MCSEClasses Certification Training Boot Camp Cisco Certification Training Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us

CompTIA A+/Network+/Security+

Course Length: 15 days
Certifications: A+
Number of Exams: 4

Class Schedule
01/06/18 - 01/20/18


01/27/18 - 02/10/18


02/17/18 - 03/03/18


03/10/18 - 03/24/18


03/31/18 - 04/14/18


04/21/18 - 05/04/18


05/12/18 - 05/26/18


  • Includes roundtrip airfare and lodging (for boot camps held in Georgia)
  • Hands-on instruction by a certified instructor
  • Includes all course materials
  • On-site Testing
  • Lunch & Snacks provided each day

CompTIA A+ 220-901 covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

CompTIA A+ 220-902 covers the skills required to install and configure PC operating systems, as well as configuring common features (e.g. network connectivity and email) for mobile operating systems Android and Apple iOS.

The CompTIA Network+ (Exam N10-006) certification ensures that the successful candidate has the important knowledge and skills necessary to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure, describe networking technologies, basic design principles, and adhere to wiring standards and use testing tools.

CompTIA Security+ (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ examination. In this course, you'll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.

A+ Certification

IT success stories start with CompTIA A+ certification. It validates understanding of the most common hardware and software technologies in business and certifies the skills necessary to support complex IT infrastructures. CompTIA A+ is a powerful credential that helps IT professionals worldwide ignite their IT career.

CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.

CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.


Held by over 1? million IT professionals worldwide, CompTIA A+ is the most essential IT certification for establishing an IT career. If you're new to the IT industry, this will help you put your best foot forward. And if you're already an IT professional, the CompTIA A+ certification validates your skills and can boost your career.

A+ is comprehensive and vendor-neutral

A+ certified professionals have mastered the technologies found in today's extensive and varied IT environments, from mobile to traditional devices and operating systems. They can confidently handle the most challenging technology problems more efficiently.

A+ validates foundational skills

A+ establishes best practices in troubleshooting, networking and security across a variety of devices to set the stage for IT careers. The certification also matches professional tech skills with communication skills.

A+ is trusted by employers

As businesses and governments worldwide continue to adopt mobile and cloud technology, they trust A+ certified professionals to keep their devices running and organizations working smoothly.

A+ is globally recognized and accredited

A+ carries ISO/ANSI accreditation status. You can trust that the rigorous development process of the A+ certification objectives and exams follows international standards of quality assurance.

A+ is industry supported

A+ is developed and maintained by leading IT experts. Content for the exams stems from a combination of industry-wide survey feedback and contributions from our team of subject matter experts.

Jobs that use CompTIA A+

  • Technical support specialist
  • Field service technician
  • IT support technician
  • IT support administrator
  • IT support specialist

CompTIA A+ 220-901

CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.

Course Outline

1.0 Hardware
  • Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
  • Explain the importance of motherboard components, their purpose and properties.
  • Compare and contrast various RAM types and their features.
  • Install and configure PC expansion cards.
  • Install and configure storage devices and use appropriate media.
  • Install various types of CPUs and apply the appropriate cooling methods.
  • Compare and contrast various PC connection interfaces, their characteristics and purpose.
  • Install a power supply based on given specifications.
  • Given a scenario, select the appropriate components for a custom PC configuration to meet customer specifications or needs.
  • Compare and contrast types of display devices and their features.
  • Identify common PC connector types and associated cables.
  • Install and configure common peripheral devices.
  • Install SOHO multifunction device/printers and configure appropriate settings.
  • Compare and contrast differences between the various print technologies and the associated imaging process.
  • Given a scenario, perform appropriate printer maintenance.
2.0 Networking
  • Identify the various types of network cables and connectors.
  • Compare and contrast the characteristics of connectors and cabling.
  • Explain the properties and characteristics of TCP/IP.
  • Explain common TCP and UDP ports, protocols and their purpose.
  • Compare and contrast various WiFi networking standards and encryption types.
  • Given a scenario, install and configure SOHO wireless/ wired router and apply appropriate settings.
  • Compare and contrast Internet connection types, network types and their features.
  • Compare and contrast network architecture devices, their functions and features.
  • Given a scenario, use appropriate networking tools.
3.0 Mobile Devices
  • Install and configure laptop hardware and components.
  • Explain the function of components within the display of a laptop.
  • Given a scenario, use appropriate laptop features.
  • Explain the characteristics of various types of other mobile devices.
  • Compare and contrast accessories and ports of other mobile devices.
4.0 Hardware and Network Troubleshooting
  • Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
  • Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
  • Given a scenario, troubleshoot common video, projector and display issues.
  • Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
  • Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
  • Given a scenario, troubleshoot printers with appropriate tools.

