Are you considering enquiring? Please note: All courses listed are paid courses, though many providers offer flexible payment plans. Speak to a course advisor to find out more by making an enquiry today.
Special offer this month!
Save £140 on the course fees below this month! Offer ends 31st October
Full payments only. Discount is not available if you choose to pay for your course through instalments.
Course overview
If you’ve ever considered working within the cyber security industry, but felt you lacked the knowledge or skills to launch your career, this cyber security for beginners course might be what you’re looking for.
This course is aimed at absolute beginners to IT who want to start a career in cyber security or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cyber security and practice it at a technical level, you must first possess an understanding of basic IT technology such as computer systems and networks, which you will be taught in this course.
This course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this course, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the cyber security industry and attracts an average salary of £48,850 p.a. on its own. (source: ITjobswatch).
From the beginning, Hudson Courses will teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cyber security will gradually begin to develop.
Upon completion of the course, you will exit with a series of globally respected certifications and a deeper knowledge of cyber security concepts. You will also possess a set of cyber security skills you can apply to a vast range of cyber security job roles.
Our cyber security for beginners course is comprised of five separate courses in total. Three of which are skills based only with no exam, and three certification courses with a final exam after each course. The final course being the CompTIA Security+. The non-certification course provides a soft introduction to modern-day cyber security practices, titled ‘Cyber Security Awareness and Prevention’. The skills and certifications that you gain through this course will offer you scope to work in other areas aside from cyber security. These include IT support, networking, systems administration, and data compliance.
Job outcomes
- Cyber Security Engineer
- Cyber Security Analyst
- Cyber Security Investigator
- Cyber Threat Analyst
- Cyber Threat Consultant
- IT Security Specialist
- IT Security Consultant
- IT Support Technician
- Network Engineer
- Network Consultant
- Data Centre Manager
- IT Manager
- IT Sales Account Manager
- IT Consultant
- Systems Administrator
Study method
- Online
- Blended
- In-class
Awards
coursesonline.co.uk customers are now eligible to apply for an XO Student Discount Card.
Enrol in a course today to unlock exclusive deals.
Duration study load
Our courses are self-paced. Some people finish their course faster than others. Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this course, then it will take you less time than if you do two or three or all of them. No matter what though, you will always have 12 months to complete your course.
Course features
- Video learning: Access to video-based online learning material. Tutors use diagrams and illustrations to teach the classes, as well as giving demonstrations of equipment. Lessons are pre-recorded allowing you to fast-forward, rewind and pause at any time throughout the lessons. Videos can be viewed on different devices including desktop computers, laptops, tablet, and smartphones.
- Accessible from anywhere: Your course can be done from any where in the world. If you decide to move to a different city or even country, you can continue with the course from wherever you are. All you need is a device such as a desktop computer, laptop, tablet, smartphone, and an internet connection.
- MeasureUP practice tests: Before you sit an exam, you will be given access to a MeasureUP practice test. These tests have two modes: 1. practice mode, allowing you to learn the questions and answers with resources included; 2. certification mode, allowing you to test yourself within a limited time and without the answers. These tests are the closest experience to the real exams. MeasureUP has been the gold standard in exam preparation for over 20 years.
- Exam fees paid: Your course comes with official CompTIA exam vouchers. This means all exam fees are fully paid. Your exams can be taken at home. All you need is a laptop or desktop computer with a web camera. This will allow an examiner to observe you while you take the exam.
- CompTIA certifications: Upon passing your exams, you will receive three certifications from CompTIA: A+, Network+, and Security+. These certifications are globally recognised, meaning you can work anywhere in the world with them. CompTIA certifications are held in high regard by IT employers and IT recruiters. Click here to view salary and employment information.
- Job guarantee: As part of your course, you’ll get access to our job guarantee program to help you into work upon completion of your course. The program includes cover letter and CV preparation, LinkedIn account creation, full career assessment, employment case management, active job search, short-listing for job roles, coordination with employers to secure employment opportunities, completion of application forms for IT roles, and interview planning and preparation. Click here to learn more about the job guarantee.
