New To IT Tech Training Series

(8 customer reviews)
Sale!

Leading the way

New To IT Tech Training Series

(8 customer reviews)

|  Online IT course
|  Number of Courses: 9
|  Training Hours: 135
|  Videos: 714
|  Topics: 85
|  Course Access: 12 Months Unlimited Access
|  Study Method: Online Video Lessons
|  Course Type: Multiple Certificate Bundle
|  Award: Cyber Studies Institute
International Exam: Yes (CompTIA & Microsoft) (Not included in course fee)

Course Fee:

R3500,00

Current Special Ends in:

  • 00Days
  • 00Hours
  • 00Min
  • 00Sec

Get ready for a brand new career in IT with this online IT course.

 

The perfect online IT course for your dream job in IT.

 

Looking to launch or enhance your career in information technology? Look no further than our New to IT Tech Training Series! These 9 comprehensive online IT courses, are presented by experts in their field. The course total 135 training hours, 714 videos, and 85 topics and this training bundle is designed to provide you with the core IT knowledge needed to succeed in the industry. Plus, with 12 months of unlimited access, you can study at your own pace and on your own schedule.

 

This bundle includes courses such as CompTIA A+ 220-1101 (Core 1), CompTIA A+ 220-1102 (Core 2), CompTIA FC0-U61: IT Fundamentals, and more. Upon completion, you’ll be eligible to sit for international exams and achieve CompTIA and Microsoft certifications. And with our subject-matter expert support and 7 days a week WhatsApp support, you’ll have the resources and guidance you need to succeed.

 

Whether you’re a help desk analyst or an IT generalist, this bundle is an excellent choice to start your IT journey. Enroll today and begin your path towards a rewarding and fulfilling career in information technology!

 

Click on Curriculum to view the content of the course.

 

This bundle includes the following online IT Courses:

This course will allow you to sit for the following International Exams and achieve CompTIA & Microsoft Certification:

  • CompTIA A+ 220-1101 (Core 1)
  • CompTIA A+ 220-1102 (Core 2)
  • CompTIA FC0-U61: IT Fundamentals
  • CompTIA Network+ N10-008
  • Microsoft 70-698: Installing and Configuring Windows 10
  • Microsoft 98-365 MTA Windows Server 2016 Administration
  • Microsoft 98-366 MTA Networking Fundamentals
  • Microsoft 98-367 MTA Security Fundamentals

Enroll Now and Start Your IT Career!!

To enroll for this course, simply click on Enroll Now at the bottom of the screen and follow the check out procedure.

Claim your FREE R500 Gift Voucher

FREE R500 gift voucher, especially for you 🎁

Join our mailing list and get your free exclusive R500 discount voucher.

This Voucher can be used for any of our Bundle Courses.

