Aspire Journeys

411 Technical Support Specialist

  • 91 Courses | 105h 41m 23s
  • Includes Test Prep
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
In this journey, you will explore the skills required to provide technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components.

Basic: A+

This track contains  A+ content.

  • 33 Courses | 42h 45m 58s

Basic: Network+

This track contains Network+ content.

  • 16 Courses | 29h 33m 15s

Intermediate: Security+

This track contains Security+ content.

  • 20 Courses | 12h 28m 8s

Advanced: CASP+

This track contains CASP+ content.

  • 14 Courses | 16h 27m 29s

Advanced: CISSP

This track contains CISSP content.

  • 8 Courses | 4h 26m 33s

COURSES INCLUDED

CompTIA A+ Core 1: Installing Hardware & Display Components
As a computer technician, one of your main responsibilities is often to troubleshoot and diagnose hardware and display-related issues. In this course, you'll explore common hard drive types, replacement techniques, and migration processes. Investigate how to replace common hardware device components such as batteries and random-access memory (RAM). Examine physical privacy and security components such as biometrics and near-field scanner features. Learn how to differentiate between liquid crystal display (LCD) types, including in-plane switching (IPS), twisted nematic (TN), and vertical alignment (VA). Install and configure mobile display components, including Wi-Fi antenna connectors, webcams, microphones, and laptop screen inverters. Lastly, explore the common features of both digitizers and touchscreens. Once you have completed this course, you will be able to confidently troubleshoot hardware and display-related issues and select the appropriate solutions. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos | 1h 29m has Assessment available Badge
CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
Mobile device accessories, ports, and connectivity features allow for a variety of different connections as well as the enabling of additional mobile device features. As an IT industry professional, you will be called upon to configure those accessories and network connections, as well as provide application support in various situations. In this course, discover how to set up and configure Universal Serial Bus (USB). Explore key features of lightning and serial connectors, as well as near-field communication, Bluetooth, and hotspot connectivity options. Examine how global positioning system (GPS) services and cellular location services work. Lastly, explore the benefits of implementing mobile device management (MDM) and mobile application management (MAM) solutions. After completing this course, you will be able to set up and configure network connections and mobile device accessories. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
13 videos | 1h 22m has Assessment available Badge
CompTIA A+ Core 1: Networking Fundamentals
In order for computers to be able to exchange data and share resources with each other, they must be interconnected in some fashion. This is referred to as computer networking. Explore computer networking fundamentals, including TCP and user datagram protocol (UDP) ports, and review common networking hardware devices. Examine the differences between hubs and bridges. Discover when to use a network switch and how a router can protect a system. Explore key differences between access points, repeaters, and extenders, as well as cable and DSL modems. Learn about the benefits of Power over Ethernet (PoE) and compare it with Ethernet over Power, which uses common electrical wiring to convey Ethernet connectivity. Lastly, take a look at the features of network interface cards (NIC), optical network terminal (ONT), and software-defined networking (SDN) technologies. This course will prepare you for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos | 1h 31m has Assessment available Badge
CompTIA A+ Core 1: Wireless Networking & Services
Wireless networks are much more versatile than wired networks, especially in an environment where running wires might be difficult. This course covers the most efficient wireless networking protocols for various scenarios. You will explore wireless frequencies and channels and learn how to differentiate between 802.11 standards: - a, - b, - g, - n, - ac, and - ax. Next, delve into considerations for working with long-range fixed wireless, including licensed, unlicensed, power, and regulatory requirements. You will also identify features of near-field communication (NFC) and radio-frequency identification (RFID). Finally, explore server roles such as domain name system (DNS) and dynamic host configuration protocol (DHCP), and discover the global market for Internet of things (IoT) end-user solutions. After completing this course, you'll be able to differentiate between wireless networking protocols and tune common host services. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
16 videos | 2h 25m has Assessment available Badge
CompTIA A+ Core 1: Networking Concepts & Configurations
Internet Protocol (IP) addresses, which are assigned to network-equipped devices that are part of a Transmission Control Protocol (TCP)/IP-based network, allow computers and other resources to communicate with each other. Explore the basics of IP addressing and networking concepts such as Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). Begin with an overview of DNS and its benefits. Then take a closer look at the DHCP, its features, and the concept of reservations. Next, discover the use of virtual private networks (VPNs) and look at virtual local area networks (VLANs). Finally, explore the various networking tools including crimpers, Wi-Fi analyzers, and loopback plugs. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos | 1h 57m has Assessment available Badge
CompTIA A+ Core 1: Cable Types & Connectors
Technicians need to familiarize themselves with the vast array of cable options and connector types. Discover the most common cables and adapters encountered when working with computers and mobile devices. Explore Ethernet cable types, the differences between shielded twisted pair (STP) and unshielded twisted pair (UTP) cabling, and the basics of fiber optic and coaxial cabling. Next, learn the speed and transmission limitations of various network cables. Discover different video cables and learn about using Lightning and Thunderbolt cables. Then, examine Universal Serial Bus (USB) cables and the differences between USB, USB-C, USB2.0, and USB3.0. Explore serial peripheral cables and hard drive cables such as SATA (Serial AT Attachment), IDE (Integrated Drive Electronics), and SCSI (Small Computer System Interface). Finally, learn to differentiate between adapters such as DVI to HDMI, USB to Ethernet, and DVI to VGA and explore how computers utilize several types of connectors and converters. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
18 videos | 1h has Assessment available Badge
CompTIA A+ Core 1: RAM & Storage Solutions
Every computer requires a storage device and Random Access Memory (RAM), so in this course you will explore different storage and RAM options and how they work, and discover various types of solutions for your computer. To begin, explore virtual RAM and the Small Outline Dual In-line Memory Module, more commonly known as SODIMM. Then consider Double Data Rate (DDR) RAM and memory channels. Examine the features of solid-state drives (SSDs), a persistent memory storage type, and magnetic hard drives, an electromechanical data storage device. Next, compare and contrast features of the two most common physical sizes for hard drives: 3.5 and 2.5 inch drives. Finally, explore removable storage options and their benefits, and learn the differences between Redundant Array of Independent Disks (RAID) 0, 1, 5, and 10. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
16 videos | 1h 39m has Assessment available Badge
CompTIA A+ Core 1: Motherboards, CPUs, & Add-on Cards
Motherboards are the backbone that connect computer components and enable them to communicate. Discover motherboards, the basics of central processing units (CPUs), and add-on cards, as well as the various factors that need to be considered to install and configure them in your computer. In this course, you will learn about motherboard form factors and connector types. Discover the basic input/output system (BIOS) of your computer, how to configure BIOS security, and how BIOS contains the most basic system software that allows you to booth the system and your operating system to interact with the hardware. Explore Complementary Metal Oxide Semiconductor (CMOS) batteries, your CPU's processing core, and the differences between single core and multi-core processors. Finally, explore CPU features and compatibility, compare two of the most popular manufacturers of microprocessors, and learn about cooling mechanisms for the CPU including options for dissipating heat in your system. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
12 videos | 1h 27m has Assessment available Badge
CompTIA A+ Core 1: Power Supplies
Computer hardware technicians must understand the basics of computer power systems, including amps, wattage, voltage, general guidelines for power sizing, and power supply options. Explore key power systems lessons like differentiating between power supply inputs and outputs, identifying the values needed for components, such as overall wattage rating, and determining the amount of power needed based on the number of devices in use. Examine the characteristics of redundant power supplies and modular power supplies. Finally, put your new skills to use solving a problem to determine when to use more or less voltage, how to describe wattage ratings, and how to determine the output of a rail on power supply. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
9 videos | 45m has Assessment available Badge
CompTIA A+ Core 1: Multifunction Devices & Printer Consumables
