Description:
CompTIA or the Computing Technology Industry Association is a non-profit organisation that provides professional certificates for the IT industry. A license from CompTIA will increase your opportunity for career build-up. The CompTIA Certification – Complete Video Course course is the best choice for you if you want to obtain a professional degree in It.
The course is taught in several sections and sub-sections. The CompTIA A+ 900 Certification series shows you the current knowledge and skills needed by today’s IT professionals including configuring BIOS, motherboard, RAM types, PC installation, networking, etc. Then the CompTIA Network+ Certification provides in-depth information related to networking while the CompTIA Security+ section shows you how to secure your confidential data. Next, CompTIA Healthcare IT deals with the application of IT in the medical industry to provide excellent service to the patients while the CompTIA Linux+ course gives you a complete guide for the Linux Operating system. Finally, the CompTIA Advanced Security Practitioner (CASP) course will help you to know about the enterprise security architecture, security technology and resource technology so that you can determine the root of the security problem and solve the issues.
CompTIA provides various certifications based on the different sectors of IT. The purpose of the bundled course is to prepare for those exams and at the same time to help you to gain the practical knowledge related to IT Sector.
Assessment & Certification
To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee.
- Hardcopy Certificate by post – £19
- Soft copy PDF via email – £10
Requirements
Our CompTIA Certification – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
Career Path
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
Course Curriculum
Configuring BIOS | |||
Firmware | 00:07:00 | ||
BIOS Configuration Options | 00:25:00 | ||
Motherboards | |||
Motherboard Sizes Form Factors | 00:14:00 | ||
The Motherboard | 00:12:00 | ||
AMD CPU Socket Types | 00:11:00 | ||
Expansion Slots | |||
Expansion Cards | 00:13:00 | ||
Bus Speeds | 00:28:00 | ||
RAM Types and Features | |||
Memory | 00:06:00 | ||
Types of RAM | 00:07:00 | ||
Install and Configure PC Expansion Cards | |||
Ports | 00:11:00 | ||
SCSI Connections | 00:14:00 | ||
Audio Video Connections | 00:26:00 | ||
Install and Configure Storage Devices | |||
Storage Devices | 00:17:00 | ||
Hard Drives | 00:17:00 | ||
Media Capacity | 00:21:00 | ||
CPU's and Cooling Methods | |||
CPU Types and Characteristics | 00:14:00 | ||
PC Connection Interfaces | |||
Physical Connections USB | 00:11:00 | ||
Physical Connections VGA | 00:11:00 | ||
Wireless Connections Bluetooth | 00:06:00 | ||
Power Supplies | |||
Power Supply Specifications | 00:16:00 | ||
Custom Computer Specifications | |||
What is a Standard Client | 00:13:00 | ||
Audio Video Editing Workstations | 00:08:00 | ||
Installing Displays | |||
Display Device Types | 00:20:00 | ||
Backlighting | 00:12:00 | ||
PC Connectors | |||
DVI to HDMI | 00:13:00 | ||
Installing Peripheral | |||
Standard Input Device Types | 00:16:00 | ||
Expansion Card Types | 00:11:00 | ||
Multimedia Devices | 00:11:00 | ||
Installing Multifunction Devices and SOHO Networks | |||
SOHO Networks | 00:17:00 | ||
WPS | 00:16:00 | ||
Encryption | 00:14:00 | ||
Printer Technologies | |||
Printers | 00:02:00 | ||
Printer Technologies Topic B Inkjet Printers | 00:13:00 | ||
Printer Maintenance | |||
Technical Printer Components | 00:09:00 | ||
Local and Network-Based Printers | 00:22:00 | ||
Networking | |||
Network Interface Card Characteristics | 00:20:00 | ||
Fiber Optic Cables | 00:14:00 | ||
Properties and Characteristics of TCP/IP | |||
TCP IP | 00:14:00 | ||