[ back to top ]

CompTIA A+ 220-902

CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.

Course Outline

1.0 Windows Operating Systems
  • Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
  • Given a scenario, install Windows PC operating systems using appropriate methods.
  • Given a scenario, apply appropriate Microsoft command line tools.
  • Given a scenario, use appropriate Microsoft operating system features and tools.
  • Given a scenario, use Windows Control Panel utilities.
  • Given a scenario, install and configure Windows networking on a client/desktop.
  • Perform common preventive maintenance procedures using the appropriate Windows OS tools.
2.0 Other Operating Systems and Technologies
  • Identify common features and functionality of the Mac OS and Linux operating systems.
  • Given a scenario, set up and use client-side virtualization.
  • Identify basic cloud concepts.
  • Summarize the properties and purpose of services provided by networked hosts.
  • Identify basic features of mobile operating systems.
  • Install and configure basic mobile device network connectivity and email.
  • Summarize methods and data related to mobile device synchronization.
3.0 Security
  • Identify common security threats and vulnerabilities.
  • Compare and contrast common prevention methods.
  • Compare and contrast differences of basic Windows OS security settings.
  • Given a scenario, deploy and enforce security best practices to secure a workstation.
  • Compare and contrast various methods for securing mobile devices.
  • Given a scenario, use appropriate data destruction and disposal methods.
  • Given a scenario, secure SOHO wireless and wired networks.
4.0 Software Troubleshooting
  • Given a scenario, troubleshoot PC operating system problems with appropriate tools.
  • Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.
  • Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.
  • Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.
5.0 Operational Procedures
  • Given a scenario, use appropriate safety procedures.
  • Given a scenario with potential environmental impacts, apply the appropriate controls.
  • Summarize the process of addressing prohibited content/activity, and explain privacy, licensing and policy concepts.
  • Demonstrate proper communication techniques and professionalism.
  • Given a scenario, explain the troubleshooting theory.

[ back to top ]

Network+ certification

The CompTIA Network+ certification (Exam N10-006) is an internationally recognized validation of the technical knowledge required of foundation-level IT network practitioners.

This exam will certify that the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network wireless and wired devices, establish basic network design and connectivity, understand and maintain network documentation, identify network limitations and weaknesses, and implement network security, standards, and protocols. The candidate will have a basic understanding of emerging technologies including unified communications, mobile, cloud, and virtualization technologies.

CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives.


It is recommended for CompTIA Network+ candidates to have the following:

  • CompTIA A+ certification or equivalent knowledge, though CompTIA A+ certification is not required.
  • Have at least 9 to 12 months of work experience in IT networking.

