Student Course Login Click Here
Sale!Featured
Complete CompTIA Training Bundle

Complete CompTIA Training Bundle

$995.00 $689.00

Description

Plan to obtain several CompTIA certifications? This CompTIA Training Bundle is the way to go!  By the time you complete A+ online training you will have the skills and credentials to start working in the IT field.  Add on Network+, and Security+ course, and you’ll have a well-rounded foundation that will allow you to advance your IT career in many directions.  You’ve probably seen on indeed.com and dice.com, the more certifications you achieve, the more income you’ll make! Since these certifications are vendor neutral by achieving any CompTIA certification you give yourself a broad array of skills to qualify you for a variety of IT positions. Our students agree become certified IT Professionals with the highest quality online training at affordable prices. We’re changing peoples lives, and we love it!

THIS CompTIA TRAINING BUNDLE INCLUDES:

CompTIA A+

CompTIA Network+

CompTIA Security+ (SY0-401)

CompTIA A+ 220-901

Module 1 Introduction To Personal Computers And IT Certification
„„
1.1 Personal Computer ConceptsPart 1
1.2 Personal Computer Concepts Part 2
1.3 Becoming An IT Professional
1.4 Certification Basics
1.5 Review

Module 2 Internal Hardware Components
„„
2.1 Motherboards Part 1
2.2 Motherboards Part 2
2.3 BIOS Part 1
2.4 BIOSPart 2
2.5 BIOSPart 3
2.6 Power Supplies Part 1
2.7 Power SuppliesPart 2
2.8 Central Processing Unit Part 1
2.9 Central Processing UnitPart 2
2.10 Central Processing Unit Part 3
2.11 MemoryPart 1
2.12 MemoryPart 2
2.13 Review

Module 3 Storage Fundamentals
„„
3.1 Storage Overview
3.2 Magnetic Drives
3.3 Solid State And Flash Drives
3.4 Optical Drives
3.5 RAID Technologies
3.6 Tape Drives
3.7 Installing Hard Drives
3.8 Review

Module 4 Expanding Hardware Capabilities
„„
4.1 Expansion Components OvereviewPart 1
4.2 Expansion Components OvereviewPart 2
4.3 Expansion TechnologiesPart 1
4.4 Expansion TechnologiesPart 2
4.5 Video CardsPart 1
4.6 Video CardsPart 2
4.7 Sound Cards
4.8 Networking Interface Cards
4.9 Alternative Expansion Devices
4.10 Review

Module 5 Working With Peripheral Devices
„„
5.1 Peripheral Devices Overview
5.2 Input Devices Part 1
5.3 Input DevicesPart 2
5.4 Input Devices Part 3
5.5 Output Devices Video MonitorsPart 1
5.6 Output DevicesVideo MonitorsPart 2
5.7 Output Devices Video Monitors Part 3
5.8 Output DevicesPrinters And ScannersPart1
5.9 Output Devices Printers And Scanners Part2
5.10 Output DevicesPrinters And ScannersPart 3
5.11 Output Devices Printers And ScannersPart 4
5.12 Input And Output Devices
5.13 Review

Module 6 Mobiles Devices
„„
6.1 Mobile Devices Overview
6.2 Laptop Computer Components Part 1
6.3 Laptop Computer ComponentsPart 2
6.4 Laptop Computer Expansion Capabilities
6.5 Replacing Portable Computer ComponentsPart 1
6.6 Replacing Portable Computer ComponentsPart 2
6.7 Additional Mobile Devices Part 1
6.8 Additional Mobile DevicesPart 2
6.9 Mobile Device Ports And Connectors
6.10 Review

Module 7 Computer Networking
„
7.1 Networking FundamentalsPart 1
7.2 Networking Fundamentals Part 2
7.3 Network DevicesPart 1
7.4 Network Devices Part 2
7.5 Cable And Connectors Part 1
7.6 Cable And ConnectorsPart 2
7.8 TCP/IP FundamentalsPart 1
7.9 TCP/IP FundamentalsPart2
7.10 TCP/IP FundamentalsPart3
7.11 TCP/IP Fundamentals Part 4
7.12 TCP/IP FundamentalsPart 5
7.13 Internet Connectivity
7.14 Wireless Networks Part 1
7.15 Wireless NetworksPart 2

