expansion Cards
    • Install and Configure
    • Video Cards
    • Network Cards
    • External Connectors
    • Storage Cards
    • Legacy Communications
    • Wireless Cards
    • Sound Card Install
    • Video Card Install
    • Accelerated Graphics Port (AGP) Card Install
    • PCI Express Card Install
    • PCI Card Install
    • Network Connectors
    • Expansion Review
  • Domain 1.10 - Display Devices
    • Display Types
    • Cathode Ray Tube (CRT)
    • Liquid Crystal Display (LCD)
    • Other Flat Panels
    • Projectors
    • Refresh Rates
    • Resolution
    • Video Standards
    • VGA Analog
    • Interlaced Video
    • Brightness and Contrast
    • Analog vs. Digital
    • Privacy Issues
    • Multiple Monitors
    • CRT Display Demo
    • LCD Monitor Demo
    • Projector Demo
    • Display Review
  • Domain 1.12 - Peripherals
    • Install and Configure
    • Input Devices
    • Multimedia Devices
    • Output Devices
    • Other Devices
    • Keyboard/KVM
    • Audio Devices
    • Gamepad
    • Camera
    • MIDI Keyboard
    • Wireless
    • Peripherals Review
  • Domain 1.9 - Custom Configurations
    • Select Components
    • Design Workstation
    • Editing Workstation
    • Virtualization
    • Gaming PC
    • Home Theater
    • Thick/Thin Client
    • Home Server
    • Custom Configuration Example
    • Custom Configuration Review
    • Hardware Review
  • Domain 2.0 - Networking
    • Networking Overview
    • Identify Network Cables and Connectors
    • Fiber Connectors
    • Twisted Pair
    • Coaxial
    • Characteristics of Connectors and Cabling
    • Fiber Cable
    • Unshielded Twisted Pair
    • UTP Categories
    • Shielded Twisted Pair
    • Cable Types
  • Domain 2.3 - Internet Protocol Suite
    • Transmission Control Protocol and Internet Protocol (TCP/IP)
    • Binary Numbering
    • IP Addressing
    • Address Classes
    • Public vs. Private
    • Network Address Translation
    • IP Address Properties
    • Dynamic Host Configuration Protocol
    • Automatic Private IP Address
    • Client Side Services
    • Client IP Configuration
    • Windows XP Client IP
    • Common TCP and UDP Ports and Protocols
    • TCP Ports
    • Protocols
    • TCP vs. UDP
    • Wireless Networking Standards and Encryption
    • 802.11 Standard
    • Authentication and Encryption
  • Domain 2.6 - Networking Hardware
    • Wireless/Wired Router
    • Router Settings
    • Security Settings
    • QoS and Firewall
    • Port Forwarding
    • Demilitarized Zone
    • Install SOHO Router
    • Compare Internet Connection Types
    • Wired Connections
    • Wireless Connections
    • Identify Types of Networks
    • Network Topologies
    • Compare Network Devices
    • Use Appropriate Networking Tools
    • Networking Tools
    • Networking Review
  • Domain 3.0 - Laptops
    • Laptops Overview
    • Dell Laptop Tour
    • Acer Laptop Tour
    • Install Hardware and Components
    • Expansion Options
    • Device Replacement
    • Laptop Display Components
    • Compare Laptop Features
    • Function Keys
    • Docking Station vs. Port Replicator
    • Physical Lock
    • Disassemble and Reassemble
    • Device Replacement Demo
    • Laptop Disassembly
    • Laptop Display
    • Laptop Base
    • Laptop Reassembly
    • Final Assembly
    • Laptops Review
  • Domain 4.0 - Printers
    • Printers Overview
    • Printer Types and Imaging Processes
    • Laser Printer Parts
    • Laser Imaging Process
    • Inkjet Printers
    • Thermal Printers
    • Impact Printers
    • Install and Configure Printers
    • Wired Printer
    • Wireless Printer
    • Print Server
    • Network Printer Demo
    • Perform Printer Maintenance
    • Laser Maintenance
    • Thermal Maintenance
    • Impact Maintenance
    • Printers Review
  • Domain 5.0 - Operational Procedures
    • Operational Procedures Overview
    • Use Appropriate Safety Procedures
    • Personal Safety
    • Regulatory Compliance
    • Environmental Impacts and Controls
    • Environmental Hazards
    • Power Regulation
    • Environmental Maintenance
    • Communication Skills
    • Professional Courtesy
    • Difficult Customer or Situation
    • Meeting Expectations
    • Confidential Materials
    • Prohibited Content and Activity
    • Use of Documentation
    • Operational Procedures Review
    • Course Review
  • CompTIA A+ 220-802 Course Outline
    • Introduction
    • Objectives
  • Domain 1.0 - Operating Systems
    • Features and Requirements
    • Windows XP
    • Windows Vista
    • Windows 7
    • 32 vs. 64 bit
    • Features
    • Aero
    • Sidebar
    • User Account Control
    • Bit-locker
    • Shadow Copy
    • System Restore
    • Ready Boost
    • Compatibility Mode
    • XP Mode
    • Easy Transfer
    • Administrative Tools
    • Defender and Security Essentials
    • More Features
    • File Structure and Paths
    • Category vs. Classic
    • Upgrade Paths
    • Compatibility Tool and Upgrade Advisor
  • Domain 1.2 - Install and Configure
    • Boot Methods
    • Types of Installation
    • Upgrade Installation
    • Upgrade Windows Vista
    • Clean Installation
    • Install Windows XP
    • Install Windows Vista/7
    • Windows XP Repair Installation
    • Windows 7 Repair Installation
    • Clean Wipe Drive C:
    • Multi-boot Installation
    • Remote Network Installation
    • Partitioning
    • File System Types
    • Disk and Partition Demo
    • Load Alternate Drivers
    • Workgroup vs. Domain
    • Installation Settings
    • Drivers and Software
    • Recovery Partition
  • Domain 1.3 - Command Line Tools
    • Networking Tools
    • Networking Tools Demo
    • Operating System Tools
    • OS Tools Demo
    • Recovery Console Tools
    • RC Tools Demo
  • Domain 1.4 - Features and Tools
    • Features and Tools
    • Event Viewer Demo
    • Shared Folders
    • Device Manager
    • Local Users and Groups
    • Local Security Policy
    • Monitoring Tools
    • Services
    • Task Scheduler
    • Administrative Tools
    • Windows Firewall
    • MSCONFIG
    • Task Manager
    • Disk Management
    • Partitioning
    • Disk Management Demo
    • Migration Tools
    • Run Line Utilities
  • Domain 1.5 - Control Panel
    • Control Panel Utilities
    • Internet Options
    • Display
    • User Accounts
    • Folder Options
    • System Properties
    • Security Center
    • Power Options
    • Add/Remove Programs
    • Network Connections
    • Printers and Faxes
    • Automatic Updates
    • Tablet PC Settings
    • Pen and Input Devices
    • Offline Files
    • Problem Reports and Solutions
    • Vista Printers
    • HomeGroup
    • Action Center
    • Remote and Desktop Apps
    • Troubleshooting in Action Center
  • Domain 1.6 - Networking
    • Workgroup vs. Domain
    • Shares and Mapping
    • Establish Network Connections
    • Proxy Settings
    • Network Settings
    • Firewall Settings
    • Configuring Alternate IP Address
    • Network Card Properties
  • Domain 1.7 - Preventative Maintenance
    • Best Practices
    • Scheduled Backups
    • Maintenance Tools
    • Defragmentation
    • Patch Management
    • Driver Updates
    • Firmware Updates
    • Antivirus Updates
    • System Restore
    • Recovery Image
  • Domain 1.8 - Security Settings
    • Users and Groups - Administrator
    • NTFS Permissions
    • File Attributes
    • Shared Files and Folders
    • Permission Propagation
    • System Files and Folders
    • User Authentication
  • Domain 1.9 - Virtualization
    • Virtual Machines
    • XP Mode Demo
    • Hyper-V Manager
    • Domain Review
    • Domain 2.0 - Security
    • Objectives
    • Physical Security
    • Digital Security
    • Prevention Methods (2.1)
    • Security Threats (2.2)
    • Secure a Workstation (2.3)
    • Best Practices
    • Data Disposal (2.4)
    • Wireless Network (2.5)
    • Wired Network (2.6)
    • Security Review
  • Domain 3.0 - Mobile Devices
    • Objectives
    • Basic Features (3.1)
    • Downloading Apps
    • Connectivity and Email (3.2)
    • Wireless and Email
    • Security (3.3)
    • Using a Passcode
    • Hardware (3.4)
    • Android Features
    • iOS Features
    • Synchronization (3.5)
    • Synchronize an iPad
    • Mobile Devices Review
  • Domain 4.0 - Troubleshooting
    • Objectives
    • Troubleshooting Theory (4.1)
    • Motherboard, RAM, CPU, Power (4.2)
    • Common Symptoms
    • Hard Drives and RAID Arrays (4.3)
    • Common Symptoms
    • Video and Display (4.4)
    • Wired and Wireless Networks (4.5)
    • Common Symptoms
    • Operating System (4.6)
    • Common Symptoms
    • Security (4.7)
    • Anti-Malware Software
    • Laptops (4.8)
    • Proper Disassembly
    • Printers (4.9)
    • Final Review