A multifunction device delivers many functions such as print, fax, scan, and copy capabilities, which would otherwise be carried out by separate devices. Learn about multifunction devices, how to unbox a device, and set up location considerations. Discover how to select appropriate drivers for a given OS such as Printer Control Language (PCL) and PostScript, and explore USB, Ethernet, and wireless device connectivity options. Next, explore configuration settings such as duplex, orientation, tray settings, and quality and discover multifunction device security features such as user authentication, badging, audit logs, and secure prints. Lastly, explore email, Server Message Block (SMB), and cloud services and discover features of laser printers, inkjet printers, thermal printers, impact printers, and 3-D printers. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
15 videos | 1h 28m has Assessment available Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos | 1h 17m has Assessment available Badge
CompTIA A+ Core 1: Client-side Virtualization
Virtualization enables the ability to use software to create a virtual computer system. One of the main benefits of virtualization is that it allows organizations to run multiple virtual systems using a single computer system, such as a server. Explore the basics of virtualization, including how it allows for the creation of virtual resources like operating systems, servers, and storage solutions. Begin with an overview of virtual machines (VMs) and memory and discover the purpose of VMs and the tasks they perform, their common uses and how they are created within the physical host computer, as well as common configurable settings for a VM. Finally, you will examine the resource and security requirements for virtualization. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
6 videos | 32m has Assessment available Badge
CompTIA A+ Core 1: Best Practices for Resolving Problems
In any technological environment, problems are inevitable. In this course, learners will look at detailed approaches to resolving issues by examining the six-step troubleshooting methodology used to resolve problems with computer systems. Begin by considering the impact of corporate policies and procedures before implementing changes. Learn steps for identifying a problem, such as questioning the user and inquiring about environmental and infrastructure changes. Discover how to conduct external or internal research based on symptoms so that you can establish a theory of probable cause, test the theory, and evaluate your test results. Next, you will learn how to establish a plan of action to resolve the problem and implement the solution, verify full system functionality, and implement preventive measures. Review best practices to document findings, actions, and outcomes. Finally, explore systems and troubleshooting techniques when dealing with hardware components, storage devices, displays, and mobile devices. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
13 videos | 1h 27m has Assessment available Badge
CompTIA A+ Core 1: Troubleshooting & Resolving Printer Issues
Printers have a lot of moving parts, so problems are inevitable. As a computer technician, your job will be to identify and resolve some of these common concerns. Start by exploring basic troubleshooting considerations for printers, including typical issues like paper jams or print quality problems. Investigate potential driver compatibility issues and learn how to interpret error codes. Find out why firmware updates are required and how they can resolve certain issues. Learn how to correct screen display and printer output problems, how to calibrate and clean printers, and how to troubleshoot print quality issues. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
14 videos | 1h 20m has Assessment available Badge
CompTIA A+ Core 1: Troubleshooting Wired & Wireless Networks
Technicians are required to identify, diagnose, and solve common wired and wireless network-related problems. Due to the many components of a network, this can be challenging at times. Fortunately, there are many common issues to look for that can help resolve issues promptly. Explore how to resolve intermittent wireless connectivity issues and slow network speeds, as well as issues related to jitter and port flapping. Discover methods to improve voice-over-IP (VoIP) phone services and high latency problems. Lastly, explore common examples of external interference that can disrupt a wired or wireless network. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
10 videos | 1h 2m has Assessment available Badge
CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
Technicians must be aware of the features and installation requirements of various types of operating systems. Use this course to learn about common OS types and how to perform OS installations and upgrades in a diverse OS environment. Begin by exploring the features of Windows, Linux, macOS, ChromeOS, and mobile device operating systems. Discover available OS installation options and plan an operating system deployment strategy after reviewing various installation methods. Finally, perform the installation of a Windows 10, Windows Server 2019, Ubuntu Linux, and macOS system. Once you have completed this course, you will be able to select the appropriate operating system for a given scenario and plan its deployment. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos | 1h 18m has Assessment available Badge
CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
New disk devices can be initialized as Master Boot Record (MBR) or GUID Partition Table (GPT) and can be formatted using different types of file systems. Use this course to become familiar with and learn how to manage common Linux, macOS, and Windows file systems. To start, explore common file system types including the New Technology File System (NTFS), File Allocation Table (FAT32), exFAT, ext3, ext4, and the Apple File System (APFS). Discover the difference between MBR and GPT disks and learn how to format and partition disks. You'll then work with NTFS, share, and Linux file system permissions to configure access for network shares and learn how to manage file systems using command line tools. Once you have completed this course, you will be able to choose the appropriate file system and management tools for specific situations. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h 7m has Assessment available Badge
CompTIA A+ Core 2: Operating System & Network Management
Understanding the network connectivity options in modern operating systems is a vital skill you need as a technician. In this course, you will explore various GUI management tools that can be used when working in Windows. Learn to navigate and configure Control Panel settings and discover how to utilize networking commands in Windows and Linux, and management tools for macOS. Next, you will review how IP addressing, DNS, and DHCP works and observe how to configure Windows DNS and DHCP servers. Finally, learn how to manage various network settings, including those related to Windows Defender and Microsoft Active Directory. Upon completion of this course, you'll be able to use command-line management tools and manage network-related settings in Windows, Linux, and the macOS. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos | 1h 50m has Assessment available Badge
CompTIA A+ Core 2: Physical Security Measures
Technicians need to familiarize themselves with the various security principles and technologies available to protect employees, networks, and intellectual property from the emergent threats of the 21st century Internet. You will begin by exploring how to implement traditional physical security measures such as video surveillance, alarm systems, and motion sensors. Discover how to implement physical security devices such as key fobs, smart cards, keys, biometrics, lighting, and magnetometers. Next, learn how to implement and configure security features of Active Directory and how to secure devices using Mobile Device Management. Lastly, explore logical security features such as the principle of least privilege, access control lists, multi-factor authentication, and hard and soft tokens. ​ Upon completion, you'll be able to design and implement technologies available to protect businesses against the latest security threats. This course helps you to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
7 videos | 38m has Assessment available Badge
CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
There are numerous wireless security protocols and authentication methods available. Technicians must learn how to recommend and potentially implement a wireless security solution depending on the requirements of an organization. In this course, you will start by learning the difference between the Wi-Fi Protected Access 2 (WPA2) and Wi-Fi Protected Access 3 (WPA3) wireless protocols and the features of each. Explore other wireless protocols and encryption options, including Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). Finally, investigate wireless security authentication solutions, including Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access-Control System (TACACS+), Kerberos, and multi-factor authentication. After completing this course you'll know how to implement wireless security protocols and authentication methods. This course also helps you to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
10 videos | 45m has Assessment available Badge
CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods. Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. ​ After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos | 1h 41m has Assessment available Badge
CompTIA A+ Core 2: Social Engineering Attacks
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers. Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks. Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD). This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.
