IT Operations Specialist Package - CTU Training Solutions
Loading...
ONLINE APPLICATION
×

Save 13%

IT Operations Specialist Package

The CompTIA A+ certification is the industry standard for computer support technicians. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting. CompTIA A+ certified technicians also have excellent customer service and communication skills to work with clients. The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technician’s competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure. Although not a prerequisite, it is recommended that CompTIA Network+ candidates have at least nine months of experience in network support or administration or academic training, along with a CompTIA A+ certification.
Duration: 24 Evenings and Saturdays (3 months)   |   Location : Online
Request A Quote View CompTIA Roadmap

Virtual Interactive Lecturer-led Teaching (VILT)

Virtual instruction environments are designed to simulate the traditional classroom or learning experience. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Additional Terms of this Package

  • *Two evenings per week and two Saturdays per month

Course Content

CompTIA A+ (16 Evenings and Saturdays)

  • 220-902: CompTIA A+ Hardware

    • 1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
    • 1.2 Explain the importance of motherboard components, their purpose, and properties.
    • 1.3 Compare and contrast various RAM types and their features.
    • 1.4 Install and configure PC expansion cards.
    • 1.5 Install and configure storage devices and use appropriate media.
    • 1.6 Install various types of CPUs and apply the appropriate cooling methods.
    • 1.7 Compare and contrast various PC connection interfaces, their characteristics and purpose.
    • 1.8 Install a power supply based on given specifications.
    • 1.9 Given a scenario, select the appropriate components for a custom PC configuration, to meet customer specifications or needs.
    • 1.10 Compare and contrast types of display devices and their features.
    • 1.11 Identify common PC connector types and associated cables.
    • 1.12 Install and configure common peripheral devices.
    • 1.13 Install SOHO multifunction device / printers and configure appropriate settings.
    • 1.14 Compare and contrast differences between the various print technologies and the associated imaging process.
    • 1.15 Given a scenario, perform appropriate printer maintenance.
  • 220-901: CompTIA A+ Networking

    • 2.1 Identify the various types of network cables and connectors.
    • 2.2 Compare and contrast the characteristics of connectors and cabling.
    • 2.3 Explain the properties and characteristics of TCP/IP.
    • 2.4 Explain common TCP and UDP ports, protocols, and their purpose.
    • 2.5 Compare and contrast various WiFi networking standards and encryption types.
    • 2.6 Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings.
    • 2.7 Compare and contrast Internet connection types, network types, and their features.
    • 2.8 Compare and contrast network architecture devices, their functions, and features.
    • 2.9 Given a scenario, use appropriate networking tools.
  • 220-901 CompTIA A+ Mobile Devices
    • 3.1 Install and configure laptop hardware and components.
    • 3.2 Explain the function of components within the display of a laptop.
    • 3.3 Given a scenario, use appropriate laptop features.
    • 3.4 Explain the characteristics of various types of other mobile devices.
    • 3.5 Compare and contrast accessories & ports of other mobile devices.
  • 220-901: CompTIA A+ Hardware and Network Troubleshooting
    • 4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
    • 4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
    • 4.3 Given a scenario, troubleshoot common video, projector and display issues.
    • 4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
    • 4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
    • 4.6 Given a scenario, troubleshoot printers with appropriate tools.
  • 220-902: CompTIA A+ Windows Operating Systems
    • 1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
    • 1.2 Given a scenario, install Windows PC operating systems using appropriate methods.
    • 1.3 Given a scenario, apply appropriate Microsoft command line tools.
    • 1.4 Given a scenario, use appropriate Microsoft operating system features and tools.
    • 1.5 Given a scenario, use Windows Control Panel utilities.
    • 1.6 Given a scenario, install and configure Windows networking on a client/desktop.
    • 1.7 Perform common preventive maintenance procedures using the appropriate Windows
  • 220-1002: CompTIA A+ Other Operating Systems and Technologies
    • 2.1 Identify common features and functionality of the Mac OS and Linux operating systems.
    • 2.2 Given a scenario, setup and use client-side virtualization.
    • 2.3 Identify basic cloud concepts.
    • 2.4 Summarize the properties and purpose of services provided by networked hosts.
    • 2.5 Identify basic features of mobile operating systems.
    • 6.6 Install and configure basic mobile device network connectivity and email.
    • 2.7 Summarize methods and data related to mobile device synchronization.
  • 220-902: CompTIA A+ Security
    • 3.1 Identify common security threats and vulnerabilities.
    • 3.2 Compare and contrast common prevention methods.
    • 3.3 Compare and contrast differences of basic Windows OS security settings.
    • 3.4 Given a scenario, deploy and enforce security best practices to secure a workstation.
    • 3.5 Compare and contrast various methods for securing mobile devices.
    • 3.6 Given a scenario, use appropriate data destruction and disposal methods.
    • 3.7 Given a scenario, secure SOHO wireless and wired networks.
  • 220-902: CompTIA A+ Software Troubleshooting
    • 4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools.
    • 4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.
    • 4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.
    • 4.4 Given a scenario, troubleshoot common mobile OS and application security issues with
  • 220-902: CompTIA A+ Operational Procedures
    • 5.1 Given a scenario, use appropriate safety procedures.
    • 5.2 Given a scenario with potential environmental impacts, apply the appropriate controls.
    • 5.3 Summarize the process of addressing prohibited content/activity, and explain privacy,
    • 5.4 Demonstrate proper communication techniques and professionalism.
    • 5.5 Given a scenario, explain the troubleshooting theory.