View Full Curriculum


CompTIA Security+ Study Guide

Use These Materials to Pass CompTIA's Security+ Certification

By iCollege | in Online Courses

CompTIA's Security+ certification is a top validation for security professionals working in the IT industry. This certification confirms a technician's critical knowledge of communication and infrastructure security, cryptography, operational security and more. With the materials contained in this course, you'll be on the fast track to pass your CompTIA Security+ certification.
  • Access prep materials for the CompTIA Security+ certification exam
  • Understand risk concepts & mitigation
  • Study incident response, security training, business continuity & more
  • Master environmental controls & disaster recovery
  • Learn Confidentiality, Integrity & Availability (CIA)
  • Install Virtual PC & Active Directory Domain Services
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Domain 1.0 - Network Security
    • Network Devices
    • Test Questions
    • Secure Network Administration
    • Secure Network Design Elements
    • Secure and Insecure Network Protocols
    • Network Ports
    • Secure Wireless
    • Domain Review
    • 1.2 Test Prep Questions
    • 1.3 Test Prep Questions
    • 1.4 Test Prep Questions
    • 1.5 Test Prep Questions
    • 1.6 Test Prep Questions
    • Review Quiz
  • Domain 2.0 - Compliance and Operational Security
    • Risk Concepts
    • Risk Mitigation
    • Incident Response
    • Security Training
    • Business Continuity
    • Environmental Controls
    • Disaster Recovery
    • Confidentiality, Integrity and Availability (CIA)
    • Domain Review
    • Installing Virtual PC and Active Directory Domain Services
    • Windows Server Backup
    • 2.1 Test Prep Questions
    • 2.2 Test Prep Questions
    • 2.3 Test Prep Questions
    • 2.4 Test Prep Questions
    • 2.5 Test Prep Questions
    • 2.6 Test Prep Questions
    • 2.7 Test Prep Questions
    • 2.8 Test Prep Questions
    • Review Quiz
  • Domain 3.0 - Threats and Vulnerabilities
    • Malware Types
    • Attack Types
    • Social Engineering Attacks
    • Wireless Attacks
    • Application Attacks
    • Attack Mitigation and Deterrence
    • Attack Assessment Tools
    • Penetration Testing vs. Vulnerability Assessment
    • Domain Review
    • Threats and Vulnerability Exercises
    • Auditing
    • Browser Security
    • Personal Firewall
    • Windows Software Update Services
    • Password Crackers
    • WinPatrol
    • Deep Freeze
    • Exercises Review
    • Module Review
    • 3.1 Test Prep Questions
    • 3.2 Test Prep Questions
    • 3.3 Test Prep Questions
    • Review Quiz
  • Domain 4.0 - Application, Data and Host Security
    • Application Security
    • Host Security
    • Data Security
    • Domain Review
    • Vulnerabilities Exercises
    • Anti-Malware
    • Malicious Software Removal Tool
    • Identifying Vulnerabilities
    • Security Templates
    • Exercises Review
    • 4.1 Test Prep Questions
    • 4.2 Test Prep Questions
    • Review Quiz
  • Domain 5.0 - Access Control and Identity Management
    • Functions of Authentication Services
    • Authentication, Authorization, and Access Control
    • Account Management
    • Domain Review
    • Access Control and Identity Management Exercises
    • Creating a Workstation
    • Creating an OU and Delegating Control
    • Disabling an Account
    • Setting Workstation Restrictions
    • Exercises Review
    • 5.1 Test Prep Questions
    • 5.2 Test Prep Questions
    • 5.3 Test Prep Questions
    • Review Quiz
  • Domain 6.0 - Cryptography
    • Cryptography Concepts
    • Cryptography Tools, Products, and Algorithms
    • Public Key Infrastructure
    • Certificate Services, Servers and Requests
    • Use Steganography Software
    • Domain Review
    • 6.1 Test Prep Questions
    • 6.2 Test Prep Questions
    • 6.3 Test Prep Questions
    • Review Quiz