IP Address Classes | 00:14:00 | ||
Addressing Schemes | 00:17:00 | ||
TCP vs. UDP | |||
Ports | 00:09:00 | ||
LDAP | 00:04:00 | ||
Wi-Fi Networking Standards and Encryption Types | |||
Standards | 00:03:00 | ||
Install and Configure SOHO Wireless/Wired Router | |||
Setting up your Router | 00:10:00 | ||
Define Appropriate NAT Policies | 00:16:00 | ||
Architecture and Internet Connection Types | |||
LANs | 00:08:00 | ||
Network Topologies | 00:11:00 | ||
ISPs | 00:06:00 | ||
Networking Tools | |||
Cable Testers | 00:13:00 | ||
Laptop Hardware Components | |||
Laptops | 00:09:00 | ||
Laptop Expansion Options | 00:10:00 | ||
Auto-Switching and Fixed Input Power Supplies | 00:09:00 | ||
Mobile Devices | |||
What is Mobile Technology | 00:09:00 | ||
Mobile Device Features | 00:09:00 | ||
Bluetooth Configuration Method | 00:08:00 | ||
Mobile Device Ports and Accessories | |||
Mobile Device Connection Types | 00:10:00 | ||
Troubleshooting Mobile Devices | 00:11:00 | ||
Troubleshooting Theory | |||
Troubleshooting Theory | 00:16:00 | ||
Boot to Incorrect Device | 00:16:00 | ||
PC Indicator Lights | 00:10:00 | ||
Repair vs. Replace | 00:10:00 | ||
Troubleshooting RAID Arrays and Hard Drives | |||
Drive and Array Troubleshooting Tools | 00:06:00 | ||
Common RAID Array Issues | 00:17:00 | ||
Troubleshooting Video | |||
Common Video and Display Issues | 00:01:00 | ||
Troubleshooting Network Issues | |||
Common Network Issues | 00:12:00 | ||
Troubleshooting Printers | |||
Common Printer Troubleshooting Tools | 00:14:00 | ||
Windows Operating Systems | |||
Microsoft Windows | 00:12:00 | ||
Microsoft Windows Features | 00:17:00 | ||
Other Operating Systems999 | 01:00:00 | ||
Installation Types | 00:14:00 | ||
Customizing System Options | 00:19:00 | ||
Command Line Tools | |||
The Command Prompt | 00:12:00 | ||
Microsoft Operating System Features and Tools | |||
Administrative Tools | 00:41:00 | ||
Task Manager | 00:28:00 | ||
Memory Diagnostic Tool | 00:46:00 | ||
Control Panel Utilities | |||
The Control Panel | 00:11:00 | ||
Internet Options | 00:10:00 | ||
Types of User Accounts | 00:11:00 | ||
Computer My Computer | 00:13:00 | ||
Permissions | 00:31:00 | ||
System | 00:10:00 | ||
Windows Networking on Client Desktops | |||
Workgroups | 00:20:00 | ||
Network Connection Types | 00:18:00 | ||
Preventative Maintenance | |||
Data Backup and Restoration | 00:11:00 | ||
Scheduling Tasks | 00:26:00 | ||
Features and Functionality of the Mac OS and Linux Operating Systems | |||
Patch Management in Mac OS X and Linux | 00:09:00 | ||
Screen Sharing | 00:06:00 | ||
Mac OS Multitouch Gestures – Touchscreen | 00:09:00 | ||
Client Side Virtualization | |||
What is Virtualization | 00:08:00 | ||
Virtual Desktop Infrastructure | 00:12:00 | ||
Cloud-based Concepts | |||
SaaS (Software as Service) | 00:09:00 | ||
Network Host Properties | |||
Server Roles | 00:12:00 | ||
Mobile Operating Systems | |||
Open Source Software | 00:03:00 | ||
Mobile Device Network and E-mail | |||
Mobile Device Hotspot | 00:10:00 | ||
Security | |||
Malware | 00:09:00 | ||
Social Engineering | 00:13:00 | ||
Prevention Methods | |||
Physical Security | 00:14:00 | ||
Hard Drive Sanitation | 00:14:00 | ||
User Education | 00:26:00 | ||
Windows Security Settings | |||
Users and Groups | 00:11:00 | ||
Security Best Practices | |||
Password Best Practices | 00:04:00 | ||
Securing Mobile Devices | |||
Locks | 00:07:00 | ||
Troubleshooting Common PC Tools | |||
Operating System Troubleshooting Tools | 00:12:00 | ||
Application Errors | 00:16:00 | ||
Common Network Issues | 00:12:00 | ||
Common Security Issues | 00:10:00 | ||
Common PC Security Issues | |||
Browser Issues | 00:06:00 | ||
Common Mobile Operating Systems Troubleshooting | |||
