Are you considering enquiring? Please note: All courses listed are paid courses, though many providers offer flexible payment plans. Speak to a course advisor to find out more by making an enquiry today.
Course overview
The Computing Technology Industry Association (CompTIA) is the association representing the international technology community. Its goal is to provide a unified voice, global advocacy and leadership, and to advance industry growth through standards, professional competence, and education and business solutions. In order to most efficiently serve the industry and its members, CompTIA has developed specialized initiatives and programs dedicated to major areas within the IT industry. They include, convergence technology, e-commerce, IT training, software services, certification, public policy and workforce development.
This bundle offers incredible value for money for anyone looking to get CompTIA certified. It includes 6 separate certification courses, spanning a variety of disciplines and technical fields from IT technician skills, to networking, and IT security, plus more!
From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of IT will gradually begin to develop.
To help you grasp the concepts and develop the skills within the course, live labs are also included. These allow you to practice a variety of skills such as networking, server setup, Linux roll-out, troubleshooting and diagnostics, and implementation of security measures.
Job outcomes
- Network Engineer
- Network Field Engineer
- Network Deployment Engineer
- Network Operations Engineer
- Network Support Engineer
- Network Operations Center Engineer
- Network Consultant
- Network Technician
- Data Centre Manager
- IT Manager
- IT Consultant
- IT Support Technician
- Systems Administrator
- Cyber Security Analyst
- IT Security Consultant
Study method
- Online
- Blended
- In-class
Awards
coursesonline.co.uk customers are now eligible to apply for an XO Student Discount Card.
Enrol in a course today to unlock exclusive deals.
Duration study load
Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this bundle, then it will take you less time than if you do two or three or all of them. Â No matter what though, you will always have 12 months to complete your course.
Course features
- Official CompTIA Video Content
- Live Labs
- MeasureUP Practice Tests
- Official CompTIA Exams
Features of MeasureUP practice tests:
- Questions are similar to exam questions, allowing you to test your knowledge of exam objectives
- Detailed explanations for both correct and distractor answers reinforce the material
- ‘Study Mode’ covers all objectives ensuring topics are covered
- ‘Certification Mode’ (timed) prepares students for exam taking conditions
- Instant, drill-down score reports tell you exactly the areas to focus on
Assessment
Certification exams included:
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-009
- CompTIA Linux+ XK0-005
- CompTIA Server+ SK0-005
- CompTIA Security+ SY0-701
Live labs included:
- CompTIA IT Fundamentals+ FC0-U61
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-009
- CompTIA Linux+ XK0-005
- CompTIA Server+ SK0-005
- CompTIA Security+ SY0-701
Practice tests included:
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-009
- CompTIA Linux+ XK0-005
- CompTIA Server+ SK0-005
- CompTIA Security+ SY0-701
Delivery
All courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace and best of all… any where in the world, providing you have access to a laptop, PC or desktop computer, and an internet connection. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. The lessons are multi-media based, which means video and audio are used to teach the lessons. Your tutor will PowerPoint slides, illustrations, diagrams and give demonstrations to teach each class.  Most lessons are also interactive, prompting the learner to participate. This might involve answering on-screen questions, participating in tasks.