Module 8 Hardware And Network Troubleshooting
„„
Troubleshooting Models Part 1
Troubleshooting ModelsPart 2
Troubleshooting Physical IssuesPart 1
Troubleshooting Physical Issues Part 2
Troubleshooting Physical IssuesPart 3
Troubleshooting Networking Issues Part 1
Troubleshooting Networking IssuesPart 2
Troubleshooting Mobile Devices
Troubleshooting Printers

CompTIA A+ 220-902

Module 1: Introduction To Operating Systems

1.1 Introduction

1.2 Operating Systems Overview Part 1

1.3 Operating Systems Overview Part 2

1.4 Operating Systems Functions Part 1

1.5 Operating Systems Functions Part 2

1.6 Windows OS Versions Part 1

1.7 Windows OS Versions Part 2

1.8 Windows OS Versions Part 3

1.9 Basic Navigation And Management Part 1

1.10 Basic Navigation And Management Part 2

Module 2: Installing Windows Operating Systems

2.1 PreInstalling Task

2.2 Performing Clean Installs Part 1

2.3 Performing Clean Installs Part 2

2.4 Performing Upgrades

2.5 Migrating User Data

Module 3: Configuration And Management In Windows

3.1 Using Control Panel And PC Settings Part 1

3.2 Using Control Panel And PC Settings Part 2

3.3 Using Control Panel And PC Settings Part 3

3.4 Using Graphical Administrative Tools Part 1

3.5 Using Graphical Administrative Tools Part 2

3.6 Using Graphical Administrative Tools Part 3

3.7 Using Graphical Administrative Tools Part 4

3.8 Using Command Line Administrative Tools

3.9 Configuring Networking Part 1

3.10 Configuring Networking Part 2

3.11 Configuring Networking Part 3

3.12 Operating System Security Part 1

3.13 Operating System Security Part 2

3.14 Operating System Security Part 3

3.15 Windows Preventative Maintenance

Module 4: Utilizing Alternative Operating Systems

4.1 Mac And Linux Overview

4.2 OS Features And Tools

4.3 Best Practices Using Alternative Operating

Systems

4.4 Basic Command Line Administration In Linux

4.5 Network Operating Systems Part 1

4.6 Network Operating Systems Part 2

Module 5: Virtualization And Cloud Computing

5.1 Understanding Virtualization

5.2 Basic Cloud Concepts

Module 6: Managing Mobile Devices

6.1 Mobile Devices Overview

6.2 Mobile Operating Systems

6.3 Network Connectivity And Email

6.4 Mobile Device Synchronization

Module 7: Understanding System Security

7.1 Understanding Threats To Security Part 1

7.2 Understanding Threats To Security Part 2

7.3 Understanding Threats To Security Part 3

7.4 Understanding Common Prevention Methods Part 1

7.5 Understanding Common Prevention Methods Part 2

7.6 Understanding Common Prevention Methods Part 3

Module 8: Troubleshooting And Operational Procedures

8.1 Troubleshooting Theory

8.2 Communication And Professionalism Part 1

8.3 Communication And Professionalism Part 2

8.4 Operational And Safety Procedures

8.5 Security And Privacy Guidelines For Troubleshooting

8.6 Troubleshooting Operating Systems Part 1

8.7 Troubleshooting Operating Systems Part 2

8.8 Troubleshooting Mobile Devices Part 1

8.9 Troubleshooting Mobile Devices Part 2

8.10 Troubleshooting Common Security Issues Part 1

8.11 Troubleshooting Common Security Issues Part 2

8.12 Conclusion

CompTIA N10-006: CompTIA Network+

Module 1 Introduction To Networking

1.1 Introduction

1.2 Networking 101

1.3 Networking Models And Topologies

1.4 Network Components And Services

1.5 Becoming A Network Professional

Module 2 Networking Standards

2.1 Introducing Network Standards

2.2 OSI/RM

2.3 IEEE Network Standards

Module 3 Network Cabling And Transmission

3.1 Transmission Fundamentals

3.2 Copper Media Types

3.3 Optical Media Types

3.4 Specialty Connectors And Cabling

3.5 Lan Infrastructure Wiring

Module 4 Understanding TCP/IP

4.1 Overview Of TCP/IP

4.2 TheProtocol Suite ­Part 1

4.3 The Protocol Suite ­Part 2

4.4 IPV4 Addressing­ Part 1

4.5 IPV4 Addressing­ Part 2

4.6 Create IPV4 Subnets­ Part 1

4.7 CreateIPV4 Subnets ­Part 2

4.8 IPv6 Adressing

4.9 Transitioning To IPv6

4.10 IP Address Assignment Services ­Part 1

4.11 IP Address Assignment Services­ Part 2

4.12 Name Resolution Services ­Part 1

4.13 Name Resolution Services­ Part 2

Module 5 Network Devices

5.1 Introduction To Network Devices

5.2 Physical Layer Devices

5.3 Data Link Layer Devices ­Part 1

5.4 Data Link Layer Devices­ Part 2

5.5 Network Layer Devices­ Part 1

5.6 Network Layer Devices ­Part2

5.7 Additional Network Devices

Module 6 Wireless Network

6.1 Wireless Networking Fundamentals

6.2 Wireless Networking Standards

6.3 Wireless Security Fundamentals

6.4 Planning For Wireless Networks

Module 7 Wide Area Network

7.1 WAN Fundamentals

7.2 Wired WAN Connections

7.3 Wireless WAN Connectors

7.4 Fiber WAN Connections