View Full Curriculum


CompTIA Network+ Study Guide

Study for A Top Network Administration Certification with These Comprehensive Materials

By iCollege | in Online Courses

CompTIA's Network+ is a top certification that validates technical competency in networking administration and support. The certification confirms a technician's critical knowledge of media and topologies, protocols and standards, and network implementation and support. Obtaining this certification will make you eligible for many network administration jobs and put you on the path of a well-paid career in IT.
  • Access prep materials for the CompTIA Network+ certification exam
  • Understand key network principles & topologies
  • Study OSI Models & functions
  • Master networking hardware, physical media, ethernet & more
  • Learn Internet Protocol & TCP/IP
  • Discover IP addressing principles
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Module 1

    • Course Introduction
    • Introduction to Networks Overview
    • What is a Network?
    • Peer to Peer Networking
    • Client Server Networks
    • Physical Topologies
    • Physical Bus Topologies
    • Physical Star Topologies
    • Physical Ring Topologies
    • Physical Mesh Topologies
    • Point to Point Topologies
    • Hybrid Topologies
    • Backbones and Segments
  • Module 2

    • OSI Model Overview
    • Internetworking Models
    • Advantages of Reference Models
    • OSI Model and Layer Functions
    • TCP Reliability
    • TCP Flow Control and Packet Acknowledgement
    • Routing at Layer 3
    • Data Encapsulation
    • Multiplexing
    • Numbering Systems
    • Base and Broad Band
    • Bit Rate and Baud Rate
    • Wavelength
  • Module 3

    • Media Cables and Connectors Overview
    • Physical Media
    • Coax Media Cables and Connectors
    • Twisted-Pair Media Cables and Connectors
    • Fiber Optic Media Cables and Connectors
    • UTP and BNC Couplers
    • Broadband Over Power Lines
    • Serial and USB Connectors
    • Cable Properties
    • Wiring Standards
    • T1 Crossover Cable
    • Wiring Distribution Installation
    • Troubleshooting Wiring
  • Module 4

    • Ethernet Standards and Properties Overview
    • Collision and Broadcast Domains
    • Carrier Sense Multiple Access/Collision Detection
    • Duplex Ethernet
    • Binary to Decimal
    • Hex to Binary to Decimal
    • Ethernet Addressing
    • Ethernet Frames
    • IEEE Standards
    • 802.3 Standards
    • IEEE 1901-2013
  • Module 5

    • Network Devices Overview
    • Common Network Device
    • Hubs
    • Network Interface Cards
    • Network Bridges
    • Switches and Routers
    • Firewalls and Other Devices
    • Dynamic Host Configuration Protocol
    • Specialized Devices
    • Multilayer Switch and Domain Name Services
    • Proxy Servers
    • Encryption Devices
    • VPN Concentrator
    • Planning and Implementing a Network
  • Module 6

    • Internet Protocol Overview
    • What is TCP/IP?
    • DoD and OSI Model
    • TCP/IP Protocol Suite
    • TCP and UDP
    • Port Number Examples
    • IP Header
    • ICMP
    • ARP
    • Data Encapsulation and De-Encapsulation
    • Protocol Data Units
    • Port Numbers at the Transport Layer
  • Module 7

    • Internet Protocol Addressing Overview
    • Addressing Terminology
    • IP Addressing Hierarchical Scheme
    • Classful IP Addressing
    • Private IP Addressing
    • IP Addressing Terms
    • Internet Protocol Version 6
    • Auto Configuration EUI-64
    • Link Local and Global Addressing
    • Transition Mechanisms
    • Dynamic Host Configuration Protocol 6
  • Module 8

    • Subnetting Overview
    • Subnetting Basics
    • Creating a Subnet Portion
    • Determining Number of Computers Through Subnetting
    • Locating Network ID's
    • Determining Block Size or Interval
    • Classless Inter-Domain Routing
    • Troubleshooting IP Addresses
    • Command Line Tools
    • Network Address Translation
    • How NAT Works
  • Module 9