18 videos | 1h 57m has Assessment available Badge
CompTIA A+ Core 2: Operating System Security Best Practices
There are many things to consider when managing and configuring basic security settings in the Microsoft Windows OS. Therefore, technicians must become well versed in configuring and enforcing workstations to meet best practices for security. In this course, you will begin by learning how to configure basic security settings including firewalls, Defender anti-virus, users and groups, and operating system login options. Explore the difference between NTFS and share permissions and discuss file and folder attributes and inheritance. Next, discover features of the administrator and standard user accounts and learn the fundamentals of user account control (UAC). Lastly, explore how to configure workstation security using features such as encryption, complex passwords, and account management and how to disable the AutoRun and AutoPlay features. Upon completion, you'll know how to configure basic security setting in the Windows OS. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos | 1h 34m has Assessment available Badge
CompTIA A+ Core 2: Mobile & Embedded Device Security
As mobile technology evolves, so does the need for mobile device security. Mobile device security features protect data, including sensitive and private information, on mobile devices such as smartphones, tablets, and laptops. Learn about screen lock security features such as facial recognition, PIN codes, fingerprint, pattern, and swipe devices. Discover the benefits of remote wiping features, locator applications, and device encryption. Next, explore how operating system updates can help secure devices and patch vulnerabilities. Then discover features of remote backup applications, firewalls, and mobile anti-virus and anti-malware solutions. Lastly, you'll get an overview of policies and procedures as they relate to BYOD, profile security requirements, and Internet of Things (IoT) security. Upon completion of this course, you'll be able to outline common methods for securing mobile and embedded devices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 59m has Assessment available Badge
CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
Technicians need to familiarize themselves with strategies, features, and techniques that can help ensure a safe and secure small office/home office (SOHO) environment. In this course, discover home router security settings to configure on a SOHO network. Explore wireless security considerations, including changing the service set identifier (SSID), disabling SSID broadcast and encryption settings, disabling guest access, and changing channels. Next, discover firewall security features such as disabling unused ports and port forwarding or mapping. You'll also learn to install and configure browsers and relevant security settings. Next you'll explore browser installations, extensions, and plug-ins, as well as password managers and certificates. Lastly, explore Internet browsing security features and techniques, including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers. Once you have completed this course, you'll be able to configure security settings for browsers and SOHO networks. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
10 videos | 1h 3m has Assessment available Badge
CompTIA A+ Core 2: Windows OS Problems & Personal Computer Security
Diagnosing problems within a network or a computer requires a special and versatile toolbox for the IT specialist. This course outlines many popular troubleshooting tools and practical strategies needed to quickly isolate all kinds of problems, regardless of platform, and resolve them, to help restore normal working conditions efficiently and quickly. Explore the benefits of building process checklists and learn how to determine if a problem is widespread or limited to one machine. Discover how to trace issues back to new hardware or software installations, and explore best practices and techniques for malware removal. Lastly, explore valuable troubleshooting steps that can be used to resolve mobile OS and app issues and any mobile OS security issues. This course will help you prepare for CompTIA+ certification exam 220-1102.
9 videos | 59m has Assessment available Badge
CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
Malware is software specifically designed to compromise computers, servers, clients, or computer networks. In this course, you will learn best practices for the identification and removal of malware. Begin by exploring how to properly investigate and verify malware symptoms and how to ensure infected systems are quarantined immediately. Discover the importance of disabling System Restore from the onset as well as steps to remediate infected systems. Explore how to schedule system scans and run updates on a system. Next, discover when to re-enable System Restore and create a new restore point in Windows. Lastly, learn about the key points and techniques to share with end users when educating them on malware. This course helps prepare for CompTIA+ certification exam 220-1102.
10 videos | 55m has Assessment available Badge
CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
A large percentage of the population carries at least one mobile device on them at all times. These devices often contain applications that can be attractive targets for mobile attacks. This course covers how to troubleshoot mobile OS applications and application security issues. Discover common symptoms pertaining to mobile OS and application issues such as applications that fail to launch, crash, and fail to update. Next, explore connectivity issues pertaining to Bluetooth, Wi-Fi, near-field communication, and AirDrop and learn how to identify internet connectivity issues, including limited or no connectivity. Lastly, discover how to deal with high numbers of ads, fake security warnings, unexpected application behavior, and leaked personal files and data. This course helps prepare for CompTIA+ certification exam 220-1102.
12 videos | 1h 18m has Assessment available Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 55m has Assessment available Badge
CompTIA A+ Core 2: Backup & Recovery Methods
Backing up data is the practice of copying data from a primary to a secondary location. Regular backups are essential when attempting to recover from a primary data failure. Backups should be performed regularly in both personal and business scenarios. In this course, explore disaster prevention techniques and recovery best practices. Discover how to differentiate between full, incremental, differential, and synthetic backups, and learn when to implement each method. Next, explore backup frequency timelines that can help ensure regular data backups. Discover how to differentiate between on-site and off-site backup rotation schemes, and lastly, explore backup rotation schemes including grandfather-father-son (GFS) and the 3-2-1 backup rule. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
7 videos | 46m has Assessment available Badge
CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
Environments should be designed and maintained with personal safety best practices and safety standards in mind. Enforcing safety standards helps ensure that operators are kept safe and prevented from causing harm to their systems. In this course, you'll learn when and where to use electrostatic discharge straps, mats, and bags. Explore personal safety measures, including disconnecting power before repairing a PC, lifting techniques, electrical fire safety, safety goggles, and air filtration masks. Discover material safety data sheet (MSDS) handling and disposal recommendations, including proper battery disposal, proper toner disposal, and proper disposal of other devices and assets. You will also learn the importance of temperature, humidity-level awareness, and proper ventilation, including equipment placement, dust cleanup, and compressed air and vacuums. Lastly, explore the impact of power surges, under-voltage events, and power outages and discuss when to use battery backup and surge suppressors. This course helps prepare for CompTIA A+ certification exam 220-1102.
12 videos | 57m has Assessment available Badge
CompTIA A+ Core 2: Communication Techniques, Licensing, & Policy Concepts
Professionalism is essential in any working environment, especially business operations that require interactions with customers. Learn about proper communication techniques and professionalism, such as avoiding jargon, acronyms, and slang. Explore how to maintain a positive attitude, project confidence, listen actively, and be on time. Discover how to avoid distractions including personal calls, texting, and personal interruptions. Explore how to set and meet expectations and timelines, and how to properly communicate status with the customer. Lastly, learn the importance of prohibited content/activity, privacy, licensing, and policy concepts. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h has Assessment available Badge
CompTIA A+ Core 2: Scripting & Remote Technologies
Remote access is accessing a computer or device from any location, including remotely administering networks and computing environments. Scripting is the process of automating tasks that would otherwise be performed individually by a human operator. In this course, discover how to leverage remote access technologies. First, learn the basics of scripting, including script file types, use cases, and other considerations for using scripts. Next, explore remote access methods and tools, and examine the security considerations of each access method. Finally, discover how to leverage remote access technologies and recognize remote access methods and tools, including the security considerations of each access method. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h 15m has Assessment available Badge

