Course code: C01256
Subjects:
CompTIA A+ 220-1101 (Core 1)
CompTIA A+ (220-1101): Installing Hardware & Display Components
CompTIA A+ (220-1101): Mobile Device Accessories & Network Connectivity
CompTIA A+ (220-1101): Networking Fundamentals
CompTIA A+ (220-1101): Wireless Networking & Services
CompTIA A+ (220-1101): Networking Concepts & Configurations
CompTIA A+ (220-1101): Cable Types & Connectors
CompTIA A+ (220-1101): RAM & Storage Solutions
CompTIA A+ (220-1101): Motherboards, CPUs, and Add-on Cards
CompTIA A+ (220-1101): Power Supplies
CompTIA A+ (220-1101): Multifunction Devices & Printer Consumables
CompTIA A+ (220-1101): Cloud Computing Concepts
CompTIA A+ (220-1101): Client-side Virtualization
CompTIA A+ (220-1101): Best Practices for Resolving Problems
CompTIA A+ (220-1101): Troubleshooting and Resolving Printer Issues
CompTIA A+ (220-1101): Troubleshooting Wired & Wireless Networks
CompTIA A+ 220-1102 (Core 2)
CompTIA A+ (220-1102): Desktop, Server, & Mobile Operating Systems
CompTIA A+ (220-1102): Linux, macOS, & Windows File Systems
CompTIA A+ (220-1102): Operating System & Network Management
CompTIA A+ (220-1102): Physical Security Measures
CompTIA A+ (220-1102): Wireless Security Protocols & Authentication Methods
CompTIA A+ (220-1102): Malware Detection, Removal, & Prevention
CompTIA A+ (220-1102): Social Engineering Attacks
CompTIA A+ (220-1102): Operating System Security Best Practices
CompTIA A+ (220-1102): Mobile & Embedded Device Security
CompTIA A+ (220-1102): Securing SOHO Networks & Browser Security
CompTIA A+ (220-1102): Windows OS Problems & Personal Computer Security
CompTIA A+ (220-1102): Best Practice Procedures for Malware Removal
CompTIA A+ (220-1102): Mobile OS Application & Application Security Issues
CompTIA A+ (220-1102): Information Management & Change Management Processes
CompTIA A+ (220-1102): Backup & Recovery Methods
CompTIA A+ (220-1102): Safety Procedures & Environmental Impacts
CompTIA A+ (220-1102): Communication Techniques, Licensing, & Policy Concepts
CompTIA A+ (220-1102): Scripting & Remote Technologies
CompTIA Network+ N10-008
CompTIA Network+ N10-008: OSI Model Layers & Data Encapsulation
CompTIA Network+ N10-008: Network Types
CompTIA Network+ N10-008: Cables & Connectors
CompTIA Network+ N10-008: IP Addressing Schemes and Subnetting
CompTIA Network+ N10-008: Well-known Ports & Protocols
CompTIA Network+ N10-008: Registered Ports
CompTIA Network+ N10-008: Network Services & Data Center Architectures
CompTIA Network+ N10-008: Cloud Concepts
CompTIA Network+ N10-008: Network Implementations
CompTIA Network+ (N10-008): Ethernet Switching & Wireless Standards
CompTIA Network+ N10-008: Network Operations
CompTIA Network+ (N10-008): Disaster Recovery & High Availability Concepts
CompTIA Network+ (N10-008): Security Concepts & Threats
CompTIA Network+ N10-008: Physical Security & Network Hardening
CompTIA Network+ (N10-008): Network Troubleshooting Methodologies & Tools
CompTIA Network+ (N10-008): Troubleshooting Network Issues
CompTIA Security+ SY0-701
SY0-701 – CompTIA Security+: Security Goals & Controls
SY0-701 – CompTIA Security+: Fundamental Security Concepts
SY0-701 – CompTIA Security+: Practical Cryptography
SY0-701 – CompTIA Security+: Threat Actors & Vectors
SY0-701 – CompTIA Security+: Survey of Malicious Activities
SY0-701 – CompTIA Security+: Mitigation Techniques
SY0-701 – CompTIA Security+: Architecture & Infrastructure Concepts
SY0-701 – CompTIA Security+: Enterprise Infrastructure Security Principles
SY0-701 – CompTIA Security+: Data Protection Concepts & Strategies
SY0-701 – CompTIA Security+: Resilience & Recovery
SY0-701 – CompTIA Security+: Computing Resources Security Techniques
SY0-701 – CompTIA Security+: Vulnerability Management
SY0-701 – CompTIA Security+: Security Monitoring & Alerting
SY0-701 – CompTIA Security+: Enterprise Security Capabilities
SY0-701 – CompTIA Security+: Identity and Access Management
SY0-701 – CompTIA Security+: Automation, Orchestration, & Incident Response
SY0-701 – CompTIA Security+: Effective Security Governance
SY0-701 – CompTIA Security+: Risk Management
SY0-701 – CompTIA Security+: Security Compliance & Third-Party Risk