Course Outline

1.0 Network architecture
  • 1.1 Explain the functions and applications of various network devices
  • 1.2 Compare and contrast the use of networking services and applications
  • 1.3 Install and configure the following networking services/applications
  • 1.4 Explain the characteristics and benefits of various WAN technologies
  • 1.5 Install and properly terminate various cable types and connectors using appropriate tools
  • 1.6 Differentiate between common network topologies
  • 1.7 Differentiate between network infrastructure implementations
  • 1.8 Given a scenario, implement and configure the appropriate addressing schema
  • 1.9 Explain the basics of routing concepts and protocols
  • 1.10 Identify the basics elements of unified communication technologies
  • 1.11 Compare and contrast technologies that support cloud and virtualization
  • 1.12 Given a set of requirements, implement a basic network
2.0 Network operations
  • 2.1 Given a scenario, use appropriate monitoring tools
  • 2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools
  • 2.3 Given a scenario, use appropriate resources to support configuration management
  • 2.4 Explain the importance of implementing network segmentation
  • 2.5 Given a scenario, install and apply patches and updates
  • 2.6 Given a scenario, configure a switch using proper features
  • 2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices
3.0 Network security
  • 3.1 Compare and contrast risk related concepts
  • 3.2 Compare and contrast common network vulnerabilities and threats
  • 3.3 Given a scenario, implement network hardening techniques
  • 3.4 Compare and contrast physical security controls
  • 3.5 Given a scenario, install and configure a basic firewall
  • 3.6 Explain the purpose of various network access control models
  • 3.7 Summarize basic forensic concepts
4.0 Troubleshooting
  • 4.1 Given a scenario, implement the following network troubleshooting methodology
  • 4.2 Given a scenario, analyze and interpret the output of troubleshooting tools
  • 4.3 Given a scenario, troubleshoot and resolve common wireless issues
  • 4.4 Given a scenario, troubleshoot and resolve common copper cable issues
  • 4.5 Given a scenario, troubleshoot and resolve common fiber cable issues
  • 4.6 Given a scenario, troubleshoot and resolve common network issues
  • 4.7 Given a scenario, troubleshoot and resolve common security issues
  • 4.8 Given a scenario, troubleshoot and resolve common WAN issues
5.0 Industry standards, practices, and network theory
  • 5.1 Analyze a scenario and determine the corresponding OSI layer
  • 5.2 Explain the basics of network theory and concepts
  • 5.3 Given a scenario, deploy the appropriate wireless standard
  • 5.4 Given a scenario, deploy the appropriate wired connectivity standard
  • 5.5 Given a scenario, implement the appropriate policies or procedures
  • 5.6 Summarize safety practices
  • 5.7 Given a scenario, install and configure equipment in the appropriate location using best practices
  • 5.8 Explain the basics of change management procedures
  • 5.9 Compare and contrast the following ports and protocols
  • 5.10 Given a scenario, configure and apply the appropriate ports and protocols

[ back to top ]

Security+ certification

The CompTIA Security+ Certification (Exam SY0-401) is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.

Target Student

The CompTIA Security+ Certification is aimed at an IT security professional who has:

  • A minimum of 2 years experience in IT administration with a focus on security
  • Day to day technical information security experience
  • Broad knowledge of security concerns and implementation