COURSES INCLUDED

CompTIA Network+: OSI Model Layers & Data Encapsulation
The Open Systems Interconnection, or OSI, model is used to describe how computer systems communicate with each other. Frequently used for troubleshooting network problems, the seven layers of the OSI model are concepts with which all networking professionals should be familiar In this course, you'll learn about each layer of the OSI model. You'll outline how human-readable information, such as emails and chat messages, are transferred over a network, as well as the path this information takes along the OSI model. You'll also examine data encapsulation and decapsulation within the context of the OSI model. You'll outline characteristics for Ethernet headers, IP headers, and TCP/UDP headers, and learn to differentiate between synchronization (SYN) and acknowledgement (ACK) flags. Lastly, you'll recognize the primary differences between maximum transmission unit, or MTU, and maximum segment size, or MSS, and how these concepts relate to data being transmitted over a network.
14 videos | 1h 21m has Assessment available Badge
CompTIA Network+: Network Types
Network topologies represent how computers are interconnected to form a network. There are five main network topology types - mesh, star, bus, ring, and hybrid - and each offers unique advantages and disadvantages that technicians need to be aware of. In this course, you'll explore the five topologies in detail and learn when to implement each. You'll learn about computer networks such as local area networks, metropolitan area networks, and wide area networks. Next, you explore other computer network types including peer-to-peer, client/server, wireless local area network, personal area network, and campus area network. You'll examine Multiprotocol Label Switching and how it can be used as an efficient alternative to traditional Internet Protocol routing. Lastly, you'll learn about common service related entry points, virtual networking concepts, and the common network provider links such as satellite, digital subscriber line, cable, leased line, and metro-optical
17 videos | 1h 51m has Assessment available Badge
CompTIA Network+: Cables & Connectors
Networking cables and connectors are network hardware components that allow devices to connect and communicate with each other. Different types of network cables exist, each offering different standards, limitations, and speeds. In addition to connecting devices, network cables and connectors are essential for transferring data and information between computers, routers, switches, and storage area networks. In this course, you'll examine common network cabling implementations such as copper and fiber. You'll discover how to differentiate between the different cable types, including twisted pair, coaxial, and twinaxial. You'll also explore the many different connector and transceiver types and learn common cable management responsibilities including working with patch panels and punchdown blocks. Finally, you'll learn how to differentiate between 10BASE-T, 100BASE-TX, 1000BASE-T, 10GBASE-T, and 40GBASE-T copper Ethernet standards, as well as the 100BASE-FX, 100BASE-SX, 1000BASE-SX, 1000BASE-LX, 10GBASE-SR, and 10GBASE-LR fiber Ethernet standards. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
10 videos | 57m has Assessment available Badge
CompTIA Network+: IP Addressing Schemes and Subnetting
Computers and devices each require a unique identifier, known as an IP address, in order to participate on an IP network. Using a subnet mask, the IP address is divided into a network portion and a host portion. This practice is called subnetting and it allows for an IP network to be logically subdivided or segmented. In this course, you'll learn the fundamentals of public and private IP addresses and how to use Network Address Translation and Port Address Translation to translate addresses. Next, you'll examine the differences between IPv4 and IPv6 addressing, as well as various types of addresses including unicast, multicast, and anycast. You'll learn the basics of base-2 conversions and binary values and examine classes A, B, C, D, and E, which respectively allow you to portion a network into various different sizes. Finally, you'll learn about supernetting, a more advanced form of subnetting, as well as IPv6 concepts, subinterfaces, and virtual IP addresses
18 videos | 2h 35m has Assessment available Badge
CompTIA Network+: Well-known Ports & Protocols
In terms of computer networks, protocols are used to provide a required set of rules that enable computers to exchange information. Well-known Internet protocols include Transmission Control Protocol/Internet Protocol, User Datagram Protocol/Internet Protocol, File Transfer Protocol, and Hypertext Transfer Protocol. Ports, by comparison, are used to identify a type of network or specific process. Port numbers, ranging from 0 to 65535, are typically divided into three categories - well-known ports, dynamic ports, and registered ports. In this course, you'll learn about the most commonly-known ports in use on a computer network today. These include File Transfer Protocol, Simple Mail Transfer Protocol, Domain Name System, and Hypertext Transfer Protocol. You'll examine how HTTP uses the reserved port 80 and enables computers to send and receive Web client-based communication and messages from a Web server, including web site pages and data. Next, you'll explore other key ports including, port 25, reserved for Simple Mail Transfer Protocol and how SMTP allows e-mail clients and services to send out e-mails. You'll learn how port 100, reserved for Post Office Protocol v3 and port 143, reserved for Internet Message Access Protocol, allow for e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. Lastly, you'll learn about Secure Sockets Layer and how it can be incorporated into POP3 and IMAP implementations to enable more secure encrypted e-mail communications
23 videos | 2h 39m has Assessment available Badge
CompTIA Network+: Registered Ports
With a range from 0 to 65535 split across three groups (those reserved for TCP/IP applications, registered ports, and dynamic ports), differentiating port numbers can be confusing. In this course, you'll learn how to identify and use the most common registered ports You'll examine port 1433, reserved for Structured Query Language (SQL) Server and when to use SQLnet port 1521, Remote Desktop Protocol (RDP) port 3306, and port 5060/5061, reserved for the Session Initiation Protocol (SIP). You'll then outline how IP protocols are used to facilitate Internet Protocol (IP) communication, such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), and Gateway Routing Encapsulation (GRE). Lastly, you'll examine connectionless and connection-oriented services, two data transmission services used to establish and terminate connections, exploring how they behave at the network and transport layers of the OSI model.
9 videos | 50m has Assessment available Badge
CompTIA Network+: Network Services & Data Center Architectures
All computers and network devices require an IP address to be able to connect to the Internet or other IP devices on an organizational network. In this course, you'll learn about the fundamentals of both DHCP and DNS and how DHCP can help automate the configuration of devices on an IP network. You'll explore start of authority records as well as the various DNS record types used to handle requests and translate domain names into IP addresses. You'll then review key characteristics of both the Network Time Protocol and IP Address Management. Next, you'll examine basic corporate and data center architectures, and common architectures such as three-tiered, spine and leaf. You'll learn key characteristics of software-defined networking and explore the storage area network and common connections types that include fiber channel, fiber channel over Ethernet, Internet small computer, and Systems Interface. Lastly, you'll learn about colocations and the benefits and solutions these data centers can offer. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
16 videos | 1h 38m has Assessment available Badge
CompTIA Network+: Cloud Concepts
Cloud networking is a type of Internet-based network solution that makes resources available to network users via a central, third-party platform that is typically hosted online. In this course, you'll learn about cloud deployment and service models, and explore how to select the appropriate solution depending on your organizational needs. In addition to SaaS, IaaS, and PaaS, you'll explore the benefits of using the desktop as a service software technology. You'll also learn about the relationship between local and cloud resources, as well as relevant security implications and considerations. You'll also examine how multitenancy allows multiple customers of the same cloud vendor to use the same computing resources. Finally, you will explore the effects of elasticity on cloud computing, with a focus on one of the main features of cloud computing, the ability to increase or decrease (scale) the size or power of a cloud solution. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
18 videos | 1h 56m has Assessment available Badge
CompTIA Network+: Network Implementations
Networking devices are instrumental to the delivery of data over a network. In this course, you'll learn about comparing and contrasting various networking devices to determine when and where to use them on a network. You'll also explore common networking devices such as hubs, switches, and routers in addition to network appliances used for more specialized tasks such as the Intrusion prevention system, intrusion detection system, proxy servers, and supervisory control and data acquisition systems. You'll also examine different routing technologies, including dynamic routing concepts and protocols. And you'll explore how to recognize the key differences between the Routing Information Protocol and Open Shortest Path First routing protocols, and recognize how to differentiate between link state, distance vector, and hybrid routing protocols. Lastly, you'll learn about bandwidth management concepts including traffic shaping and quality of service. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
16 videos | 1h 55m has Assessment available Badge
CompTIA Network+: Ethernet Switching & Wireless Standards
Ethernet switching enables devices such as computers and printers to communicate seamlessly with each other on the same network. In this course, you'll learn about key switching features. You'll also explore different port configurations, how Address Resolution Protocol works, and examine key features of the Neighbor Discovery Protocol. You'll also explore how to install and configure the appropriate wireless technologies and standards and learn how to differentiate between 802.11 standards, and recognize when to implement 2.4 GHz and 5 GHz wireless frequencies. You'll also learn when to deploy a service set identifier as well as basic service sets, the extended service set, independent basic service set (Ad-hoc) and roaming. Lastly, you'll learn about wireless encryption standards, cellular technologies, and multiple-input multiple-output, and multi-user MIMO. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
20 videos | 2h 10m has Assessment available Badge
CompTIA Network+: Network Operations
The goal of network operations is typically to monitor, manage, and respond to network-related incidents to ensure a network's overall availability and performance is not compromised. In this course, you'll learn about statistics and sensors available to ensure network availability. You'll explore the Simple Network Management Protocol and how it works, and examine using network device logs. You'll also learn about interface statistics, errors, and alerts, as well as environmental factors and sensors that relate to temperature, humidity, electrical, and flooding. You'll then learn about organizational documents and policies, and learn how to plan for incident response, disaster recovery, and business continuity. Lastly, you'll explore hardening and security policy planning strategies, and common documentation every organization should maintain. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
15 videos | 1h 30m has Assessment available Badge
CompTIA Network+: Disaster Recovery & High Availability Concepts
Disaster recovery and high availability are areas of security planning that involve tools, policies, and procedures that ensure the availability and recovery of critical services and infrastructure in the event of a human-induced or natural disaster. In this course, you'll explore high availability and disaster recovery concepts such as load balancing, multipathing, and network interface card teaming. You'll learn about facilities and infrastructure support concepts including uninterruptible power supply, power distribution units, generators, HVAC, and fire suppression. Lastly, you'll explore redundancy and high availability concepts including cold, warm, and hot sites, as well as network device backup and restore states and configurations. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
9 videos | 59m has Assessment available Badge
CompTIA Network+: Security Concepts & Threats
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You'll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you'll examine authentication methods and how to perform security assessments. You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
20 videos | 2h 5m has Assessment available Badge
CompTIA Network+: Physical Security & Network Hardening
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you'll learn about network hardening techniques and best practices. You'll learn to secure networks and about wireless authentication and authorization features You'll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You'll learn about remote authentication and authorization considerations and how to implement out-of-band management.
22 videos | 2h 18m has Assessment available Badge
CompTIA Network+: Network Troubleshooting Methodologies & Tools
If an incident or outage occurs, network administrators must be able to respond effectively and resolve network problems in a timely fashion. In this course, you'll learn about best practices for identifying a problem, establishing a theory of probable cause, testing theories, formulating a plan of action to resolve a problem, implementing a solution, or escalating the issue. You'll explore how to verify full system functionality and document findings, actions, outcomes, and lessons learned. You'll examine how to troubleshoot common cable connectivity issues and explore network specifications and limitations, cable considerations, and common issues such as attenuation, interference, bad ports, and duplexing issues. Lastly, you'll learn about common cable connectivity tools including cable crimpers, punchdown tools, tone generators, loopback adapters, and cable testers. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
20 videos | 1h 59m has Assessment available Badge
CompTIA Network+: Troubleshooting Network Issues
Troubleshooting network connectivity is a complex responsibility that can require various approaches and techniques in order to resolve issues. In this course, you'll learn about using the appropriate network troubleshooting software tools and commands. You'll explore software tools such as Wi-Fi analyzers and port scanners and learn about traditional command line tools and network platform commands. You'll also examine how to troubleshoot common wireless connectivity issues including issues relating to specifications and limitations. Next, you'll learn about common considerations and issues pertaining to wireless connectivity. You'll explore general network troubleshooting best practices as they relate to wired networks. Finally, you'll examine considerations such as routing tables, VLAN assignment, and other common issues. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
23 videos | 2h 44m has Assessment available Badge