Dim Display | 00:09:00 | ||
No Sound from Speakers | 00:07:00 | ||
Common Safety Practices | |||
Static Electricity | 00:14:00 | ||
Electrical Hazards | 00:12:00 | ||
General Power Issues | 00:10:00 | ||
Hazardous Material Disposal Procedures | 00:07:00 | ||
Maintenance Tools and Techniques | |||
Professional Conduct | 00:11:00 | ||
Types of Hardware Toolkits | 00:11:00 | ||
Hard Drive Self-Tests | 00:05:00 | ||
Computer Component Maintenance Techniques | 00:10:00 | ||
Privacy and Licensing Concepts | |||
Incident Response | 00:08:00 | ||
Proper Communication and Professionalism | 00:07:00 | ||
Set Expectations | 00:06:00 | ||
Network Theory | |||
OSI Layers | 00:44:00 | ||
LANs and WANs | 00:14:00 | ||
Network Types | 00:07:00 | ||
Transmissions | 00:36:00 | ||
Bounded Network Media | |||
Cables | 00:41:00 | ||
Fiber Optics | 00:17:00 | ||
Converters and Connectors | 00:27:00 | ||
Unbounded Network Media | |||
802.11 Standard | 00:20:00 | ||
Wireless | 00:11:00 | ||
Wireless Options | 00:19:00 | ||
Network Implementations | |||
Topologies | 00:39:00 | ||
Ethernet | 00:50:00 | ||
Switches | 01:48:00 | ||
VLANs | 00:52:00 | ||
TCP/IP Addressing and Data Delivery | |||
Network Communication Protocols | 00:37:00 | ||
Special Addresses | 00:13:00 | ||
CIDR | 00:11:00 | ||
IPv6 | 00:31:00 | ||
Routing | |||
Routes | 00:59:00 | ||
Routing Types | 00:18:00 | ||
TCP/IP Services | |||
TCP and IP | 00:40:00 | ||
FQDN and DNS | 00:28:00 | ||
Transport-layer Protocols | 00:05:00 | ||
UDP | 00:06:00 | ||
WAN Infrastructure | |||
Wide Area Networks | 00:18:00 | ||
QoS | 00:39:00 | ||
Voice-over-Data Systems | 00:06:00 | ||
Cloud and Virtualization Technologies | |||
Types of Server Virtualization | 00:27:00 | ||
Fibre Channel | 00:05:00 | ||
Cloud Concepts.prproj | 00:24:00 | ||
Network Security Basics | |||
Wireless Security | 00:15:00 | ||
Authentication.prproj | 00:21:00 | ||
Wireless Security Threats | 00:30:00 | ||
TACACS | 00:10:00 | ||
Keys | 00:26:00 | ||
Preventing Security Breaches | |||
Potent Points to Clear Channel Pain – Part 6 | 00:01:00 | ||
Vulnerabilities | 00:16:00 | ||
Attacks | 00:58:00 | ||
Authentication | 00:25:00 | ||
Benefits of Acupressure 3 | 00:02:00 | ||
Education and Awareness | 00:03:00 | ||
Responding to Security Incidents | |||
Response Policy | 00:04:00 | ||
Remote Networking | |||
RADIUS | 00:07:00 | ||
VPN Technologies | 00:16:00 | ||
Tunneling Protocols.prproj | 00:05:00 | ||
Network Management | |||
Acceptable Use | 01:00:00 | ||
Troubleshooting Network Issues | |||
Common Problems | 00:32:00 | ||
Troubleshooting | 00:28:00 | ||
Network Technician Tools | 00:46:00 | ||
Physical and Logical Issues | 00:19:00 | ||
Open or Closed Ports | 00:09:00 | ||
ARP Issues | 00:13:00 | ||
Planning and Implementing a SOHO Network | |||
SOHO Network | 00:15:00 | ||
Security Fundamentals | |||
The Information Security Cycle | 00:37:00 | ||
Information Security Controls | 00:36:00 | ||
Authentication Methods | 00:09:00 | ||
Cryptography Fundamentals | 00:56:00 | ||
Security Policy Fundamentals | 00:11:00 | ||
Identifying Security Threats and Vulnerabilities | |||
Social Engineering | 00:32:00 | ||
Malware | 00:25:00 | ||
Software-Based Threats | 00:22:00 | ||
Based Threats | 00:39:00 | ||
Wireless Threats and Vulnerabilities | 00:43:00 | ||
Physical Threats and Vulnerabilities | 00:09:00 | ||
Managing Data, Application, and Host Security | |||
Manage Data Security | 00:47:00 | ||
Manage Application Security | 00:55:00 | ||
Manage Device and Host Security | 01:08:00 | ||
Manage Mobile Security | 00:10:00 | ||
Implementing Network Security | |||
Configure Security Parameters on Network Devices and Technologies | 00:49:00 | ||
Network Design Elements and Components | 00:26:00 | ||
