Show as: Mobile

Cyber Security for Beginners with 4 Official CompTIA Exams

Course summary
Length: Flexible
Price: 148.75 GBP
Location: Distance

Course Description

    If you've ever considered working within the cyber security industry, but felt you lacked the knowledge or skills to launch your career, this might be what you're looking for.   This course bundle is aimed at absolute beginners to IT who want to start a career in cyber security or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cyber security and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies such as computer systems and networks, which you will be taught through this course.   This course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this bundle, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the IT security industry and attracts an average salary of £48,850 p.a. (source: ITjobswatch).  

Who are CompTIA? Watch this video to find out.

  From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cyber security will gradually begin to develop.   Upon completion of the course, you will exit with a series of globally respected certifications and a deeper knowledge of cyber security concepts. You will also possess a set of cyber security skills you can apply to a vast range of cyber security job roles.  

An example of the CompTIA Security+ certification you can gain through this course.

  The course bundle is comprised of six separate courses in total. Three of which are skills based only with no exam, and three certification courses with a final exam after each course. The final course being the CompTIA Security+. Two of the non-certification courses provide a soft introduction to modern day cyber security practices. These course titles include Cyber Security Awareness and Prevention; and Data Security Compliance. The skills and certifications that you gain through this course will offer you scope to work in other areas aside from cyber security. These include IT support, networking, systems administration, and data compliance.  

Watch this video to learn more about CompTIA certifications.

