• No products in the cart.

Category:

£
4.9( 9 REVIEWS )
537 STUDENTS

Description:

CompTIA or the Computing Technology Industry Association is a non-profit organisation that provides professional certificates for the IT industry. A license from CompTIA will increase your opportunity for career build-up. The CompTIA Certification – Complete Video Course course is the best choice for you if you want to obtain a professional degree in It.

The course is taught in several sections and sub-sections.  The CompTIA A+ 900 Certification series shows you the current knowledge and skills needed by today’s IT professionals including configuring BIOS, motherboard, RAM types, PC installation, networking, etc. Then the CompTIA Network+ Certification provides in-depth information related to networking while the CompTIA Security+ section shows you how to secure your confidential data. Next, CompTIA Healthcare IT deals with the application of IT in the medical industry to provide excellent service to the patients while the CompTIA Linux+ course gives you a complete guide for the Linux Operating system. Finally, the CompTIA Advanced Security Practitioner (CASP) course will help you to know about the enterprise security architecture, security technology and resource technology so that you can determine the root of the security problem and solve the issues.

CompTIA provides various certifications based on the different sectors of IT. The purpose of the bundled course is to prepare for those exams and at the same time to help you to gain the practical knowledge related to IT Sector.

Assessment & Certification

To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee.

  • Hardcopy Certificate by post – £19
  • Soft copy PDF via email – £10

Requirements

Our CompTIA Certification – Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Course Curriculum