Course Content

1.0 Network Security
1.1 Implement security configuration parameters on network devices and other technologies.
  • Firewalls
  • Routers
  • Switches
  • Load Balancers
  • Proxies
  • Web security gateways
  • VPN concentrators
  • NIDS and NIPS
  • Protocol analyzers
  • Spam filter
  • UTM security appliances
  • Web application firewall vs. network firewall
  • Application aware devices
1.2 Given a scenario, use secure network administration principles.
  • Rule-based management
  • Firewall rules
  • VLAN management
  • Secure router configuration
  • Access control lists
  • Port Security
  • 802.1x
  • Flood guards
  • Loop protection
  • Implicit deny
  • Network separation
  • Log analysis
  • Unified Threat Management
1.3 Explain network design elements and components.
  • DMZ
  • Subnetting
  • VLAN
  • NAT
  • Remote Access
  • Telephony
  • NAC
  • Virtualization
  • Cloud Computing
  • Layered security / Defense in depth
1.4 Given a scenario, implement common protocols and services.
  • Protocols
  • Ports
  • OSI relevance
1.5 Given a scenario, troubleshoot security issues related to wireless networking.
  • WPA
  • WPA2
  • WEP
  • EAP
  • PEAP
  • LEAP
  • MAC filter
  • Disable SSID broadcast
  • TKIP
  • CCMP
  • Antenna Placement
  • Power level controls
  • Captive portals
  • Antenna types
  • Site surveys
  • VPN (over open wireless)
2.0 Compliance and Operational Security
2.1 Explain the importance of risk related concepts.
  • Control types
  • False positives
  • False negatives
  • Importance of policies in reducing risk
  • Risk calculation
  • Quantitative vs. qualitative
  • Vulnerabilities
  • Threat vectors
  • Probability / threat likelihood
  • Risk-avoidance, transference, acceptance, mitigation, deterrence
  • Risks associated with Cloud Computing and Virtualization
  • Recovery time objective and recovery point objective
2.2 Summarize the security implications of integrating systems and data with third parties.
  • On-boarding/off-boarding business partners
  • Social media networks and/or applications
  • Interoperability agreements
  • Privacy considerations
  • Risk awareness
  • Unauthorized data sharing
  • Data ownership
  • Data backups
  • Follow security policy and procedures
  • Review agreement requirements to verify compliance and performance standards
2.3 Given a scenario, implement appropriate risk mitigation strategies.
  • Change management
  • Incident management
  • User rights and permissions reviews
  • Perform routine audits
  • Enforce policies and procedures to prevent data loss or theft
  • Enforce technology controls
2.4 Given a scenario, implement basic forensic procedures.
  • Order of volatility
  • Capture system image
  • Network traffic and logs
  • Capture video
  • Record time offset
  • Take hashes
  • Screenshots
  • Witnesses
  • Track man hours and expense
  • Chain of custody
  • Big Data analysis
2.5 Summarize common incident response procedures.
  • Preparation
  • Incident identification
  • Escalation and notification
  • Mitigation steps
  • Lessons learned
  • Reporting
  • Recovery/reconstitution procedures
  • First responder
  • Incident isolation
  • Data breach
  • Damage and loss control
2.6 Explain the importance of security related awareness and training.
  • Security policy training and procedures
  • Role-based training
  • Personally identifiable information
  • Information classification
  • Data labeling, handling and disposal
  • Compliance with laws, best practices and standards
  • User habits
  • New threats and new security trends/alerts
  • Use of social networking and P2P
  • Follow up and gather training metrics to validate compliance and security posture
2.7 Compare and contrast physical security and environmental controls.
  • Environmental controls
  • Physical security
  • Control types
2.8 Summarize risk management best practices.
  • Business continuity concepts
  • Fault tolerance
  • Disaster recovery concepts
2.9 Given a scenario, select the appropriate control to meet the goals of security.
  • Confidentiality
  • Integrity
  • Availability
  • Safety
3.0 Threats and Vulnerabilities
3.1 Explain types of malware.
  • Adware
  • Virus
  • Spyware
  • Trojan
  • Rootkits
  • Backdoors
  • Logic bomb
  • Botnets
  • Ransomware
  • Polymorphic malware
  • Armored virus
3.2 Summarize various types of attacks.
  • Man-in-the-middle
  • DDoS
  • DoS
  • Replay
  • Smurf attack
  • Spoofing
  • Spam
  • Phishing
  • Spim
  • Vishing
  • Spear phishing
  • Xmas attack
  • Pharming
  • Privilege escalation
  • Malicious insider threat
  • DNS poisoning and ARP poisoning
  • Transitive access
  • Client-side attacks
  • Password attacks
  • Typo squatting/URL hijacking
  • Watering hole attack
3.3 Summarize social engineering attacks and the associated effectiveness with each attack.
  • Shoulder surfing
  • Dumpster diving
  • Tailgating
  • Impersonation
  • Hoaxes
  • Whaling
  • Vishing
  • Principles (reasons for effectiveness)
3.4 Explain types of wireless attacks.
  • Rogue access points
  • Jamming/Interference
  • Evil twin
  • War driving
  • Bluejacking
  • Bluesnarfing
  • War chalking
  • IV attack