Curriculum

CompTIA Network+ N10-008 Course Outline

Module 0 – Course introduction
  •    0.1 Instructor Intro
  •    0.2 Course Overview
Module 1 – Networking Fundamentals
  •    1.1 Intro to Networking
  •    1.1.1 Activity: Creating a Network
  •    1.2 Common Terminology
  •    1.2.1 Activity: Examining Ports and Sockets
  •    1.3 OSI Model
  •    1.4 DoD Model
  •    1.4.1 Activity: Examining Network Layers
  •    1.5 TCP, UDP, IP
  •    1.5.1 Activity: Examining TCP
  •    1.5.2 Activity: Examining UDP
  •    1.5.3 Activity: Examining IP
  •    1.6 ICMP, IGMP, ARP
  •    1.6.1 Activity: Examining ICMP
  •    1.6.2 Activity: Examining ARP
  •    1.6.3 Activity: Examining IGMP
  •    1.7 Network Topologies
  •    1.8 Network Types
  •    1.9 Part 1: Network Characteristics
  •    1.9 Part 2: Network Characteristics
  •    1.10 Module 1 outro
Module 2 – Cables and Connectors
  •    2.1 Ethernet Standards
  •    2.2 Copper Cable Types
  •    2.3 Fiber Optic Cable Types
  •    2.4 Connector Types
  •    2.4.1 Activity: Selecting the Right Cable
  •    2.5 Media Converters and Transceivers
  •    2.6 Cable Management
  •    2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
  •    3.1 IPv4 Basics
  •    3.2 IP Packet and Interface Types
  •    3.2.1 Activity: Configuring Client IP Settings
  •    3.3 Binary Numbering System
  •    3.4 Classful and Classless Addressing
  •    3.5 Understanding CIDR Notation
  •    3.6 IPv4 Subnetting Method
  •    3.7 Verifying with Binary
  •    3.8 Finding Subnet IDs
  •    3.8.1 Activity: Subnetting a Class C Network
  •    3.9 The Delta in Action
  •    3.9.1 Activity: Subnetting With the Delta
  •    3.10 Subnetting Based on Hosts
  •    3.11 Subnetting in Other Octets
  •    3.12 Supernetting
  •    3.12.1 Activity: Supernetting
  •    3.13 IPv6
  •    3.14 IPv4 – IPv6 Transition Mechanisms
  •    3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
  •    4.1 Remote Control Protocols
  •    4.2 File Sharing Protocols
  •    4.3 Web Protcols
  •    4.4 Email Protocols
  •    4.5 Database Protocols
  •    4.6 Voice Protocols
  •    4.7 Security Protocols
  •    4.8 Management Protocols
  •    4.9 Module 4 Outro
Module 5 – Network Services
  •    5.1 DHCP
  •    5.1.1 Activity: Configuring DHCP
  •    5.1.2 Activity: Configuring a DHCP Relay Agent
  •    5.2 DNS
  •    5.2.1 Activity: Configuring DNS – Part 1
  •    5.2.2 Activity: Configuring DNS – Part 2
  •    5.3 NTP
  •    5.4 Corporate and Datacenter Network Architecture
  •    5.5 Cloud Concepts and Connectivity Options
  •    5.6 Module 5 Outro
Module 6 – Networking Devices
  •    6.1 Introductory Concepts
  •    6.2 Repeaters and Hubs
  •    6.2.1 Activity: Connecting Devices with a Hub
  •    6.3 Bridges and Switches
  •    6.3.1 Activity: Connecting Devices with a Switch
  •    6.4 Routers and Multilayer Switches
  •    6.5 Security Devices
  •    6.6 Modems
  •    6.7 Module 6 Outro
Module 7 – Networked Devices
  •    7.1 IP Devices
  •    7.2 IoT
  •    7.2.1 Activity – Programming IoT Devices
  •    7.3 ICS/SCADA
  •    7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
  •    8.1 Routing Basics
  •    8.1.1 Activity: Configuring Static Routes
  •    8.2 Packet Delivery on the Same Network
  •    8.3 IP Routing Across a Single Router
  •    8.4 IP Routing Across Multiple Hops
  •    8.4.1 Activity: Static Routes – CHALLENGE
  •    8.5 Route Selection
  •    8.6 RIP
  •    8.6.1 Activity: Configuring RIP – CHALLENGE
  •    8.7 OSPF
  •    8.8 EIGRP
  •    8.9 BGP
  •    8.10 NAT/PAT
  •    8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
  •    9.1 Ethernet Basics
  •    9.2 Switching Overview
  •    9.2.1 Activity: Examining a MAC Table
  •    9.3 VLANs
  •    9.3.1 Activity: Creating VLANs
  •    9.4 VLAN Trunking
  •    9.4.1 Activity: Configuring VLAN Trunking
  •    9.5 VLAN Routing
  •    9.5.1 Activity: Configuring VLAN Routing
  •    9.6 Contention Management
  •    9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
  •    10.1 Wireless Overview
  •    10.2 Radio Basics
  •    10.3 Modulation
  •    10.4 Wi-Fi Standards
  •    10.5 Antennas
  •    10.6 Wi-Fi Service Sets
  •    10.7 Wi-Fi Security
  •    10.8 Cellular
Module 11 Network Performance
  •    11.1 Monitoring Performance
  •    11.2 Common Metrics
  •    11.2.1 Activity: Examining Interface Statistics
  •    11.3 SNMP
  •    11.4 Netflow
  •    11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
  •    12.1 HA and DR Concepts
  •    12.2 High Availability Mechanisms
  •    12.3 Disaster Recovery Mechanisms
  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
  •    13.1 Plans and Procedures
  •    13.2 Security Policies
  •    13.3 Loss Prevention
  •    13.4 Common Agreements
  •    13.5 Common Documentation
  •    13.6 Structured Cabling – MDF and IDF
  •    13.7 Horizontal and Vertical Cabling
  •    13.7.1 Activity – Implementing Cable Management
  •    13.8 Labeling
  •    13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
  •    14.1 Common Security Concepts
  •    14.2 Common Attack Types
  •    14.3 Spoofing-based Attacks
  •    14.4 Hijacking and MITM
  •    14.5 Social Engineering
  •    14.6 Network Segmentation
  •    14.7 Private VLANs
  •    14.8 Single Organization Authentication
  •    14.9 Extending Authentication
  •    14.10 Authorization
  •    14.11 Network Device Hardening
  •    14.12 Wireless Security
  •    14.13 Remote Access Security
  •    14.14 IoT Security
  •    14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
  •    15.1 Troubleshooting Methodology
  •    15.2 Physical Connectivity Issues
  •    15.3 Hardware Testing Tools
  •    15.3.1 Activity – Testing an Ethernet Cable
  •    15.3.2 Activity – Crimping on an RJ-45 Connector
  •    15.3.3 Activity – Punching Down Twisted Pair
  •    15.3.4 Activity – Using a Telephone Toner
  •    15.4 Understanding Electricity
  •    15.4.1 Activity – Checking Cable Continuity
  •    15.4.2 Activity – Testing DC Voltage
  •    15.4.3 Activity – Testing AC Voltage
  •    15.5 Twisted Pair Pinout Problems
  •    15.6 Twisted Pair Termination Problems
  •    15.7 Repairing Damaged Twisted Pair Cable
  •    15.8 Fiber Optic Connectivity Issues
  •    15.8.1 Activity – Testing a Fiber Optic Cable
  •    15.9 Common Port Problems
  •    15.9.1 Working with Ports and Their Devices
  •    15.10 Common Software Testing Tools
  •    15.10.1 Activity – Scanning for Open Ports
  •    15.11 Common Command Line Utilities
  •    15.12 Troubleshooting Basic IP Networking Issues
  •    15.13 Common Switching Issues
  •    15.14 Switching Test Tools and Techniques
  •    15.15 Common IP Routing Issues
  •    15.16 Wi-Fi Access Point Issues
  •    15.17 Wirelss Interference
  •    15.17.1 Activity – Using a Spectrum Analyzer
  •    15.18 Wireless Antenna Issues
  •    15.18.1 Activity – Configuring a Wi-Fi Router
  •    15.19 WAP Placement Strategies
  •    15.20 Infrastructure Service Issues (DHCP)
  •    15.21 Infrastructure Service Issues (DNS)
  •    15.22 Infrastructure Service Issues (NTP)
  •    15.23 Fireall / ACL Issues
  •    15.24 VPN Issues
  •    15.25 Additional Network Security Troubleshooting and Tips
  •    15.26 Advanced Networking Issues
  •    15.27 Troubleshooting Server Services (with Module 15 Outro)
  •    CompTIA Network+ N10-008 Course Outro

