Are you considering enquiring? Please note: All courses listed are paid courses, though many providers offer flexible payment plans. Speak to a course advisor to find out more by making an enquiry today.
Course overview
If you’ve ever considered working within the cybersecurity industry, but felt you lacked the knowledge or skills to launch your career, this course might be what you’re looking for.
This cybersecurity course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this bundle, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the IT security industry.
From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cybersecurity will gradually begin to develop.
Upon completion of the course, you will exit with a series of globally respected certifications and a deeper knowledge of cybersecurity concepts. You will also possess a set of cybersecurity skills you can apply to a vast range of cybersecurity job roles.
The course bundle is comprised of six separate courses in total. Three of which are skills-based only with no exam, and three CompTIA certification courses with a final exam after each course. The final course being the CompTIA Security+. One of the non-certification courses provides a soft introduction to modern-day cybersecurity practices. The skills and certifications that you gain through this course will offer you scope to work in other areas aside from cybersecurity. These include IT support, networking, systems administration, and data compliance.
To help you grasp the concepts and develop the skills within the course, simulators (aka live labs) are also included. These allow you to practice your skills such as setting up firewalls, troubleshooting and diagnostics, implementing security measures, and running threat scans.
Job outcomes
- Cyber Security Engineer
- Cyber Security Analyst
- Cyber Security Investigator
- Cyber Threat Analyst
- Cyber Threat Consultant
- IT Security Specialist
- IT Security Consultant
- IT Support Technician
- Network Engineer
- Network Consultant
- Data Centre Manager
- IT Manager
- IT Consultant
- Systems Administrator
Study method
- Online
- Blended
- In-class
Awards
coursesonline.co.uk customers are now eligible to apply for an XO Student Discount Card.
Enrol in a course today to unlock exclusive deals.
Duration study load
Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this bundle, then it will take you less time than if you do two or three or all of them. No matter what though, you’ll always have 12 months to complete your course.
Course features
- Official CompTIA Video Content
- Simulators
- MeasureUP Practice Tests
- Official CompTIA Exams
Features of MeasureUP practice tests:
- Questions are similar to exam questions, allowing you to test your knowledge of exam objectives
- Detailed explanations for both correct and distractor answers reinforce the material
- ‘Study Mode’ covers all objectives ensuring topics are covered
- ‘Certification Mode’ (timed) prepares students for exam taking conditions
- Instant, drill-down score reports tell you exactly the areas to focus on
Assessment
Certification exams included:
- CompTIA IT Fundamentals+ FC0-U61
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-009
- CompTIA Security+ SY0-701
Simulators/Live labs included:
- IC3 Computing Fundamentals
- CompTIA IT Fundamentals+ FC0-U61
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-009
- CompTIA Security+ SY0-701
Practice tests included:
- CompTIA A+ 220-1101
- CompTIA A+ 220-1102
- CompTIA Network+ N10-009
- CompTIA Security+ SY0-701
Delivery
All courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace and best of all… anywhere in the world, providing you have access to a laptop, PC or desktop computer, and an internet connection. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. The lessons are multi-media based, which means video and audio are used to teach the lessons. Your tutor will PowerPoint slides, illustrations, diagrams and give demonstrations to teach each class. Most lessons are also interactive, prompting the learner to participate. This might involve answering on-screen questions, participating in tasks.
Who's it for?
This course bundle is aimed at absolute beginners to IT who want to start a career in cybersecurity or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cybersecurity and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies such as computer systems and networks, which you will be taught through this course.