  What's included in this certification bundle?   This bundle contains six courses in total comprising of three CompTIA certification courses (inclusive of four official CompTIA exams) and three skills based courses. This course MUST be completed in the order listed below. If however you feel the material covered in courses 1-3 is already familiar to you and is of no benefit, then you can skip ahead to courses 4-6. Click on a title to see a full breakdown of what you'll be learning in each course.   Courses included: [zozo_accordions id="1. CompTIA IT Fundamentals FC0-U51 (NO EXAM)"] [zozo_accordion title="1. CompTIA IT Fundamentals FC0-U51 (NO EXAM)" open="no" parent_id="accordion-1"] Module 1: Software 1.1 Course And Instructor Introduction 1.2 Software Operating Systems - Part 1 1.3 Software Operating Systems - Part 2 1.4 Software Operating Systems - Part 3 1.5 Software Operating Systems - Part 4 1.6 Software Operating Systems - Part 5 1.7 Common FileTypes - Part 1 1.8 Common FileTypes - Part 2 1.9 Software Management Best Practices - Part 1 1.10 Software Management Best Practices - Part 2 1.11 Alternative Software Technologies 1.12 Basic Software Features And Functions   Module 2: Hardware and IT 2.1 Basic Wired And Wireless Peripherals - Part 1 2.2 Basic Wired And Wireless Peripherals - Part 2 2.3 Basic Wired And Wireless Peripherals - Part 3 2.4 Common Computer Connector Types - Part 1 2.5 Common Computer Connector Types - Part 2 2.6 Internal Computer Components - Part 1 2.7 Internal Computer Components - Part 2   Module 3: Security 3.1 Basic Security Threats - Part 1 3.2 Basic Security Threats - Part 2 3.3 Basic Security Threats - Part 3 3.4 Security Best Practices - Part 1 3.5 Security Best Practices - Part 2 3.6 Web-Browsing Best Practices 3.7 Web-Browsing Best Practices Demo - Part 1 3.8 Web-Browsing Best Practices Demo - Part 2 3.9 Web-Browsing Best Practices Demo - Part 3   Module 4: Networking 4.1 Setup And Configure Basic SOHO Router 4.2 Wireless Router Demo 4.3 Compare And Contrast Cellular Wireless And Wire Data Connections 4.5 Compare And Contrast Different Methods OfSharingAndStorage - Part 1 4.6 Compare And Contrast Different Methods OfSharingAndStorage - Part 2 4.7 Compare And Contrast Different Methods OfSharingAndStorage - Part 3   Module 5: Basic IT Literacy 5.1 Setting Up A Basic Workstation - Part 1 5.2 Setting Up A Basic Workstation - Part 2 5.3 Setting Up A Basic Workstation Demo - Part 1 5.4 Setting Up A Basic Workstation Demo - Part 2 5.5 Setting Up A Basic Workstation Demo - Part 3 5.6 Basic Methods Of Navigating An Operating System - Part 1 5.7 Basic Methods Of Navigating An Operating System - Part 2 5.8 Basic Methods Of Navigating An Operating System Demo - Part 1 5.9 Basic Methods Of Navigating An Operating System Demo - Part 2 5.10 Basic Support Concepts 5.11 Basic Backup Concepts 5.12 Environmental And Safety Concepts - Part 1 5.13 Environmental And Safety Concepts - Part 2   Module 6: Course Review 6.1 Software Domain Review 6.2 Hardware Domain Review 6.3 Security Domain Review 6.4 Networking Domain Review 6.5 Basic IT Literacy Review 6.6 Course Review Question 6.7 Test Taking Tips 6.8 Course Outro [/zozo_accordion] [zozo_accordions id="2. CompTIA A+ 220-901 and 902 (2 EXAMS INCLUDED)"] [zozo_accordion title="2. CompTIA A+ 220-901 and 902 (2 EXAMS INCLUDED)" open="no" parent_id="accordion-1"] CompTIA A+ 220-901     Module 1 Introduction To Personal Computers And IT Certification 1.1 Personal Computer ConceptsPart 1 1.2 Personal Computer Concepts Part 2 1.3 Becoming An IT Professional 1.4 Certification Basics 1.5 Review   Module 2 Internal Hardware Components 2.1 Motherboards Part 1 2.2 Motherboards Part 2 2.3 BIOS Part 1 2.4 BIOSPart 2 2.5 BIOSPart 3 2.6 Power Supplies Part 1 2.7 Power SuppliesPart 2 2.8 Central Processing Unit Part 1 2.9 Central Processing UnitPart 2 2.10 Central Processing Unit Part 3 2.11 MemoryPart 1 2.12 MemoryPart 2 2.13 Review   Module 3 Storage Fundamentals 3.1 Storage Overview 3.2 Magnetic Drives 3.3 Solid State And Flash Drives 3.4 Optical Drives 3.5 RAID Technologies 3.6 Tape Drives 3.7 Installing Hard Drives 3.8 Review   Module 4 Expanding Hardware Capabilities 4.1 Expansion Components OvereviewPart 1 4.2 Expansion Components OvereviewPart 2 4.3 Expansion TechnologiesPart 1 4.4 Expansion TechnologiesPart 2 4.5 Video CardsPart 1 4.6 Video CardsPart 2 4.7 Sound Cards 4.8 Networking Interface Cards 4.9 Alternative Expansion Devices 4.10 Review   Module 5 Working With Peripheral Devices 5.1 Peripheral Devices Overview 5.2 Input Devices Part 1 5.3 Input DevicesPart 2 5.4 Input Devices Part 3 5.5 Output Devices Video MonitorsPart 1 5.6 Output DevicesVideo MonitorsPart 2 5.7 Output