CompTIA FC0-U61: IT Fundamentals Course Outline

Module 1 – IT Concepts and Terminology
  •    Module 1 Notes
  •    0.1 Instructor Intro
  •    1.1 Compare and Contrast Notational Systems
  •    1.1 Compare and Contrast Notational Systems Demo
  •    1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
  •    1.3 Illustrate the Basics of Computing and Processing
  •    1.4 Explain the Value of Data and Information
  •    1.5 Compare and Contrast Common Units of Measures
  •    1.5 Compare and Contrast Common Units of Measures Demo
  •    1.6 Explain the Troubleshooting Methodology
Module 2 – Infrastructure
  •    Module 2 Notes
  •    2.1 Classify Common Types of Input-Output Device Interfaces
  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  •    2.3 Explain the Purpose of Common Internal Computing Components
  •    2.4 Compare & Contrast Common Internet Service Types-
  •    2.5 Compare & Contrast Storage Types
  •    2.6 Compare & Contrast Common Computing Devices & Their Purposes
  •    2.7 Explain Basic Networking Concepts
  •    2.7 Explain Basic Networking Concepts Demo
  •    2.7 Explain Basic Networking Concepts Part 2
  •    2.7 Explain Basic Networking Concepts Part 3
  •    2.7 Explain Basic Networking Concepts Part 4
  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 – Applications and Software
  •    Module 3 Notes
  •    3.1 Explain the Purpose of Operating Systems
  •    3.1 Explain the Purpose of Operating Systems Demo
  •    3.2 Compare & Contrast Components of an Operating System
  •    3.2 Compare & Contrast Components of an Operating System Demo
  •    3.3 Explain the Purpose & Proper Use of Software
  •    3.4 Explain Methods of Application Architecture & Delivery Models
  •    3.5 Given a Scenario Configure & Use Web Browsers
  •    3.5 Given a Scenario Configure & Use Web Browsers FireFox
  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
  •    3.6 Compare & Contrast General Application Concepts & Uses
Module 4 – Software Development
  •    Module 4 Notes
  •    4.1 Compare & Contrast Programming Language Categories-
  •    4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
  •    4.3 Explain the Purpose & Use of Programming Concepts-
  •    4.3 HTML Demo
Module 5 – Database Fundamentals
  •    Module 5 Notes
  •    5.1 Explain Database Concepts and the Purpose of Databases
  •    5.2 Compare and Contrast Various Database Structures
  •    5.3 Summarize Methods Used to Interface with Databases
  •    5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 – Security
  •    Module 6 Notes
  •    6.1 Summarize Confidentiality, Integrity, and Availability Concerns
  •    6.2 Explain Methods to Secure Devices and Best Practices
  •    6.3 Summarize Behavioral Security Concepts
  •    6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
  •    6.5 Explain Password Best Practices
  •    6.6 Explain Common Uses of Encryption
  •    6.7 Explain Business Continuity Concepts
  •    6.8 Takeaways-
  •    6.9 ITF Fundamentals Conclusion

