CompTIA Security+ Certification

Duration: 
5 days

Overview

CompTIA A+ is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management & technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace.

This course has been developed to produce competent PC support engineers who are capable of taking and passing the CompTIA A+ certification exams, as well as other similar qualifications. After successfully completing this course you will have the skills to:

  • Support basic IT infrastructure, including endpoint management, advanced device connectivity troubleshooting, and basic networking
  • Configure and support PC, mobile and IoT device hardware, including components, connectors and peripherals
  • Implement basic data backup and recovery methods and apply data storage and management best practices
  • Demonstrate baseline security skills for IT support professionals, including detecting and removing malware, addressing privacy concerns, physical security and device hardening
  • Configure device operating systems, including Windows, Mac, Linux, Chrome OS, Android and iOS and administer client-based as well as cloud-based (SaaS) software
  • Troubleshoot and problem solve core service and support challenges while applying best practices for documentation, change management, and the use of scripting in IT support

In order to receive the CompTIA A+ certification you must pass two exams: Core 1 (220-1001) and Core 2 (220-1002). Core 1 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting. Core 2 covers installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures. Each exam is 90 minutes and includes a mix of multiple choice, drag and drop, and performance-based questions.

CompTIA A+ is accredited by ANSI as meeting the ISO/IEC 17024 standard and is approved by U.S. Department of Defense (DoD) to fulfill Directive 8570.01-M requirements.

Audience

CompTIA A+ is the industry standard for launching IT careers into today's digital world. This course is intended for those wishing to improve their skills in PC support and administration and qualify with CompTIA A+ certification. CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. Popular job roles which benefit from CompTIA A+ certification include:

  • Service Desk Analyst
  • Help Desk Technician
  • Technical Support Specialist
  • Field Service Technician
  • Associate Network Engineer
  • Data Support Technician
  • Desktop Support Administrator
  • End User Computing Technician
  • System Support Specialist

This course can help prepare for other technical qualifications and act as groundwork for more advanced training, including CompTIA Network+ Certification, CompTIA Security+ Certification, CompTIA Server+ Certification, CCNA, MCTS, MCITP, MCSE and a number of HP certifications.

Prerequisites

You should have extensive experience using a PC, Windows and browsing the web. You should be able to:

  • Use a keyboard, mouse, and touchscreen
  • Recognise the main components of a PC (such as case, monitor, mouse and keyboard) and different data media such as floppy disks or CD-ROMs
  • Start the computer and navigate the desktop
  • Use Windows Explorer to create directories and subdirectories and move, copy or rename files and directories
  • Connect to a network
  • Use Internet Explorer to view websites

Course Outline

Given a scenario, install and configure laptop hardware and components Hardware/device replacement