Subjects
COMPUTING FUNDAMENTALS
Mobile Devices
Hardware Device Types
Hardware Components
Hardware Components Part 2
Peripherals
Peripherals Part 2
Storage
Computer Software Architecture
Configuration And Preferences
Configurations And Preferences Part 2
File Management
Networking
Backup And Restore
Cloud Computing
Security
Troubleshooting Software
Troubleshooting Software Part 2
OPERATING SYSTEMS
Overview
Computer Operating Systems
Microsoft Windows
Apple MacOS
GNU Linux
SOFTWARE AND APPLICATIONS
Software Usage Requirements
Business And Productivity Software
Business And Productivity Software Part 2
Collaboration Software
Web Browser Settings
Web Browser Settings Part 2
SOFTWARE DEVELOPMENT
Programming Concepts
Programming Concepts Part 2
Developing With Python
COMPUTER HARDWARE
Central Processing Unit (CPU)
Common Hardware
Common Hardware Part 2
Peripheral Devices
Peripheral Devices Part 2
Display Hardware
Storage Hardware
NETWORKING
Basic Networking Concepts
Basic Networking Concepts Part 2
Configuring A Wireless Router
Configuring A Wireless Router Part 2
Connection And Service Types
Connection And Service Types Part 2
DATABASES
Database Concepts
Querying A Database
Table Design
SECURITY
Basic Security Principles
Basic Security Principles Part 2
Security Best Practices
Security Best Practices Part 2
Security Best Practices Part 3
TROUBLESHOOTING
Troubleshooting Methodology
Troubleshooting Methodology Part 2
Troubleshooting Example
CompTIA A+ 220-1101
MOBILE DEVICES
Overview
Laptop Hardware And Components
Mobile Device Ports And Accessories
Mobile Device Displays
Mobile Device Network Connections
Mobile Device Application Support
NETWORKING
Ports And Protocols
Networking Hardware
Wireless Protocols
Networked Hosts And Services
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
IP Address Format
IP Address Configuration
Internet Connection Types
Network Types
Network Tools
HARDWARE
Network Cables
Peripheral And Video Cables
Storage Device Cables
Random-Access Memory
Storage Devices
Motherboards
BIOS And UEFI
Processors
Expansion Cards
Power Supplies
Printer Configuration
Printers
VIRTUALIZATION AND CLOUD COMPUTING
Cloud Models And Services
Virtualization
TROUBLESHOOTING HARDWARE AND NETWORKING
Troubleshooting Methodology
Troubleshooting PC Components
Troubleshooting Storage
Troubleshooting Display Issues
Troubleshooting Printers
Troubleshooting Mobile Devices
Troubleshooting Networks
CompTIA A+ 220-1102
OPERATING SYSTEMS
Overview
Mobile Operating Systems
Windows OS
Installation Requirements
OS Boot And Installation Methods
Partitioning And File Systems
Post Installation Tasks
Windows Client Networking Configuration
Windows Command Line Tools
Windows Network Commands
Using Microsoft System Utilities
Desktop Operating Systems
MacOS Tools And Features
Linux Commands
Using Microsoft Control Panel Utilities
SECURITY
Implementing Physical Security Measures
Logical User Security Concepts
Logical Device And Network Security Concepts
Wireless SOHO Security
Malware Types
Social Engineering Techniques And Exploits
Microsoft OS Security – Permissions
Microsoft OS Security Features
Workstation Security Best Practices
Mobile Device Security Solutions
Securing Web Browsers
SOFTWARE TROUBLESHOOTING
Windows OS Issues
Additional Windows OS Issues
PC Security Issues
Malware Removal Best Practices
Mobile OS And Application Issues
Mobile OS And Application Security Issues
OPERATIONAL PROCEDURES
Organizational Documentation
Basic Change Management Best Practices
Workstation Backup And Recovery Methods
Equipment And Personal Safety Procedures
Environmental Variables And Controls
Privacy And Licensing Concepts
Incident Response Policies And Procedures
Communication And Professionalism Techniques
Introduction To Basic Scripting Techniques
Implementing Remote Access Technologies
Course Overview
Networking Concepts
Network Implementation
Network Operations
Network Security Fundamentals
Network Troubleshooting
GSEC
Overview
Access Control And Password Management
Active Defense
Contingency Plans
Critical Controls
Basic Cryptography
Cryptography Algorithms And Deployment
Cryptography Application
Defense In Depth
Defensible Network Architecture
Endpoint Security
Enforcing Windows Security
Incident Handling And Response
IT Risk Management
Linux Security: Structure, Permissions, And Access
Linux Hardening And Securing
Linux Monitoring And Attack Detection
Linux Security Utilities
Log Management And SIEMs
Common Attack Methods
Mitigation Strategies
Network Device Security
Network Security Devices