Microsoft 98-365 MTA Windows Server 2016 Administration Course Outline

Module 1 Introducing Windows Server 2016
  •    Module 1 Notes
  •    1. Windows Server 2016 Fundamentals Intro
  •    2. Mod 1 Introducing Windows Server 2016
  •    3. Mod 1a Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
  •    Module 2 Notes
  •    4. Mod 2 Managing Windows Server 2016
  •    5. Mod 2a Managing Windows Server 2016
Module 3 Managing Storage
  •    Module 3 Notes
  •    6. Mod 3 Managing Storage
  •    7. Mod 3a Managing Storage
Module 4 Monitoring and Troubleshooting Servers
  •    Module 4 Notes
  •    8. Mod 4 Monitoring and Troubleshooting Servers
  •    9. Mod 4a Monitoring and Troubleshooting Servers
Module 5 Essential Services
  •    Module 5 Notes
  •    10. Mod 5 Essential Services
  •    11. Mod 5a Essential Services
Module 6 Understanding File and Print Services
  •    Module 6 Notes
  •    12. Mod 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
  •    Module 7 Notes
  •    13. Mod 7 Windows Network Services and Applications-
  •    14. Mod 7a Windows Network Services and Applications-
Mod 8 Key Takeaways
  •    Key Takeaway Notes
  •    15. Key takeaways Intro
  •    16. Key takeaways – Module 1 Introducing Windows Server 2016
  •    17. Key takeaways – Module 2 Managing Windows Server 2016
  •    18 Key takeaways – Module 3 Storing Data in Windows Server 2016
  •    19. Key takeaways – Module 4 Monitoring and Troubleshooting Servers
  •    20. Key takeaways – Module 5 Essential Services
  •    21. Key takeaways – Module 6 Understanding File and Print Services
  •    22. Key takeaways – Module 7 Windows Network Services and Applications
Mod 9 Terms to Know
  •    Terms to Know Notes
  •    23. Terms to Know Intro
  •    24. Terms to Know – Module 1 Introducing Windows Server 2016
  •    25. Terms to Know – Module 2 Managing Windows Server 2016
  •    26 Terms to Know – Module 3 Storing Data in Windows Server 2016
  •    27. Terms to Know – Module 4 Monitoring and Troubleshooting Servers
  •    28. Terms to Know – Module 5 Essential Services
  •    29. Terms to Know – Module 6 Understanding File and Print Services
  •    30. Terms to Know – Module 7 Windows Network Services and Applications
Mod 10 Hands on Labs
  •    Hands on Labs Setup Notes
  •    01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
  •    02 Step by Step Install VMware Player 15 in Windows 10 1
  •    03 Installing and Configuring DC1 Virtual Machine
  •    04 Installing and Configuring SRV-1 Virtual Machine
  •    05 Installing and Configuring Client 1 Virtual Machine
  •    06 Installing and Configuring the Router Virtual Machine
  •    07 Creating and Configuring SRV-2 Virtual Machine
  •    08 Working with Windows Server 2016 Desktop Experience
  •    09 Managing Organizational Units and Groups in AD DS

Microsoft 98-367 MTA Security Fundamentals Course Outline

Module 1 Understanding Security Layers
  •    Module 1 Notes
  •    1.0 Security Fundamentals Instructor
  •    1.1 Security Fundamentals Intro
  •    1.2 Understanding Security Layers Part1
  •    1.3 Understanding Security Layers Part2
Module 2 Authentication, Authorization, and Accounting
  •    Module 2 Notes
  •    2.0 Authentication, Authorization & Accounting Part1
  •    2.1 Authentication, Authorization & Accounting Part2
  •    2.2 Authentication, Authorization & Accounting Demo
Module 3 Understanding Security Policies
  •    Module 3 Notes
  •    3.0 Understanding Security Policies
Module 4 Understanding Network Security
  •    Module 4 Notes
  •    4.0 Understanding Network Security Part1
  •    4.1 Understanding Network Security Part2
Module 5 Locking Down Server and Client
  •    Module 5 Notes
  •    5.0 Locking Down the Server and Client
  •    5.1 Locking Down the Server and Client Part2
Module 6 Key Takeaways
  •    Key Takeaway Notes
  •    6.0 Key Take Aways Intro
  •    6.1 Understanding Security Layers
  •    6.2 Authentication Authorization and Accounting
  •    6.3 Understanding Security Policies
  •    6.4 Understanding Network Security
  •    6.5 Security Fundamentals Part 2
Module 7 Terms to Know
  •    Terms to Know Notes
  •    7.0 Terms to Know Intro
  •    7.1 Understanding Security Layers Terms
  •    7.2 Authentication Authorization and Accounting Terms
  •    7.3 Understanding Security Policies Terms
  •    7.4 Understanding Network Security Terms
  •    7.5 Locking Down Server and Client Terms