    • Routing Concepts Overview
    • IP Routing Basics
    • IP Routing Process
    • Static and Dynamic Routing
    • Additional Routing Terms
    • Default Routing
    • Gateway Redundancy
  • Module 10

    • Dynamic Routing Protocols Overview
    • Routing Protocol Basics
    • Administrative Distance
    • Routing Protocol Classes
    • Distance Vector Routing Protocols
    • Routing Information Protocol
    • Classful and Classless Networks
    • Discontiguous Network
    • EIGRP and BGP
    • RIP - OSF and IS-IS Protocols
    • IPv6 Routing Protocols
  • Module 11

    • Switching and VLAN Configuration Overview
    • Switching and Virtual LANs
    • Switching Services
    • Address Learning and Forward/Filter Decisions
    • Loop Avoidance
    • Spanning Tree Protocol
    • VLAN Broadcast Domains
    • Access and Trunk Links
    • VTP Modes of Operation and Configuration
    • Advanced Features of Switches
    • Switch Management
    • VLAN Switch Configuration Demonstration
  • Module 12

    • Wireless Technologies Overview
    • Wireless Technologies Basics
    • Wireless Agencies and Standards
    • Wireless Frequency Ranges
    • 802.11 Committees and Subcommittees
    • Wireless LAN Modulation Techniques
    • Wireless Access Points and NIC Cards
    • Wireless Network Types
    • Installing and Configuring Hardware
    • Wireless Security
    • Troubleshooting Issues
    • Environmental Factors
    • Rogue Access Point
  • Module 13

    • Network Hardening Techniques Overview
    • Access Control Lists
    • Tunneling Protocols
    • Encryption Standards
    • Remote Access
    • User Account and Resource Security
    • User Authentication Methods
    • Authentication - Authorization and Accounting
    • Secure and Unsecure Protocols
    • Access Control List Demonstration
  • Module 14

    • Network Security Vulnerabilities Overview
    • Denial of Service Attacks
    • Virus Attacks
    • Attackers and Their Tools
    • ARP Cache Poisoning and VLAN Hoping
    • Mitigation Techniques
    • Policies and Procedures
    • NSA Specifications
  • Module 15

    • Firewalls Overview
    • Firewalls Types
    • Firewall Technologies
    • Intrusion Detection and Prevention Systems
    • Vulnerability Scanning and VPN Concentrators
    • Device Security
    • Forward and Reverse Proxy Servers
    • Network Address Translation and Port Forwarding
    • Port Security Demonstration
  • Module 16

    • Wide Area Network Technologies Overview
    • Defining Wide Area Networks
    • WAN Connection Types
    • Dense and Course Wavelength Division Multiplexing
    • Passive Optical Network and SONET
    • Wireless Technologies
    • Broadband Services
    • WAN Protocols
    • Cellular WAN
    • Metro Ethernet
  • Module 17

    • Network Troubleshooting Overview
    • Protocol Analyzers
    • Network Scanners
    • Throughput Testers and Connectivity Software
    • Command Line Tool traceroute
    • ipconfig and ifconfig Utility
    • Ping and IPv6 Utility
    • Address Resolution Protocol
    • nslookup Utility
    • My traceroute Command
    • nbtstat and netstat Utility
    • File Transfer Protocol
    • Telnet Utility
    • Command Line Tool Guidelines
    • Windows Command Line Tools Demonstration
  • Module 18

    • Network Management Hardware Tools Overview
    • Hardware Tools Overview
  • Module 19

    • Troubleshooting Methodologies Overview
    • Troubleshooting Approaches
    • Narrowing Down the Problem
    • Troubleshooting Steps
    • Troubleshooting Tips
  • Module 20

    • Network Monitoring Tools Overview
    • Simple Network Management Protocol
    • Schematics and Diagrams
    • Policies - Procedures and Regulations
    • Network Performance Monitoring
    • Metrics - Reporting Terms and Interface Monitoring
    • Configuration Management
    • Virtual Networking
    • Storage Area Network
    • Cloud Architectures
    • Protocol Analyzer Demonstration
  • Module 21

    • Troubleshooting Wide Area Networks Overview
    • Local and Wide Area Networks
    • Wireless Local Area Network
    • Personal Area Network
    • SCADA and ICS
    • Medianets
    • WAN Connection Issues
    • Customer Equipment
    • Company ISP Security Policies and Satellite Issues
  • Module 22

    • Physical Security Overview
    • SCADA Review
    • Network Segmentation
    • Additional Physical Security and Specific Dangers
    • Access Controls and Monitoring
    • Environmental Controls and Electrical Power
    • Access Control Authentication Types
    • Multiple Factor Authentication
  • Module 23

    • Network Access Control Overview
    • IEEE 802.1x
    • Network Access Control
    • Computer Forensics
    • Investigative Process
    • Free Space vs. Slack Space
    • Disaster Recovery
    • Business Impact Assessment
    • Backup Considerations
    • RAID Backup Solutions
    • Redundancy and Single Points of Failure
  • Module 24

    • Troubleshooting Security Overview
    • Firewall Security Issues
    • Avenues of Attack
    • Types of DDOS Attacks
    • IP Address Spoofing
    • Replay Attacks and TCP/IP Hijacking
    • Encryption Attacks
    • Address System and Password Attacks
    • Software Exploitation
    • Viruses and Malware
    • Anti Malware Software
    • Switch Port Security
  • Module 25

    • Voice Over IP Overview
    • VOIP
  • Module 26

    • Security Policies and Programs Overview
    • Security Programs
    • Security Policy Types
    • Security Policy Concepts
    • Human Resource Policies
    • Installation Safety Issues
  • Module 27

