Additional Terms of this Package
- *Two evenings per week and two Saturdays per month
Course Content
CompTIA A+ (16 Evenings and Saturdays)
-
220-902: CompTIA A+ Hardware
- 1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
- 1.2 Explain the importance of motherboard components, their purpose, and properties.
- 1.3 Compare and contrast various RAM types and their features.
- 1.4 Install and configure PC expansion cards.
- 1.5 Install and configure storage devices and use appropriate media.
- 1.6 Install various types of CPUs and apply the appropriate cooling methods.
- 1.7 Compare and contrast various PC connection interfaces, their characteristics and purpose.
- 1.8 Install a power supply based on given specifications.
- 1.9 Given a scenario, select the appropriate components for a custom PC configuration, to meet customer specifications or needs.
- 1.10 Compare and contrast types of display devices and their features.
- 1.11 Identify common PC connector types and associated cables.
- 1.12 Install and configure common peripheral devices.
- 1.13 Install SOHO multifunction device / printers and configure appropriate settings.
- 1.14 Compare and contrast differences between the various print technologies and the associated imaging process.
- 1.15 Given a scenario, perform appropriate printer maintenance.
-
220-901: CompTIA A+ Networking
- 2.1 Identify the various types of network cables and connectors.
- 2.2 Compare and contrast the characteristics of connectors and cabling.
- 2.3 Explain the properties and characteristics of TCP/IP.
- 2.4 Explain common TCP and UDP ports, protocols, and their purpose.
- 2.5 Compare and contrast various WiFi networking standards and encryption types.
- 2.6 Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings.
- 2.7 Compare and contrast Internet connection types, network types, and their features.
- 2.8 Compare and contrast network architecture devices, their functions, and features.
- 2.9 Given a scenario, use appropriate networking tools.
- 220-901 CompTIA A+ Mobile Devices
- 3.1 Install and configure laptop hardware and components.
- 3.2 Explain the function of components within the display of a laptop.
- 3.3 Given a scenario, use appropriate laptop features.
- 3.4 Explain the characteristics of various types of other mobile devices.
- 3.5 Compare and contrast accessories & ports of other mobile devices.
- 220-901: CompTIA A+ Hardware and Network Troubleshooting
- 4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
- 4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
- 4.3 Given a scenario, troubleshoot common video, projector and display issues.
- 4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
- 4.5 Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
- 4.6 Given a scenario, troubleshoot printers with appropriate tools.
- 220-902: CompTIA A+ Windows Operating Systems
- 1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
- 1.2 Given a scenario, install Windows PC operating systems using appropriate methods.
- 1.3 Given a scenario, apply appropriate Microsoft command line tools.
- 1.4 Given a scenario, use appropriate Microsoft operating system features and tools.
- 1.5 Given a scenario, use Windows Control Panel utilities.
- 1.6 Given a scenario, install and configure Windows networking on a client/desktop.
- 1.7 Perform common preventive maintenance procedures using the appropriate Windows
- 220-1002: CompTIA A+ Other Operating Systems and Technologies
- 2.1 Identify common features and functionality of the Mac OS and Linux operating systems.
- 2.2 Given a scenario, setup and use client-side virtualization.
- 2.3 Identify basic cloud concepts.
- 2.4 Summarize the properties and purpose of services provided by networked hosts.
- 2.5 Identify basic features of mobile operating systems.
- 6.6 Install and configure basic mobile device network connectivity and email.
- 2.7 Summarize methods and data related to mobile device synchronization.
- 220-902: CompTIA A+ Security
- 3.1 Identify common security threats and vulnerabilities.
- 3.2 Compare and contrast common prevention methods.
- 3.3 Compare and contrast differences of basic Windows OS security settings.
- 3.4 Given a scenario, deploy and enforce security best practices to secure a workstation.
- 3.5 Compare and contrast various methods for securing mobile devices.
- 3.6 Given a scenario, use appropriate data destruction and disposal methods.
- 3.7 Given a scenario, secure SOHO wireless and wired networks.
- 220-902: CompTIA A+ Software Troubleshooting
- 4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools.
- 4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.
- 4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.
- 4.4 Given a scenario, troubleshoot common mobile OS and application security issues with
- 220-902: CompTIA A+ Operational Procedures
- 5.1 Given a scenario, use appropriate safety procedures.
- 5.2 Given a scenario with potential environmental impacts, apply the appropriate controls.
- 5.3 Summarize the process of addressing prohibited content/activity, and explain privacy,
- 5.4 Demonstrate proper communication techniques and professionalism.
- 5.5 Given a scenario, explain the troubleshooting theory.