Devices Video Monitors Part 3 5.8 Output DevicesPrinters And ScannersPart1 5.9 Output Devices Printers And Scanners Part2 5.10 Output DevicesPrinters And ScannersPart 3 5.11 Output Devices Printers And ScannersPart 4 5.12 Input And Output Devices 5.13 Review   Module 6 Mobiles Devices 6.1 Mobile Devices Overview 6.2 Laptop Computer Components Part 1 6.3 Laptop Computer ComponentsPart 2 6.4 Laptop Computer Expansion Capabilities 6.5 Replacing Portable Computer ComponentsPart 1 6.6 Replacing Portable Computer ComponentsPart 2 6.7 Additional Mobile Devices Part 1 6.8 Additional Mobile DevicesPart 2 6.9 Mobile Device Ports And Connectors 6.10 Review   Module 7 Computer Networking 7.1 Networking FundamentalsPart 1 7.2 Networking Fundamentals Part 2 7.3 Network DevicesPart 1 7.4 Network Devices Part 2 7.5 Cable And Connectors Part 1 7.6 Cable And ConnectorsPart 2 7.8 TCP/IP FundamentalsPart 1 7.9 TCP/IP FundamentalsPart2 7.10 TCP/IP FundamentalsPart3 7.11 TCP/IP Fundamentals Part 4 7.12 TCP/IP FundamentalsPart 5 7.13 Internet Connectivity 7.14 Wireless Networks Part 1 7.15 Wireless NetworksPart 2   Module 8 Hardware And Network Troubleshooting Troubleshooting Models Part 1 Troubleshooting ModelsPart 2 Troubleshooting Physical IssuesPart 1 Troubleshooting Physical Issues Part 2 Troubleshooting Physical IssuesPart 3 Troubleshooting Networking Issues Part 1 Troubleshooting Networking IssuesPart 2 Troubleshooting Mobile Devices Troubleshooting Printers     CompTIA A+ 220-902   Module 1: Introduction To Operating Systems 1.1 Introduction 1.2 Operating Systems Overview Part 1 1.3 Operating Systems Overview Part 2 1.4 Operating Systems Functions Part 1 1.5 Operating Systems Functions Part 2 1.6 Windows OS Versions Part 1 1.7 Windows OS Versions Part 2 1.8 Windows OS Versions Part 3 1.9 Basic Navigation And Management Part 1 1.10 Basic Navigation And Management Part 2   Module 2: Installing Windows Operating Systems 2.1 PreInstalling Task 2.2 Performing Clean Installs Part 1 2.3 Performing Clean Installs Part 2 2.4 Performing Upgrades 2.5 Migrating User Data   Module 3: Configuration And Management In Windows 3.1 Using Control Panel And PC Settings Part 1 3.2 Using Control Panel And PC Settings Part 2 3.3 Using Control Panel And PC Settings Part 3 3.4 Using Graphical Administrative Tools Part 1 3.5 Using Graphical Administrative Tools Part 2 3.6 Using Graphical Administrative Tools Part 3 3.7 Using Graphical Administrative Tools Part 4 3.8 Using Command Line Administrative Tools 3.9 Configuring Networking Part 1 3.10 Configuring Networking Part 2 3.11 Configuring Networking Part 3 3.12 Operating System Security Part 1 3.13 Operating System Security Part 2 3.14 Operating System Security Part 3 3.15 Windows Preventative Maintenance   Module 4: Utilizing Alternative Operating Systems 4.1 Mac And Linux Overview 4.2 OS Features And Tools 4.3 Best Practices Using Alternative Operating Systems 4.4 Basic Command Line Administration In Linux 4.5 Network Operating Systems Part 1 4.6 Network Operating Systems Part 2   Module 5: Virtualization And Cloud Computing 5.1 Understanding Virtualization 5.2 Basic Cloud Concepts   Module 6: Managing Mobile Devices 6.1 Mobile Devices Overview 6.2 Mobile Operating Systems 6.3 Network Connectivity And Email 6.4 Mobile Device Synchronization   Module 7: Understanding System Security 7.1 Understanding Threats To Security Part 1 7.2 Understanding Threats To Security Part 2 7.3 Understanding Threats To Security Part 3 7.4 Understanding Common Prevention Methods Part 1 7.5 Understanding Common Prevention Methods Part 2 7.6 Understanding Common Prevention Methods Part 3   Module 8: Troubleshooting And Operational Procedures 8.1 Troubleshooting Theory 8.2 Communication And Professionalism Part 1 8.3 Communication And Professionalism Part 2 8.4 Operational And Safety Procedures 8.5 Security And Privacy Guidelines For Troubleshooting 8.6 Troubleshooting Operating Systems Part 1 8.7 Troubleshooting Operating Systems Part 2 8.8 Troubleshooting Mobile Devices Part 1 8.9 Troubleshooting Mobile Devices Part 2 8.10 Troubleshooting Common Security Issues Part 1 8.11 Troubleshooting Common Security Issues Part 2 8.12 Conclusion [/zozo_accordion] [zozo_accordions id="3. Cyber Security Awareness and Prevention (NO EXAM)"] [zozo_accordion title="3. Cyber Security Awareness and Prevention (NO EXAM)" open="no" parent_id="accordion-1"] 1.1 Course Introduction 1.2 Where We Are Today 1.3 Areas Of Protection 1.4 The Connection - Part 1 1.5 The Connection - Part 2 1.6 Network Protection 1.7 Browsing Blunders - Part 1 1.8 Browsing Blunders - Part 2 1.9 Settings - Part 1 1.10 Settings - Part 2 1.11 Settings - Part 3 1.12 Settings - Part 4 1.13 Cookies 1.14 