- Spread the cost: We understand it can be difficult to pay your course fees in one go. That’s why we’ve allowed our students to spread the cost of their course over a manageable 6-12 month period through Paypal. There are no interest, charges, or credit checks, and you don’t need a PayPal account. Simply choose the instalment option that’s right for you (6, 9 or 12 months), then provide your payment details. The first instalment will be taken instantly. The remaining instalments will be taken every month until your full course fees are paid.
Assessment
Certification exams included:
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-008
- CompTIA Security+ SY0-701
MeasureUP practice tests included:
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-008
- CompTIA Security+ SY0-701
How do I book my exams?
When you’re ready to sit your exams, email support@hudsoncourses.com with your request along with the title of the exam you wish to take. We will then send you an email with instructions on how to complete your exam booking. The exams for this course must be sat at your local test center, which we will locate for you.
Delivery
All of the cyber security for beginners courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace and best of all… anywhere in the world, providing you have access to a laptop, PC or desktop computer, and an internet connection. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. The lessons are multi-media based, which means video and audio are used to teach the lessons. Your tutor will PowerPoint slides, illustrations, and diagrams and give demonstrations to teach each class. Most lessons are also interactive, prompting the learner to participate. This might involve answering on-screen questions, and participating in tasks.
Can I continue to access my course after 12 months has lapsed?
Yes. Once 12 months has lapsed since you enrolled on the course, you will be automatically switched to a rolling monthly subscription at a cost of £19 per month. This will be debited from the payment card you used to enrol on the course the first time.
Please note that if your exam vouchers have expired within the 12 month period, the auto course renew feature will not extend your exam voucher expiry dates. Exams must taken within 12 months from the time of enrolment.
If you do not wish to continue to access your course account after 12 months, you can cancel the auto-renew feature at any time by emailing support@hudsoncourses.com.
Subjects
Our cyber security for beginners course contains five courses in total comprising of three CompTIA certification courses (inclusive of four official CompTIA exams) and three skills-based courses. This course MUST be completed in the order listed below. Click on a title to see a full breakdown of what you’ll be learning in each course.
IT Concepts and Terminology
Understand the basics of computing
Understand basic terminology
Comprehend notational systems
Explain the value of data and troubleshooting
Infrastructure
Setting up and installing common peripheral devices
Applications and Software
Manage applications software
Understand various components of an operating system
Explain the purpose of methods of application architecture
Software Development
Comprehend programming language categories
Interpret logic
Understand the purpose of programming concepts
Database Fundamentals
Explain database concepts
Explain structures
Explain purpose
Understand methods used to interface
Security
Understand confidentiality
Understand integrity
Understand availability concerns of secure devices
Understand best practice methods of secure devices
CompTIA A+ 220-1101
Module 1 – CompTIA A+ 220-1101 Devices, Setups, and Installs
