Skip to main content

CompTIA complete training

LE042

Do you want to make a career in the IT industry? Then this CompTIA complete training course bundle could be perfect for you.

Course duration

Up to 1 year.

Course outcome

You will receive a certificate of completion.

Entry requirements

There are no specific entry requirements for this course.

Assessment

If you want the qualification, then you will need to take one exam for each course.

Study Options

This course is only available to study online.

Study Options

 
£459.00
or £13.95 /month*
Course code: LE042

Spin to win huge Black Friday discounts today!

Contact us

*Pay monthly option available via Snap Finance on payment page in checkout

visamaestromastercardpaypalamexdiscoverdinerselo

Course overview

  • This collection of CompTIA certificates will give you a solid foundation of knowledge to help you get started in your IT career.
  • Study at your own pace, in your own environment – no deadline or timetable!

Enrol today on this flexible home study course and progress in your career in the IT industry.

During the CompTIA A+ 220-1101 section, you will explore laptop hardware and components, common connector types, best practices for solving problems, and much more.

Meanwhile, during the CompTIA A+ 220-1102 section, you will explore common operating system types and their purposes, the importance of physical security measures, implementing basic change management best practices, and much more.

Study at your own time and pace. You will have a full 12 months to complete the course.

Enrol today with a flexible study option to suit you and your busy lifestyle… deadlines and timetables are a thing of the past!

What next?

Following the successful completion of this course, you will be able to put your newfound knowledge into practice and develop your career. If after, you’re looking to enhance your IT knowledge even further, take a look at the other Computing and IT courses we offer.

Jobs that use knowledge gained from a CompTIA course:

  • IT support specialist
  • Help desk technician
  • Field technician
  • Tier I support specialist
  • Desktop support specialist
  • Associate network engineer
  • Systems support technician
  • Junior systems administrator

Course content

  • Mobile devices
  • Networking
  • Hardware
  • Virtualization and cloud computing
  • Hardware and network troubleshooting
  • Operation systems
  • Security
  • Software troubleshooting
  • Operational procedures

  • IT concepts and terminology
  • Infrastructure
  • Applications and software
  • Software development
  • Database fundamentals
  • Security

  • Networking concepts
  • Infrastructure
  • Network operations
  • Network security
  • Network troubleshooting and tools

  • Fundamental security concepts
  • Zero trust
  • Deception and disruption
  • Security controls
  • Change management and security
  • Cryptography basics and implementations
  • Asymmetric encryption
  • Hashing
  • Digital certificates
  • Public key infrastructure
  • Data and keys
  • Blockchain
  • Non-cryptographic data protection
  • Threat actors, motivations and vectors
  • OMG no cable
  • Social engineering
  • Operating system vulnerabilities and attacks
  • Application vulnerabilities and attacks
  • Web-based vulnerabilities and attacks
  • Other vulnerabilities
  • Common malicious activity indicators
  • Insider threat indicators
  • Social engineering indicators
  • Malware activity indicators
  • Operating system, application, network and physical Attack indicators
  • Cryptographic and password attack indicators
  • Network segmentation and access control
  • Enterprise device hardening
  • High availability
  • Virtualization
  • Cloud
  • Serverless computing
  • IoT
  • ICS SCADA
  • RTOS and embedded systems
  • Reducing the attack surface
  • Firewalls and Firewall configuration
  • IDS IPS.mp4
  • Secure communications - access
  • Port security
  • SD-WAN and SASE
  • Data classifications
  • Protecting data types and data considerations
  • Redundancy
  • Alternate sites and business continuity
  • Multiple platforms
  • Secure baselines
  • Attack surface reduction
  • Wireless installation and security settings
  • Mobile solutions
  • Application security and vulnerability management
  • Asset management
  • Monitoring activities and monitoring tools
  • Intrusion detection configuration
  • Web traffic filtering
  • Operating system policy
  • Network service security and access control
  • Data loss protection
  • Identity and access management
  • Security automation
  • Incident response
  • Digital forensics
  • Elements of effective security governance
  • Elements of the risk management process
  • Third party risk assessment and management
  • Effective security compliance
  • Audits and assessments
  • Security awareness practices

  • Threat and vulnerability management
  • Software and systems security
  • Security operations and monitoring
  • Incident response
  • Compliance and assessment

  • Underlying security models
  • General security
  • Selecting security products
  • Control selection process
  • Cryptography symmetric and asymmetric
  • Cryptography message integrity controls
  • Cryptography digital signatures
  • Cryptography PKI and PGP
  • Storage
  • Virtual computing
  • Cloud computing
  • IPV6
  • Remote access security
  • Domain name system
  • Directory services
  • Firewall and VPN
  • Firewall policy
  • Security configuration management
  • Network infrastructure security
  • Secure web services
  • OWASP top ten
  • Buffer overflows
  • SQL injection
  • Access control
  • Single sign-on
  • Risk assessment
  • Testing and assessment
  • Common vulnerability scoring system
  • Common criteria
  • Personally identifiable information
  • Risk management
  • Frameworks
  • Interconnecting systems
  • Security services
  • Continuous monitoring
  • Incident handling
  • Forensic and incident response
  • Requirements processing
  • Standards bodies
  • Secure system life cycle
  • Email
  • Mobile and BYOD
  • Voice over IP
  • Physical facilities assessment process
  • Security requirements traceability matrix

  • The pen test engagement
  • Passive reconnaissance
  • Active reconnaissance
  • Physical security
  • Social engineering
  • Vulnerability scan analysis
  • Password cracking
  • Penetrating wired networks
  • Penetrating wireless networks
  • Windows exploits
  • Linux exploits
  • Mobile devices
  • Specialized systems
  • Scripts
  • Application testing
  • Web app exploits
  • Lateral movement
  • Persistence
  • Cover your tracks
  • The report
  • Post engagement clean-up

Awarding body

The Computing Industry Association (CompTIA) is a leading voice for the estimated 75 million person industry, and the tech professionals who design, implement, manage, and safeguard the technology that powers the world’s economy.

They promote industry growth, the development of highly skilled workforces, and a commitment to creating an environment where innovation happens, through education, training, and certificates.

CompTIA’s membership and certification holders span the full range of technology companies, from established Fortune 500 leaders to small and medium-sized tech businesses.

Extra information

To receive each of your CompTIA certifications, you will need to complete an exam. Exams are held at Pearson Vue centres and cost between £140 and £290 depending on the centre you choose.

With this flexible home learning course, you can fast-forward, rewind or repeat all the online classes so you can go at your own pace with no strict deadlines. You will have a full 12 months to complete the course from the date of enrolment and will take you approximately 360 hours.

This blended learning solution offers a highly interactive and engaging learning environment with video demonstrations, multimedia presentations and educational games to assist with your study. Fun quizzes and exam simulations after each module reinforce your confidence and aid progression to the next stage. This course also includes the use of social networking forums, so you chat and gain friendly advice and support from other students.

Upon completion of your exam, you will receive a CompTIA Certificate of Completion, so you can showcase your achievement to future employers.

FAQs

No previous knowledge is required to enrol onto this course, just a basic knowledge of IT.

To receive the full CompTIA certification, you will need to sit an exam. Exams are held at Pearson Vue centres and cost between £140 and £290 depending on the centre you choose.

That's not a problem. We want to make sure you're 100% confident about enrolling on the course and starting your study. So, just give our team of education specialists a call on 03300 563 100 and they'll do their best to help.

Related courses