Subjects
- Operating Systems
- Software and Applications
- Software Development
- Computer Hardware
- Networking
- Databases
- Security
CompTIA A+ 220-1101
- Module 1 – CompTIA A+ 220-1101 Devices, Setups, and Installs
- Module 2 – CompTIA A+ 220-1101 Displays and Multimedia Devices
- Module 3 – CompTIA A+ 220-1101 Supporting Multiple Drive Types
- Module 4 – CompTIA A+ 220-1101 Accounting for CPUs and Internal Components
- Module 5 – CompTIA A+ 220-1101 All About Network Theories
- Module 6 – CompTIA A+ 220-1101 Network Operations and Diagnostics
- Module 7 – CompTIA A+ 220-1101 Cloud and Virtualization Computing
- Module 8 – CompTIA A+ 220-1101 Laptop Features and Troubleshooting
- Module 9 – CompTIA A+ 220-1101 Syncing and Setup of Mobile Devices
- Module 10 – CompTIA A+ 220-1101 All Things Printing
CompTIA A+ 220-1102
- Module 1 – CompTIA A+ 220-1102 Operating System Management
- Module 2 – CompTIA A+ 220-1102 Configuring and installing the OS
- Module 3 – CompTIA A+ 220-1102 Tools to Troubleshoot and Maintain the OS
- Module 4 – CompTIA A+ 220-1102 Network Management Tools
- Module 5 – CompTIA A+ 220-1102 Sharing Resources and Wrights Management
- Module 6 – CompTIA A+ 220-1102 Threats and Security Measures
- Module 7 – CompTIA A+ 220-1102 Policies to Protect Data
- Module 8 – CompTIA A+ 220-1102 Prevent Malware and Security Threats
- Module 9 – CompTIA A+ 220-1102 Supporting and Troubleshooting Mobile Devices
- Module 10 – CompTIA A+ 220-1102 Implementing Operational Procedures
- Course Overview
- Networking Concepts
- Network Implementation
- Network Operations
- Network Security Fundamentals
- Network Troubleshooting
Getting Started in Linux
Overview
What Is Linux?
Linux Distributions
Installing Linux
Linux Command Line Interface and Utilities
Using A Terminal In Linux
Linux Command Line Interface (CLI)
Getting Help In Linux
Application and Software
Installing And Managing Software With DNF
Installing And Managing Software With APT
Supporting Sandboxed Applications
Building Applications From Source
Files and Directories in Linux
Navigating The Linux File System
Working With Files
Locating Files
Searching With Grep
Working With Regular Expressions
Working With File Archives
Linux Administration
Super User Privileges
Managing Users
Managing Accounts
Managing Groups
Working With File Permissions
Advanced File Permissions
Localising Linux
Troubleshooting Linux Performance
Managing Storage
Basic Linux Storage Concepts
Creating Partitions And Volumes
Creating File Systems
Mounting File Systems
Linux Filesystem Hierarchy Standard
Logical Volume Manager (LVM)
Troubleshooting Disk Access
Troubleshooting Disk Performance
Shell Scripting
Creating And Executing A Script
Controlling Input And Output
Using Programming Constructs
Containers and Automation
Introduction To Containers
Automating Containers
Automating Hosts
Change Management With Git
Linux Boot Process
Basic Linux Boot Process
Exploring The Linux Kernel
Troubleshooting The Linux Boot Process
Linux Networking
Configuring A Network Adapter
Configuring Name Lookups
Network Troubleshooting
Copying Files Across A Network
Accessing Servers With Secure Shell (SSH)
Linux Security
Securing RHEL With SELinux
Securing Ubuntu With AppArmor
Configuring A Linux Firewall
Certificate-Based Authentication With SSH
Securing A Web Server With SSL
Alternative Authentication Methods In Linux
Server Hardware Installation and Management
Overview
Server Components
Server Racks And Power
Network Cabling And Connections
Storage Drive And Interfaces Types
Shared Storage
Storage Fault Tolerance
Server Management And Maintenance
Server Administration
Server Operating System Requirements
Partitioning And File Systems
Server OS Installation
Server Network Configuration
Configure Server Roles And Features
Server Storage Management
Data Migration And Transfer
Server Monitoring
High Availability Concepts
Virtualisation
Cloud Technologies
Scripting Basics
Asset Management
Documentation Management
Policy And Procedures
Licensing Concepts
Security and Disaster Recovery
Data Security
Physical Security
Users And Group Management
Identity And Access Management
Access Control
Data Security Risks And Mitigations
Server Hardening
Server Decommissioning
Media Destruction
Server Backup And Restoration
Disaster Recovery Concepts
Host Security And Patching
Server Backup Methods