Browsing Tips And Tricks 1.15 Email Cant Hurt You Right - Part 1 1.16 Email Cant Hurt You Right - Part 2 1.17 Viruses - Part 1 1.18 Viruses - Part 2 1.19 Viruses - Part 3 1.20 Course Outro   Module 2: Managing Mobile Device Security 2.1 Managing Mobile Device Security Part1 2.2 Managing Mobile Device Security Part2 2.3 Secure Access 2.4 Secure Access iPhone Demo 2.5 Secure Access Android Demo 2.6 Protect The Data 2.7 Protect The Data Android Demo 2.8 Protect The Data iPhone Demo 2.9 Manage App Access 2.10 Manage App Access iPhone Demo 2.11 Manage App Access Android Demo 2.12 Stay Up To Date 2.13 Stay Up To Date Android Demo 2.14 Stay Up To Date iPhone Demo 2.15 Use Other Tools To Help 2.16 Prepare For The Worst 2.17 Prepare For The Worst Android Demo 2.18 Prepare For The Worst iPhone Demo 2.19 Best Practices [/zozo_accordion] [zozo_accordions id="4. Data Security Compliance (NO EXAM)"] [zozo_accordion title="4. Data Security Compliance (NO EXAM)" open="no" parent_id="accordion-1"] Module 1: Data Breaches And ID Theft 1.1 Course Introduction 1.2 Threat And Cost   Module 2: Device Security Basics 2.1 It’s All About YOU- Part 1 2.2 It’s All About YOU- Part 2   Module 3: Avoiding Inadvertent Disclosuree 3.1 No More OOps- Part 1 3.2 No More OOps- Part 2   Module 4: Physical And Technical Safeguards 4.1 The DOOf Security- Part 1 4.2 The DOOf Security - Part 2 4.3 Course Outro [/zozo_accordion] [zozo_accordions id="5. CompTIA Network+ N10-006 (1 EXAM)"] [zozo_accordion title="5. CompTIA Network+ N10-006 (1 EXAM)" open="no" parent_id="accordion-1"] Module 1 Introduction To Networking 1.1 Introduction 1.2 Networking 101 1.3 Networking Models And Topologies 1.4 Network Components And Services 1.5 Becoming A Network Professional   Module 2 Networking Standards 2.1 Introducing Network Standards 2.2 OSI/RM 2.3 IEEE Network Standards   Module 3 Network Cabling And Transmission 3.1 Transmission Fundamentals 3.2 Copper Media Types 3.3 Optical Media Types 3.4 Specialty Connectors And Cabling 3.5 Lan Infrastructure Wiring   Module 4 Understanding TCP/IP 4.1 Overview Of TCP/IP 4.2 TheProtocol Suite ­Part 1 4.3 The Protocol Suite ­Part 2 4.4 IPV4 Addressing­ Part 1 4.5 IPV4 Addressing­ Part 2 4.6 Create IPV4 Subnets­ Part 1 4.7 CreateIPV4 Subnets ­Part 2 4.8 IPv6 Adressing 4.9 Transitioning To IPv6 4.10 IP Address Assignment Services ­Part 1 4.11 IP Address Assignment Services­ Part 2 4.12 Name Resolution Services ­Part 1 4.13 Name Resolution Services­ Part 2   Module 5 Network Devices 5.1 Introduction To Network Devices 5.2 Physical Layer Devices 5.3 Data Link Layer Devices ­Part 1 5.4 Data Link Layer Devices­ Part 2 5.5 Network Layer Devices­ Part 1 5.6 Network Layer Devices ­Part2 5.7 Additional Network Devices   Module 6 Wireless Network 6.1 Wireless Networking Fundamentals 6.2 Wireless Networking Standards 6.3 Wireless Security Fundamentals 6.4 Planning For Wireless Networks   Module 7 Wide Area Network 7.1 WAN Fundamentals 7.2 Wired WAN Connections 7.3 Wireless WAN Connectors 7.4 Fiber WAN Connections   Module 8 Remote Access 8.1 Introduction To Remote Networking 8.2 Authenticating Remote Connections 8.3 Understanding Virtual Private Networks   Module 9 Network Security 9.1 Network Security 101 9.2 Planning For Network Security Part 1 9.3 Planning For Network Security Part 2 9.4 Planning For Network Security Part 3 9.5 Identifying Threats And VulnerabilitiesPart 1 9.6 Identifying Threats And Vulnerabilities Part 2 9.7 Identifying Threats And Vulnerabilities Part 3 9.8 Protecting The Network Part 1 9.9 Protecting The Network Part 2 9.10 Protecting The Network Part 3 9.11 Protecting The Network Part 4 9.12 Incident Response And Computer Forensics   Module 10 Building Scalable High Performance Networks 10.1 Maintaining Business Continuity Part 1 10.2 Maintaining Business Continuity Part 2 10.3 Virtualization And Cloud Computing Part 1 10.4 Virtualization And Cloud Computing Part 2 10.5 Virtualization And Cloud Computing Part 3 10.6 Virtualization And Cloud Computing Part 4 10.7 Unified Communication   Module 11 Monitoring And Troubleshooting Networks 11.1 Network Safety Fundamentals 11.2 Maintaining And Monitoring Networks Part 1 11.3 Maintaining And Monitoring Networks Part 2 11.4 Maintaining And Monitoring Networks Part 3 11.5 Maintaining And Monitoring Networks Part 4 11.6 Troubleshooting Methodology Part 1 11.7 Troubleshooting Methodology Part 2 11.8 Understanding Troubleshooting Tools Part 1 11.9 Understanding Troubleshooting Tools Part 2 11.10 Troubleshooting Network Issues Part 1 11.11 Troubleshooting Network Issues Part 2 11.12 Course Outro [/zozo_accordion] [zozo_accordions id="6. CompTIA Security+ SY0-501 (1 EXAM)"] [zozo_accordion title="6. CompTIA