  • Given a scenario, install components within the display of a laptop
  • Types
  • WiFi antenna connector/placement
  • Webcam
  • Microphone
  • Inverter
  • Digitizer/touchscreen
  • Given a scenario, use appropriate laptop features
  • Special function keys
  • Docking station
  • Port replicator
  • Physical laptop lock and cable lock
  • Rotating/removable screens
  • Compare and contrast characteristics of various types of other mobile devices
  • Tablets
  • Smartphones
  • Wearable technology devices
  • E-readers
  • GPS
  • Given a scenario, connect and configure accessories and ports of other mobile devices
  • Connection types
  • Accessories
  • Given a scenario, configure basic mobile device network connectivity and application support
  • Wireless/cellular data network (enable/disable)
  • Bluetooth
  • Corporate and ISP email configuration
  • Integrated commercial provider email configuration
  • Radio firmware
  • IMEI vs. IMSI
  • VPN
  • Given a scenario, use methods to perform mobile device synchronization
  • Synchronization methods
  • Types of data to synchronize
  • Mutual authentication for multiple services (SSO)
  • Software requirements to install the application on the PC
  • Connection types to enable synchronization
  • Compare and contrast TCP and UDP ports, protocols, and their purposes
  • Ports and protocols
  • TCP vs. UDP
  • Compare and contrast common networking hardware devices
  • Routers
  • Switches
  • Access points
  • Cloud-based network controller
  • Firewall
  • Network interface card
  • Repeater
  • Hub
  • Cable/DSL modem
  • Bridge
  • Patch panel
  • Power over Ethernet (PoE)
  • Ethernet over Power
  • Given a scenario, install and configure a basic wired/wireless SOHO network
  • Router/switch functionality
  • Access point settings
  • IP addressing
  • NIC configuration
  • End-user device configuration
  • IoT device configuration
  • Cable/DSL modem configuration
  • Firewall settings
  • QoS
  • Wireless settings
  • Compare and contrast wireless networking protocols
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • 802.11ac
  • Frequencies
  • Channels
  • NFC
  • RFID
  • Zigbee
  • Z-Wave
  • 3G
  • 4G
  • 5G
  • LTE
  • Summarize the properties and purposes of services provided by networked hosts
  • Server roles
  • Internet appliance
  • Legacy/embedded systems
  • Explain common network configuration concepts
  • DNS
  • DHCP
  • IPv4 vs. IPv6
  • Subnet mask
  • Gateway
  • VLAN
  • NAT
  • Compare and contrast Internet connection types, network types, and their features
  • Internet connection types
  • Network types
  • Given a scenario, use appropriate networking tools
  • Crimper
  • Cable stripper
  • Multimeter
  • Tone generator and probe
  • Cable tester
  • Loopback plug
  • Punchdown tool
  • WiFi analyzer
  • Explain basic cable types, features, and their purposes
  • Network cables
  • Video cables
  • Multipurpose cables
  • Peripheral cables
  • Hard drive cables
  • Adapters
  • Identify common connector types
  • RJ-11
  • RJ-45
  • RS-232
  • BNC
  • RG-59
  • RG-6
  • USB
  • Micro-USB
  • Mini-USB
  • USB-C
  • DB-9
  • Lightning
  • SCSI
  • eSATA
  • Molex
  • Given a scenario, install RAM types
  • RAM types
  • Single channel
  • Dual channel
  • Triple channel
  • Error correcting
  • Parity vs. non-parity
  • Given a scenario, select, install and configure storage devices
  • Optical drives
  • Solid-state drives
  • Magnetic hard drives
  • Hybrid drives
  • Flash
  • Configurations
  • Given a scenario, install and configure motherboards, CPUs, and add-on cards
  • Motherboard form factor
  • Motherboard connectors types
  • BIOS/UEFI settings
  • CMOS battery
  • CPU features
  • Compatibility
  • Cooling mechanism
  • Expansion cards
  • Explain the purposes and uses of various peripheral types
  • Printer
  • ADF/flatbed scanner
  • Barcode scanner/QR scanner
  • Monitors
  • VR headset
  • Optical drive types
  • Mouse
  • Keyboard
  • Touchpad
  • Signature pad
  • Game controllers
  • Camera/webcam
  • Speakers
  • Headset
  • Projector
  • External storage drives
  • KVM
  • Magnetic reader/chip reader
  • NFC/tap pay device
  • Smart card reader
  • Summarize power supply types and features
  • Input 115V vs. 220V
  • Output 5V vs. 12V
  • 24-pin motherboard adapter
  • Wattage rating
  • Number of devices/types of devices to be powered
  • Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs
  • Graphic/CAD/CAM design workstation
  • Audio/video editing workstation
  • Virtualization workstation
  • Gaming PC
  • Network attached storage device
  • Standard thick client
  • Thin client
  • Given a scenario, install and configure common devices
  • Desktop
  • Laptop/common mobile devices
  • Given a scenario, configure SOHO multifunction devices/printers and settings
  • Use appropriate drivers for a given operating system
  • Device sharing
  • Public/shared devices
  • Given a scenario, install and maintain various print technologies
  • Laser
  • Inkjet
  • Thermal
  • Impact
  • Virtual
  • 3D printers
  • Compare and contrast cloud computing concepts
  • Common cloud models
  • Shared resources
  • Rapid elasticity
  • On-demand
  • Resource pooling
  • Measured service
  • Metered
  • Off-site email applications
  • Cloud file storage services
  • Virtual application streaming/cloud-based applications
  • Virtual desktop
  • Given a scenario, set up and configure client-side virtualization
  • Purpose of virtual machines
  • Resource requirements
  • Emulator requirements
  • Security requirements
  • Network requirements
  • Hypervisor
  • Given a scenario, use the best practice methodology to resolve problems
  • Always consider corporate policies, procedures, and impacts before implementing changes
  • Identify the problem
  • Establish a theory of probable cause (question the obvious)
  • Test the theory to determine cause
  • Establish a plan of action to resolve the problem and implement the solution
  • Verify full system functionality and, if applicable, implement preventive measures
  • Document findings, actions, and outcomes

Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power Common symptoms

Given a scenario, troubleshoot hard drives and RAID arrays Common symptoms

Given a scenario, troubleshoot video, projector, and display issues Common symptoms

  • Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
  • Common symptoms
  • Disassembling processes for proper reassembly

Given a scenario, troubleshoot printers Common symptoms

Given a scenario, troubleshoot common wired and wireless network problems Common symptoms

  • Compare and contrast common operating system types and their purposes
  • 32-bit vs. 64-bit
  • Workstation operating systems
  • Cell phone/tablet operating systems
  • Vendor-specific limitations
  • Compatibility concerns between operating systems
  • Compare and contrast features of Microsoft Windows versions
  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows 10
  • Corporate vs. personal needs
  • Desktop styles/user interface
  • Summarize general OS installation considerations and upgrade methods
  • Boot methods
  • Type of installations
  • Partitioning
  • File system types/formatting
  • Load alternate third-party drivers when necessary
  • Workgroup vs. Domain setup
  • Time/date/region/language settings
  • Driver installation, software, and Windows updates
  • Factory recovery partition
  • Properly formatted boot drive with the correct partitions/format
  • Prerequisites/hardware compatibility
  • Application compatibility
  • OS compatibility/upgrade path
  • Given a scenario, use appropriate Microsoft command line tools
  • Navigation
  • ipconfig
  • ping
  • tracert
  • netstat
  • nslookup
  • shutdown
  • dism
  • sfc
  • chkdsk
  • diskpart
  • taskkill
  • gpupdate
  • gpresult
  • format
  • copy
  • xcopy
  • robocopy
  • net use
  • net user
  • [command name] /?
  • Commands available with standard privileges vs. administrative privileges
  • Given a scenario, use Microsoft operating system features and tools
  • Administrative
  • MSConfig
  • Task Manager
  • Disk Management
  • System utilities
  • Given a scenario, use Microsoft Windows Control Panel utilities
  • Internet Options
  • Display/Display Settings
  • User Accounts
  • Folder Options
  • System
  • Windows Firewall
  • Power Options
  • Credential Manager
  • Programs and features
  • HomeGroup
  • Devices and Printers
  • Sound
  • Troubleshooting
  • Network and Sharing Center
  • Device Manager
  • BitLocker
  • Sync Center
  • Summarize application installation and configuration concepts
  • System requirements
  • OS requirements
  • Methods of installation and deployment
  • Local user permissions
  • Security considerations
  • Given a scenario, configure Microsoft Windows networking on a client/desktop
  • HomeGroup vs. Workgroup
  • Domain setup
  • Network shares/administrative shares/mapping drives
  • Printer sharing vs. network printer mapping
  • Establish networking connections
  • Proxy settings
  • Remote Desktop Connection
  • Remote Assistance
  • Home vs. Work vs. Public network settings
  • Configuring an alternative IP address in Windows
  • Network card properties
  • Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems
  • Best practices
  • Tools
  • Features
  • Basic Linux commands
  • Summarize the importance of physical security measures
  • Mantrap
  • Badge reader
  • Smart card
  • Security guard
  • Door lock
  • Biometric locks
  • Hardware tokens
  • Cable locks
  • Server locks
  • USB locks
  • Privacy screen
  • Key fobs
  • Entry control roster
  • Explain logical security concepts
  • Active Directory
  • Software tokens
  • MDM policies
  • Port security
  • MAC address filtering
  • Certificates
  • Antivirus/Anti-malware
  • Firewalls
  • User authentication/strong passwords
  • Multifactor authentication
  • Directory permissions
  • DLP
  • Access control lists
  • Email filtering
  • Trusted/untrusted software sources
  • Principle of least privilege
  • Compare and contrast wireless security protocols and authentication methods
  • Protocols and encryption
  • Authentication
  • Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
  • Malware
  • Tools and methods
  • Compare and contrast social engineering, threats, and vulnerabilities
  • Social engineering
  • DDoS
  • DoS
  • Zero-day
  • Man-in-the-middle
  • Brute force
  • Dictionary
  • Rainbow table
  • Spoofing
  • Non-compliant systems
  • Zombie
  • Compare and contrast the differences of basic Microsoft Windows OS security settings
  • User and groups
  • NTFS vs. share permissions
  • Shared files and folders
  • System files and folders
  • User authentication
  • Run as administrator vs. standard user
  • BitLocker To Go
  • EFS
  • Given a scenario, implement security best practices to secure a workstation
  • Password best practices
  • Account management
  • Disable autorun
  • Data encryption
  • Patch/update management
  • Given a scenario, implement methods for securing mobile devices
  • Screen locks
  • Remote wipes
  • Locator applications
  • Remote backup applications
  • Failed login attempts restrictions
  • Patching/OS updates
  • Biometric authentication
  • Full device encryption
  • Authenticator applications
  • Trusted sources vs. untrusted sources
  • Policies and procedures
  • Given a scenario, implement appropriate data destruction and disposal methods
  • Physical destruction
  • Recycling or repurposing best practices
  • Given a scenario, configure security on SOHO wireless and wired networks
  • Wireless-specific
  • Change default usernames and passwords
  • Enable MAC filtering
  • Assign static IP addresses
  • Port forwarding/mapping
  • Disabling ports
  • Content filtering/parental controls
  • Update firmware
  • Physical security
  • Given a scenario, troubleshoot Microsoft Windows OS problems
  • Common solutions