Microsoft 98-366 MTA Networking Fundamentals Course Outline

Module 1 Understanding Local Area Networking
  •    Module 1 Notes
  •    1.0 Intro to Networking Fundamentals
  •    1.1 Exam Overview
  •    1.1 Examining Local Network Devices and Data Transfers 1a
  •    1.1 Examining Local Network Devices and Data Transfers 1b
  •    1.1 Examining Local Network Devices and Data Transfers 1c
  •    1.1 Examining Local Network Devices and Data Transfers 1d
  •    1.1 Examining Local Network Devices and Data Transfers 1e
  •    1.1 Examining Local Network Devices and Data Transfers 1f
  •    1.2 Examining Local Network Devices and Data Transfers Part 2a
  •    1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
  •    Module 2 Notes
  •    2.1 Defining Networks with OSI Model Part 1a
  •    2.2 Defining Networks with OSI Model Part 1b
  •    2.3 Defining Networks with OSI Model Part 1c
  •    2.4 Defining Networks with OSI Model Part 1d
  •    2.5 Defining Networks with OSI Model Part 1e
  •    2.6 Defining Networks with OSI Model Part 1f
  •    2.7 Defining Networks with OSI Model Part 1g
  •    2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
  •    Module 3 Notes
  •    3.1 Understand Wired and Wireless Networks Part1
  •    3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
  •    Module 4 Notes
  •    4.1 Understanding Internet Protocol Part1
  •    4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
  •    Module 5 Notes
  •    5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
  •    Module 6 Notes
  •    6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
  •    Module 7 Notes
  •    7.1 Understanding Wide Area Network Part1
  •    7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
  •    Module 8 Notes
  •    8.1 Defining Network Infrastructure & Network Security Part1
  •    8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
  •    Key Takeaway Notes
  •    1. Key Take Aways of Networking Fundamentals
  •    2. Key Take Aways Mod1
  •    3. Key Take Aways Mod2
  •    4. Key Take Aways Mod3
  •    5. Key Take Aways Mod4
  •    6. Key Take Aways Mod5
  •    7. Key Take Aways Mod6
  •    8. Key Take Aways Mod7
Module 10 Terms to Know
  •    Terms to Know Notes
  •    1. Terms to Know Networking Fundamentals
  •    2. Terms to Know Mod1
  •    3. Terms to Know Mod2
  •    4. Terms to Know Mod3
  •    5. Terms to Know Mod4
  •    6. Terms to Know Mod5
  •    7. Terms to Know Mod6
  •    8. Terms to Know Mod7
  •    9. Terms to Know Mod8

CompTIA A+ 220-1002 (Core 2) Course Outline

Module 1 – Operating Systems
  •    Module 1 Workbook
  •    0.1 Intro to A+ Core2 Instructor
  •    1.0 Intro to A+ Core2
  •    1.1 Operating Systems Part1
  •    1.1 Operating Systems Part2
  •    1.2 Compare and Contrast features of Microsoft Windows Versions
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  •    1.4 Scenario use appropriate Microsoft Command Line Tools Part1
  •    1.4 Scenario use appropriate Microsoft Command Line Tools Part2
  •    1.4 Scenario use appropriate Microsoft Command Line Tools Demo
  •    1.5 Microsoft Operating System and Tools Part1
  •    1.5 Microsoft Operating System and Tools Part1 Demo
  •    1.5 Microsoft Operating System and Tools Part2
  •    1.5 Microsoft Operating System and Tools Part2 Demo
  •    1.5 Microsoft Operating System and Tools Part3
  •    1.5 Microsoft Operating System and Tools Part3 Demo
  •    1.5 Microsoft Operating System and Tools Part4
  •    1.5 Microsoft Operating System and Tools Part4 Demo
  •    1.6 Microsoft Windows Control Panel Utilities
  •    1.6 Microsoft Windows Control Panel Utilities Demo
  •    1.7 Summerize Application Installation and Configuration Concepts
  •    1.8 Configure Windows Networking on a Client Desktop
  •    1.8 Configure Windows Networking on a Client Desktop Demo
  •    1.9 Features and Tools of MAC OS and Linux Client Desktop
Module 2 – Security
  •    Module 2 Workbook
  •    2.1 Security – Physical Security Measures
  •    2.2 Explain Logical Security Concepts
  •    2.2 Explain Logical Security Concepts Part2
  •    2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  •    2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
  •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  •    2.6 Compare Contrast the different Microsoft Windows Security Settings
  •    2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  •    2.7 Implement Security Best Practices to Secure a Workstation
  •    2.7 Implement Security Best Practices to Secure a Workstation Part2
  •    2.8 Implement Methods for Securing Mobile Devices
  •    2.9 Implement Appropriate Data Destruction & Disposal Methods
  •    2.10 Configure Security on SOHO Wireless and Wired Networks
  •    2.10 Configure Security on SOHO Wireless and Wired Networks Demo
Module 3 – Software Troubleshooting
  •    Module 3 Workbook
  •    3.1 Software Troubleshooting Part1
  •    3.1 Software Troubleshooting Part2
  •    3.1 Software Troubleshooting Demo
  •    3.2 Troubleshoot and Resolve PC Security Issues
  •    3.2 Troubleshoot and Resolve PC Security Issues Part2
  •    3.2 Troubleshoot and Resolve PC Security Issues Demo
  •    3.3 Best Practice Procedures for Malware Removal
  •    3.4 Troubleshoot Mobile OS and Application
  •    3.5 Troubleshoot Mobile OS and Application Security Issue
Module 4 – Operational Procedures
  •    Module 4 Workbook
  •    4.1 Operational Procedures
  •    4.2 Implement Basic Change Management Best Practices
  •    4.3 Implement Basic Disaster Prevention and Recovery Methods
  •    4.4 Explain Common Safety Procedures
  •    4.5 Explain Environmental Impacts and Appropriate Controls
  •    4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  •    4.7 Using Proper Communication Techniques and Professionalism
  •    4.8 Identify the Basic of Scripting
  •    4.8 Identify the Basic of Scripting Demo
  •    4.9 Use Remote Access Technologies