Networking And Protocols
Securing Windows Network Services
Security Policies
Virtualization And Cloud Security
Web Communication Vulnerabilities
Vulnerability Scanning And Penetration Testing
Windows Access Controls
Windows Updates
Windows Auditing And Forensics
Windows Security Infrastructure
Wireless Network Security
COURSE OVERVIEW
Course Overview
GENERAL SECURITY CONCEPTS
Examining Security Control Categories
Examining Security Control Types
Examining The Principles Of Security
Examining Authentication Factors
Examining Authorization And Access Control Models
Examining Authentication, Authorization, And Accounting (AAA)
Examining The Principles Of Zero Trust
Examining Physical Security
Examining Deception And Disruption Technology
Business Processes And Security Operations
Change Management Implications & Documentation
Examining Encryption Solutions
Examining Public Key Infrastructure (PKI)
Examining Digital Certificates
Examining Asymmetric Encryption
Examining Symmetric Encryption
Examining Hashing And Obfuscation
THREATS, VULNERABILITIES, AND MITIGATION
Threat Actors
Social Engineering
Business Email Compromise
Digital System Threats
Network Based Threats
Removable Media Threats
Supply Chain Attacks
Application Vulnerabilities
Operating System Vulnerabilities
Web Based Vulnerabilities
Hardware Vulnerabilities
Cloud Vulnerabilities
Virtualization Vulnerabilities
Cryptographic Vulnerabilities
Mobile Device Vulnerabilities
Zero Day Vulnerabilities
Indicators Of Malware Attacks
Indicators Of Physical Attacks
Indicators Of Network Attacks
Indicators Of Application Attacks
Indicators Of Crypographic Attacks
Indicators Of Password Attacks
Cybersecurity Mitigation Techniques
SECURITY ARCHITECTURE
Cloud-Related Concepts
Network Infrastructure Concepts
Virtualization Concepts
IoT And SCADA
Architectural Model Considerations
Security Infrastructure Considerations
Network Appliances
Port Security
Firewall Types
Secure Communication And Access
Selecting Effective Controls
Data Types
Data Classifications
Data Considerations
Methods To Secure Data
HA And Site Considerations
Platform Diversity And Multi-Cloud Systems
Continuity Of Operations And Capacity Planning
Testing
Backups
Power
SECURITY OPERATIONS
Examining Identity And Access Management
Examining Wireless Security
Examining Operating System Security
Examining Firewalls And Intrusion Detection Devices
Examining Password Security
Examining Web Filtering
Examining The Incident Response Process And Activities
Examining Endpoint Detection And Response (EDR)
Examining Single Sign-On
Examining Secure Network Protocols And Services
Examining Automation And Scripting Uses
Examining Asset Management
Examining Privileged Identity Management
Examining Application Security
Examining Investigation Data Sources And Log Data
Examining Security For Mobile Devices
Examining Vulnerability Analysis
Examining Digital Forensics Activities
Vulnerability Response, Remediation And Reporting
Examining Security Baselines And Hardening
Examining User Onboarding And Offboarding
Examining Email Security
Examining Security Monitoring And Alerting
Identifying Vulnerabilities
SECURITY PROGRAMS MANAGEMENT AND OVERSIGHT
Guidelines And Policies
Standards And Procedures
External Considerations And Revisions
Governance Structures
Roles And Responsibilities
Risk Identification And Assessment
Risk Analysis
Risk Register, Tolerance, And Appetite
Risk Management Strategies
Risk Reporting And BIA
Vendor Assessment And Selection
Agreement Types
Additional Vendor Considerations
Compliance
Compliance Monitoring
Privacy
Attestation
Audits
Penetration Testing
Phishing
Anomalous Behavior Recognition
User Guidance And Training
Reporting And Monitoring
Development And Execution
About Hudson
Save £140 on selected courses this month! Offer ends 31st October
In the confusing world of e-learning, Hudson is quite simply one of the best at what they do. Why? Because they offer first-class customer service. The Hudson Learning Center puts their customers’ needs before anything else. If there’s something they can do to help you, Hudson will climb mountains to do it.
The Hudson online courses, certifications, and diplomas are highly effective, offering a whole range of features designed to get you certified faster. Some of these incredible features include video and audio based training so you can see and hear your tutor, 24/7 online tutor support, and online labs to practice your skills in a simulated environment.
Come and give Hudson a try. They’ll change the way you think about learning.