MIS Global Technologies

COURSE

ComTIA A+

CompTIA A+ is a widely recognized certification in the field of information technology (IT). It is designed for individuals seeking to establish a career in IT or enhance their existing knowledge and skills. The certification is provided by CompTIA (Computing Technology Industry Association), a non-profit trade association.

5-days Online Class

Beginner

English

Introduction to ComTIA A+

CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security. Attacks, threats, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance will all be covered in this course. Individuals with demonstrated skills are in high demand in today’s employment market, and the material and activities in this course can help you expand your computer security skill set so that you can successfully fulfil your obligations in any security-related work.

CompTIA Security+ is the first security certification a candidate should obtain. It establishes the fundamental knowledge essential for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity jobs. Security+ combines best practises in hands-on troubleshooting, ensuring candidates have the practical security problem-solving abilities required to:

  • Assess the corporate security posture and recommend and deploy relevant security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an understanding of applicable laws and rules, including governance, risk, and compliance principles
  • Identify, analyze, and respond to security events and incidents

What will you learn?

EXAM CODE: SY0-601

To earn your CompTIA Security+ certification, you’ll need to pass one certification exam: EXAM CODE: SY0-601

Program Outcome

In this course, you will apply information security in a number of scenarios:

Instructor-Led Training

An instructor-led training session, whether in-person or online, is base on classroom.

E-Learning

Learners can go through the content and activities at their own pace.

Hybrid Training

Combines traditional, face-to-face “seat time” with some online learning activities.

Curriculum | Your study plan

1.1 Introduction

2.1  Protection and Safety
2.2 Environmental Controls
2.3  Professionalism
2.4  Change Management
2.5 PC Maintenance
2.6 PC and Networking Tools
2.7 Troubleshooting Process Overview
2.8 Support Systems
2.9 Documentation

3.1 Network Media
3.2 Cables and Connectors
3.3 Cases and Motherboards
3.4 Motherboard Troubleshooting
3.5 Memory
3.6 Memory Installation
3.7 Memory Troubleshooting
3.8 BIOS/UEFI
3.9 Processors
3.10 Processor Troubleshooting
3.11 Video and Expansion Cards
3.12 Audio
3.13 Cooling
3.14 Power Supplies

4.1 Operating System
4.2 Windows Basics
4.3 Linux Basics
4.4 macOS Basics

5.1 Storage Devices
5.2 SATA
5.3 Optical Media
5.4 RAID
5.5 File Systems
5.6 Storage Management
5.7 Storage Spaces
5.8 Disk Optimization
5.9 Storage and RAID Troubleshooting

6.1 Windows Pre-Installation
6.2 Windows Installation
6.3 Cloud Computing
6.4 Virtualization

7.1 Windows System Tools
7.2 Windows Settings
7.3 Performance Monitoring
7.4 Windows Application Management
7.5 Linux Application Management
7.6 Digital Content Management
7.7 Virtual Memory
7.8 Windows and Application Troubleshooting
7.9 Scripting Basics

8.1 Active Directory
8.2 Users and Groups
8.3 Remote Services
8.4 VPN
8.5 Updates
8.6 System Backup
8.7 System Recovery
8.8 Windows Boot Errors

9.1 Manage Files on Windows
9.2 NTFS and Share Permissions
9.3 File Encryption
9.4 Linux File Management

10.1 Peripheral Devices
10.2 Display Devices
10.3 Display, Video, and Projector Troubleshooting
10.4 Device Driver Management
10.5 Device Driver Troubleshooting

11.2 Networking Ports and Protocols
11.3 Client-Side Network Configuration
11.4 Services Provided by Network Devices
11.5 Wireless Networking
11.6 SOHO Configuration
11.7 Networking Hardware
11.8 Command Line Network Utilities
11.9 Network Troubleshooting

12.1 Laptops
12.2 Mobile Device Displays and Components
12.3 Laptop Power Management
12.4 Mobile Devices
12.5 Mobile Device Network Connectivity
12.6 Mobile Device Security
12.7 Laptop and Mobile Device Troubleshooting

13.1 Printer Overview
13.2 Print Connectivity
13.3 Printer Types and Components
13.4 Printer Troubleshooting

14.1 Security Best Practices
14.2 Incident Response and Regulated Data
14.3 Physical Security
14.4 Logical Security Measures
14.5 Social Engineering Attacks
14.6 Data Destruction and Disposal
14.7 Malware Protection
14.8 Firewalls
14.9 Proxy Servers
14.10 Install, Configure, and Secure Browsers
14.11 Security Troubleshooting

Testimony | What our students said?

Login

Email US

We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.

    X
    CONTACT US