CompTIA A+ 220-1001 (Core 1) Course Outline

Module 1 – Mobile Devices
  •    Module 1 Workbook
  •    0.1 Intro to A+ Core1 Instructor
  •    1.0 CompTIA A+ Course Intro
  •    1.1 Mobile Devices Part 1
  •    1.1 Mobile Devices Part 2
  •    1.1 Mobile Devices Part 3
  •    1.2 Installing Components in Laptop
  •    1.3 Laptop Features Part 1
  •    1.3 Laptop Features Part 2
  •    1.4 Compare and Contrast Types of Mobile Devices
  •    1.5 Accessories and Ports of Other Mobile Devices Part 1
  •    1.5 Accessories and Ports of Other Mobile Devices Part 2
  •    1.6 Configure Basic Device Network Connectivity and Application Support Part 1
  •    1.6 Configure Basic Device Network Connectivity and Application Support Part 2
  •    1.7 Use Methods to Perform Mobile Device Synchronization
  •    1.8 Laptop Disassemble and Assemble
Module 2 – Networking
  •    Module 2 Workbook
  •    2.1 Networking Part 1
  •    2.1 Networking Part 2
  •    2.2 Compare and Contrast Common Networking Hardware Devices Part 1
  •    2.2 Compare and Contrast Common Networking Hardware Devices Part 2
  •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  •    2.3 Setting Up a Wireless Router
  •    2.4 Compare and Contrast Wireless Networking Protocols
  •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  •    2.6 Explain Common Network Configuration Concepts Part 1
  •    2.6 Explain Common Network Configuration Concepts Part 2
  •    2.7 Compare and Contrast Internet Connection Types Network Types and Features
  •    2.8 Given a Scenario Using Appropriate Networking Tools
Module 3 – Hardware
  •    Module 3 Workbook
  •    3.1 Hardware Part 1
  •    3.1 Hardware Part 2
  •    3.1 Hardware Part 3
  •    3.2 Identify Common Connector Types
  •    3.3 Scenario Install RAM Types
  •    3.4 Scenario Select Install and Configure Storage Devices
  •    3.4 Scenario Select Install and Configure Storage Devices Part 2
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
  •    3.5 Install Disassemble and Assemble a Desktop
  •    3.6 Purposes for Peripherals and Types
  •    3.7 Summarize Power Supplies
  •    3.8 Scenario Select and Configure Appropriate Components for Customers PCs
  •    3.9 Scenario Installand Configure Common Devices
  •    3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
  •    3.11 Scenario Install and Maintain Various Print Technologies Part 1
  •    3.11 Scenario Install and Maintain Various Print Technologies Part 2
  •    3.11 Scenario Install and Maintain Various Print Technologies Part 3
Module 4 – Virtualization and Cloud Computing
  •    Module 4 Workbook
  •    4.1 Virtualization Part 1
  •    4.1 Virtualization Part 2
  •    4.2 Scenario Setup and Configure Client-side Virtualization
Module 5 – Hardware and Network Troubleshooting
  •    Module 5 Workbook
  •    5.1 Hardware and Networking Troubleshooting
  •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  •    5.3 Troubleshoot Hard Drives and RAID Arrays
  •    5.4 Troubleshoot Video and Display Issues
  •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  •    5.6 Troubleshoot Printers
  •    5.7 Troubleshoot Common Wired and Wireless Network Problems