Given a scenario, troubleshoot and resolve PC security issues Common symptoms

  • Given a scenario, use best practice procedures for malware removal
  • Identify and research malware symptoms
  • Quarantine the infected systems
  • Disable System Restore (in Windows)
  • Remediate the infected systems
  • Schedule scans and run updates
  • Enable System Restore and create a restore point (in Windows)
  • Educate the end user

Given a scenario, troubleshoot mobile OS and application issues Common symptoms

Given a scenario, troubleshoot mobile OS and application security issues Common symptoms

  • Compare and contrast best practices associated with types of documentation
  • Network topology diagrams
  • Knowledge base/articles
  • Incident documentation
  • Regulatory and compliance policy
  • Acceptable use policy
  • Password policy
  • Inventory management
  • Given a scenario, implement basic change management best practices
  • Documented business processes
  • Purpose of the change
  • Scope the change
  • Risk analysis
  • Plan for change
  • End-user acceptance
  • Change board
  • Backout plan
  • Document changes
  • Given a scenario, implement basic disaster prevention and recovery methods
  • Backup and recovery
  • Backup testing
  • UPS
  • Surge protector
  • Cloud storage vs. local storage backups
  • Account recovery options
  • Explain common safety procedures
  • Equipment grounding
  • Proper component handling and storage
  • Toxic waste handling
  • Personal safety
  • Compliance with government regulations
  • Explain environmental impacts and appropriate controls
  • MSDS documentation for handling and disposal
  • Temperature, humidity level awareness, and proper ventilation
  • Power surges, brownouts, and blackouts
  • Protection from airborne particles
  • Dust and debris
  • Compliance to government regulations
  • Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
  • Incident response
  • Licensing/DRM/EULA
  • Regulated data
  • Follow all policies and security best practices
  • Given a scenario, use proper communication techniques and professionalism
  • Use proper language and avoid jargon, acronyms, and slang, when applicable
  • Maintain a positive attitude/project confidence
  • Actively listen (taking notes) and avoid interrupting the customer
  • Be culturally sensitive
  • Be on time (if late, contact the customer)
  • Avoid distractions
  • Dealing with difficult customers or situations
  • Set and meet expectations/timeline and communicate status with the customer
  • Deal appropriately with customers' confidential and private materials
  • Identify the basics of scripting
  • Script file types
  • Environment variables
  • Comment syntax
  • Basic script constructs
  • Basic data types
  • Given a scenario, use remote access technologies
  • RDP
  • Telnet
  • SSH
  • Third-party tools
  • Security considerations of each access method

