Course fee: R13 345.50
Deposit: R2 200.00
Monthly instalment: R928.79
Payment duration: 12 months
Study duration: We recommend a total of 360 hours of study, e.g. study 1 hour per day and complete your course in 12 months.
Skillsoft course access: 12 months
Course code: C01256
This course is intended for:
Candidates who wish to establish a career in IT support, networking, and cybersecurity. CompTIA A+, CompTIA Network+ and CompTIA Security+ are core certifications and regarded as entry-level competencies to embark on the CompTIA certification journey.
Popular career options include:
Help Desk Technician
IT Specialist
Field Service Technician
Technical Support Specialist
Managed Service Provider Personnel
IT Server Technician
IT Support Manager
Network Controller
Systems Administrator |
CloudOps Engineer
CyberOps Analyst
CyberOps Engineer
Network Administrator
Network Automation Engineer
Network Engineer
Security Analyst
Security Engineer
Systems Engineer |
Modules and topics covered:
CompTIA A+ 220-1101 (Core 1)
CompTIA A+ (220-1101): Installing Hardware & Display Components
CompTIA A+ (220-1101): Mobile Device Accessories & Network Connectivity
CompTIA A+ (220-1101): Networking Fundamentals
CompTIA A+ (220-1101): Wireless Networking & Services
CompTIA A+ (220-1101): Networking Concepts & Configurations
CompTIA A+ (220-1101): Cable Types & Connectors
CompTIA A+ (220-1101): RAM & Storage Solutions
CompTIA A+ (220-1101): Motherboards, CPUs, and Add-on Cards
CompTIA A+ (220-1101): Power Supplies
CompTIA A+ (220-1101): Multifunction Devices & Printer Consumables
CompTIA A+ (220-1101): Cloud Computing Concepts
CompTIA A+ (220-1101): Client-side Virtualization
CompTIA A+ (220-1101): Best Practices for Resolving Problems
CompTIA A+ (220-1101): Troubleshooting and Resolving Printer Issues
CompTIA A+ (220-1101): Troubleshooting Wired & Wireless Networks
CompTIA A+ 220-1102 (Core 2)
CompTIA A+ (220-1102): Desktop, Server, & Mobile Operating Systems
CompTIA A+ (220-1102): Linux, macOS, & Windows File Systems
CompTIA A+ (220-1102): Operating System & Network Management
CompTIA A+ (220-1102): Physical Security Measures
CompTIA A+ (220-1102): Wireless Security Protocols & Authentication Methods
CompTIA A+ (220-1102): Malware Detection, Removal, & Prevention
CompTIA A+ (220-1102): Social Engineering Attacks
CompTIA A+ (220-1102): Operating System Security Best Practices
CompTIA A+ (220-1102): Mobile & Embedded Device Security
CompTIA A+ (220-1102): Securing SOHO Networks & Browser Security
CompTIA A+ (220-1102): Windows OS Problems & Personal Computer Security
CompTIA A+ (220-1102): Best Practice Procedures for Malware Removal
CompTIA A+ (220-1102): Mobile OS Application & Application Security Issues
CompTIA A+ (220-1102): Information Management & Change Management Processes
CompTIA A+ (220-1102): Backup & Recovery Methods
CompTIA A+ (220-1102): Safety Procedures & Environmental Impacts
CompTIA A+ (220-1102): Communication Techniques, Licensing, & Policy Concepts
CompTIA A+ (220-1102): Scripting & Remote Technologies
CompTIA Network+ N10-008
CompTIA Network+ N10-008: OSI Model Layers & Data Encapsulation
CompTIA Network+ N10-008: Network Types
CompTIA Network+ N10-008: Cables & Connectors
CompTIA Network+ N10-008: IP Addressing Schemes and Subnetting
CompTIA Network+ N10-008: Well-known Ports & Protocols
CompTIA Network+ N10-008: Registered Ports
CompTIA Network+ N10-008: Network Services & Data Center Architectures
CompTIA Network+ N10-008: Cloud Concepts
CompTIA Network+ N10-008: Network Implementations
CompTIA Network+ (N10-008): Ethernet Switching & Wireless Standards
CompTIA Network+ N10-008: Network Operations
CompTIA Network+ (N10-008): Disaster Recovery & High Availability Concepts
CompTIA Network+ (N10-008): Security Concepts & Threats