Implement Networking Protocols and Services | 01:09:00 | ||
Apply Secure Network Administration Principles | 00:12:00 | ||
Secure Wireless Traffic | 00:31:00 | ||
Implementing Access Control, Authentication, and Account Management | |||
Access Control and Authentication Services | 00:42:00 | ||
Implement Account Management Security Controls | 00:33:00 | ||
Managing Certificates | |||
Install a CA Hierarchy | 00:25:00 | ||
Enroll Certificates | 00:13:00 | ||
Secure Network Traffic by Using Certificates | 00:03:00 | ||
Renew Certificates | 00:01:00 | ||
Back Up and Restore Certificates and Private Keys | 00:05:00 | ||
Revoke Certificates | 00:07:00 | ||
Implementing Compliance and Operational Security | |||
Physical Security | 00:20:00 | ||
Legal Compliance | 00:10:00 | ||
Security Awareness and Training | 00:11:00 | ||
Integrate Systems and Data with Third Parties | 00:08:00 | ||
Risk Management | |||
A Risk Analysis | 00:17:00 | ||
Implement Vulnerability Assessment Tools and Techniques | 00:05:00 | ||
Scan for Vulnerabilities | 00:27:00 | ||
Mitigation and Deterrent Techniques | 00:19:00 | ||
Troubleshooting and Managing Security Incidents | |||
Respond to Security Incidents | 00:23:00 | ||
Recover from a Security Incident | 00:10:00 | ||
Business Continuity and Disaster Recovery Planning | |||
What is Acupressure? | 00:02:00 | ||
How to Apply Pressure to Acupressure Points | 00:02:00 | ||
Potent Points to Clear Channel Pain 1 | 00:01:00 | ||
Healthcare IT Fundamentals | |||
Core Concepts in Healthcare IT | 00:06:00 | ||
EMR EHR Issues | 00:05:00 | ||
Regulations, Standards, and Stakeholders | 00:14:00 | ||
HIPAA Controls and Compliance | 00:08:00 | ||
The Medical Environment | |||
Healthcare Organizations | 00:14:00 | ||
Medical Terminology, Equipment, and Software | 00:12:00 | ||
Medical Coding and Billing | 00:05:00 | ||
Medical Computer Interfaces | 00:06:00 | ||
Using IT in the Medical Workplace | |||
Roles and Responsibilities | 00:10:00 | ||
Manage Communication and Ethics Issues | 00:15:00 | ||
Legal Best Practices, Requirements, and Documentation | 00:09:00 | ||
Medical Document Imaging | 00:04:00 | ||
Sanitation Management | 00:03:00 | ||
Healthcare IT Technical Components | |||
Computing Essentials | 00:05:00 | ||
Networking | 00:33:00 | ||
Manage Servers and Software | 00:27:00 | ||
Hardware Support | 00:14:00 | ||
Providing Medical IT Support | |||
Set Up a Workstation | 00:08:00 | ||
Troubleshoot Basic IT Issues | 00:15:00 | ||
Troubleshoot Medical IT Issues | 00:20:00 | ||
Implementation of an EMR EHR System | 00:34:00 | ||
Change Control | 00:08:00 | ||
Security | |||
Manage Physical and Logical Security | 00:36:00 | ||
Implement Security Best Practices and Threat Mitigation Techniques | 00:13:00 | ||
Manage Remote Access | 00:06:00 | ||
Manage Wireless Security | 00:15:00 | ||
Perform Backups and Disaster Recovery | 00:16:00 | ||
Installation | |||
Linux Introduction | 00:25:00 | ||
Pre-installation Tasks | 00:09:00 | ||
Linux Installation | 00:18:00 | ||
Using Linux | |||
Graphical User Interfaces | 00:26:00 | ||
Command Line Linux | 00:56:00 | ||
File and Directory Management | |||
Directory Organization | 00:33:00 | ||
File Management | 00:58:00 | ||
Removable Storage | 00:19:00 | ||
System Administration | |||
Users and Groups | 00:57:00 | ||
File and Directory Permissions | 00:53:00 | ||
User Environment Configuration | 00:29:00 | ||
GUI Configuration | 00:18:00 | ||
Application Management | |||
Packages and Package Managers | 00:30:00 | ||
Source Code Software | 00:20:00 | ||
System Configuration | |||
Disk Management | 00:46:00 | ||
File System Management | 00:29:00 | ||
Device Management | 00:13:00 | ||
Process and Module Management | |||
Process Management | 00:35:00 | ||