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

Upcoming Dates

  • GREEN This class is Guaranteed To Run.
  • SPVC - Self-Paced Virtual Class.
  • Click a Date to Enroll.
Course Location Days Cost Date
Glasgow
Glasgow4 4387 £4387 2019-08-12
Nottinghamshire
Nottingham4 4387 £4387 2019-08-12
Kent
Maidstone5 4387 £4387 2019-08-19
Virtual
Virtual5 4387 £4387 2019-08-19
Gloucestershire
Cirencester4 4387 £4387 2019-08-27
London
Bromley5 4387 £4387 2019-08-27
Cheshire
Chester5 4387 £4387 2019-08-27
Yorkshire
Wakefield5 4387 £4387 2019-08-27
Yorkshire
York4 4387 £4387 2019-08-27
Buckingshire
High Wycombe5 4387 £4387 2019-08-27
Gloucester
Gloucester4 4387 £4387 2019-08-27
West Sussex
Chichester4 4387 £4387 2019-08-27
Kent
Tonbridge4 4387 £4387 2019-08-27
Cumbria
Carlisle4 4387 £4387 2019-08-27
Midlands
Coventry4 4387 £4387 2019-08-27
Midlands
Wolverhampton4 4387 £4387 2019-08-27
Jersey
Jersey4 4387 £4387 2019-08-27
Hertfordshire
Watford4 4387 £4387 2019-08-27
Worcestershire
Worcester4 4387 £4387 2019-08-27
Suffolk
Ipswich5 4387 £4387 2019-08-27
Cheshire
Chester4 4387 £4387 2019-08-27
Aberdeenshire
Aberdeen4 4387 £4387 2019-08-27
Midlands
Northampton5 4387 £4387 2019-08-27
Buckingshire
High Wycombe4 4387 £4387 2019-08-27
Surrey
Guildford4 4387 £4387 2019-08-27
Dorset
Poole4 4387 £4387 2019-08-27
Cheshire
Crewe5 4387 £4387 2019-08-27
Essex
Chelmsford5 4387 £4387 2019-08-27
London
Heathrow4 4387 £4387 2019-08-27
Berkshire
Slough4 4387 £4387 2019-08-27
Hertfordshire
Watford5 4387 £4387 2019-08-27
Essex
Colchester4 4387 £4387 2019-08-27
Aberdeenshire
Aberdeen5 4387 £4387 2019-08-27
Lincolnshire
Lincoln4 4387 £4387 2019-08-27
West Sussex
Chichester5 4387 £4387 2019-08-27
Inverness
Inverness5 4387 £4387 2019-08-27
Devon
Exeter4 4387 £4387 2019-08-27
Midlands
Wolverhampton5 4387 £4387 2019-08-27
Fife
Dunfermline4 4387 £4387 2019-08-27
Dundee
Dundee4 4387 £4387 2019-08-27
Derbyshire
Burton upon Trent4 4387 £4387 2019-08-27
Warwickshire
Warwick4 4387 £4387 2019-08-27
Dorset
Bournemouth5 4387 £4387 2019-08-27
Kent
Canterbury5 4387 £4387 2019-08-27
Yorkshire
Harrogate4 4387 £4387 2019-08-27
Somerset
Bath5 4387 £4387 2019-08-27
Yorkshire
Wakefield4 4387 £4387 2019-08-27
