Save 77%

CompTIA Certification - Complete Video Course

Online

Special Emagister price

£ 79 £ 350 VAT inc.
  • Typology

    Course

  • Level

    Advanced

  • Methodology

    Online

  • Class hours

    108h

  • Duration

    Flexible

  • Start

    Different dates available

Description

CompTIA or the Computing Technology Industry Association is a non-profit organisation that provides professional certificates for the IT industry. A license from CompTIA will increase your opportunity for career build-up. The CompTIA Certification – course is the best choice for you if you want to obtain a professional degree in It.

The course is taught in several sections and sub-sections. The CompTIA A+ 900 Certification series shows you the current knowledge and skills needed by today’s IT professionals including configuring BIOS, motherboard, RAM types, PC installation, networking, etc. Then the CompTIA Network+Certification provides in-depth information related to networking while the CompTIA Security+ section shows you how to secure your confidential data. Next, CompTIA Healthcare IT deals with the application of IT in the medical industry to provide excellent service to the patients while the CompTIA Linux+ course gives you a complete guide for the Linux Operating system. Finally, the CompTIA AdvancedSecurity Practitioner (CASP) course will help you to know about the enterprise security architecture, security technology and resource technology so that you can determine the root of the security problem and solve the issues.

CompTIA provides various certifications based on the different sectors of IT. The purpose of the bundled course is to prepare for those exams and at the same time to help you to gain the practical knowledge related to IT Sector.

Important information

Price for Emagister users:

Facilities

Location

Starts

Online

Starts

Different dates availableNow taking bookings

To take into account

Our CompTIA Certification – is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods.

Questions & Answers

Ask a question and other users will answer you

Who do you want to respond to your question/enquiry?

We will only publish your name and question

Achievements for this centre

This centre has demonstrated its quality on Emagister
3 years with Emagister

What you'll learn on the course

  • Risk
  • Networking
  • Computing
  • Linux
  • Network
  • Installation
  • Design
  • healthcare
  • Technology
  • Industry
  • Medical
  • Medical training
  • IT risk
  • Communication Training
  • Network Training

Teachers and trainers (1)

John Adams John

John Adams John

Instructor

Course programme

COURSE CURRICULUM

Firmware
BIOS Configuration Options
Motherboard Sizes Form Factors
The Motherboard
AMD CPU Socket Types
Expansion Cards
Bus Speeds
Memory
Types of RAM
Ports
SCSI Connections
Audio Video Connections
Storage Devices
Hard Drives
Media Capacity
CPU Types and Characteristics
Physical Connections USB
Physical Connections VGA
Wireless Connections Bluetooth
Power Supply Specifications
What is a Standard Client
Audio Video Editing Workstations
Display Device Types
Backlighting
DVI to HDMI
Standard Input Device Types
Expansion Card Types
Multimedia Devices
SOHO Networks
WPS
Encryption
Printers
Printer Technologies Topic B Inkjet Printers
Technical Printer Components
Local and Network-Based Printers

