Cyber Security

Cyber Security

CompTIA A+

The CompTIA A+ certification is a basic certification that demonstrates proficiency
with computer hardware and operating systems (OS). It is the preferred qualifying
credential for technical support and IT operational roles.

CompTIA 220-901 A+ and CompTIA 220-902 A+


  • BIOS and UEFI
  • Motherboards & RAM
  • PC Expansion Cards & Storage Devices
  • CPU Technologies
  • Interfaces
  • Display Devices & Connector Types
  • Adapters and Converters Printers & Printer Maintenance
  • Network Cabling, IP Addressing, Ports and Protocols
  • Networking Technologies
  • Networking Devices and Tools
  • Laptops
  • Mobile Devices
  • Troubleshooting Computer Hardware and Network
  • Troubleshooting Printers


  • Introducing Microsoft Windows
  • Installing and Configuring Windows
  • Optimizing Windows
  • Mac OS and Linux
  • Common Security Threats
  • Physical and Digital Security Prevention Methods
  • Securing a SOHO Network
  • Operating System Troubleshooting & Tools
  • Mobile Device App Troubleshooting
  • Managing Electrostatic Discharge
  • Computer Safety Procedures

CompTIA N+

CompTIA Network+ is a gateway that helps you develop a career in IT infrastructure
by validating the hands-on skills needed to troubleshoot, configure, and manage
both wired and wireless networks.
It is the preferred qualifying credential for network support roles.


  • Topologies and the OSI Model
  • Ethernet
  • Infrastructure and Design
  • IPv4 Addressing
  • IPv6 Addressing
  • Routing
  • Transport Protocols
  • Name Resolution
  • Troubleshooting
  • Applications and Services
  • Management and Monitoring
  • Cloud and Virtualization
  • Installing Cable
  • Installing Wireless Networks
  • WAN Technologies
  • Remote Access
  • Vulnerabilities and Threats Security Basics
  • Security Appliances
  • Authentication
  • Incident Response
  • Change and Configuration Management



  • Network Fundamentals
  • OSI and TCP/IP models
  • TCP and UDP protocols
  • Network Topologies
  • Cabling
  • IPv4 and IPv6
  • LAN Switching Technologies
  • Switching concepts
  • Configure VLAN
  • Interswitch connectivity
  • STP protocols
  • Routing Technologies
  • Inter-VLAN routing
  • Static Routing
  • Dynamic Routing (rip, eigrp, ospf)
  • IPv6 Static Routing
  • IPv6 Dynamic Routing
  • WAN Technologies
  • GRE tunnel
  • Infrastructure Services
  • DNS
  • DHCP
  • NAT
  • HSRP
  • Infrastructure Security
  • Port Security
  • Access-list for traffic filtering
  • Infrastructure Management
  • Configure device-monitoring protocols
  • Configure device management
  • Device maintenance

EX-70-710, EX-70-741, EX-70-742


  • Installing, upgrading, and migrating servers and workloads
  • Configuration local storage This module explains how to manage disks and volumes in Windows Server 2016.
  • Implementing enterprise storage solutions
  • Implementing Storage Spaces and Data Deduplication
  • Installing and configuring Hyper-V and virtual machines
  • Deploying and managing Windows and Hyper-V
  • Overview of high availability and disaster recovery
  • Implementing failover clustering
  • Implementing failover clustering with Windows Server 2016 Hyper-V
  • Implementing Network Load Balancing
  • Creating and managing deployment images
  • Managing, monitoring, and maintaining virtual machine installations


  • Planning and implementing an IPv4 network
  • Implementing DHCP
  • Implementing IPv6
  • Implementing DNS
  • Implementing and managing IPAM
  • Remote access to Windows Server 2016
  • Implementing DirectAccess
  • Implementing VPNs
  • Implementing networking for branch offices
  • Configuring advanced networking features
  • Implementing Software Defined Networking



  • Installing and configuring a domain controller
  • Managing objects in AD DS
  • Advance AD DS infrastructure management
  • Implementing and administering AD DS sites and replication
  • Implementing Group Policy
  • Managing user settings with Group Policy
  • Securing Active Directory Domain Services
  • Deploying and managing AD CS
  • Deploying and managing certificates
  • Implementing and administering AD FS
  • Implementing and administering AD RMS
  • Implementing AD DS synchronization with Microsoft Azure ADLessons
  • Monitoring, managing, and recovering AS DS



  • Access the command line
  • Manage files from the command line
  • Get help in Redhat Enterprise Linux
  • Create, view, and edit text files
  • Manage local Linux users and groups
  • Control access to files with Linux file system permissions
  • Monitor and manage Linux processes
  • Control services and daemons
  • Configure and secure Open SSH service
  • Analyze and store logs
  • Manage Redhat Enterprise Linux networking
  • Archive and copy files between systems
  • Install and Keystone identity service update software packages
  • Access Linux file systems
  • Use virtualized systems


  • Automate installation with Kickstart
  • Use regular expressions with grep
  • Create and Edit text files with vim
  • Schedule future Linux tasks
  • Manage priority of Linux processes
  • Control access to files with access control lists (ACL)
  • Manage Linux security
  • Connect to network-defined users and groups
  • Add disks, partitions, and file systems to a Linux system
  • Manage logical volume management (LVM) storage
  • Access networked attached storage with network file system (NFS)
  • Access networked storage with SMB
  • Control and troubleshoot the Redhat Enterprise Linux boot process
  • Limit network communication with the firewall



  • Introduction to Security
  • Securing Operating Systems
  • Malware and Antivirus
  • Internet Security
  • Security on Social Networking Sites
  • Securing Email Communications
  • Securing Mobile Devices
  • Securing the Cloud
  • Securing Network Connections
  • Data Backup and Disaster Recovery



  • Introduction to Checkpoint Technology
  • Checkpoint deployment Platforms
  • Security Policies
  • Monitoring traffic and connections
  • Network Address Translation
  • Using SmartUpdate
  • User Management and Authentication
  • Identity Awareness
  • VPN



  • Information Security Management System
  • Footprinting
  • Network Scanning and Enumeration and its counter-measures
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of service
  • Session Hijacking
  • Hacking Web servers
  • Hacking Wireless Networks
  • Hacking Web Applications
  • SQL injection
  • Honeypots