  • Packet sniffing
  • Near field communication
  • Replay attacks
  • WEP/WPA attacks
  • WPS attacks
3.5 Explain types of application attacks.
  • Cross-site scripting
  • SQL injection
  • LDAP injection
  • XML injection
  • Directory traversal/command injection
  • Buffer overflow
  • Integer overflow
  • Zero-day
  • Cookies and attachments
  • LSO (Locally Shared Objects)
  • Flash Cookies
  • Malicious add-ons
  • Session hijacking
  • Header manipulation
  • Arbitrary code execution / remote code execution
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
  • Monitoring system logs
  • Hardening
  • Network security
  • Security posture
  • Reporting
  • Detection controls vs. prevention controls
3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
  • Interpret results of security assessment tools
  • Tools
  • Risk calculations
  • Assessment types
  • Assessment technique
3.8 Explain the proper use of penetration testing versus vulnerability scanning.
  • Penetration testing
  • Vulnerability scanning
  • Black box
  • White box
  • Gray box
4.0 Application, Data and Host Security
4.1 Explain the importance of application security controls and techniques.
  • Fuzzing
  • Secure coding concepts
  • Cross-site scripting prevention
  • Cross-site Request Forgery (XSRF) prevention
  • Application configuration baseline (proper settings)
  • Application hardening
  • Application patch management
  • NoSQL databases vs. SQL databases
  • Server-side vs. Client-side validation
4.2 Summarize mobile security concepts and technologies.
  • Device security
  • Application security
  • BYOD concerns
4.3 Given a scenario, select the appropriate solution to establish host security.
  • Operating system security and settings
  • OS hardening
  • Anti-malware
  • Patch management
  • White listing vs. black listing applications
  • Trusted OS
  • Host-based firewalls
  • Host-based intrusion detection
  • Hardware security
  • Host software baselining
  • Virtualization
4.4 Implement the appropriate controls to ensure data security.
  • Cloud storage
  • SAN
  • Handling Big Data
  • Data encryption
  • Hardware based encryption devices
  • Data in-transit, Data at-rest, Data in-use
  • Permissions/ACL
  • Data policies
4.5 Compare and contrast alternative methods to mitigate security risks in static environments.
  • Environments
  • Methods
5.0 Access Control and Identity Management
5.1 Compare and contrast the function and purpose of authentication services.
  • Kerberos
  • LDAP
  • SAML
  • Secure LDAP
5.2 Given a scenario, select the appropriate authentication, authorization or access control.
  • Identification vs. authentication vs. authorization
  • Authorization
  • Authentication
  • Authentication factors
  • Identification
  • Federation
  • Transitive trust/authentication
5.3 Install and configure security controls when performing account management, based on best practices.
  • Mitigate issues associated with users with multiple account/roles and/or shared accounts
  • Account policy enforcement
  • Group based privileges
  • User assigned privileges
  • User access reviews
  • Continuous monitoring
6.0 Cryptography
6.1 Given a scenario, utilize general cryptography concepts.
  • Symmetric vs. asymmetric
  • Session keys
  • In-band vs. out-of-band key exchange
  • Fundamental differences and encryption methods
  • Transport encryption
  • Non-repudiation
  • Hashing
  • Key escrow
  • Steganography
  • Digital signatures
  • Use of proven technologies
  • Elliptic curve and quantum cryptography
  • Ephemeral key
  • Perfect forward secrecy
6.2 Given a scenario, use appropriate cryptographic methods.
  • WEP vs. WPA/WPA2 and preshared key
  • MD5
  • SHA
  • AES
  • DES
  • 3DES
  • HMAC
  • RSA
  • Diffie-Hellman
  • RC4
  • One-time pads
  • NTLM
  • NTLMv2
  • Blowfish
  • TwoFish
  • DHE
  • CHAP
  • PAP
  • Comparative strengths and performance of algorithms
  • Use of algorithms/protocols with transport encryption
  • Cipher suites
  • Key stretching
6.3 Given a scenario, use appropriate PKI, certificate management and associated components.
  • Certificate authorities and digital certificates
  • PKI
  • Recovery agent
  • Public key
  • Private key
  • Registration
  • Key escrow
  • Trust models

[ back to top ] is your best choice for CompTIA A+ Net+ Security+, CompTIA A+ Net+ Security+ training, CompTIA A+ Net+ Security+ certification, CompTIA A+ Net+ Security+ certification boot camp, CompTIA A+ Net+ Security+ boot camp, CompTIA A+ Net+ Security+ certification training, CompTIA A+ Net+ Security+ boot camp training, CompTIA A+ Net+ Security+ boot camp certification, CompTIA A+ Net+ Security+ certification course, CompTIA A+ Net+ Security+ course, training CompTIA A+ Net+ Security+, certification CompTIA A+ Net+ Security+, boot camp CompTIA A+ Net+ Security+, certification CompTIA A+ Net+ Security+ boot camp, certification CompTIA A+ Net+ Security+ training, boot camp CompTIA A+ Net+ Security+ training, certification CompTIA A+ Net+ Security+ course.

Search classes by keyword:

Search classes by category:

Copyright © 2017 Institute of Professional Learning. IPL Refund Policy. All Rights Reserved.