    • IT Distribution and Change Management Overview
    • IT Distribution Concepts and Procedures
    • Change Management

View Full Curriculum


CompTIA Cloud+ Study Guide

Strive Towards a Cloud Management Career with These Materials for the CompTIA Cloud+ Exam

By iCollege | in Online Courses

CompTIA's Cloud+ is a top certification that validates technical competency in methodology required to securely implement and maintain cloud technologies. The certification validates that an IT practitioner has the knowledge and best practices to work in cloud computing environments. Through these course materials, you'll get prepared to pass the CompTIA Cloud+ and be eligible for a wide range of high-paying IT positions..
  • Access prep materials for the CompTIA Cloud+ certification exam
  • Understand various Cloud models & their respective responsibilities
  • Study on & off premises hosting, Cloud terms & characteristics
  • Master Cloud bursting, storage concepts, storage systems & more
  • Learn Tiering, raid types, raid comparison & more
  • Discover network types, topologies & infrastructure
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Module 1

    • Concepts - Models and Terminology Overview
    • Cloud Service Models
    • Derivative Models
    • Service Model Responsibilities
    • Models and Their Consumers
    • Delivery Models
    • On and Off Premises Hosting
    • Orchestration Platform
    • Cloud Terms and Characteristics
    • Cloud Bursting
    • Storage Concepts
    • Disk Storage Systems Overview
  • Module 2

    • Disk Storage Systems Overview
    • Disk Types and Rotational Media
    • Drive Access Speed
    • Solid State Drives and Other Storage Options
    • Tiering
    • Raid Types
    • Raid Comparison
    • Storage Access File Systems
  • Module 3

    • Storage Networking Overview
    • Storage Technologies
    • Access Protocols and Applications
    • Fibre Channel Protocol (FCP)
    • Ethernet Protocol
    • IP and ISCSI
    • Storage Provisioning
    • Network Shares
    • Zoning
    • LUN Masking
    • Multipathing
  • Module 4

    • Network Infrastructure Overview
    • Network Types
    • Network Topologies
    • Network Bandwidth and Latency
    • Routing and Switching
    • Private IP Addressing
    • NAT and PAT
    • Subnetting and Supernetting
    • Routing Tables
    • VLANs
    • Network Protocols and Ports
    • Domain Name Service (DNS)
    • Dynamic Host Configuration Protocol (DHCP)
    • Simple Mail Transfer Protocol (SMTP)
    • Port Numbers to Know
  • Module 5

    • Virtualization Components Overview
    • Hypervisors
    • Virtualization Product Types
    • Virtualization Host
    • CPUs and Cores and Memory Allocation
    • Network Interface Cards
    • Host Maximums
    • Virtual Machine Components
    • Virtual Switches and Routers
    • Managing Memory
    • Virtual Machine Limits
    • Virtualized Storage
    • Guest Tools
  • Module 6

    • Virtualization and the Cloud Overview
    • Virtualization Benefits
    • VM Templates
    • Physical to Virtual Migration
    • V2V and V2P Migration
    • VM Cloning
    • Storage Migration
    • Migration Considerations
  • Module 7

    • Network Management Overview
    • SNMP Management Protocol
    • Syslog Management Protocol
    • WMI Management Protocol
    • WBEM Management Protocol
    • IPMI Management Protocol
    • Metrics
    • Remote Access Tools
  • Module 8

    • Performance Tuning Overview
    • Host Resource Allocation and Usage
    • VM Resource Usage Control
    • Physical Resource Redirection
    • Pools and Dynamic Allocation
    • Memory Performance Optimization
    • CPU Performance Optimization
    • Disk Performance Optimization
    • Disk Terminology
    • Disk Issues and Mitigation
    • Memory Issues and Mitigations
    • Network Issues and Mitigations
    • CPU Issues and Mitigations
    • Disk and Network Performance Concepts
    • Managing Virtual Machine Resources
  • Module 9

    • System Management Overview
    • Policies and Procedures
    • Change Management Process
    • Configuration Management
    • Configuration Management Benefits
    • Configuration Items Procedure
    • Capacity Management
    • Life Cycle Management
    • Life Cycle Management Best Practices
  • Module 10

    • Testing and Troubleshooting Overview
    • Configuration Testing Techniques
    • Security Testing Techniques
    • Roles and Responsibilities
    • Testing and Troubleshooting Tools-ping
    • Testing and Troubleshooting Tools-tracert
    • Testing and Troubleshooting Tools-ipconfig
    • Testing and Troubleshooting Tools-ifconfig
    • Testing and Troubleshooting Tools-nslookup
    • Testing and Troubleshooting Tools-netstat
    • Testing and Troubleshooting Tools-arp-a
    • Telnet
    • Documentation
  • Module 11

    • Security In the Cloud Overview
    • Network Security Best Practices
    • Network Attacks
    • Securing Storage
    • Rapid Deployment Dangers
    • Data Security
    • Digital Signatures
    • Ciphers
    • Encryption Protocols
    • Access Control Model
    • Multifactor Authentication
    • Single Sign On and Federation Based Single Sign On
    • Command Line Troubleshooting Tools
  • Module 12

    • Business In the Cloud Overview
    • Disaster Recovery Methods and Terms
    • Multisite Configurations
    • Backup and Recovery Full Backup
    • Backup and Recovery Differential Backup
    • Replication
    • Snapshots
    • Providing High Availability
    • Backup Data Using Snapshots Demonstration