1.1 Introduction to the Course, Meet the Instructor
1.2 Appropriate Safety Procedures
1.3 PC Components
1.4 Guidelines for PC Disassembly
1.5 Motherboards
1.6 CPU Sockets
1.7 PCI Bus
1.8 Storage Bus (SATA and IDE)
1.9 Discussing PC Components
1.10 Common Connection Interfaces
1.11 Wired and Wireless Connection Standards
1.12 Install Peripheral Devices
1.13 Guidelines and Discussion for Installing Peripheral Devices
Module 2 – CompTIA A+ 220-1101 Displays and Multimedia Devices
2.1 Displays and Multimedia
2.2 Display Device Connections and Cables
2.3 Discussing Display Device Installation and Configuration
2.4 Troubleshoot Display Devices
2.5 Guidelines for Troubleshooting Display Devices
2.6 Discussing Display Device Troubleshooting
2.7 Install and Configure Multimedia Devices
2.8 Discussing Multimedia Device Installation and Configuration
Module 3 – CompTIA A+ 220-1101 Supporting Multiple Drive Types
3.1 Supporting Multiple Drive Types and Memory
3.2 Memory Types
3.3 RAM Types
3.4 Memory Modules
3.5 DIMM and SO-DIMM Technologies
3.6 Parity and ECC RAM
3.7 Memory Compatibility Issues
3.8 Discussing System Memory Installation
3.9 Install and Configure Mass Storage Devices
3.10 Storage Adapters and Cables
3.11 Solid State Drives
3.12 Guidelines for Installing Mass Storage Devices
3.13 Discussing Mass Storage Device Installation and Configuration
3.14 Install and Configure Removable Storage
3.15 Discussing Removable Storage Device Installation and Configuration
3.16 Configure RAID
3.17 RAID Configuration Options
3.18 Discussing RAID Configuration
3.19 Troubleshoot Storage Devices
3.20 Boot Failures
3.21 Discussing Storage Device Troubleshooting
Module 4 – CompTIA A+ 220-1101 Accounting for CPUs and Internal Components
4.1 Install Upgrade CPUs
4.2 Multiprocessing and Multicore Processors
4.3 Discussing CPU Upgrades
4.4 Configure and Update BIOS UEFI
4.5 Discussing BOIS-UEFI Configuration and Updates
4.6 Install Power Supplies
4.7 Discussing Power Supply Installation
4.8 Troubleshoot Internal System Components
4.9 POST and Boot Problems
4.10 Boot Troubleshooting and Log Entries
4.11 Motherboard Component Problems
4.12 Discussing System Component Troubleshooting
Module 5 – CompTIA A+ 220-1101 All About Network Theories
5.1 Wired Networks
5.2 Common Ethernet Network Implementations
5.3 Taps and Mirrors
5.4 Discussing Wired Networks
5.5 Network Hardware Devices
5.6 Switches
5.7 Power Over Ethernet
5.8 Discussing Network Hardware Devices
5.9 Wireless Networks
5.10 Access Points and Wireless Network Modes
5.11 Discussing Wireless Networks
5.12 Internet Connection Types
5.13 Wireless Internet Service Providers WISP
5.14 Discussing Internet Connection Types
5.15 Network Configuration Concepts
5.16 The TCIP-IP Protocol Suite
5.17 Internet Protocol and IP Addressing
5.18 Public and Private IP Addresses
5.19 IPv6
5.20 Discussing Network Configuration Concepts
5.21 Network Services
5.22 DNS
5.23 Dynamic and Static IP Configurations
5.24 DNS Records MX and A
5.25 Web Servers and HTTP-HTTPS
5.26 Discussing Network Services
Module 6 – CompTIA A+ 220-1101 Network Operations and Diagnostics
6.1 Configuring and Troubleshooting Networks
6.2 Network Connections in Windows
6.3 Install and Configure SOHO Networks
6.4 Configure SOHO Network Security
6.5 Firewalls
6.6 Port Forwarding and Port Triggering
6.7 Windows Firewall
6.8 Network Security and Embedded Appliances
6.9 Configure Remote Access
6.10 Discussing Remote Access Configuration
6.11 Troubleshoot Network Connections
6.12 IP Configuration Issues
6.13 Routing Issues
6.14 Discussing Network Connection Troubleshooting
Module 7 – CompTIA A+ 220-1101 Cloud and Virtualisation Computing
7.1 Configure Client-Side Virtualisation
7.2 Hypervisors