See fewer details

CompTIA Network+ (8 Evenings and Saturdays)

  • Module 1 / Local Area Networks

    • Topologies and the OSI Model
      • Key Features of Networks
      • Network Topologies
      • The OSI Model
      • Physical Layer
      • Data Link Layer
      • Network Layer
      • Transport Layer
      • Upper Layers
      • OSI Model Summary
      • Labs
      • VM Orientation
    • Ethernet
      • Transmission Media
      • Media Access Control
      • Broadcast Domains
      • Ethernet Frames
      • Ethernet Deployment Standards
      • MAC Addressing
      • Address Resolution Protocol (ARP)
      • Packet Sniffers
      • Labs
      • Configuring Ethernet Networking
    • Hubs, Bridges, and Switches
      • Hubs and Bridges
      • Switches
      • Switch Interface Configuration
      • Spanning Tree Protocol (STP)
      • Power over Ethernet (PoE)
    • Infrastructure and Design
      • Network Infrastructure Implementations
      • Planning an Enterprise Campus Network
      • Network Hierarchy and Distributed Switching
      • Software Defined Networking
      • Planning a SOHO Network
      • TCP/IP Protocol Suite
    • Policies and Best Practices
      • Procedures and Standards
      • Safety Procedures
      • Incident Response Policies
      • Security and Data Policies
      • Password Policy
      • Employee Policies
  • Module 2 / IP Addressing
  • Internet Protocol
    • IPv4
    • IPv4 Address Structure
    • Subnet Masks
    • IP Routing Basics
    • ipconfig / ifconfig
    • ICMP and ping
    • Labs
    • Configuring IPv4 Networking
  • IPv4 Addressing
    • IPv4 Addressing Schemes
    • Classful Addressing
    • Public versus Private Addressing
    • Subnetting and Classless Addressing
    • Planning an IPv4 Addressing Scheme
    • Public Internet Addressing
    • Variable Length Subnet Masks (VLSM)
    • Labs
    • Configuring IPv4 Subnets
  • IPv6 Addressing
    • IPv6 Address Format
    • IPv6 Addressing Schemes
    • IPv6 Address Autoconfiguration
    • Migrating to IPv6
    • Labs
    • Configuring IPv6 Networking
  • DHCP and APIPA
    • IPv4 Address Autoconfiguration
    • Configuring DHCP
    • DHCPv6
    • Labs
    • Configuring Address Autoconfiguration
  • Module 3 / Internetworking
  • Routing
    • Routing Basics
    • Routing Algorithms and Metrics
    • Dynamic Routing Protocols
    • Administrative Distance and Route Redistribution
    • IPv4 and IPv6 Internet Routing
    • High Availability Routing
    • Installing and Configuring Routers
    • Routing Troubleshooting Tools
    • Labs
    • Configuring Routing
  • TCP and UDP
    • Transmission Control Protocol (TCP)
    • User Datagram Protocol (UDP)
    • TCP and UDP Ports
    • Port Scanners
    • Protocol Analyzers
    • Labs
    • TCP and Port Scanning
  • Name Resolution and IPAM
    • Host Names and FQDNs
    • Domain Name System
    • Configuring DNS Servers
    • Resource Records
    • Name Resolution Tools
    • IP Address Management (IPAM)
    • Labs
    • Configuring Name Resolution and IPAM
  • Monitoring and Scanning
    • Performance Monitoring
    • Network Monitoring Utilities
    • Logs and Event Management
    • Simple Network Management Protocol
    • Analyzing Performance Metrics
    • Patch Management
    • Vulnerability Scanning
    • Labs
    • Performance Testing and Monitoring
  • Network Troubleshooting
    • Troubleshooting Procedures
    • Identifying the Problem
    • Establishing a Probable Cause
    • Establishing a Plan of Action
    • Troubleshooting Hardware Failure Issues
    • Troubleshooting Addressing Issues