Process Priority and Execution | 00:12:00 | ||
Kernel Modules | 00:24:00 | ||
System Maintenance | |||
Backup and Restore | 00:38:00 | ||
Scheduling Tasks | 00:14:00 | ||
Performance Monitoring | 00:26:00 | ||
Logging | 00:39:00 | ||
Networking | |||
Networking Basics | 00:58:00 | ||
Network Services | 00:36:00 | ||
Domain Name Services | 00:29:00 | ||
File Sharing and Printing | |||
Network File Resources | 00:25:00 | ||
Printing | 00:16:00 | ||
Interoperability | |||
Network Interoperability | 00:18:00 | ||
Remote Desktop Access | 00:08:00 | ||
Security | |||
System Security | 00:23:00 | ||
Network Security | 00:32:00 | ||
Web Environment | |||
Web Services | 00:43:00 | ||
MySQL Services | 00:13:00 | ||
FTP and Email Services | |||
FTP Services | 00:36:00 | ||
Mail Services | 00:05:00 | ||
Troubleshooting and Maintenance | |||
Booting Linux | 00:28:00 | ||
Network Troubleshooting | 00:11:00 | ||
Scripting Basics | 00:08:00 | ||
The Enterprise Security Architecture | |||
The Basics of Enterprise Security | 01:00:00 | ||
The Enterprise Structure | 00:21:00 | ||
Enterprise Security Requirements | 00:09:00 | ||
The Enterprise Security Technology | |||
Common Network Security Components and Technologies | 00:55:00 | ||
Communications and Collaboration Security | 00:40:00 | ||
Cryptographic Tools and Techniques | 00:56:00 | ||
Advanced Authentication | 00:14:00 | ||
Enterprise Resource Technology | |||
Enterprise Storage Security Issues | 01:18:00 | ||
Distributed, Shared, and Virtualized Computing | 00:26:00 | ||
Cloud Computing and Security | 00:10:00 | ||
Security Design and Solutions | |||
Network Security Design | 02:22:00 | ||
Conduct a Security Assessment | 00:55:00 | ||
Host Security | 01:19:00 | ||
Managing Risk in Projects | |||
Create a Risk Management Plan | 01:15:00 | ||
Identify Risks and Their Causes | 00:11:00 | ||
Analyze Risks | 00:19:00 | ||
Develop a Risk Response Plan | 00:07:00 | ||
Integrating Advanced Authentication and Authorization Techniques | |||
Implement Authentication | 00:19:00 | ||
Implement Advanced | 00:07:00 | ||
Implementing Cryptographic Techniques | |||
Describe Cryptographic Concepts | 00:19:00 | ||
Choose Cryptographic Techniques | 00:31:00 | ||
Choose Cryptographic Implementation | 00:07:00 | ||
Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture | |||
Implement Security Standards in the Enterprise | 00:13:00 | ||
Select Technical Deployment Models | 00:28:00 | ||
The Enterprise Structure | 00:21:00 | ||
Secure Enterprise Application Integration Enablers | 00:21:00 | ||
Security Research and Analysis | |||
Perform an Industry Trends and Impact Analysis | 00:41:00 | ||
Perform an Enterprise Security Analysis | 00:26:00 | ||
Disaster Recovery and Business Continuity | |||
BCP Fundamentals | 00:21:00 | ||
BCP Implementation | 00:10:00 | ||
DRP Fundamentals | 00:18:00 | ||
DRP Implementation | 00:03:00 | ||
Responding to and Recovering from Incidents | |||
Design Systems to Facilitate Incident Response | 00:14:00 | ||
Conduct Incident and Emergency Responses | 00:20:00 | ||
Legal Issues | |||
Computer Crime Laws and Regulations | 00:16:00 | ||
Computer Crime Incident Response | 00:17:00 | ||
Judgment and Decision-Making | |||
Develop Critical Thinking Skills | 00:12:00 | ||
Determine the Root of a Problem | 00:06:00 | ||
Use Judgment to Make Sound Decisions | 00:18:00 | ||
Mock Exam | |||
Final Exam |
Certificate of Achievement
CPD Accredited Certification
Certification is available –
- In PDF for £2.99
- Hard copy for £8.99
Course Reviews
4.9
- 5 stars0
- 4 stars0
- 3 stars0
- 2 stars0
- 1 stars0
No Reviews found for this course.
- PRIVATE
- 1 year
- Advanced
- Number of Units320
- Number of Quizzes0
- 4 days, 12 hours
More courses for you
No related courses found