Troubleshooting
Troubleshooting Methodology
Hardware Components
System Crashes And Lockups
Storage Issues And Tools
OS Issues And Tools
Network Issues And Tools
Security Issues And Tools
Course Overview
Course Overview
General Security Concepts
Examining Security Control Categories
Examining Security Control Types
Examining The Principles Of Security
Examining Authentication Factors
Examining Authorisation And Access Control Models
Examining Authentication, Authorisation, And Accounting (AAA)
Examining The Principles Of Zero Trust
Examining Physical Security
Examining Deception And Disruption Technology
Business Processes And Security Operations
Change Management Implications & Documentation
Examining Encryption Solutions
Examining Public Key Infrastructure (PKI)
Examining Digital Certificates
Examining Asymmetric Encryption
Examining Symmetric Encryption
Examining Hashing And Obfuscation
Threats, Vulnerabilities, and Mitigation
Threat Actors
Social Engineering
Business Email Compromise
Digital System Threats
Network-Based Threats
Removable Media Threats
Supply Chain Attacks
Application Vulnerabilities
Operating System Vulnerabilities
Web Based Vulnerabilities
Hardware Vulnerabilities
Cloud Vulnerabilities
Virtualisation Vulnerabilities
Cryptographic Vulnerabilities
Mobile Device Vulnerabilities
Zero Day Vulnerabilities
Indicators Of Malware Attacks
Indicators Of Physical Attacks
Indicators Of Network Attacks
Indicators Of Application Attacks
Indicators Of Cryptographic Attacks
Indicators Of Password Attacks
Cybersecurity Mitigation Techniques
Security Architecture
Cloud-Related Concepts
Network Infrastructure Concepts
Virtualisation Concepts
IoT And SCADA
Architectural Model Considerations
Security Infrastructure Considerations
Network Appliances
Port Security
Firewall Types
Secure Communication And Access
Selecting Effective Controls
Data Types
Data Classifications
Data Considerations
Methods To Secure Data
HA And Site Considerations
Platform Diversity And Multi-Cloud Systems
Continuity Of Operations And Capacity Planning
Testing
Backups
Power
Security Operations
Examining Identity And Access Management
Examining Wireless Security
Examining Operating System Security
Examining Firewalls And Intrusion Detection Devices
Examining Password Security
Examining Web Filtering
Examining The Incident Response Process And Activities
Examining Endpoint Detection And Response (EDR)
Examining Single Sign-On
Examining Secure Network Protocols And Services
Examining Automation And Scripting Uses
Examining Asset Management
Examining Privileged Identity Management
Examining Application Security
Examining Investigation Data Sources And Log Data
Examining Security For Mobile Devices
Examining Vulnerability Analysis
Examining Digital Forensics Activities
Vulnerability Response, Remediation And Reporting
Examining Security Baselines And Hardening
Examining User Onboarding And Offboarding
Examining Email Security
Examining Security Monitoring And Alerting
Identifying Vulnerabilities
Security Programs Management and Oversight
Guidelines And Policies
Standards And Procedures
External Considerations And Revisions
Governance Structures
Roles And Responsibilities
Risk Identification And Assessment
Risk Analysis
Risk Register, Tolerance, And Appetite
Risk Management Strategies
Risk Reporting And BIA
Vendor Assessment And Selection
Agreement Types
Additional Vendor Considerations
Compliance
Compliance Monitoring
Privacy
Attestation
Audits
Penetration Testing
Phishing
Anomalous Behavior Recognition
User Guidance And Training
Reporting And Monitoring
Development And Execution
About Hudson
In the confusing world of e-learning, Hudson is quite simply one of the best at what they do. Why? Because they offer first-class customer service. The Hudson Learning Center puts their customers’ needs before anything else. If there’s something they can do to help you, Hudson will climb mountains to do it.
The Hudson online courses, certifications, and diplomas are highly effective, offering a whole range of features designed to get you certified faster. Some of these incredible features include video and audio based training so you can see and hear your tutor, 24/7 online tutor support, and online labs to practice your skills in a simulated environment.
Come and give Hudson a try. They’ll change the way you think about learning.