Warwickshire
Warwick5 4387 £4387 2019-08-27
Bedfordshire
Luton4 4387 £4387 2019-08-27
Cheshire
Crewe4 4387 £4387 2019-08-27
Merseyside
Liverpool4 4387 £4387 2019-09-02
Merseyside
Liverpool5 4387 £4387 2019-09-02
Somerset
Bath3 4387 £4387 2019-09-03
Berkshire
Reading4 4387 £4387 2019-09-09
Virtual
Virtual5 4387 £4387 2019-09-09
Somerset
Bath5 4387 £4387 2019-09-09
Manchester
Manchester4 4387 £4387 2019-09-16
Manchester
Manchester5 4387 £4387 2019-09-16
Edinburgh
Edinburgh4 4387 £4387 2019-09-16
Midlands
Birmingham4 4387 £4387 2019-09-23
Somerset
Bath5 4387 £4387 2019-09-23
London
London5 4387 £4387 2019-09-30
Somerset
Bath5 4387 £4387 2019-09-30
Bristol
Bristol4 4387 £4387 2019-09-30
Glamorgan
Cardiff4 4387 £4387 2019-10-07
Glamorgan
Cardiff5 4387 £4387 2019-10-07
Nottinghamshire
Nottingham5 4387 £4387 2019-10-07
Bristol
Bristol5 4387 £4387 2019-10-07
Manchester
Manchester4 4387 £4387 2019-10-07
Sussex
Brighton5 4387 £4387 2019-10-14
Virtual
Virtual5 4387 £4387 2019-10-14
Yorkshire
Sheffield4 4387 £4387 2019-10-14
Aberdeenshire
Aberdeen5 4387 £4387 2019-10-21
London
London5 4387 £4387 2019-10-21
Cambridgeshire
Cambridge5 4387 £4387 2019-10-28
Cambridgeshire
Cambridge4 4387 £4387 2019-10-28
Northern Ireland
Belfast4 4387 £4387 2019-11-04
Northern Ireland
Belfast5 4387 £4387 2019-11-04
Virtual
Virtual4 4387 £4387 2019-11-11
Edinburgh
Edinburgh4 4387 £4387 2019-11-11
Edinburgh
Edinburgh5 4387 £4387 2019-11-11
Hampshire
Southampton5 4387 £4387 2019-11-18
Glasgow
Glasgow4 4387 £4387 2019-11-18
Hampshire
Southampton4 4387 £4387 2019-11-18
Yorkshire
Sheffield5 4387 £4387 2019-11-18
London
London5 4387 £4387 2019-11-25
Tyne and Wear
Newcastle5 4387 £4387 2019-11-25
Midlands
Birmingham4 4387 £4387 2019-11-25
Yorkshire
Leeds4 4387 £4387 2019-12-02
Edinburgh
Edinburgh5 4387 £4387 2019-12-02
London
London5 4387 £4387 2019-12-02
London
London5 4387 £4387 2019-12-02
Virtual
Virtual5 4387 £4387 2019-12-02
Somerset
Bath3 4387 £4387 2019-12-03
Norfolk
Norwich4 4387 £4387 2019-12-09
London
London5 4387 £4387 2019-12-09
London
London5 4387 £4387 2019-12-16
Manchester
Manchester5 4387 £4387 2019-12-16
Buckinghamshire
Milton Keynes5 4387 £4387 2019-12-16
London
London5 4387 £4387 2020-01-13