View Full Curriculum


CompTIA Project+ Study Guide

Get Certified as a Project Manager With This Extensive Guide

By iCollege | in Online Courses

CompTIA's Security+ certification is a top validation for project managers. This certification confirms a project manager's critical knowledge of the entire project life cycle, from initiation and planning through execution, acceptance, support and closure. The Project+ certification confirms the necessary competencies for all project managers, particularly in the IT industry, and the materials within this course will help you earn that certification.
  • Access prep materials for the CompTIA Project+ certification exam
  • Determine feasibility & learn project scope management
  • Study processes of time management
  • Master processes of cost management & earned value management
  • Manage risk processes & sources
  • Learn essentials to project quality, resource, communications management & more
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Module 1: Definitions and Integration Management
    • Introduction to Project Management
    • Determine Feasibility
  • Module 2: Project Scope Management
    • Initiating Scope Plan
  • Module 3: Project Time Management
    • Processes of Time Management
  • Module 4: Project Cost Management
    • Processes of Cost Management
    • Earned Value Management
  • Module 5: Risk Management
    • Processes and Sources
  • Module 6: Project Quality Management
    • Processes of Quality Management
  • Module 7: Resource Management
    • Human Resources
  • Module 8: Communications Management
    • Processes of Communication Management
  • Module 9: Change Management
    • Planning Project Strategy
  • Module 10: Procurement and Contract Management
    • Procurements and Contracts
  • Module 11: The Close Out Plan
    • Plan to Close the Project
  • Module 12: Microsoft Project 2007
    • General Features
  • Module 13: Methodology
    • Project Templates

View Full Curriculum


CompTIA Linux+ Study Guide

Prep For a Career in Linux System Administration with This Comprehensive Course

By iCollege | in Online Courses

CompTIA's Linux+ is a top certification the knowledge of individuals with a minimum of six to twelve months of practical Linux experience. This course and study material includes expert instructor-led training modules with customized presentations, practice exam simulators and learning supplements so you can prepare for the Linux+ certification exam at your own pace. By course's end you'll have the knowledge and tools necessary to manage Linux systems from the command line.
  • Access prep materials for the CompTIA Linux+ certification exam
  • Understand key principles & Linux functions
  • Study user administration & group & profile management
  • Master working w/ files & MySQL
  • Learn scripting, shell scripting & I/O control statements in Linux
  • Discover networking w/ Linux
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Module 1: Getting Started with Linux
    • Module Overview
    • Linux and its History
    • Basic Commands
    • Documentation
    • Booting and Shutting Down
    • Module Review Module 2: Linux File System
    • Module Overview
    • File System Types
    • Partitioning
    • Navigation
    • Managing and Maintaining the File System
    • Module Review Module 3: Users and Groups
    • Module Overview
    • User Groups and Profiles
    • Managing User Accounts
    • Module Review Module 4: Working with Files
    • Module Overview
    • VI Editor
    • Locating Files
    • Links
    • Backup and Restore
    • MySQL
    • Permissions
    • Special Permissions
    • Module Review Module 5: Scripting
    • Module Overview
    • Shells
    • Customizing the Bash Shell
    • I/O and Control Statements
    • Module Review Module 6: Printing
    • Module Overview
    • Module Overview
    • Configuring local Printers and Printer File Commands
    • Print Jobs and Queues and Remote Printing
    • Module Review Module 7: Packages
    • Module Overview
    • Using RPM
    • Verifying Packages, Updating Packages and Repositories
    • YUM Commands and Install with YUM
    • Debian Package Manager
    • Source Files
    • Module Review Module 8: Networking
    • Module Overview
    • Connecting to a Network
    • Configuring Routes
    • Configuring DHCP
    • Configuring DNS
    • Implementing Network File Sharing Services
    • Configuring NIS
    • Managing Remote Network Servers
    • Configuring Web Servers
    • Implementing Apache Access Control
    • Implementing Access Control in a Proxy Server
    • Configuring E-mail Services
    • Module Review Module 9: Hardware
    • Module Overview
    • Common Hardware
    • Power Management
    • Removable Hardware
    • Mass Storage Devices
    • Logical Volumes
    • Disk Quotas
    • Module Review Module 10: Linux Kernel
    • Module Overview
    • Exploring the Linux Kernel and Customizing Kernel Modules
    • Creating an initrd Image
    • Managing Device Drivers
    • Monitoring Hardware Devices, Processes and Resources
    • Module Review Module 11: Processes
    • Module Overview
    • Jobs and Background Processes
    • Using Process Table
    • Delayed, Detached and Scheduled Jobs
    • System Time
    • Module Review Module 12: System Services
    • Module Overview
    • Configuring System Services
    • Monitoring System Logs
    • Configuring SELinux
    • Module Review Module 13: Securing Linux
    • Module Overview
    • Examining System Security
    • Securing User Accounts
    • Enabling Firewall Functionality and Implementing Security Auditing
    • Intrusion Detection
    • Module Review
    • Demonstration: Security Based Distributions Module 14: Pre-Installation Considerations and Installing
    • Module Overview
    • Preparing For Installation
    • Identifying Phases of the Linux Boot Sequence
    • Configuring GRUB
    • Install Overview
    • Installing SUSE
    • Installing Fedora
    • Installing CentOS
    • Installing Debian
    • Configuring the GUI and Performing Post-Installation Tasks
    • Module Review Module 15: Troubleshooting
    • Module Overview
    • Troubleshooting System-Based Issues and Hardware Issues
    • Troubleshooting Network Connection and Security Issues
    • Module Review
    • Course Review
    • Final Thoughts

View Full Curriculum


CompTIA Certified Healthcare IT Technician Exam Study Guide

The Demand for Healthcare IT Technicians is Growing, It's Time to Get Certified!

