Security Bundle

R7,940.00

Become a Cyber Security Specialist in 6 months. The Security Bundle includes five courses – CompTIA Security+, CompTIA CYSA, CompTIA CASP, CEH and CISA which are aligned with the international exam objectives.

Deposit : R3,417.00

, , ,
 Mode of delivery: Digital learning
  Subjects:
 CompTIA Security+ SY0-601
CompTIA PenTest+ (PTO-002)
CompTIA Advanced Security Practitioner: CASP+ (CAS-004)
Certified Ethical Hacker (CEH)
Certified Information Systems Auditor (CISA) 

Subject breakdown

CompTIA Security+ SY0-601
SY0-601 – CompTIA Security+: Social Engineering Techniques & Attack Types
SY0-601 – CompTIA Security+: Analyzing Application & Network Attacks
SY0-601 – CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
SY0-601 – CompTIA Security+: Security Assessments & Penetration Testing Techniques
SY0-601 – CompTIA Security+: Security Concepts in an Enterprise Environment
SY0-601 – CompTIA Security+: Implementing Cybersecurity Resilience
SY0-601 – CompTIA Security+: Virtualization, Cloud Computing, and Cloud Cybersecurity Solutions
SY0-601 – CompTIA Security+: Controls & Application Development, Deployment, & Automation
SY0-601 – CompTIA Security+: Authentication & Authorization Design Concepts
SY0-601 – CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
SY0-601 – CompTIA Security+: Physical Security Controls
SY0-601 – CompTIA Security+: Basic Cryptography & Public Key Infrastructure
SY0-601 – CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
SY0-601 – CompTIA Security+: Implementing Secure Network Designs
SY0-601 – CompTIA Security+: Wireless Mobile, & Embedded Device Security
SY0-601 – CompTIA Security+: Organizational Security Assessment tools & Mitigation Controls
SY0-601 – CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
SY0-601 – CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
SY0-601 – CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
SY0-601 – CompTIA Security+: Monitoring, Visibility, & Reporting

CompTIA PenTest+ (PTO-002)
CompTIA PenTest+ (PTO-002): Scoping & Engagement
CompTIA PenTest+ (PTO-002): Professionalism & Integrity
CompTIA PenTest+ (PTO-002): Passive Reconnaissance
CompTIA PenTest+ (PTO-002): Active Reconnaissance
CompTIA PenTest+ (PTO-002): Vulnerability Scanning
CompTIA PenTest+ (PTO-002): Network Attacks & Exploits
CompTIA PenTest+ (PTO-002): Wireless Attacks
CompTIA PenTest+ (PTO-002): Application-based Attacks
CompTIA PenTest+ (PTO-002): Attacks on Cloud Technologies
CompTIA PenTest+ (PTO-002): Attacks on Specialized Systems
CompTIA PenTest+ (PTO-002): Social Engineering Attacks
CompTIA PenTest+ (PTO-002): Post-Exploitation Techniques
CompTIA PenTest+ (PTO-002): Written Reports
CompTIA PenTest+ (PTO-002): Communication & Post-Report Activities
CompTIA PenTest+ (PTO-002): Analyzing Tool & Script Output
CompTIA PenTest+ (PTO-002): Penetration Testing Tools

CompTIA Advanced Security Practitioner: CASP+ (CAS-004)
CompTIA CASP CAS-004: Business and Industry Influences and Risks
CompTIA CASP CAS-004: Organizational Security and Privacy Policies
CompTIA CASP CAS-004: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-004: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-004: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-004: Integrating Security Controls for Host Devices
CompTIA CASP CAS-004: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-004: Selecting Software Security Controls
CompTIA CASP CAS-004: Conducting Security Assessments
CompTIA CASP CAS-004: Implementing Incident Response and Recovery
CompTIA CASP CAS-004: Integrating Hosts, Storage, and Applications in the Enterprise

Certified Ethical Hacker (CEH)
CEHv11: Ethical Hacking Overview and Threats
CEHv11: Hacking Concepts
CEHv11: Security Controls
CEHv11: Security Controls Part 2
CEHv11: Pentesting, Laws, and Standards
CEHv11: Footprinting
CEHv11: Host Discovery and Scanning with Nmap
CEHv11: ProxyChains and Enumeration
CEHv11: Vulnerability Analysis Concepts and Tools
CEHv11: Password Attacks
CEHv11: Password Attacks Part 2
CEHv11: Privilege Escalation
CEHv11: Covert Data Gathering
CEHv11: Hidden Files and Covering Tracks
CEHv11: Malware Threats
CEHv11: Malware Distribution
CEHv11: Network Sniffing
CEHv11: Denial of Service
CEHv11: Session Hijacking
CEHv11: Evading IDS, Firewalls, and Honeypots
CEHv11: Evading IDS, Firewalls, and Honeypots Part 2
CEHv11: Evading IDS, Firewalls, and Honeypots Part 3
CEHv11: Hacking Web Servers
CEHv11: Common Web App Threats
CEHv11: Common Web App Threats Part 2
CEHv11: Practical Web App Hacking
CEHv11: SQL Injection
CEHv11: SQL Injection Types and Tools
CEHv11: Wireless Hacking Concepts
CEHv11: Wireless Hacking Tools
CEHv11: Wireless Hacking Common Threats
CEHv11: Cracking and Mobile Hacking
CEHv11: IoT Concepts
CEHv11: IoT Attacks
CEHv11: Clouding Computing Concepts
CEHv11: Cloud Computer Attacks
CEHv11: Cryptography Concepts
CEHv11: Cryptography Concepts Part 2
CEHv11: Cryptography Concepts Part 3
CEHv11: Cryptography Attacks
CEHv11: IoT Hacking and Countermeasures

Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice

 

Course starting dates: You can register and start studying this course at any time as registration is open all year round.

Admission requirements:

Grade 10

The ability to read and write in English

Learners must be at least 16 years of age

 

 

 

 Course type: Industry Endorsed

  Industry Partner: CompTIA/CISA

  Certification: Certificate confirming course completion

  Certification issued by: Optimi College

 

 

Assessment information

Online Assessments

 

Course fee: R7,940.00

Course Deposit: R3,417.00

Monthly instalment option: R502.56

Payment duration: 9 Months

Study duration: 12 Months

 Dedicated Client Engagement Support
 Online Mentor (Skillsoft)
 Skillsoft Learner Management System Access
 Skillsoft App Access
 Skillsoft Practice Labs (Online)