7.3 Processor Support and Resource Requirements
7.4 Virtual Networks
7.5 Client-Side Virtualisation
7.6 Cloud Computing Concepts
7.7 Internal and External Shared Resources
7.8 Cloud Service Options
7.9 Virtual Desktops
7.10 Software-Defined Networking (SDN)
7.11 Discussing Cloud Computing Concepts
Module 8 – CompTIA A+ 220-1101 Laptop Features and Troubleshooting
8.1 Use Laptop Features
8.2 Expansion Options
8.3 Discussing Laptop Features
8.4 Install and Configure Laptop Hardware
8.5 Discussing Laptop Hardware Installation and Configuration
8.6 Troubleshoot Common Laptop Issues
8.7 Discussing Troubleshooting Common laptop Issues
Module 9 – CompTIA A+ 220-1101 Syncing and Setup of Mobile Devices
9.1 Syncing and Setup of Mobile Devices
9.2 Connect and Configure Mobile Devices
9.3 Configure Mobile Device Network Connectivity
9.4 Mobile VPN Configuration
9.5 Email Configuration Options
9.6 Discussing Mobile Device Network Connectivity Configuration
9.7 Support Mobile Apps
9.8 Discussing Mobile App Support
Module 10 – CompTIA A+ 220-1101 All Things Printing
10.1 All Things Printing
10.2 Discussing Laser Printer Maintenance
10.3 Maintain Inkjet Printers
10.4 Discussing Inkjet Printer Maintenance
10.5 Maintain Impact, Thermal, and 3D Printers
10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
10.7 Install and Configure Printers
10.8 Discussing Printer Installation and Configuration
10.9 Troubleshoot Print Device Issues
10.10 Install and Configure Imaging Devices
10.11 Discussing Device Installation and Configuration
CompTIA A+ 220-1102
Module 1 – CompTIA A+ 220-1102 Operating System Management
1.1 Introduction to the Course, Meet the Instructor
1.2 Identify Common Operating Systems
1.3 Microsoft Windows
1.4 Work and Education Features
1.5 Windows System Limits
1.6 Apple Operating Systems
1.7 Linux Disk and File Management
1.8 Discussing OS Types
1.9 Use Windows Features and Tools
1.10 Administrative Tools
1.11 Manage Files in Windows
1.12 System Hierarchies
1.13 File Attributes
1.14 Discussing Windows Features and Tools
1.15 Manage Disks in Windows
1.16 Discussing File Management in Windows
1.17 The Windows Disk Management Console
1.18 Discussing Windows Disk Management
1.19 Manage Devices in Windows
1.20 Device Manager
1.21 Discussing Windows Device Manager
Module 2 – CompTIA A+ 220-1102 Configuring and installing the OS
2.1 Configuring and Installing the OS
2.2 Installation Boot Methods
2.3 Disk Formatting and Partitioning
2.4 Networking Considerations
2.5 Post Installation Tasks
2.6 OS Installation Types
2.7 Unattended Installations
2.8 Maintain OSs
2.9 OS Updates
2.10 Anti-Malware Updates
2.11 Scheduled Backups
2.12 Task Schedulers part 1
2.13 Task Schedulers part 2
2.14 Install Windows 10 Demonstration
2.15 Discussing OS Maintenance
Module 3 – CompTIA A+ 220-1102 Tools to Troubleshoot and Maintain the OS
3.1 Install and Manage Windows Applications
3.2 Windows OS Tools
3.3 Application and Print Services
3.4 Task Manager
3.5 Manage Windows Performance
3.6 Windows Performance Management Tools
3.7 Troubleshoot Windows
3.8 Event Viewer
3.9 The System Configuration Utility
3.10 Troubleshooting Tips Boot Process
3.11 Troubleshooting Tips for Windows System Issues
3.12 Blue Screens and Spontaneous Shutdowns
3.13 Troubleshooting Tips for File and Memory Corruption
3.14 Safe Boot
3.15 System Repair Disc
3.16 System Restore
3.17 Guidelines for Troubleshooting Windows Issues
Module 4 – CompTIA A+ 220-1102 Network Management Tools
4.1 Network Management Tools
4.2 Network Connectivity
4.3 IP Addressing and Connection Types
4.4 Proxy Settings
4.5 Windows Client Configuration
4.6 Location Services
4.7 Firewalls
4.8 Network Troubleshooting
4.9 Remote Desktop Tools
4.10 Desktop Management and Remote Monitoring Tools