CompTIA Network+ N10-008: Physical Security & Network Hardening
CompTIA Network+ (N10-008): Network Troubleshooting Methodologies & Tools
CompTIA Network+ (N10-008): Troubleshooting Network Issues
CompTIA Security+ SY0-701
SY0-701 – CompTIA Security+: Security Goals & Controls
SY0-701 – CompTIA Security+: Fundamental Security Concepts
SY0-701 – CompTIA Security+: Practical Cryptography
SY0-701 – CompTIA Security+: Threat Actors & Vectors
SY0-701 – CompTIA Security+: Survey of Malicious Activities
SY0-701 – CompTIA Security+: Mitigation Techniques
SY0-701 – CompTIA Security+: Architecture & Infrastructure Concepts
SY0-701 – CompTIA Security+: Enterprise Infrastructure Security Principles
SY0-701 – CompTIA Security+: Data Protection Concepts & Strategies
SY0-701 – CompTIA Security+: Resilience & Recovery
SY0-701 – CompTIA Security+: Computing Resources Security Techniques
SY0-701 – CompTIA Security+: Vulnerability Management
SY0-701 – CompTIA Security+: Security Monitoring & Alerting
SY0-701 – CompTIA Security+: Enterprise Security Capabilities
SY0-701 – CompTIA Security+: Identity and Access Management
SY0-701 – CompTIA Security+: Automation, Orchestration, & Incident Response
SY0-701 – CompTIA Security+: Effective Security Governance
SY0-701 – CompTIA Security+: Risk Management
SY0-701 – CompTIA Security+: Security Compliance & Third-Party Risk
SY0-701 – CompTIA Security+: Audits, Assessments, & Awareness
CompTIA PenTest+ (PTO-002)
CompTIA PenTest+ (PTO-002): Scoping & Engagement
CompTIA PenTest+ (PTO-002): Professionalism & Integrity
CompTIA PenTest+ (PTO-002): Passive Reconnaissance
CompTIA PenTest+ (PTO-002): Active Reconnaissance
CompTIA PenTest+ (PTO-002): Vulnerability Scanning
CompTIA PenTest+ (PTO-002): Network Attacks & Exploits
CompTIA PenTest+ (PTO-002): Wireless Attacks
CompTIA PenTest+ (PTO-002): Application-based Attacks
CompTIA PenTest+ (PTO-002): Attacks on Cloud Technologies
CompTIA PenTest+ (PTO-002): Attacks on Specialized Systems
CompTIA PenTest+ (PTO-002): Social Engineering Attacks
CompTIA PenTest+ (PTO-002): Post-Exploitation Techniques
CompTIA PenTest+ (PTO-002): Written Reports
CompTIA PenTest+ (PTO-002): Communication & Post-Report Activities
CompTIA PenTest+ (PTO-002): Analyzing Tool & Script Output
CompTIA PenTest+ (PTO-002): Penetration Testing Tools
CompTIA Advanced Security Practitioner: CASP+ (CAS-004)
CompTIA CASP CAS-004: Business and Industry Influences and Risks
CompTIA CASP CAS-004: Organizational Security and Privacy Policies
CompTIA CASP CAS-004: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-004: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-004: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-004: Integrating Security Controls for Host Devices
CompTIA CASP CAS-004: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-004: Selecting Software Security Controls
CompTIA CASP CAS-004: Conducting Security Assessments
CompTIA CASP CAS-004: Implementing Incident Response and Recovery
CompTIA CASP CAS-004: Integrating Hosts, Storage, and Applications in the Enterprise
Ethical Hacker
Cybersecurity Concepts, Attacks, and Information Warfare
Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
Risk Management, Cyber Threat Intelligence, and Threat Modeling
Incident Management, ML, AI, and Regulations
Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
Footprinting, Google Dorks, Search Engines, and Subdomains
Recon Tools and Tactics
Footprinting and Social Engineering Recon and Countermeasures
Network Scanning, TCP, Host Discovery, and Port/Service Scanning
Nmap TCP Scans
Nmap IDLE IPID, UDP, and SCTP Scans
Scan Optimization, OS Identification, and IDS/Firewall Evasion
NetBIOS, SMB, SNMP, and LDAP Enumeration
NTP, NFS, SMTP, and FTP Enumeration
Vulnerability Assessment, Management, and Classification