By iCollege | in Online Courses

CompTIA's Healthcare IT Technician certification ensures IT professionals have the knowledge and skills needed to successfully install, manage and troubleshoot IT systems in medical and clinical settings. This certification dives into the latest hospital-based IT systems and focuses on the medical jargon you'll be working with. Health IT professionals are growing in demand and salary, so the time to get certified is now.
  • Access prep materials for the CompTIA Healthcare IT Technician certification exam
  • Understand the basic types of healthcare facilities & respective IT needs
  • Study Hospital information systems & support flow
  • Master the regulatory requirements of hospitals & healthcare IT professionals
  • Learn organizational behaviors & standards in hospital working environments
  • Discover IT & medical business operations in the healthcare industry
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Module 1 - Introducing IT Healthcare
    • What is Healthcare IT Types of Healthcare Facilities Hospital Patient Flow Healthcare IT Goals Healthcare IT.gov Website Tour CompTIA Healthcare IT Technician Exam Introducing Data Flow in HIT
  • Module 2 -Support Flow
    • Getting To Know Information Systems Hospital Information System Primary Functions Master Patient Index Message Types and Interface Functions Admitted-Discharged-Transferred Messages Perioperative Information System Pharmacy Information System Radiology Information Systems Lab Information Systems Emergency Department Information Systems
  • Module 3 - Regulatory Requirements
    • Agencies Governing Healthcare Operating Divisions Of The HHS Centers for Medicare & Medicaid Services (CMS) Office of the National Coordinator (ONC) Office of Civil Rights and NIST Healthcare Programs and e-PHI Healthcare Laws HIPAA Controls-Compliance and Penalties Legal Best Practices and Documentation Health and Human Services Website (HHS.gov) Center for Medicare and Medicaid Services Website (CMS.gov) HIPAA Privacy and Security Rules
  • Module 4 - Organizational Behavior
    • Handling Protected Health Information (PHI) Physical and Technical Safeguards Applying Proper Communication Methods PBX and VoIP Infrastructure Technical Roles and Responsibilities Technical Roles and Responsibilities Role-Based Access and Exceptions Organizational Structures and Methods of Operation Private Practices and Other Facilities Executing Dailey Activities and IT Functions HIT Etiquette in the Hospital Room Consideration Requirements and Protections HealthIT.gov Privacy and Security Game
  • Module 5 - IT Operations
    • Internet and Intranet Concepts OSI Model and TCP/IP Transport and Network Layers Data Link and Physical Layers Wi-Fi Standards Network Servers and Single Sign On Cloud Computing and Virtualization Programming Languages WLAN Topologies Routing-Port Forwarding and DHCP Client IP Configuration Switches and Internet Modems Network Tools Healthcare Power Outlets EHR and EMR Information Systems Issues to Consider Backups Deploying Workstations OS Updates and Troubleshooting Devices Change Management Documentation Peripheral Devices and Removable Storage Troubleshooting Tools and Utilities Demonstration
  • Module 6 - Medical Business Operations
    • Medical Terms-Imaging and Testing Controlled Substance Schedules Trauma Center Qualifications Medical Imaging Terms and Testing Inpatient Medical Departments Outpatient Medical Departments Clinical Operations and Tools Medical Software Terms and Functions Imaging Formats and Standards Change Control and Support Requests System and Interface Messaging Typical Interface Issues Electronic Health Record Solutions Demonstration
  • Module 7 - HIT Security
    • Security Challenges Access Control and Permissions Physical Security and Device Location Physical Security Access Environmental Security Password Guidelines Encryption Types and Utilities Secure Communications Storage Encryption Goals Storage Types and Architectures Securing Wireless Networks Remote Access Options Backup Security PHI Disposal

View Full Curriculum


CompTIA Advanced Security Practitioner (CASP) Study Guide

After This Study Prep, You'll Be Ready to Ace One of the Top Security Certifications

By iCollege | in Online Courses

CompTIA's Advanced Security Practicioner (CASP) is a top certification that validates IT professionals with advanced-level security skills and knowledge. The certification covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Obtaining this certification will make you eligible for a range of high-level, high-paying IT jobs.
  • Access prep materials for the CASP certification exam
  • Understand business model strategies & associated risk management
  • Study advanced risk mitigation planning
  • Master security privacy policies, prodcedures & more
  • Learn advanced incident response & recovery procedures
  • Discover assessment tools & methods to serve businesses
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels, but CompTIA Security+ or equivalent knowledge is recommended

Compatibility

  • Internet required

Terms

  • Instant digital redemption

Course Outline

  • Module 1 - Business Influences and Associated Security Risks

    • Risk Management
    • Business Model Strategies
    • Integrating Diverse Industries
    • Third Party Information Security and Providers
    • Internal and External Influences
    • Impact of De-Perimeterization
  • Module 2 - Risk Mitigation Planning - Strategies and Controls

    • CIA Triad
    • Business Classifications
    • Information Life Cycle and Steak-Holder Input
    • Implementing Technical Controls
    • Determine Aggregate CIA Score
    • Worst Case Scenario Planning
    • Calculation Tools and Attacker Motivation
    • Return Of Investment
    • Total Cost of Ownership and Risk Strategies
    • Risk Management Process
    • Identifying Vulnerabilities and Threats
    • Security Architecture Frameworks
    • Business Continuity Planning
    • IT Governance
    • Security Policies
  • Module 3 - Security-Privacy Policies and Procedures

    • Policy Development Updates
    • Developing Processes and Procedures
    • Legal Compliance
    • Security Policy Business Documents
    • Outage Impact and Estimating Downtime Terms
    • Sensitive Information-Internal Security Policies
    • Incident Response Process
    • Forensic Tasks
    • Employment and Termination Procedures
    • Network Auditing
  • Module 4 - Incident Response and Recovery Procedures

    • E-Discovery and Data Retention Policies
    • Data Recovery-Storage and Backup Schemes
    • Data Owner and Data Handling
    • Disposal Terms and Concepts
    • Data Breach and Data Analysis
    • Incident Response Guidelines
    • Incident and Emergency Response
    • Media-Software and Network Analysis
    • Order of Volatility
  • Module 5 - Industry Trends