COURSES INCLUDED

CompTIA Security+: Security Goals & Controls
Every long journey, including the path to Security+ certification, begins with a few steps and some fundamental practices. Security goals and controls are an important starting point for building your security skills. You will begin this course by familiarizing yourself with the four primary security goals of confidentiality, integrity, availability, and non-repudiation. You will then explore the concepts of authentication, authorization, and accounting (AAA) and how they relate to people, systems, and models. Finally, you will delve into security control categories and types. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
10 videos | 29m has Assessment available Badge
CompTIA Security+: Fundamental Security Concepts
The Security+ candidate must display competency in an assortment of core security concepts including the newer Zero Trust initiative and common physical security controls. In this course, the learner will explore gap analysis, Zero Trust control and data planes, deception technologies like honeynets, physical security controls, Change Management business processes and technical implications, and documentation and version control. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
11 videos | 33m has Assessment available Badge
CompTIA Security+: Practical Cryptography
Cryptography is at the heart of many security controls and countermeasures and as such, Security+ candidates must have a solid grasp of practical cryptography. In this course, you will discover symmetric and asymmetric cryptography and compare different encryption levels, including full disk and partition. Next, you will explore hashing, salting, hash-based message authentication codes (HMACs), and key exchange. Then you will examine digital signatures, certificates, and public key infrastructure (PKI), focusing on certificate authorities (CAs), certificate signing request (CSR) generation, and Online Certificate Status Protocol (OCSP). Finally, you will investigate cryptographic tools like Trusted Platform Module (TPM), hardware security module, and key management systems, and you will dive into blockchain technology. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
11 videos | 43m has Assessment available Badge
CompTIA Security+: Threat Actors & Vectors
One of the primary goals for an emerging security practitioner is to have a firm grasp of the present threatscape. The learner will build this vital knowledge base in this course. In this course, we will explore threat actor types, attributes, and motivations. Next, we will dive into the use of human vectors and social engineering as well as common attack surfaces. Then we will explore supply chain, application, and O/S and web-based vulnerabilities. Finally, we will cover hardware and virtualization vulnerabilities, cloud vulnerabilities, and mobile device vulnerabilities. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
12 videos | 34m has Assessment available Badge
CompTIA Security+: Survey of Malicious Activities
Malicious software, also known as malware, comes in a variety of attack vectors and characteristics. The ability to stay current with the different malware and variants is one of the biggest challenges for modern security professionals. Begin this course by exploring malware attacks like ransomware, trojan horses, and logic bombs. Then you will investigate physical and network attacks including brute force, denial-of-service, and credential replay attacks. Next, you will focus on application and cryptographic attacks, such as buffer overflow, privilege escalation, collision, and birthday attacks. Finally, you will take a look at password attacks and discover indicators of compromise, like concurrent session usage, blocked content, and impossible travel. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
9 videos | 35m has Assessment available Badge
CompTIA Security+: Mitigation Techniques
As a security professional, it is always better to be proactive with mitigation rather than purely reactive. Begin this course by exploring segmentation and isolation, access control mechanisms, and configuration and patch management. Next, you will investigate the principles of least privilege and separation of duties and find out how encryption technologies can shield private information from unauthorized users. Then you will examine the monitoring and visibility of access controls and learn the best practices for decommissioning and offboarding. Finally, you will focus on hardening techniques, including endpoint detection and response (EDR), host intrusion detection system (HIDS)/host intrusion prevention system (HIPS), disabling ports/protocols, default password changes, and removal of unnecessary software. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
10 videos | 29m has Assessment available Badge
CompTIA Security+: Architecture & Infrastructure Concepts
A physical structure that is built by engineers and architects needs solid design, construction, and ongoing maintenance. The same can be said for a networking and system environment. Begin this course by exploring fundamental security architectural considerations, including high availability, resilience, scalability, and responsiveness. Then, you will discover cloud computing, focusing on the cloud responsibility matrix, hybrid considerations, and third-party vendors. You will investigate Infrastructure as Code, compare serverless technologies, and learn about containers and microservices. Next, you will take a look at network infrastructure, centralized and decentralized design, and virtualization. Finally, you will examine industrial control systems (ICSs), Supervisory Control and Data Acquisition (SCADA) systems, and the Internet of Things. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
12 videos | 44m has Assessment available Badge
CompTIA Security+: Enterprise Infrastructure Security Principles
This course is a critical component of modern technical controls and countermeasures, as many of the technologies covered represent the daily technical activities of security practitioners, operators, and administrators. Begin by discovering various infrastructure security considerations like device placement, security zones, and failure modes. Then, you will compare network appliances and explore port security and firewalls. Next, you will examine virtual private networks (VPNs) and IP security (IPSec). Finally, you will investigate transport layer security (TLS), software-defined wide area networks (SD-WANs), and secure access service edge (SASE). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
10 videos | 43m has Assessment available Badge
CompTIA Security+: Data Protection Concepts & Strategies
It is an understatement to declare that society is rapidly becoming a data-driven and service-oriented. Data protection and security is a key aspect of modern IT security management. In this course, we will begin by exploring data states, classification, types, and lifecycles. Then we will examine considerations for securing data including geographic and cultural restrictions, encryptions, and hashing. Finally, we will look at masking, obfuscation, and tokenization as well as segmentation and compartmentalization. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
10 videos | 26m has Assessment available Badge
CompTIA Security+: Resilience & Recovery
Restoration and recovery is a vital part of a comprehensive backup plan. As a well-known axiom regarding backup strategy states, "a backup policy without tested restoration and recovery is no backup at all." In this course, we will examine restoration and recovery concepts, beginning with load balancing, clustering, and backup strategies. Next, we will explore continuity of operations, multicloud, and disaster recovery sites. We will then focus on capacity planning and testing techniques. Finally, we will look at power considerations. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
9 videos | 44m has Assessment available Badge
CompTIA Security+: Computing Resources Security Techniques
Today's security professional must contend with more types of computing systems and operating systems than ever before due to mobility, embedded, smart, and Internet of Things (IoT) devices. In this course, you will explore secure baselines and hardening targets. Then you will learn about wireless device installation issues, mobile device solutions, and connection methods. Next, you will investigate wireless security settings, cryptographic protocols, and authentication protocols. Finally, you will discover application security techniques and asset management tasks, including assignment/accounting, monitoring/asset tracking, enumeration, and disposal/decommissioning. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