Microsoft 70-698: Installing and Configuring Windows 10 Course Outline

Module 1 : Prepare for installation requirements
  •    Module 1 Workbook
  •    Prep for Installation Windows 10
  •    Clean Install or Upgrade Windows 10
  •    Editions of Windows 10
  •    What Features Do You Want
  •    Installation Media
  •    Looking at MS Application Compatibility Toolkit (ACT)
Module 2 : Install Windows
  •    Module 2 Workbook
  •    Installing Windows
  •    Clean installation of Windows 10-Demo
  •    Upgrade using Installation Media
  •    Configure Native Boot and VHD
  •    Migrating to Windows 10
  •    Chp2 Booting from VHD
  •    Creating a VHD-Demo
  •    Installing Windows 10 to a VHD-Demo
  •    Installing on Bootable USB
  •    Using USMT User State Migration Tool-Demo
  •    Additional Windows Features
  •    Create an MBR-Partitioned VHD-Demo
  •    Additional Regional and Language Support
  •    Putting Win 10 on a VHD with DISM-Demo
Module 3 : Configure devices and device drivers
  •    Module 3 Workbook
  •    Configure Devices and Device Drivers
  •    Resolve Driver Issues
  •    Configuring Driver Settings
  •    Manage Driver Packages
  •    Download and Import Driver Packages
  •    Using DISM
  •    Installing o Updating Drivers using Device Manager-Demo
  •    Roll Back Drivers-Demo
  •    Using Sigverif-Demo
  •    More on Device Manager-Demo
Module 4 : Perform post-installation configuration
  •    Module 4 Workbook
  •    Perform Post Installation Configuration
  •    Configure Accessibilty Options
  •    Configure Cortana
  •    Configure Microsoft Edge
  •    Configure Internet Explorer
  •    Configure Client Hyper-V
  •    Configure Power Settings
  •    Customizing the Start Menu-Demo
  •    Start Tiles-Demo
  •    Desktop Customization-Demo
  •    Action Center and Notifications-Demo
  •    Hyper V-Demo
  •    Power Settings-Demo
Module 5 : Implement Windows in an enterprise environment
  •    Module 5 Workbook
  •    Implement Windows in an Enterprise Enviornment
  •    Implementing Active Directory
  •    Implement Volume Activation Using a Key Mgmt Service
  •    Query and Configure Activation State using Command line
  •    Configure Active Directory Including Group Policies
  •    Configure and Optimize User Account Control UAC
  •    Using Software Licensing Manager; slmgr.vbs -dli-Demo
  •    Taking a look at UAC-Demo
Module 6 : Configure networking
  •    Module 6 Workbook
  •    Configuring Networking
  •    Configuring Name Resolution
  •    Connect to a Network
  •    Configure Network Locations
  •    Configure Windows Firewall
  •    Configure Windows Firewall with Advance Security
  •    Configure Network Discovery
  •    Configuring Wi-Fi Settings
  •    Troubleshoot Network Issues
  •    Configure VPNs
  •    Configure IPsec
  •    Configure DirectAccess
  •    Configure IP Addresses Manually-Demo
  •    DNS Settings-Demo
  •    Looking at Network Locations and where to make Chpanges-Demo
  •    Windows Firewall – Basic Settings-Demo
  •    Windows Firewall – Advanced Settings-Demo
  •    Troubleshooting Tools-Demo
  •    Create a VPN Connection-Demo
Module 7 : Configure storage
  •    Configure Storage
  •    Create and Configure VHD
  •    Configure Removable Devices
  •    Create and Configure Storage Spaces
  •    Troubleshoot Storage and Removable Device Issue
  •    Steps to create a simple volume-Demo
  •    Create VHD with Hyper-V Manager-Demo
  •    Create VHD with PowerShell-Demo
  •    Bitlocker to Go-Demo
Module 8 : Configure data access and usage
  •    Module 8 Workbook
  •    Configure Data Access and Usage File-Printer
  •    Configure File System Permissions
  •    Configure File Share Public Folders and OneDrive
  •    Configure OneDrive usage including Files On Demand
  •    Troubleshoot Data Access and Usage
  •    File Sharing-Demo
  •    Printer Sharing-Demo
  •    Set Printer Security-Demo
  •    File system permissions-Demo
  •    Public Folder Sharing-Demo
  •    OneDrive-Demo
  •    Storage Sense-Demo
  •    Disk Quotas-Demo
Module 9 : Implement Apps
  •    Module 9 Workbook
  •    Implement Apps
  •    Configure Startup Options
  •    Configure Windows Features
  •    Configure Windows Stores
  •    Implementing Windows Store Apps
  •    Implement Windows Store for Business and Education
  •    Provison Packages
  •    Create Packages
  •    Chpange Default Apps-Demo
  •    Application Startup Options-Demo
  •    Looking at Windows Features-Demo
  •    Windows Store-Demo
  •    Windows Imaging and Configuration Designer Tool ICD-Demo
Module 10 : Configure remote management
  •    Module 10 Workbook
  •    Configuring Remote Management
  •    Configure Remote Management Settings
  •    Configure Remote Desktop
  •    Configure Remote Assistance
  •    Modifying Using MMC or PS
  •    Configure Remote PowerShell
  •    Remote Management Settings-Demo
  •    Allow through Windows Firewall-Demo
  •    Remote Desktop-Demo
  •    Remote Assistance-Demo
  •    Remote with MMC-Demo
  •    Windows PowerShell Remoting-Demo
Module 11 : Configure Updates
  •    Module 11 Workbook
  •    Configure Update Windows 10
  •    Manage Update History
  •    Roll Back Updates
  •    Implement Insider Preview CB CBB and LTSB
  •    Update Windows Store Apps
  •    Windows Update Options-Demo
  •    Update History-Demo
  •    Rolling Back Updates-Demo
  •    Update Windows Store apps-Demo
Module 12 : Monitor Windows
  •    Module 12 Workbook
  •    Monitor Windows
  •    Configure Event Subscriptions
  •    Monitor Performance Using Task Manager
  •    Monitor System
  •    Monitor and Manage Printers
  •    Monitor Performance Using Performance Monitor Data Collectors
  •    Monitor and Manage Printers
  •    Configure Indexing Options
  •    Manage Client Security by Using Windows Defender
  •    Evaluate System Stability by Using Reliaability Monitor
  •    Troubleshoot Performance Issues
  •    Manage Security Using Windows Defender Security Center
  •    Configure Windows Defender Advanced Threat Detection
  •    Event Viewer-Demo
  •    Creating Event Subscriptions-Demo
  •    Task Manager-Demo
  •    Performance Monitor-Demo
  •    Resource Monitor-Demo
  •    Managing the Printers with Print Management-Demo
  •    Indexing-Demo
  •    Windows Defender-Demo
  •    Reliability Monitor-Demo
Module 13 : Configure System and Data Recovery
  •    Module 13 Workbook
  •    Configure System and Data Recovery
  •    Configure System Restore
  •    Configure Restore Points
  •    Peform a Refresh or Recycle
  •    Restore Previous Versions of Files and Folders
  •    Configure File History
  •    Recover Files from OneDrive
  •    Use Windows Backup and Restore
  •    Perform a Backup and Restore with WBAdmin
  •    Perform Recovery Operations Windows Recovery
  •    Configure a Recovery Drive-Demo
  •    Configure System Restore-Demo
  •    Configure Restore Points-Demo
  •    Performing a Refresh or Recycle-Demo
  •    Configure File History-Demo
  •    Use Windows Backup & Restore-Demo
Module 14 : Configure Authorization and Authentication
  •    Module 14 Workbook
  •    Configure Authorization and Authentication
  •    Configure Pictures Passwords and Biometrics
  •    Configure Workgroups
  •    Configure Domain Settings
  •    Configue Homegroup Settings
  •    Configure Credential Manager
  •    Configure Local Accounts
  •    Configure Microsoft Accounts
  •    Configure Device Registration
  •    Configure Windows Hello for Business
  •    Configure Device Guard
  •    Credential Guard
  •    Configure Device Health Attestation
  •    Configure UAC Behavior
  •    Configure Dynamic Look
  •    Picture Passwords-Demo
  •    Workgroups-Demo
  •    Domains-Demo
  •    Credential Manager-Demo
  •    Configure Local Accounts-Demo
  •    Dynamic Lock-Demo
Module 15 : Configure Advanced Management Tools
  •    Module 15 Workbook
  •    Configure Advanced Management Tools
  •    Configure Device Manager
  •    Configure and use the MMC
  •    Configure Task Schedule
  •    Configure Automation of Mgmt Task Using Windows PowerShell
  •    Convert Group Policy Objects to MDM Policies using the MDM
  •    Services-Demo
  •    Using the MMC-Demo
  •    Task Scheduler-Demo
  •    Opening PowerShell and the Integrated Scripting Environment-Demo