4.11 Discussion Topics
Module 5 – CompTIA A+ 220-1102 Sharing Resources and Wrights Management
5.1 Sharing Resources and Wrights Management
5.2 User Group Accounts
5.3 Local Security Policy
5.4 SSO and Credential Manager
5.5 Workgroups and Homegroups
5.6 Network and Sharing Centre
5.7 Network Share Configuration
5.8 NTSF File and Folder Permissions
5.9 Configure Active Directory Accounts and Policies
5.10 Domain Membership and Group Policy Objects
5.11 Basic AD Functions
5.12 Account Locks and Password Resets
Module 6 – CompTIA A+ 220-1102 Threats and Security Measures
6.1 Threats and Security Measures
6.2 Logical Security Concepts
6.3 Encryption
6.4 PKI and Certificates
6.5 Execution Control
6.6 NAC
6.7 Discussing Logical Security Concepts
6.8 Threats and Vulnerabilities
6.9 Types of Password Attacks
6.10 Discussing Threats and Vulnerabilities
6.11 Physical Security Controls
6.12 Discussing Physical Security Measures
Module 7 – CompTIA A+ 220-1102 Policies to Protect Data
7.1 Policies to Protect Data
7.2 Implement Security Best Practices
7.3 Guidelines for Implementing Security Best Practices
7.4 Discussing Security Best Practices Implementation
7.5 Implement Data Protection Policies
7.6 ACLs and Directory Permissions
7.7 Full Disk Encryption
7.8 Guidelines for Implementing Data Protection Policies
7.9 Discussing Data Protection Policies
7.10 Protect Data During Incident Response
7.11 Discussing Data Protection During Incident Response
Module 8 – CompTIA A+ 220-1102 Prevent Malware and Security Threats
8.1 Prevent Malware and Security Threats
8.2 Detect, Remove, and Prevent Malware
8.3 Trojan Horses and Spyware
8.4 Sources of Malware Infection
8.5 Best Practices for Malware Removal
8.6 Discussing Detecting, Removing, and Preventing Malware Infections
8.7 Troubleshoot Common Workstation Security Issues
8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 – CompTIA A+ 220-1102 Supporting and Troubleshooting Mobile Devices
9.1 Supporting and Troubleshooting Mobile Devices
9.2 Secure Mobile Devices
9.3 IOT Internet of Things
9.4 Discussing Mobile Device Security
9.5 Troubleshoot Mobile Device Issues
9.6 Mobile Device Security Troubleshooting
9.7 Discussing Troubleshooting Mobile Devices
Module 10 – CompTIA A+ 220-1102 Implementing Operational Procedures
10.1 Implementing Operational Procedures
10.2 Environmental Impacts and Controls
10.3 Discussing Environmental Impact and Controls
10.4 Create and Maintain Documentation
10.5 Discussing Documentation Creation and Maintenance
10.6 Use Basic Change Management Best Practices
10.7 Discussing Change Management Best Practices
10.8 Implement Disaster Prevention and Recovery Methods
10.9 Discussing Implement Disaster Prevention and Recovery Methods
10.10 Basic Scripting Concepts
10.11 Discussing Scripting
10.12 Professionalism and Communication
10.13 Discussing Professionalism and Communication Skills
1.1 Course Introduction
1.2 Where We Are Today
1.3 Areas Of Protection
1.4 The Connection – Part 1
1.5 The Connection – Part 2
1.6 Network Protection
1.7 Browsing Blunders – Part 1
1.8 Browsing Blunders – Part 2
1.9 Settings – Part 1
1.10 Settings – Part 2
1.11 Settings – Part 3
1.12 Settings – Part 4
1.13 Cookies
1.14 Browsing Tips And Tricks
1.15 Email Cant Hurt You Right – Part 1
1.16 Email Cant Hurt You Right – Part 2
1.17 Viruses – Part 1
1.18 Viruses – Part 2
1.19 Viruses – Part 3
1.20 Course Outro
Module 2: Managing Mobile Device Security
2.1 Managing Mobile Device Security Part1
2.2 Managing Mobile Device Security Part2
2.3 Secure Access
2.4 Secure Access iPhone Demo
2.5 Secure Access Android Demo
2.6 Protect The Data
2.7 Protect The Data Android Demo
2.8 Protect The Data iPhone Demo
2.9 Manage App Access