9 videos | 35m has Assessment available Badge
CompTIA Security+: Vulnerability Management
Vulnerability management is an ongoing process designed to proactively protect computer systems, networks, and applications from cyberattacks and data breaches and is an integral part of your overall security system. Begin this course by exploring threat feeds like open-source intelligence (OSINT), Common Vulnerability Scoring System (CVSS), and Common Vulnerability Enumeration (CVE) to help gather information about potential threats or adversaries. Then you will investigate application vulnerability assessments for assigning severity levels, vulnerability scanning to identify known and unknown weaknesses, and penetration testing to simulate real-world attacks. Finally, you will discover vulnerability response and learn how to validate and report on remediation processes. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
8 videos | 26m has Assessment available Badge
CompTIA Security+: Security Monitoring & Alerting
Congratulations. You have convinced your steering committee to give you a huge budget, new hires, and broader access to deploy a ton of security controls at the new regional branch office. However, within weeks you will be brought back to report on the effectiveness of the new expensive toys. This is why solid monitoring and alerting are critical for success. In this course, you will explore security monitoring and alerting, beginning with monitoring computing resources, visibility, and agent-based and agentless monitoring. Then you will focus on monitoring activities like log aggregation, alert response, and validation. Next, you will discover the importance and benefits of Security Content Automation Protocol (SCAP), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) systems. Finally, you will investigate antivirus and data loss prevention (DLP) systems, Simple Network Management Protocol (SNMP) traps, and NetFlow records. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
10 videos | 31m has Assessment available Badge
CompTIA Security+: Enterprise Security Capabilities
This course is a vital exploration of many of the day-to-day operational controls that the security professional is often involved with. This is what is referred to as the "due care" aspect of the job or ongoing continual maintenance. In other words, these are core "blue team" responsibilities. Topics presented to the learner include firewalls, intrusion detection system (IDS)/intrusion prevention system (IPS), web filtering, operating system security, implementing secure protocols, DNS filtering, email security, DomainKeys Identified Mail (DKIM), Sender Policy Framework (SPF), gateways, File Integrity Monitoring (FIM), data loss prevention (DLP), network access control (NAC), endpoint detection and response (EDR), Extended Detection and Response (XDR), and user behavior analytics (UBA). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
13 videos | 53m has Assessment available Badge
CompTIA Security+: Identity and Access Management
Hybrid and remote work are more common than ever, and employees need secure access to enterprise resources from wherever they are. This is where identity and access management (IAM) comes to the rescue. The organization's IT department needs to control what users can and can't access so that sensitive data and functions are restricted to only the people and resources that need to work with them. In this course, we will explore IAM tools beginning with provisioning and deprovisioning user accounts, and password concepts including password best practices, length, complexity, reuse, expiration, age, password managers, and passwordless solutions. Next, we will look at federation and single sign-on (SSO), Lightweight Directory Access Protocol (LDAP), Open Authorization (OAuth), Security Assertions Markup Language (SAML), interoperability, and attestation. We will then consider access control models including mandatory, discretionary, role-based, rule-based, attribute-based, time-of-day restrictions, and least privilege. Finally, we will explore multi-factor authentication (MFA), biometric authentication, and privileged access management tools (PAM). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
9 videos | 42m has Assessment available Badge
CompTIA Security+: Automation, Orchestration, & Incident Response
Automation offers many advantages to information technology including higher production rates and increased productivity, more efficient use of resources, both physical and logical, better product/service quality, and improved security and safety. In this course, the learner will tackle concepts such as automation and scripting use cases, continuous integration and testing, application programming interfaces (APIs), the benefits of automation, automation considerations, the incident response process, training, testing, tabletop exercises, simulations, threat hunting, root cause analysis, digital forensics, and investigation data sources. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
10 videos | 48m has Assessment available Badge
CompTIA Security+: Effective Security Governance
According to Gartner: "Security governance is a process for overseeing the cybersecurity teams who are responsible for mitigating business risks. Security governance leaders make the decisions that allow risks to be prioritized so that security efforts are focused on business priorities rather than their own." In this course, you will further define security governance and types of governance structures. Then you will discover security governance roles and responsibilities, such as owners, stewards, and officers, and external governance considerations. Next, you will explore guidance, best practices, standards, and policies like the software development life cycle (SDLC) and change management. Finally, you will investigate security governance procedures, including playbooks, monitoring, and revision. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
9 videos | 46m has Assessment available Badge
CompTIA Security+: Risk Management
Security risk management is the ongoing process of identifying security risks and implementing plans to address them. Most security professionals should have a solid foundation in this important cross-disciplinary initiative. In this course, you will take a deep dive into security risk management, including risk identification and assessment. Then you will explore risk analysis concepts like qualitative and quantitative analysis and impact/magnitude. Next, you will discover risk treatment and handling strategies, including transfer, acceptance, and exemption. You will examine risk registers and ledgers, key risk indicators, risk owners, and risk thresholds. Finally, you will investigate risk reporting techniques and business impact analysis (BIA) to predict the consequences of a disruption to a business and collect information needed to develop recovery strategies. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
9 videos | 38m has Assessment available Badge
CompTIA Security+: Security Compliance & Third-Party Risk
Security compliance management is the collection of policies, procedures, and other internal controls that an enterprise leverages to meet its regulatory requirements for data privacy and protection. In this course, you will explore compliance monitoring topics like due diligence, attestation, and compliance automation, as well as internal and external compliance reporting. Then you investigate the consequences of non-compliance, including fines, sanctions, and reputational damage. Next, you will examine privacy considerations for keeping information involving people confidential. Finally, you will assess vendor assessment and selection techniques like supply chain analysis and rules of engagement, and you will discover various agreement types, such as non-disclosure agreements (NDAs), service-level agreements (SLAs), and statements of work (SOWs). This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
8 videos | 35m has Assessment available Badge
CompTIA Security+: Audits, Assessments, & Awareness
A security audit is a systematic and methodical examination of an organization's security infrastructure, policies, and procedures. The goal is to identify vulnerabilities, weaknesses, and potential threats to sensitive information assets, physical assets, and personnel. In this final course, the learner will be exposed to topics such as internal and external audit and attestation, penetration testing audits, user guidance and training, phishing campaigns, and security training monitoring and reporting. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
8 videos | 23m has Assessment available Badge