Windows 10 Power User (How to use Windows 10) Course Outline

Module 1: Getting Started With Windows 10
  •    Introduction
  •    First Steps
  •    Navigating The Desktop
  •    Using Cortana To Search
Module 2: Using File Explorer
  •    File Explorer
  •    Understanding File And Folder Basics
  •    Work With Libraries
  •    Creating A Home Group
Module 3: Using Windows Applications
  •    Opening And Using Applications
  •    Installing New Applications From The Windows Store
  •    Using Default Applications
Module 4: Browsing the Web With Microsoft Edge
  •    Examining The Edge Window
  •    Searching The Web With Edge
  •    Bookmarking Important Sites
  •    Using The Reading List
  •    Marking A Page With Web Notes
  •    Conclusion
Module 5: Customizing Windows
  •    Introduction
  •    Customizing The Display
  •    Customizing File Explorer
  •    Configuring Cortanas Notebook Feature
  •    Customizing Privacy Settings
  •    Customizing Microsoft Edge
Module 6: Connecting Devices And Devices
  •    Connecting Printers
  •    Connecting And Using A Flash Drive
  •    Connect A Phone
Module 7: Managing User Accounts
  •    Create Additional Users
  •    Understanding User Profiles
  •    Sharing Data Between Profiles
Module 8: Backing Up Important Data
  •    Using File History
  •    Using Windows Backup
  •    Using System Restore
Module 9: Maintaining Windows
  •    Windows Updates
  •    Working With The Action Center
  •    Using Disk Defragmenter
  •    Managing Storage And Apps Using Settings
  •    Conclusion
Module 10: Protecting Windows
  •    Introduction
  •    Using Windows Defender
  •    Using Windows Firewall
  •    Using Bit Locker
  •    Windows Hello
Module 11: Monitoring Performance
  •    Using Task Manager
  •    Using Resource Monitor
Module 12: Working With Control Panel And Settings
  •    Control Panel Part 1
  •    Control Panel Part 2
  •    Settings App
  •    Using Device Manager
  •    Using Remote Desktop
  •    Conclusion

8 reviews for New To IT Tech Training Series

  1. Simba

    I was impressed by the depth of knowledge presented in the course. It covered all the essential aspects.

  2. Zahara

    I appreciated the regular check-ins and progress assessments that kept me motivated throughout the course.

  3. Nobuhle

    Loved the course

  4. Thando

    The course offered lifetime access to the materials, allowing me to revisit and reinforce my learning whenever needed.

  5. Michael

    You played a crucial role in helping me secure my dream job. Thank you!

  6. Ethan

    I can’t thank you enough for providing such a phenomenal course.

  7. Siphesihle

    The course provided a solid foundation in the subject matter, equipping me with the knowledge I needed to excel in my field.

  8. Zuri

    Best course

Add a review

Your email address will not be published. Required fields are marked *

Excited to Study Enroll Qualify

If you are ready to take the next step, click on the “Enroll Now” button below or “Contact us now” on this course for a detailed course outline or if you have any questions. An expert course adviser is standing by to assist you.

CompTIA Authorized Partner

Cyber Studies Institute (Pty) Ltd is proud to be an Official CompTIA Authorized Partner. Ensuring that you receive the best training in the world.

CompTIA Authorized Partner

How does studying with CSI work?

Click here to read how the process of studying at CSI work.