2.10 Manage App Access iPhone Demo
2.11 Manage App Access Android Demo
2.12 Stay Up To Date
2.13 Stay Up To Date Android Demo
2.14 Stay Up To Date iPhone Demo
2.15 Use Other Tools To Help
2.16 Prepare For The Worst
2.17 Prepare For The Worst Android Demo
2.18 Prepare For The Worst iPhone Demo
2.19 Best Practices
Module 0 – Course introduction
0.1 Instructor Intro
0.2 Course Overview
Module 1 – Networking Fundamentals
1.1 Intro to Networking
1.1.1 Activity: Creating a Network
1.2 Common Terminology
1.2.1 Activity: Examining Ports and Sockets
1.3 OSI Model
1.4 DoD Model
1.4.1 Activity: Examining Network Layers
1.5 TCP, UDP, IP
1.5.1 Activity: Examining TCP
1.5.2 Activity: Examining UDP
1.5.3 Activity: Examining IP
1.6 ICMP, IGMP, ARP
1.6.1 Activity: Examining ICMP
1.6.2 Activity: Examining ARP
1.6.3 Activity: Examining IGMP
1.7 Network Topologies
1.8 Network Types
1.9 Part 1: Network Characteristics
1.9 Part 2: Network Characteristics
1.10 Module 1 outro
Module 2 – Cables and Connectors
2.1 Ethernet Standards
2.2 Copper Cable Types
2.3 Fibre Optic Cable Types
2.4 Connector Types
2.4.1 Activity: Selecting the Right Cable
2.5 Media Converters and Transceivers
2.6 Cable Management
2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
3.1 IPv4 Basics
3.2 IP Packet and Interface Types
3.2.1 Activity: Configuring Client IP Settings
3.3 Binary Numbering System
3.4 Classful and Classless Addressing
3.5 Understanding CIDR Notation
3.6 IPv4 Subnetting Method
3.7 Verifying with Binary
3.8 Finding Subnet IDs
3.8.1 Activity: Subnetting a Class C Network
3.9 The Delta in Action
3.9.1 Activity: Subnetting With the Delta
3.10 Subnetting Based on Hosts
3.11 Subnetting in Other Octets
3.12 Supernetting
3.12.1 Activity: Supernetting
3.13 IPv6
3.14 IPv4 – IPv6 Transition Mechanisms
3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
4.1 Remote Control Protocols
4.2 File Sharing Protocols
4.3 Web Protocols
4.4 Email Protocols
4.5 Database Protocols
4.6 Voice Protocols
4.7 Security Protocols
4.8 Management Protocols
4.9 Module 4 Outro
Module 5 – Network Services
5.1 DHCP
5.1.1 Activity: Configuring DHCP
5.1.2 Activity: Configuring a DHCP Relay Agent
5.2 DNS
5.2.1 Activity: Configuring DNS – Part 1
5.2.2 Activity: Configuring DNS – Part 2
5.3 NTP
5.4 Corporate and Datacentre Network Architecture
5.5 Cloud Concepts and Connectivity Options
5.6 Module 5 Outro
Module 6 – Networking Devices
6.1 Introductory Concepts
6.2 Repeaters and Hubs
6.2.1 Activity: Connecting Devices with a Hub
6.3 Bridges and Switches
6.3.1 Activity: Connecting Devices with a Switch
6.4 Routers and Multilayer Switches
6.5 Security Devices
6.6 Modems
6.7 Module 6 Outro
Module 7 – Networked Devices
7.1 IP Devices
7.2 IoT
7.2.1 Activity – Programming IoT Devices
7.3 ICS/SCADA
7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
8.1 Routing Basics
8.1.1 Activity: Configuring Static Routes
8.2 Packet Delivery on the Same Network
8.3 IP Routing Across a Single Router
8.4 IP Routing Across Multiple Hops
8.4.1 Activity: Static Routes – CHALLENGE
8.5 Route Selection
8.6 RIP
8.6.1 Activity: Configuring RIP – CHALLENGE
8.7 OSPF
8.8 EIGRP
8.9 BGP
8.10 NAT/PAT
8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
9.1 Ethernet Basics
9.2 Switching Overview
9.2.1 Activity: Examining a MAC Table
9.3 VLANs
9.3.1 Activity: Creating VLANs
9.4 VLAN Trunking
9.4.1 Activity: Configuring VLAN Trunking
9.5 VLAN Routing
9.5.1 Activity: Configuring VLAN Routing
9.6 Contention Management
9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
10.1 Wireless Overview
10.2 Radio Basics
10.3 Modulation
10.4 Wi-Fi Standards
10.5 Antennas
10.6 Wi-Fi Service Sets
10.7 Wi-Fi Security
10.8 Cellular
Module 11 Network Performance
11.1 Monitoring Performance