Module 8 Remote Access

8.1 Introduction To Remote Networking

8.2 Authenticating Remote Connections

8.3 Understanding Virtual Private Networks

Module 9 Network Security

9.1 Network Security 101

9.2 Planning For Network Security Part 1

9.3 Planning For Network Security Part 2

9.4 Planning For Network Security Part 3

9.5 Identifying Threats And VulnerabilitiesPart 1

9.6 Identifying Threats And Vulnerabilities Part 2

9.7 Identifying Threats And Vulnerabilities Part 3

9.8 Protecting The Network Part 1

9.9 Protecting The Network Part 2

9.10 Protecting The Network Part 3

9.11 Protecting The Network Part 4

9.12 Incident Response And Computer Forensics

Module 10 Building Scalable High Performance Networks

10.1 Maintaining Business Continuity Part 1

10.2 Maintaining Business Continuity Part 2

10.3 Virtualization And Cloud Computing Part 1

10.4 Virtualization And Cloud Computing Part 2

10.5 Virtualization And Cloud Computing Part 3

10.6 Virtualization And Cloud Computing Part 4

10.7 Unified Communication

Module 11 Monitoring And Troubleshooting Networks

11.1 Network Safety Fundamentals

11.2 Maintaining And Monitoring Networks Part 1

11.3 Maintaining And Monitoring Networks Part 2

11.4 Maintaining And Monitoring Networks Part 3

11.5 Maintaining And Monitoring Networks Part 4

11.6 Troubleshooting Methodology Part 1

11.7 Troubleshooting Methodology Part 2

11.8 Understanding Troubleshooting Tools Part 1

11.9 Understanding Troubleshooting Tools Part 2

11.10 Troubleshooting Network Issues Part 1

11.11 Troubleshooting Network Issues Part 2

11.12 Course Outro

CompTIA SY0-401: Security+
Module 1: Networking Terminology

1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network

2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices

Module 3: Wireless

3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology

4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards

5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2

Module 6: Physical Security„„

6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls

Module 7: Risk Analysis
„„
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
„„
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore

Module 9: Introduction To Computer Forensics
„„
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response

Module 10: Types Of Attacks
„„
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks

Module 11: System Security Threats
„„
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware

Module 12: Security Assessments
„„
12.1 Types Of Assessments
12.2 Penetration Testing

Module 13: Monitoring And Auditing
„„
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing

Module 14: Authentication
„„
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication

Module 15: Access Control
„„
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats
„„
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security
„„
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography
„„
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure
„„
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion

With Computer Learning Center Online’s e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our award winning learning system gives you all of the benefits of a live class at just a fraction of the cost. We’re so confident that our materials will produce results; we guarantee you’ll get certified on your FIRST attempt or your money back!

Computer Learning Center Online courses include:

 

Expert Instructor-Led Training

Computer Learning Center Online uses only the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Visual Demonstrations & Multimedia Presentations

Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Computer Learning Center Online always focuses on real world scenarios and skill-set development.

Quizzes & Exam Simulators

Computer Learning Center Online’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.

This will allow you to gauge your effectiveness before moving to the next module in your course. Computer Learning Center Online Courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

Social Learning & Networking

Computer Learning Center Online has designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students and ITU employees, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

Flash Cards & Educational Games

Computer Learning Center Online knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

Navigation & Controls

Computer Learning Center Online’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

TRY IT FREE FOR 48 HOURS

Access our entire library for 48 hours.
Just let us know where to send your LOGIN  click here!