Vulnerability Assessment Types, Models, Tools, and Reports
Windows Authentication
Passwords Attacks, Extraction, and Cracking
Buffer Overflows, Privilege Escalation, and System Access
Steganography and Avoiding Detection
AD Enumeration, Mimikatz, and Pivoting Techniques
Malware, Threats, Trojans, and Viruses
Fileless Malware, Malware Analysis, and Countermeasures
Sniffing and Poisoning
Social Engineering, Insider Threats, and Identity Theft
DoS, DDoS, Volumetric, and Protocol Attacks
App Layer Attacks, Botnets, and DoS Countermeasures
Hijacking Concepts and Countermeasures
Intrusion Detection and Prevention, Firewalls, and Honeypots
Web Server Hacking, Attacks, and Attack Methodologies
Web Application Attacks and Vulnerabilities
Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
SQL Injection Concepts and Attacks
SQL Injection and SQLMap
Wireless Concepts, Threats, and Hacking Tools
Wireless Hacking and Countermeasures
Mobile Hacking, OS Security, and Device Management
IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
Operational Technology Concepts, Attack Tools, and Countermeasures
Cloud Computing, Containers, Hacking, and Security Controls
Cryptography, Algorithms, Implementations, and Tools
PKI, Cryptanalysis, and Attack Countermeasures
Certified Information Systems Auditor (CISA)
CISA 2022: Information Systems Auditing
CISA 2022: Auditing, Data Analysis, & Controls
CISA 2022: IT Management Frameworks, Regulations, & Standards
CISA 2022: IT Resources & Monitoring
CISA 2022: Projects, Development, & Testing
CISA 2022: Information Systems Management
CISA 2022: Information Systems Development & Implementation
CISA 2022: Data Privacy
CISA 2022: IAM & Data Classification
CISA 2022: Securing Networks & IT Assets
CISA 2022: Protecting Information Assets
CISA 2022: Virtualization & Cloud Computing
CISA 2022: Auditing Scenarios
Academic grade: No minimum school pass requirements or formal prerequisites, but the following recommendations are suggested if students want to attempt the certification exams:
- CompTIA PenTest+: Approximately 3-4 years of hands-on experience in information security.
- CompTIA CASP+: A minimum of 10 years of IT experience, with at least 5 years of hands-on technical security experience.
- Ethical hacker: At least 2 years of experience in information security.
- CISA®: At least 5 or more years of experience in IS/IT audit, control, assurance, or security. Experience waivers are available for a maximum of 3 years.
Language: Proficiency in English (course material and support only available in English).
Expertise level: Intermediate to advanced.
Equipment: Access to a PC or laptop with a reliable internet connection.
Effort: Self-paced learning online.
Dedicated support team
We understand that students may require guidance and support to navigate the learning journey, and our Client Services team is always ready to assist them in every possible way. Our team is readily available during office hours and can be contacted via email, phone, WhatsApp and social media.
Exam booking assistance
Depending on your chosen course you will either receive advice or assistance in booking certain exams yourself, or our exam team will make a booking on your behalf. Our team will advise you on the venue closest to you, assist with booking a seat, and confirm the time, date and logistics for your exam sitting. Optimi College also offers discounted exam vouchers for numerous IT certification exams.
Skillsoft Learner Management System (LMS) access
Skillsoft is an online learning management system that offers all students enrolled for any of our IT Academy courses compelling content, interactive videos, quizzes, mentoring and practical simulations/virtual labs. The platform allows students to learn at their own pace.