SY0-701 – CompTIA Security+: Audits, Assessments, & Awareness
CompTIA PenTest+ (PTO-002)
CompTIA PenTest+ (PTO-002): Scoping & Engagement
CompTIA PenTest+ (PTO-002): Professionalism & Integrity
CompTIA PenTest+ (PTO-002): Passive Reconnaissance
CompTIA PenTest+ (PTO-002): Active Reconnaissance
CompTIA PenTest+ (PTO-002): Vulnerability Scanning
CompTIA PenTest+ (PTO-002): Network Attacks & Exploits
CompTIA PenTest+ (PTO-002): Wireless Attacks
CompTIA PenTest+ (PTO-002): Application-based Attacks
CompTIA PenTest+ (PTO-002): Attacks on Cloud Technologies
CompTIA PenTest+ (PTO-002): Attacks on Specialized Systems
CompTIA PenTest+ (PTO-002): Social Engineering Attacks
CompTIA PenTest+ (PTO-002): Post-Exploitation Techniques
CompTIA PenTest+ (PTO-002): Written Reports
CompTIA PenTest+ (PTO-002): Communication & Post-Report Activities
CompTIA PenTest+ (PTO-002): Analyzing Tool & Script Output
CompTIA PenTest+ (PTO-002): Penetration Testing Tools
CompTIA Advanced Security Practitioner: CASP+ (CAS-004)
CompTIA CASP CAS-004: Business and Industry Influences and Risks
CompTIA CASP CAS-004: Organizational Security and Privacy Policies
CompTIA CASP CAS-004: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-004: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-004: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-004: Integrating Security Controls for Host Devices
CompTIA CASP CAS-004: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-004: Selecting Software Security Controls
CompTIA CASP CAS-004: Conducting Security Assessments
CompTIA CASP CAS-004: Implementing Incident Response and Recovery
CompTIA CASP CAS-004: Integrating Hosts, Storage, and Applications in the Enterprise
Ethical Hacker (CEH)
CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
CEH v12: Incident Management, ML, AI, and Regulations
CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
CEH v12: Recon Tools and Tactics
CEH v12: Footprinting and Social Engineering Recon and Countermeasures
CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
CEH v12: Nmap TCP Scans
CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
CEH v12: NTP, NFS, SMTP, and FTP Enumeration
CEH v12: Vulnerability Assessment, Management, and Classification
CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
CEH v12: Windows Authentication
CEH v12: Passwords Attacks, Extraction, and Cracking
CEH v12: Buffer Overflows, Privilege Escalation, and System Access
CEH v12: Steganography and Avoiding Detection
CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
CEH v12: Malware, Threats, Trojans, and Viruses
CEH v12: Fileless Malware, Malware Analysis, and Countermeasures
CEH v12: Sniffing and Poisoning
CEH v12: Social Engineering, Insider Threats, and Identity Theft
CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks
CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures
CEH v12: Hijacking Concepts and Countermeasures
CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots
CEH v12: Web Server Hacking, Attacks, and Attack Methodologies
CEH v12: Web Application Attacks and Vulnerabilities
CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
CEH v12: SQL Injection Concepts and Attacks
CEH v12: SQL Injection and SQLMap
CEH v12: Wireless Concepts, Threats, and Hacking Tools
CEH v12: Wireless Hacking and Countermeasures
CEH v12: Mobile Hacking, OS Security, and Device Management
CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures
CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
CEH v12: Cryptography, Algorithms, Implementations, and Tools
CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
Certified Information Systems Auditor (CISA)
CISA 2022: Information Systems Auditing
CISA 2022: Auditing, Data Analysis, & Controls
CISA 2022: IT Management Frameworks, Regulations, & Standards
CISA 2022: IT Resources & Monitoring
CISA 2022: Projects, Development, & Testing
CISA 2022: Information Systems Management
CISA 2022: Information Systems Development & Implementation
CISA 2022: Data Privacy
CISA 2022: IAM & Data Classification
CISA 2022: Securing Networks & IT Assets
CISA 2022: Protecting Information Assets
CISA 2022: Virtualization & Cloud Computing
CISA 2022: Auditing Scenarios