    • Troubleshooting DHCP Issues
    • Troubleshooting Name Resolution
    • Troubleshooting Services
  • Module 4 / Applications and Security
  • Applications and Services
    • TCP/IP Services
    • HTTP and Web Servers
    • SSL / TLS and HTTPS
    • Email (SMTP / POP / IMAP)
    • Voice Services (VoIP and VTC)
    • Real-time Services Protocols
    • Quality of Service
    • Traffic Shaping
    • Bottlenecks and Load Balancing
    • Multilayer Switches
    • Labs
    • Configuring Application Protocols
  • Virtualization, SAN, and Cloud Services
    • Virtualization Technologies
    • Network Storage Types
    • Fibre Channel and InfiniBand
    • iSCSI
    • Cloud Computing
    • Configuring Cloud Connectivity
  • Network Security Design
    • Security Basics
    • Common Networking Attacks
    • Network Segmentation and DMZ
    • Virtual LANs (VLAN)
    • VLAN Trunks
    • Network Address Translation (NAT)
    • Device and Service Hardening
    • Honeypots and Penetration Tests
  • Network Security Appliances
    • Basic Firewalls
    • Stateful Firewalls
    • Deploying a Firewall
    • Configuring a Firewall
    • Deploying a Proxy
    • Intrusion Detection Systems (IDS)
    • Denial of Service
    • Labs
    • Configuring a NAT Firewall
  • Authentication and Endpoint Security
    • Authentication and Access Controls
    • Social Engineering
    • Authentication Technologies
    • PKI and Digital Certificates
    • Local Authentication
    • RADIUS and TACACS+
    • Directory Services
    • Endpoint Security
    • Network Access Control
    • Labs
    • Secure Appliance Administration
  • Module 5 / Operations and Infrastructure
  • Network Site Management
    • Network Cabling Solutions
    • Distribution Frames
    • Change and Configuration Management
    • Network Documentation and Diagrams
    • Labeling
    • Physical Security Devices
    • Business Continuity and Disaster Recovery
    • Network Link Management
    • Power Management
    • Backup Management
    • Labs
    • Network Inventory Management
  • Installing Cabled Networks
    • Twisted Pair Cable (UTP / STP / ScTP)
    • Twisted Pair Connectors
    • Wiring Tools and Techniques
    • Cable Testing Tools
    • Troubleshooting Wired Connectivity
    • Other Copper Cable Types
    • Fiber Optic Cable and Connectors
    • Transceivers and Media Converters
  • Installing Wireless Networks
    • Wireless Standards (IEEE 802.11)
    • Wireless Network Topologies
    • Wireless Site Design
    • Troubleshooting Wireless Connectivity
    • Wireless Security
    • Wi-Fi Authentication
    • Extensible Authentication Protocol
    • Troubleshooting Wireless Security
    • Wireless Controllers
  • Installing WAN Links
    • Wide Area Networks (WAN)
    • Telecommunications Networks
    • Modern Telecommunications Networks
    • Local Loop Services
    • Installing WAN Links
    • Wireless WAN Services
    • Internet of Things
  • Configuring Remote Access
    • Remote Access Services (RAS)
    • MPLS and PPP
    • SIP Trunks
    • Virtual Private Networks (VPN)
    • SSL / TLS / DTLS VPNs
    • IPsec
    • Internet Key Exchange / ISAKMP
    • Remote Access Servers
    • Remote Administration Tools
    • Managing Network Appliances
    • Remote File Access
    • Labs
    • Configuring Secure Access Channels
    • Configuring a Virtual Private Network

+ See more details

CTU Training Solutions , Updated: February 3rd, 2020

Request A Quote

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Open chat
1
Need Help?
Hello
How can we assist you today?