COURSES INCLUDED

CompTIA CASP+: Assessing & Managing Risk
Recognizing threats and managing risk are key to hardening an organization's security posture. In this course, you'll explore how to apply risk management frameworks to assess and mitigate risk, as well as how to identify threat actors and physical risks. Next, you'll learn how to mitigate risks related to human resources and social engineering techniques. You'll then move on to examine how to work with qualitative and quantitative risk analysis. Lastly, you'll learn about insider threats, supply chain dependencies, and sources of threat intelligence. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
15 videos | 1h 25m has Assessment available Badge
CompTIA CASP+: Virtualization Security
Securing today's enterprise computing environments means understanding how virtualization is used. Organizations must consider how to secure virtualization solutions used both on-premises in and the cloud. In this course, you'll learn to identify various types of virtualization solutions such as network virtualization, operating system virtualization, desktop, and app virtualization. You will then learn to distinguish the difference between type 1 and type 2 hypervisors. Next, you'll focus on virtualization security and how to deploy virtual machines on-premises. Lastly, you'll learn to work with application containers. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
12 videos | 1h has Assessment available Badge
CompTIA CASP+: Secure Cloud Computing
Cloud computing is widely used by individuals and enterprises to outsource IT solutions. In this course, you'll begin with learning how to identify cloud deployment and service models. Next, you'll review cloud service level agreements, cloud security solutions, and how to work with cloud VNets. Moving on, you'll learn how to configure cloud autoscaling to increase application availability. You'll also explore now to deploy a cloud-based firewall, configure firewall routing, and enable RDP through cloud firewalls. Lastly, you'll learn how to create a cloud key vault and enable cloud storage security. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
19 videos | 1h 50m has Assessment available Badge
CompTIA CASP+: Cryptography & PKI
Cryptography has long played a role in securing sensitive information. In this course, you'll begin with an overview of cryptography and how it can secure data at rest and data in motion. You'll then learn how to enable EFS and BitLocker to protect data at rest. You'll explore how to identify methods by which cryptography can protect data in transit and configure network security via IPsec. Finally, you'll examine how PKI uses certificates to secure IT systems through HTTPS, SSH remote management, and generating file system hashes. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
17 videos | 1h 51m has Assessment available Badge
CompTIA CASP+: Storage & Network Security
On-premises and cloud-based storage security solutions are very similar in nature. In this course, you'll learn how to determine which RAID disk solution best applies in a given situation, as well as how to secure various network storage solutions and DNS. Next, you'll learn to recognize when to apply firewalls to secure networks and how to configure various firewall solutions. Moving on, you'll explore how to configure a VPN and secure wired and wireless networks. Lastly, you'll examine how to manage servers through a jump box and how attackers enable reverse shells. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
16 videos | 1h 47m has Assessment available Badge
CompTIA CASP+: Authentication & Authorization
Securing user and device logins, as well as access to IT resources, relates to authentication and authorization. In this course, you'll learn how to differentiate between authentication and authorization and also ow to enable 2FA and MFA user authentication. Next, you'll explore how to enable Wi-Fi RADIUS authentication, configure SELinux, and enable attribute-based control in Windows. Lastly, you'll examine how to use Group Policy to configure password policy settings, crack passwords using freely available tools like the Johnny tool, brute-force RDP using Hydra, and limit cloud admin access using role-based access control. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
11 videos | 1h 1m has Assessment available Badge
CompTIA CASP+: IT Governance & Security Compliance
IT governance involves ensuring that business and regulatory compliance needs are met by IT solutions. In this course, you'll learn to identify common data privacy standards and regulations, as well as various types of business agreements. Next, you'll learn to classify personally identifiable information using various methods including Macie for data discovery and classification. You'll explore how to use Azure Information Protection to enable DLP and tag cloud resources to facilitate resource management. You'll then examine how to securely wipe a storage device and identify common organization security policies. Lastly, you'll learn how to identify data roles and configure cloud data retention. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
12 videos | 1h 7m has Assessment available Badge
CompTIA CASP+: Mobile & Embedded Devices
Mobile devices have become ubiquitous and as a result deserve the attention of cybersecurity specialists. In this course, you'll explore how mobile, embedded, drones, and IoT devices are used and their related security risks. Next, you'll learn how to search for vulnerable devices using the Shodan web site. Moving on, you'll explore how to secure remote network connectivity with a VPN and examine smartphone hardening techniques. Lastly, you'll learn how to register and manage an Android device using a Mobile Device Management solution. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
8 videos | 42m has Assessment available Badge
CompTIA CASP+: Industrial Computing Environments
Industrial control systems present a unique security risk when it comes to public services such as power, water, and other industrial processes. In this course, you'll learn how to recognize common industrial network protocols and terminology. Next, you'll learn how Supervisory Control and Data Acquisition relates to industrial control systems. You'll explore NIST ICS security control documentation. Lastly, you'll learn how to configure an S7 PLC emulator and use Metasploit to stop the device. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
8 videos | 39m has Assessment available Badge
CompTIA CASP+: Emerging Technologies & SecDevOps
Emerging technologies present unique security risks in that the technology is not yet mature. Software developers must adhere to secure development practices to minimize threat impacts. In this course, you'll learn how to identify security risks associated with emerging technologies such as machine learning, artificial intelligence, blockchain, quantum computing, and 3-D printing. You'll also learn to identify the top 10 web app threats and use the OWASP ZAP tool to identify web app vulnerabilities. Next, you'll explore how to securely develop and deploy software solutions. Lastly, you learn to distinguish between various testing techniques. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
8 videos | 43m has Assessment available Badge
CompTIA CASP+: Monitoring & Incident Response
Enterprise IT monitoring is crucial in detecting potential security incidents. In this course, you'll explore various monitoring methods for hosts, devices, and networks. Next, you'll learn to configure log forwarding and work with logs through PowerShell. Moving on, you'll learn to recognize when to use honeyfiles, honeypots, and honeynets, as well as SIEM and SOAR solutions. You'll then examine intrusion detection and prevention and how they are used to secure a network. Lastly, you'll explore the use of tools such as Snort, tcpdump, nmap, and Wireshark for analyzing networks and network traffic. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
15 videos | 1h 27m has Assessment available Badge
CompTIA CASP+: Vulnerabilities & Hardening
Cybersecurity specialists must be able to identify vulnerabilities and apply security controls to mitigate threats. In this course, you'll learn how to identify the steps attackers take to gain access to resources and examine physical security issues. Next, you'll learn how network segmentation can increase security, how attackers use zombies and botnets, and how common attacks take place. Moving on, you'll explore common hardening techniques, how to scan for vulnerabilities, and how to setup up a WSUS server. Lastly, you'll learn how to use the Metasploit framework and crack WPA2 Wi-Fi passphrases. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
13 videos | 1h has Assessment available Badge
CompTIA CASP+: Digital Forensics
Gathering digital evidence for use in a court of law is done using very specific techniques. In this course, you'll learn to recognize the process by which hardware and software digital forensic tools are used to acquire and analyze evidence. Next, you'll learn to work with file system hashing and forensic disk image acquisition including creating and hashing a Linux disk image. You'll also explore how to use FTK imager to acquire a forensic disk image. Lastly, you'll explore how to retrieve Android device information using the Android Debug Bridge and hide messages using steganography. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
8 videos | 39m has Assessment available Badge
CompTIA CASP+: Business Continuity
Business continuity measures ensure that business operations continue during disruptions. In this course, you'll learn how to identify common disaster recovery terms and techniques and plan how to respond to business disruptions. Next, you'll learn to identify how to use physical and logical redundancy, clustering and load balancing to increase system and application availability. Lastly, you'll explore cloud-based load balancing and backups including learning how to configure and deploy a Microsoft Azure Load Balancer as well as back up data using Microsoft Azure. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
7 videos | 35m has Assessment available Badge