11.2 Common Metrics
11.2.1 Activity: Examining Interface Statistics
11.3 SNMP
11.4 Netflow
11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
12.1 HA and DR Concepts
12.2 High Availability Mechanisms
12.3 Disaster Recovery Mechanisms
12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organisational Documents
13.1 Plans and Procedures
13.2 Security Policies
13.3 Loss Prevention
13.4 Common Agreements
13.5 Common Documentation
13.6 Structured Cabling – MDF and IDF
13.7 Horizontal and Vertical Cabling
13.7.1 Activity – Implementing Cable Management
13.8 Labelling
13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
14.1 Common Security Concepts
14.2 Common Attack Types
14.3 Spoofing-based Attacks
14.4 Hijacking and MITM
14.5 Social Engineering
14.6 Network Segmentation
14.7 Private VLANs
14.8 Single Organisation Authentication
14.9 Extending Authentication
14.10 Authorisation
14.11 Network Device Hardening
14.12 Wireless Security
14.13 Remote Access Security
14.14 IoT Security
14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
15.1 Troubleshooting Methodology
15.2 Physical Connectivity Issues
15.3 Hardware Testing Tools
15.3.1 Activity – Testing an Ethernet Cable
15.3.2 Activity – Crimping on an RJ-45 Connector
15.3.3 Activity – Punching Down Twisted Pair
15.3.4 Activity – Using a Telephone Toner
15.4 Understanding Electricity
15.4.1 Activity – Checking Cable Continuity
15.4.2 Activity – Testing DC Voltage
15.4.3 Activity – Testing AC Voltage
15.5 Twisted Pair Pinout Problems
15.6 Twisted Pair Termination Problems
15.7 Repairing Damaged Twisted Pair Cable
15.8 Fibre Optic Connectivity Issues
15.8.1 Activity – Testing a Fibre Optic Cable
15.9 Common Port Problems
15.9.1 Working with Ports and Their Devices
15.10 Common Software Testing Tools
15.10.1 Activity – Scanning for Open Ports
15.11 Common Command Line Utilities
15.12 Troubleshooting Basic IP Networking Issues
15.13 Common Switching Issues
15.14 Switching Test Tools and Techniques
15.15 Common IP Routing Issues
15.16 Wi-Fi Access Point Issues
15.17 Wireless Interference
15.17.1 Activity – Using a Spectrum Analyser
15.18 Wireless Antenna Issues
15.18.1 Activity – Configuring a Wi-Fi Router
15.19 WAP Placement Strategies
15.20 Infrastructure Service Issues (DHCP)
15.21 Infrastructure Service Issues (DNS)
15.22 Infrastructure Service Issues (NTP)
15.23 Firewall / ACL Issues
15.24 VPN Issues
15.25 Additional Network Security Troubleshooting and Tips
15.26 Advanced Networking Issues
15.27 Troubleshooting Server Services (with Module 15 Outro)
CompTIA Network+ N10-008 Course Outro
Module 1 – SY0-701 General Security Concepts
1.0 Introduction to the Course
1.1 Fundamental Security Concepts
1.2 Zero Trust
1.3 Deception and Disruption
1.3.1 ACTIVITY – Testing a Honeypot
1.4 Security Controls
1.5 Change Management and Security
1.6 Cryptography Basics
1.6.1 ACTIVITY – Examining Symmetric Encryption
1.7 Asymmetric Encryption
1.7.1 ACTIVITY – Exploring Asymmetric Encryption
1.8 Hashing
1.8.1 ACTIVITY – Verifying Integrity with Hashing
1.9 Digital Certificates
1.10 Public Key Infrastructure
1.11 Data and Keys
1.12 Crypto Implementations
1.13 Blockchain
1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
2.1 Threat Actors and Motivations
2.2 Threat Vectors
2.2.1 ACTIVITY – O.MG Cable Baiting
2.2.2 O.MG-No Cable
2.3 Social Engineering
2.4 Operating System Vulnerabilities and Attacks
2.5 Application Vulnerabilities and Attacks
2.5.1 ACTIVITY – Performing a Buffer Overflow
2.6 Web-based Vulnerabilities and Attacks
2.6.1 ACTIVITY – Abusing Unsanitised Input
2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
2.6.3 ACTIVITY – Swiping a Token with XSS
2.7 Other Vulnerabilities
2.8 Common Malicious Activity Indicators