Security+ SY0-501 (1 EXAM)" open="no" parent_id="accordion-1"] Module 1: Networking Terminology 1.1 Course Introduction 1.2 Network Devices Part 1 1.3 Network Devices Part 2 1.4 Networking Cabling 1.5 Networking Addressing Part 1 1.6 Networking Addressing Part 2 1.7 Networking Addressing Part 3 1.8 Networking Addressing Part 4   Module 2: Locking Down Or Network 2.1 Firewalls Part 1 2.2 Firewalls Part 2 2.3 Intrusion Detection Systems 2.4 Network Design 2.5 Securing Devices   Module 3: Wireless 3.1 Wireless Basics Part 1 3.2 Wireless Basics Part 2 3.3 Securing Wireless Part 1 3.4 Securing Wireless Part 2 3.5 Configuring Wireless, Bluetooth And Infrared   Module 4: Intro To Security Terminology 4.1 Goals Of Information Security 4.2 Authentication And Authorization 4.3 Security Principles And Terminology Part 1 4.4 Security Principles And Terminology Part 2   Module 5: Policies And Standards 5.1 Introduction To Security Policies 5.2 Looking At Some Security Policies Part 1 5.3 Looking At Some Security Policies Part 2 5.4 Looking At Some Security Policies Part 3 5.5 Human Resource Policies Part 1 5.6 Human Resource Policies Part 2 5.7 User Education And Awareness Part 1 5.8 User Education And Awareness Part 2   Module 6: Physical Security 6.1 Business Location 6.2 Physical Access Controls 6.3 Implementing Environmental Controls   Module 7: Risk Analysis 7.1 Introduction Risk Analysis Part 1 7.2 Introduction Risk Analysis Part 2 7.3 Types Of Risk Analysis 7.4 Risk Mitigation Strategies   Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis) 8.1 Business Continuity 8.2 Business Impact Analysis 8.3 Disaster Recovery 8.4 Backup And Restore   Module 9: Introduction To Computer Forensics 9.1 Working With Evidence 9.2 Collecting Digital Evidence Part 1 9.3 Collecting Digital Evidence Part 2 9.4 Looking At Incident Response   Module 10: Types Of Attacks   10.1 Social Engineering 10.2 Network Attacks Part 1 10.3 Network Attacks Part 2 10.4 Password And Application Attacks   Module 11: System Security Threats 11.1 Identifying Physical Threats 11.2 Malicious Software Part 1 11.3 Demo 11.4 Malicious Software Part 2 11.5 Threats Against Hardware   Module 12: Security Assessments 12.1 Types Of Assessments 12.2 Penetration Testing   Module 13: Monitoring And Auditing 13.1 Introduction To Monitoring And Monitoring Tools 13.2 Implementing Logging And Auditing   Module 14: Authentication 14.1 Authentication Models 14.2 Authentication Protocols 14.3 Implementing Authentication   Module 15: Access Control 15.1 Introducing Access Control 15.2 Access Control Models 15.3 Implementing Access Control Part 1 15.4 Implementing Access Control Part 2   Module 16: Mitigating Security Threats 16.1 Operating System Hardening 16.2 System Hardening Procedures 16.3 Application Security 16.4 Server Hardening Best Practices Part 1 16.5 Server Hardening Best Practices Part 2   Module 17: Implementing System Security 17.1 Implementing Personal Firewalls And HIDS 17.2 Protecting Against Malware 17.3 Device Security And Data Security Part 1 17.4 Device Security And Data Security Part 2 17.5 Understanding Virtualization And Cloud Computing   Module 18: Cryptography 18.1 Introduction To Cryptography 18.2 Symmetric And Asymmetric Encryption 18.3 Understanding Hashing And Encryption Uses   Module 19: Public Key Infrastructure 19.1 Intro To PKI 19.2 Managing And Implementing PKI 19.3 Course Conclusion [/zozo_accordion]   Certification exams included:  
  1. CompTIA A+ 220-901
  2. CompTIA A+ 220-902
  3. CompTIA Network+ N10-006
  4. CompTIA Security+ SY0-501
  Course access period: 12 months online access   How much can I potentially earn with these certifications?   Each certification offers a different level of earning potential. See what the UK and US national average salary is for people with these certifications from this bundle:  
  • CompTIA A+: £30,000 p.a. UK* / $40,599 p.a. US^
  • CompTIA Network+: £45,000 p.a. UK* / $52,414 p.a. US^
  • CompTIA Security+: £48,850 p.a. UK* / $54,095 p.a. US^
  Source: *UK: ITjobswatch / ^US: PayScale - As at Jan 2017   How much does a Cyber Security Specialist earn?   The average salary for a Cyber Security Specialist is £57,500 p.a.* As at October 2017. Source: ITjobswatch   What career paths are available to me through this course?  
  • Cyber Security Engineer
  • Cyber Security Analyst
  • Cyber Security Investigator
  • Cyber Threat Analyst
  • Cyber Threat Consultant
  • IT Security Specialist
  • IT Security Consultant
  • IT Support Technician
  • Network Engineer
  • Network Consultant
  • Data Centre Manager
  • IT Manager
  • IT Sales Account Manager
  • IT Consultant
  • Systems Administrator
  How is each course taught?  

All courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace and best of all... any where in the world, providing you have access to a laptop, PC or desktop computer, and an internet connection. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to.  The lessons are multi-media based, which means video and audio are used to teach the lessons. Your tutor will PowerPoint slides, illustrations, diagrams and give demonstrations to teach each class.  Most lessons are also interactive, prompting the learner to participate.  This might involve answering on-screen questions, participating in tasks.


Learn what the CompTIA Security+ can do for your career.

  How long will it take me to complete each course?  

As mentioned above, our courses are self-paced.  Some people finish their course faster than others.  Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this bundle, then it will take you less time than if you do two or three or all of them.  No matter what though, you will always have 12 months to complete your course.

  How do I book my exams?   When you’re ready to sit your exams, email with your request along with the title of the exam you wish to take. We will then send you an email with instructions on how to complete your exam booking. The exams for this course must be sat at your local test center, which we will locate for you.   What do I need?  

All you need is an internet connection and a device, such as a smart phone, tablet, laptop or PC, and an internet connection. To get the most out of the course, we recommend you access it using either a laptop or desktop computer through Google Chrome.

  Can I do further Cyber Security training after this course?   Yes. We offer an extensive range of advanced Cyber Security courses in such areas as digital forensics, vulnerability assessment, security leadership, incident handling, and information systems security management, plus more. Click hereto see our full range of courses.   Course Features   With Hudson's e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our learning system gives you all of the benefits of a live class at just a fraction of the cost. Courses include:   Expert Instructor-Led Training We only use the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.   Visual Demonstrations & Multimedia Presentations Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.   Quizzes & Exam Simulators Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.   This will allow you to gauge your effectiveness before moving to the next module in your course. Hudson courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.   Social Learning & Networking Hudson has designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students and staff, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.   Flash Cards & Educational Games Hudson knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.   Navigation & Controls Hudson’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

Provider: Hudson

Hudson - On-Demand 24/7 Learning

Hudson - Convenient and effective learning solutions

In the vast world of e-learning, Hudson strives to be nothing but the best. Hudson courses come in a range of topics, with the ultimate in flexibility and customer service. Hudson will put your learning needs above all else, and...

Read more and show all courses with Provider: Hudson

Request information - obligation free

Fill out your details to find out more about Cyber Security for Beginners with 4 Official CompTIA Exams.

  Contact the provider

  Get more information

  Register your interest