Network Interface Card Characteristics
Fiber Optic Cables
TCP IP
IP Address Classes
Addressing Schemes
Ports
LDAP
Standards
Setting up your Router
Define Appropriate NAT Policies
LANs
Network Topologies
ISPs
Cable Testers
Laptops
Laptop Expansion Options
Auto-Switching and Fixed Input Power Supplies
What is Mobile Technology
Mobile Device Features
Bluetooth Configuration Method
Mobile Device Connection Types
Troubleshooting Mobile Devices
Troubleshooting Theory
Boot to Incorrect Device
PC Indicator Lights
Repair vs. Replace
Drive and Array Troubleshooting Tools
Common RAID Array Issues
Common Video and Display Issues
Common Network Issues
Common Printer Troubleshooting Tools
Microsoft Windows
Microsoft Windows Features
Other Operating Systems
Installation Types
Customizing System Options
The Command Prompt
Administrative Tools
Task Manager
Memory Diagnostic Tool
The Control Panel
Internet Options
Types of User Accounts
Computer My Computer
Permissions
System
Workgroups
Network Connection Types
Data Backup and Restoration
Scheduling Tasks
Patch Management in Mac OS X and Linux
Screen Sharing
Mac OS Multitouch Gestures – Touchscreen
What is Virtualization
Virtual Desktop Infrastructure
SaaS (Software as Service)
Server Roles
Open Source Software
Mobile Device Hotspot
Malware
Social Engineering
Physical Security
Hard Drive Sanitation
User Education
Users and Groups
Password Best Practices
Locks
Operating System Troubleshooting Tools
Application Errors
Common Network Issues
Common Security Issues
Browser Issues
Dim Display
No Sound from Speakers
Static Electricity
Electrical Hazards
General Power Issues
Hazardous Material Disposal Procedures
Professional Conduct
Types of Hardware Toolkits
Hard Drive Self-Tests
Computer Component Maintenance Techniques
Incident Response
Proper Communication and Professionalism
Set Expectations
OSI Layers
LANs and WANs
Network Types
Transmissions
Cables
Fiber Optics
Converters and Connectors
802.11 Standard
Wireless
Wireless Options
Topologies
Ethernet
Switches
VLANs
Network Communication Protocols
Special Addresses
CIDR
IPv6
Routes
Routing Types
TCP and IP
FQDN and DNS
Transport-layer Protocols
UDP
Wide Area Networks
QoS
Voice-over-Data Systems
Types of Server Virtualization
Fibre Channel
Cloud Concepts.prproj
Wireless Security
Authentication.prproj
Wireless Security Threats
TACACS
Keys
Security Factors
Vulnerabilities
Attacks
Authentication
Honeypots
Education and Awareness
Response Policy
RADIUS
VPN Technologies
Tunneling Protocols.prproj
Acceptable Use
Common Problems
Troubleshooting
Network Technician Tools
Physical and Logical Issues
Open or Closed Ports
ARP Issues
SOHO Network
The Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals
Social Engineering
Malware
Software-Based Threats
Based Threats
Wireless Threats and Vulnerabilities
Physical Threats and Vulnerabilities
Manage Data Security
Manage Application Security
Manage Device and Host Security
Manage Mobile Security
Configure Security Parameters on Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols and Services
Apply Secure Network Administration Principles
Secure Wireless Traffic
Access Control and Authentication Services
Implement Account Management Security Controls
Install a CA Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew Certificates
Back Up and Restore Certificates and Private Keys
Revoke Certificates
Physical Security
Legal Compliance
Security Awareness and Training
Integrate Systems and Data with Third Parties
A Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques
Respond to Security Incidents
Recover from a Security Incident
Business Continuity
Plan for Disaster Recovery
Execute DRPs and Procedures
Core Concepts in Healthcare IT
EMR EHR Issues
Regulations, Standards, and Stakeholders
HIPAA Controls and Compliance
Healthcare Organizations
Medical Terminology, Equipment, and Software
Medical Coding and Billing
Medical Computer Interfaces
Roles and Responsibilities
Manage Communication and Ethics Issues
Legal Best Practices, Requirements, and Documentation
Medical Document Imaging
Sanitation Management
Computing Essentials
Networking
Manage Servers and Software
Hardware Support
Set Up a Workstation
Troubleshoot Basic IT Issues
Troubleshoot Medical IT Issues
Implementation of an EMR EHR System
Change Control9
Manage Physical and Logical Security
Implement Security Best Practices and Threat Mitigation Techniques9
Manage Remote Access
Manage Wireless Security
Perform Backups and Disaster Recovery
Linux Introduction
Pre-installation Tasks
Linux Installation
Graphical User Interfaces
Command Line Linux
Directory Organization
File Management
Removable Storage
Users and Groups
File and Directory Permissions
User Environment Configuration
GUI Configuration
Packages and Package Managers
Source Code Software
Disk Management
File System Management
Device Management
Process Management
Process Priority and Execution
Kernel Modules
Backup and Restore
Scheduling Tasks
Performance Monitoring
Logging
Networking Basics
Network Services
Domain Name Services
Network File Resources
Printing
Network Interoperability
Remote Desktop Access
System Security
Network Security
Web Services
MySQL Services
FTP Services
Mail Services
Booting Linux
Network Troubleshooting
Scripting Basics
The Basics of Enterprise Security
Secure the Design of the Enterprise Infrastructure
Enterprise Security Requirements
Common Network Security Components and Technologies
Communications and Collaboration Security
Cryptographic Tools and Techniques
Advanced Authentication
Enterprise Storage Security Issues
Distributed, Shared, and Virtualized Computing
Cloud Computing and Security
Network Security Design
Conduct a Security Assessment
Host Security
Create a Risk Management Plan
Identify Risks and Their Causes
Analyze Risks
Develop a Risk Response Plan
Implement Authentication
Implement Advanced
Describe Cryptographic Concepts
Choose Cryptographic Techniques
Choose Cryptographic Implementation
Implement Security Standards in the Enterprise
Select Technical Deployment Models
Secure the Design of the Enterprise Infrastructure
Secure Enterprise Application Integration Enablers
Perform an Industry Trends and Impact Analysis
Perform an Enterprise Security Analysis
BCP Fundamentals
BCP Implementation
DRP Fundamentals
Advanced Security Course 10 Topic D DRP Implementation
Design Systems to Facilitate Incident Response
Conduct Incident and Emergency Responses
Computer Crime Laws and Regulations
Computer Crime Incident Response
Develop Critical Thinking Skills
Determine the Root of a Problem
Use Judgment to Make Sound Decisions

Special Emagister price

£ 79 £ 350 VAT inc.

Call the centre

for further information on the course