2.9 Insider Threat Indicators
2.10 Social Engineering Indicators
2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
2.11 Malware Activity Indicators
2.12 Operating System Attack Indicators
2.13 Application Attack Indicators
2.13.1 ACTIVITY – Recognising Directory Traversal
2.14 Physical Attack Indicators
2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
2.15 Network Attack Indicators
2.15.1 ACTIVITY – Crashing a Target with DoS
2.16 Cryptographic Attack Indicators
2.17 Password Attack Indicators
2.17.1 ACTIVITY – Password Cracking
2.18 Network Segmentation
2.19 Access Control
2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
3.1 Network Segmentation
3.1.1 ACTIVITY – Segmenting a Network
3.2 High Availability
3.3 Virtualisation
3.3.1 ACTIVITY – Deploying Docker Containers
3.4 Cloud
3.5 Serverless Computing
3.6 IoT
3.7 ICS SCADA
3.7.1 ACTIVITY – Operating a SCADA System
3.8 RTOS and Embedded Systems
3.9 Reducing the Attack Surface
3.10 Firewalls
3.11 IDS IPS.mp4
3.12 Secure Communications – Access
3.13 Port Security
3.14 SD-WAN and SASE
3.15 Data Classifications
3.16 Protecting Data Types
3.17 Data Considerations
3.18 Redundancy
3.19 Alternate Sites
3.20 Multiple Platforms
3.21 Business Continuity
Module 4 – SY0-701 Security Operations
4.1 Secure Baselines
4.2 Attack Surface Reduction
4.3 Wireless Installation
4.4 Wireless Security Settings
4.5 Mobile Solutions
4.5.1 ACTIVITY – Pawning a Mobile Device
4.6 Application Security Management
4.7 Asset Management
4.8 Vulnerability Management
4.9 Monitoring Activities
4.10 Monitoring Tools
4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
4.11 Firewall Configuration
4.11.1 ACTIVITY – Configuring Firewall Rules
4.12 Intrusion Detection Configuration
4.13 Web Traffic Filtering
4.14 Operating System Policy
4.14.1 ACTIVITY – Examining Windows Group Policy
4.15 Network Service Security
4.16 Data Loss Protection
4.16.1 ACTIVITY – Checking File Integrity
4.17 Network Access Control
4.17.1 ACTIVITY – Require Multifactor Authentication
4.18 Identity Management
4.19 Access Management
4.19.1 ACTIVITY – Implementing Access Control
4.20 Security Automation
4.21 Incident Response
4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
5.1 Elements of Effective Security Governance
5.2 Elements of the Risk Management Process
5.3 Third Party Risk Assessment and Management
5.3.1 ACTIVITY – Analysing the Solar Winds Supply Chain Failure
5.4 Effective Security Compliance
5.5 Audits and Assessments
5.5.1 ACTIVITY – Conducting OSINT
5.5.2 ACTIVITY – Performing Active Reconnaissance
5.6 Security Awareness Practices
5.7 Course Outro
- CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
- CompTIA PenTest+ (PT0-001)
- Computer Hacking Forensic Investigator (CHFI)
- Certified Ethical Hacker (CEH) v.12
- Computer Hacking Prevention
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- Cloud Computing Security Knowledge (CCSK)
About Hudson
Save £140 on selected courses this month! Offer ends 31st October
In the confusing world of e-learning, Hudson is quite simply one of the best at what they do. Why? Because they offer first-class customer service. The Hudson Learning Center puts their customers’ needs before anything else. If there’s something they can do to help you, Hudson will climb mountains to do it.
The Hudson online courses, certifications, and diplomas are highly effective, offering a whole range of features designed to get you certified faster. Some of these incredible features include video and audio based training so you can see and hear your tutor, 24/7 online tutor support, and online labs to practice your skills in a simulated environment.
Come and give Hudson a try. They’ll change the way you think about learning.