    • Performing Ongoing Research
    • Security Practices
    • Evolution of Technology
    • Situational Awareness and Vulnerability Assessments
    • Researching Security Implications
    • Global Industry Security Response
    • Threat Actors
    • Contract Security Requirements
    • Contract Documents
  • Module 6 - Securing the Enterprise

    • Benchmarks and Baselines
    • Prototyping and Testing Multiple Solutions
    • Cost/Benefit Analysis
    • Metrics Collection and Trend Data
    • Security Controls-Reverse Engineering and Deconstructing
    • Security Solutions Business Needs
    • Lesson Learned- After Action Report
  • Module 7 - Assessment Tools and Methods

    • Port Scanners and Vulnerability Scanners
    • Protocol Analyzer- Network Enumerator-Password Cracker
    • Fuzzers and HTTP Interceptors
    • Exploitation Tools
    • Passive Reconnaissance Tools
    • Vulnerability Assessments and Malware Sandboxing
    • Memory Dumping and Penetration Testing
    • Reconnaissance and Fingerprinting
    • Code Review
    • Social Engineering
  • Module 8 - Social Cryptographic Concepts and Techniques

    • Cryptographic Benefits and Techniques
    • Hashing Algorithms
    • Message Authentication Code
    • Cryptographic Concepts
    • Transport Encryption Protocol
    • Symmetric Algorithms
    • Asymmetric Algorithms
    • Hybrid Encryption and Digital Signatures
    • Public Key Infrastructure
    • Digital Certificate Classes and Cypher Types
    • Des Modes
    • Cryptographic Attacks
    • Strength vs Performance and Cryptographic Implementations
  • Module 9 - Enterprise Storage

    • Virtual Storage Types and Challenges
    • Cloud Storage
    • Data Warehousing
    • Data Archiving
    • Storage Area Networks (SANs) and (VSANs)
    • Network Attached Storage (NAS)
    • Storage Protocols and Fiber Channel over Ethernet (FCoE)
    • Storage Network File Systems
    • Secure Storage Management Techniques
    • LUN Masking/Mapping and HBA Allocation
    • Replication and Encryption Methods
  • Module 10 - Network and Security Components-Concepts-Security Architectures

    • Remote Access Protocols
    • IPv6 and Transport Encryption
    • Network Authentication Methods
    • 802.1x and Mesh Networks
    • Security Devices
    • Network Devices
    • Firewalls
    • Wireless Controllers
    • Router Security and Port Numbers
    • Network Security Solutions
    • Availability Controls-Terms and Techniques
    • Advanced Router and Switch Configuration
    • Data Flow Enforcement of Applications and Networks
    • Network Device Accessibility and Security
  • Module 11 - Security Controls for Hosts

    • Trusted Operation Systems
    • Endpoint Security Software and Data Loss Prevention
    • Host Based Firewalls
    • Log Monitoring and Host Hardening
    • Standard Operating Environment and Group Policy Security
    • Command Shell Restrictions
    • Configuring and Managing Interface Security
    • USB-Bluetooth-Firewire Restrictions and Security
    • Full Disk Encryption
    • Virtualization Security
    • Cloud Security Services
    • Boot Loader Protections
    • Virtual Host Vulnerabilities
    • Virtual Desktop Infrastructure
    • Terminal Services
    • Virtual TPM
  • Module 12 - Application Vulnerabilities and Security Controls

    • Web Application Security Design
    • Specific Application Issues
    • Session Management
    • Input Validation
    • Web Vulnerabilities and Input Mitigation Issues
    • Buffer Overflow and other Application Issues
    • Application Security Framework
    • Web Service Security and Secure Coding Standards
    • Software Development Methods
    • Monitoring Mechanisms and Client-Server Side Processing
    • Browser Extensions and Other Web Development Techniques
  • Module 13 - Host-Storage-Network and Application Integration

    • Securing Data Flows
    • Standards Concepts
    • Interoperability Issues
    • In House Commercial and Customized Applications
    • Cloud and Virtualization Models
    • Logical and Physical Deployment Diagrams
    • Secure Infrastructure Design
    • Storage Integration Security
    • Enterprise Application Integration Enablers
  • Module 14 - Authentication and Authorization Technologies

    • Authentication and Identity Management
    • Password Types-Management and Policies
    • Authentication Factors
    • Biometrics
    • Dual-Multi Factor and Certificate Authentication
    • Single Sign On Issues
    • Access Control Models and Open Authorization
    • Extensible Access Control Markup Language (XACML)
    • Service Provisioning Markup Language (SPML)
    • Attestation and Identity Propagation
    • Federation and Security Assertion Markup Language (SAML)
    • OpenID-Shibboleth and WAYF
    • Advanced Trust Models
  • Module 15 - Business Unit Collaboration

    • Identifying and Communicating Security Requirements
    • Security Controls Recommendations
    • Secure Solutions Collaboration
  • Module 16 - Secure Communication and Collaboration

    • Web-Video Conferencing-Instant Messaging
    • Desktop Sharing
    • Presence Guidelines
    • Email Messaging Protocol
    • Telephony-VoIP and Social Media
    • Cloud Based Collaboration
    • Remote Access and IPsec
    • Mobile and Personal Device Management
    • Over Air Technology Concerns
    • WLAN Concepts-Terms-Standards
    • WLAN Security and Attacks
  • Module 17 - Security Across the Technology Life Cycle

    • End to End Solution Ownership
    • System Development Life Cycle
    • Security Implications of Software Development Methodologies
    • Asset Management

View Full Curriculum



Terms

  • Instant digital redemption

15-Day Satisfaction Guarantee

We want you to be happy with every course you purchase! If you're unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.