– See fewer details
CompTIA Network+ (8 Evenings and Saturdays)
-
Module 1 / Local Area Networks
- Topologies and the OSI Model
- Key Features of Networks
- Network Topologies
- The OSI Model
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Upper Layers
- OSI Model Summary
- Labs
- VM Orientation
- Ethernet
- Transmission Media
- Media Access Control
- Broadcast Domains
- Ethernet Frames
- Ethernet Deployment Standards
- MAC Addressing
- Address Resolution Protocol (ARP)
- Packet Sniffers
- Labs
- Configuring Ethernet Networking
- Hubs, Bridges, and Switches
- Hubs and Bridges
- Switches
- Switch Interface Configuration
- Spanning Tree Protocol (STP)
- Power over Ethernet (PoE)
- Infrastructure and Design
- Network Infrastructure Implementations
- Planning an Enterprise Campus Network
- Network Hierarchy and Distributed Switching
- Software Defined Networking
- Planning a SOHO Network
- TCP/IP Protocol Suite
- Policies and Best Practices
- Procedures and Standards
- Safety Procedures
- Incident Response Policies
- Security and Data Policies
- Password Policy
- Employee Policies
- Topologies and the OSI Model
- Module 2 / IP Addressing
- Internet Protocol
- IPv4
- IPv4 Address Structure
- Subnet Masks
- IP Routing Basics
- ipconfig / ifconfig
- ICMP and ping
- Labs
- Configuring IPv4 Networking
- IPv4 Addressing
- IPv4 Addressing Schemes
- Classful Addressing
- Public versus Private Addressing
- Subnetting and Classless Addressing
- Planning an IPv4 Addressing Scheme
- Public Internet Addressing
- Variable Length Subnet Masks (VLSM)
- Labs
- Configuring IPv4 Subnets
- IPv6 Addressing
- IPv6 Address Format
- IPv6 Addressing Schemes
- IPv6 Address Autoconfiguration
- Migrating to IPv6
- Labs
- Configuring IPv6 Networking
- DHCP and APIPA
- IPv4 Address Autoconfiguration
- Configuring DHCP
- DHCPv6
- Labs
- Configuring Address Autoconfiguration
- Module 3 / Internetworking
- Routing
- Routing Basics
- Routing Algorithms and Metrics
- Dynamic Routing Protocols
- Administrative Distance and Route Redistribution
- IPv4 and IPv6 Internet Routing
- High Availability Routing
- Installing and Configuring Routers
- Routing Troubleshooting Tools
- Labs
- Configuring Routing
- TCP and UDP
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- TCP and UDP Ports
- Port Scanners
- Protocol Analyzers
- Labs
- TCP and Port Scanning
- Name Resolution and IPAM
- Host Names and FQDNs
- Domain Name System
- Configuring DNS Servers
- Resource Records
- Name Resolution Tools
- IP Address Management (IPAM)
- Labs
- Configuring Name Resolution and IPAM
- Monitoring and Scanning
- Performance Monitoring
- Network Monitoring Utilities
- Logs and Event Management
- Simple Network Management Protocol
- Analyzing Performance Metrics
- Patch Management
- Vulnerability Scanning
- Labs
- Performance Testing and Monitoring
- Network Troubleshooting
- Troubleshooting Procedures
- Identifying the Problem
- Establishing a Probable Cause
- Establishing a Plan of Action
- Troubleshooting Hardware Failure Issues
- Troubleshooting Addressing Issues
- Troubleshooting DHCP Issues
- Troubleshooting Name Resolution
- Troubleshooting Services
- Module 4 / Applications and Security
- Applications and Services
- TCP/IP Services
- HTTP and Web Servers
- SSL / TLS and HTTPS
- Email (SMTP / POP / IMAP)
- Voice Services (VoIP and VTC)
- Real-time Services Protocols
- Quality of Service
- Traffic Shaping
- Bottlenecks and Load Balancing
- Multilayer Switches
- Labs
- Configuring Application Protocols
- Virtualization, SAN, and Cloud Services
- Virtualization Technologies
- Network Storage Types
- Fibre Channel and InfiniBand
- iSCSI
- Cloud Computing
- Configuring Cloud Connectivity
- Network Security Design
- Security Basics
- Common Networking Attacks
- Network Segmentation and DMZ
- Virtual LANs (VLAN)
- VLAN Trunks
- Network Address Translation (NAT)
- Device and Service Hardening
- Honeypots and Penetration Tests
- Network Security Appliances
- Basic Firewalls
- Stateful Firewalls
- Deploying a Firewall
- Configuring a Firewall
- Deploying a Proxy
- Intrusion Detection Systems (IDS)
- Denial of Service
- Labs
- Configuring a NAT Firewall
- Authentication and Endpoint Security
- Authentication and Access Controls
- Social Engineering
- Authentication Technologies
- PKI and Digital Certificates
- Local Authentication
- RADIUS and TACACS+
- Directory Services
- Endpoint Security
- Network Access Control
- Labs
- Secure Appliance Administration
- Module 5 / Operations and Infrastructure
- Network Site Management
- Network Cabling Solutions
- Distribution Frames
- Change and Configuration Management
- Network Documentation and Diagrams
- Labeling
- Physical Security Devices
- Business Continuity and Disaster Recovery
- Network Link Management
- Power Management
- Backup Management
- Labs
- Network Inventory Management
- Installing Cabled Networks
- Twisted Pair Cable (UTP / STP / ScTP)
- Twisted Pair Connectors
- Wiring Tools and Techniques
- Cable Testing Tools
- Troubleshooting Wired Connectivity
- Other Copper Cable Types
- Fiber Optic Cable and Connectors
- Transceivers and Media Converters
- Installing Wireless Networks
- Wireless Standards (IEEE 802.11)
- Wireless Network Topologies
- Wireless Site Design
- Troubleshooting Wireless Connectivity
- Wireless Security
- Wi-Fi Authentication
- Extensible Authentication Protocol
- Troubleshooting Wireless Security
- Wireless Controllers
- Installing WAN Links
- Wide Area Networks (WAN)
- Telecommunications Networks
- Modern Telecommunications Networks
- Local Loop Services
- Installing WAN Links
- Wireless WAN Services
- Internet of Things
- Configuring Remote Access
- Remote Access Services (RAS)
- MPLS and PPP
- SIP Trunks
- Virtual Private Networks (VPN)
- SSL / TLS / DTLS VPNs
- IPsec
- Internet Key Exchange / ISAKMP
- Remote Access Servers
- Remote Administration Tools
- Managing Network Appliances
- Remote File Access
- Labs
- Configuring Secure Access Channels
- Configuring a Virtual Private Network
+ See more details