COURSES INCLUDED

CISSP 2024: Professional Ethics & Security Concepts
Regardless of the guidance that one is following as a security professional, one common theme is that architects must be held to a high ethical standard based on their responsibility to manage risk to all assets. In this course, you will explore the International Information System Security Certification Consortium (ISC2) Code of Professional Ethics. Then you will discover organizational codes of ethics, which establish an integral aspect of a mission and model adopted by an organization. Finally, you will focus on the Five Pillars of information security - confidentiality, integrity, availability, authenticity, and non-repudiation. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
9 videos | 18m has Assessment available Badge
CISSP 2024: Security Governance & Compliance Issues
Security governance is the set of practices exercised by executive management to offer strategic direction, ensuring that objectives are achieved, determining that risks are managed properly, and verifying that the organizations' resources are used responsibly. Begin this course by discovering how to align security governance with organizational goals and objectives. Then you will explore organizational processes like acquisitions, divestitures, and governance committees, as well as organizational roles and responsibilities. You will investigate security control frameworks like including the International Organization for Standardization (ISO), the National Institute of Standards and Technology (NIST) and learn about due diligence, due care, cybercrimes, and data breaches. Next, you will examine licensing and intellectual property requirements, import and export controls, transborder data flow, and privacy-related issues. Finally, you will focus on contractual, legal, industry standards and regulatory requirements. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
12 videos | 42m has Assessment available Badge
CISSP 2024: Investigations & Policies
Cybercrime investigation is a critical practice in a modern security landscape. In this field, skilled security professionals from agencies like the FBI use digital forensics to track, analyze, and dismantle various types of cybercrime and cyber threats. This course covers several CISSP exam objectives. You will begin by exploring the requirements for administrative, criminal, civil, regulatory, and industry investigations. You will then learn to develop, document, and implement security policy, standards, procedures, and guidelines. Finally, you will discover considerations for the enforcement of personnel security policies and procedures. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
7 videos | 32m has Assessment available Badge
CISSP 2024: Risk Management Concepts
Security risk management involves the continual process of identifying security risks and implementing strategy and tactics to mitigate them. It is a vital component of any organization's strategy to protect its assets, ensure regulatory compliance, maintain operational continuity, and safeguard its reputation. Begin this course by exploring threat and vulnerability identification, as well as risk analysis, assessment, and response. Next, you will discover control categories, types, and assessments. Then you will investigate continuous monitoring and measurement and risk management reporting. Finally, you will examine continuous improvement and risk frameworks as you gain the essential skills to protect and secure your organization's critical resources. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
11 videos | 45m has Assessment available Badge
CISSP 2024: Threat Modeling, SCRM, & Security Awareness
Threat modeling uses hypothetical scenarios, system and data flow diagrams, and testing to assist in securing systems, applications and data. In this course, the learner will explore threat modeling concepts and methodologies, supply chain risk management (SCRM) concepts, and ways to establish and maintain a security awareness, education, and training program. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
8 videos | 29m has Assessment available Badge
CISSP 2024: Asset Classification, Handling, & Provisioning
It is an established principle that before risk can be assessed and analyzed, an organization must know what physical and software resources they have. This enables businesses to categorize and allocate their assets effectively, thus mitigating risks, optimizing usage, and potentially saving costs. Begin this course by exploring general asset classification, types of assets, and restricted, confidential, internal, and public data. Then you will discover information and asset handling requirements and secure provisioning of assets. Next, you will investigate different use cases for asset ownership. Finally, you will examine tangible and intangible asset inventory and asset management per International Organization for Standardization (ISO) guidelines. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
9 videos | 23m has Assessment available Badge
CISSP 2024: Data Lifecycle, Controls, & Compliance
Data is one of the highest-priority assets that most organizations possess. For CISSP professionals, understanding the data lifecycle to ensure that security measures are applied at each stage to protect sensitive information, controls, and compliance is crucial. Together, these elements form the backbone of a robust security strategy, ensuring that data is managed securely throughout its lifecycle, mitigating risks through effective controls, and meeting legal and regulatory requirements. Begin this course by exploring various data roles like owner, controllers, and processors, as well as in use, in transit, and at rest data states. Then you will delve into the phases of the data lifecycle, including data collection, data location, data maintenance, data retention and remanence, and data destruction. Next, you will compare data scoping to data tailoring and learn how to select appropriate data security and privacy standards. Finally, you will focus on data protection methods, including digital rights management (DRM), data loss prevention (DLP), and cloud access security brokers (CASBs). This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
12 videos | 34m has Assessment available Badge
CISSP 2024: Secure Design Principles & Models
For the CISSP exam, one must be able to understand a variety of security design principles and practices. The topics in this course cover the following Domain 3 objectives: research, implement, and manage engineering processes using secure design principles and understand the fundamental concepts of security models. Begin by exploring the importance of least privilege and defense in depth to create multi-layered security defenses and restrict access to sensitive information. You will then look at concepts of segregation of duties (SOD), keeping it simple and small, and privacy by default and design. Next, you will consider how the shared responsibility model is crucial for participants to grasp the roles and accountability in cloud and collaborative environments. You will also explore threat modeling techniques to identify, evaluate, and mitigate potential security threats. Finally, you will compare zero trust vs. trust, explore the secure access service edge (SASE) framework, and consider the fundamental concepts of security models such as Bell-LaPadula, Biba, Star, and Clark-Wilson. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
12 videos | 40m available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 29 users Rating 4.7 of 29 users (29)
Rating 4.7 of 26 users Rating 4.7 of 26 users (26)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)