Configuring BIOS
Firmware 00:07:00
BIOS Configuration Options 00:25:00
Motherboards
Motherboard Sizes Form Factors 00:14:00
The Motherboard 00:12:00
AMD CPU Socket Types 00:11:00
Expansion Slots
Expansion Cards 00:13:00
Bus Speeds 00:28:00
RAM Types and Features
Memory 00:06:00
Types of RAM 00:07:00
Install and Configure PC Expansion Cards
Ports 00:11:00
SCSI Connections 00:14:00
Audio Video Connections 00:26:00
Install and Configure Storage Devices
Storage Devices 00:17:00
Hard Drives 00:17:00
Media Capacity 00:21:00
CPU's and Cooling Methods
CPU Types and Characteristics 00:14:00
PC Connection Interfaces
Physical Connections USB 00:11:00
Physical Connections VGA 00:11:00
Wireless Connections Bluetooth 00:06:00
Power Supplies
Power Supply Specifications 00:16:00
Custom Computer Specifications
What is a Standard Client 00:13:00
Audio Video Editing Workstations 00:08:00
Installing Displays
Display Device Types 00:20:00
Backlighting 00:12:00
PC Connectors
DVI to HDMI 00:13:00
Installing Peripheral
Standard Input Device Types 00:16:00
Expansion Card Types 00:11:00
Multimedia Devices 00:11:00
Installing Multifunction Devices and SOHO Networks
SOHO Networks 00:17:00
WPS 00:16:00
Encryption 00:14:00
Printer Technologies
Printers 00:02:00
Printer Technologies Topic B Inkjet Printers 00:13:00
Printer Maintenance
Technical Printer Components 00:09:00
Local and Network-Based Printers 00:22:00
Networking
Network Interface Card Characteristics 00:20:00
Fiber Optic Cables 00:14:00
Properties and Characteristics of TCP/IP
TCP IP 00:14:00
IP Address Classes 00:14:00
Addressing Schemes 00:17:00
TCP vs. UDP
Ports 00:09:00
LDAP 00:04:00
Wi-Fi Networking Standards and Encryption Types
Standards 00:03:00
Install and Configure SOHO Wireless/Wired Router
Setting up your Router 00:10:00
Define Appropriate NAT Policies 00:16:00
Architecture and Internet Connection Types
LANs 00:08:00
Network Topologies 00:11:00
ISPs 00:06:00
Networking Tools
Cable Testers 00:13:00
Laptop Hardware Components
Laptops 00:09:00
Laptop Expansion Options 00:10:00
Auto-Switching and Fixed Input Power Supplies 00:09:00
Mobile Devices
What is Mobile Technology 00:09:00
Mobile Device Features 00:09:00
Bluetooth Configuration Method 00:08:00
Mobile Device Ports and Accessories
Mobile Device Connection Types 00:10:00
Troubleshooting Mobile Devices 00:11:00
Troubleshooting Theory
Troubleshooting Theory 00:16:00
Boot to Incorrect Device 00:16:00
PC Indicator Lights 00:10:00
Repair vs. Replace 00:10:00
Troubleshooting RAID Arrays and Hard Drives
Drive and Array Troubleshooting Tools 00:06:00
Common RAID Array Issues 00:17:00
Troubleshooting Video
Common Video and Display Issues 00:01:00
Troubleshooting Network Issues
Common Network Issues 00:12:00
Troubleshooting Printers
Common Printer Troubleshooting Tools 00:14:00
Windows Operating Systems
Microsoft Windows 00:12:00
Microsoft Windows Features 00:17:00
Other Operating Systems999 01:00:00
Installation Types 00:14:00
Customizing System Options 00:19:00
Command Line Tools
The Command Prompt 00:12:00
Microsoft Operating System Features and Tools
Administrative Tools 00:41:00
Task Manager 00:28:00
Memory Diagnostic Tool 00:46:00
Control Panel Utilities
The Control Panel 00:11:00
Internet Options 00:10:00
Types of User Accounts 00:11:00
Computer My Computer 00:13:00
Permissions 00:31:00
System 00:10:00
Windows Networking on Client Desktops
Workgroups 00:20:00
Network Connection Types 00:18:00
Preventative Maintenance
Data Backup and Restoration 00:11:00
Scheduling Tasks 00:26:00
Features and Functionality of the Mac OS and Linux Operating Systems
Patch Management in Mac OS X and Linux 00:09:00
Screen Sharing 00:06:00
Mac OS Multitouch Gestures – Touchscreen 00:09:00
Client Side Virtualization
What is Virtualization 00:08:00
Virtual Desktop Infrastructure 00:12:00
Cloud-based Concepts
SaaS (Software as Service) 00:09:00
Network Host Properties
Server Roles 00:12:00
Mobile Operating Systems
Open Source Software 00:03:00
Mobile Device Network and E-mail
Mobile Device Hotspot 00:10:00
Security
Malware 00:09:00
Social Engineering 00:13:00
Prevention Methods
Physical Security 00:14:00
Hard Drive Sanitation 00:14:00
User Education 00:26:00
Windows Security Settings
Users and Groups 00:11:00
Security Best Practices
Password Best Practices 00:04:00
Securing Mobile Devices
Locks 00:07:00
Troubleshooting Common PC Tools
Operating System Troubleshooting Tools 00:12:00
Application Errors 00:16:00
Common Network Issues 00:12:00
Common Security Issues 00:10:00
Common PC Security Issues
Browser Issues 00:06:00
Common Mobile Operating Systems Troubleshooting
Dim Display 00:09:00
No Sound from Speakers 00:07:00
Common Safety Practices
Static Electricity 00:14:00
Electrical Hazards 00:12:00
General Power Issues 00:10:00
Hazardous Material Disposal Procedures 00:07:00
Maintenance Tools and Techniques
Professional Conduct 00:11:00
Types of Hardware Toolkits 00:11:00
Hard Drive Self-Tests 00:05:00
Computer Component Maintenance Techniques 00:10:00
Privacy and Licensing Concepts
Incident Response 00:08:00
Proper Communication and Professionalism 00:07:00
Set Expectations 00:06:00
Network Theory
OSI Layers 00:44:00
LANs and WANs 00:14:00
Network Types 00:07:00
Transmissions 00:36:00
Bounded Network Media
Cables 00:41:00
Fiber Optics 00:17:00
Converters and Connectors 00:27:00
Unbounded Network Media
802.11 Standard 00:20:00
Wireless 00:11:00
Wireless Options 00:19:00
Network Implementations
Topologies 00:39:00
Ethernet 00:50:00
Switches 01:48:00
VLANs 00:52:00
TCP/IP Addressing and Data Delivery
Network Communication Protocols 00:37:00
Special Addresses 00:13:00
CIDR 00:11:00
IPv6 00:31:00
Routing
Routes 00:59:00
Routing Types 00:18:00
TCP/IP Services
TCP and IP 00:40:00
FQDN and DNS 00:28:00
Transport-layer Protocols 00:05:00
UDP 00:06:00
WAN Infrastructure
Wide Area Networks 00:18:00
QoS 00:39:00
Voice-over-Data Systems 00:06:00
Cloud and Virtualization Technologies
Types of Server Virtualization 00:27:00
Fibre Channel 00:05:00
Cloud Concepts.prproj 00:24:00
Network Security Basics
Wireless Security 00:15:00
Authentication.prproj 00:21:00
Wireless Security Threats 00:30:00
TACACS 00:10:00
Keys 00:26:00
Preventing Security Breaches
Potent Points to Clear Channel Pain – Part 6 00:01:00
Vulnerabilities 00:16:00
Attacks 00:58:00
Authentication 00:25:00
Benefits of Acupressure 3 00:02:00
Education and Awareness 00:03:00
Responding to Security Incidents
Response Policy 00:04:00
Remote Networking
RADIUS 00:07:00
VPN Technologies 00:16:00
Tunneling Protocols.prproj 00:05:00
Network Management
Acceptable Use 01:00:00
Troubleshooting Network Issues
Common Problems 00:32:00
Troubleshooting 00:28:00
Network Technician Tools 00:46:00
Physical and Logical Issues 00:19:00
Open or Closed Ports 00:09:00
ARP Issues 00:13:00
Planning and Implementing a SOHO Network
SOHO Network 00:15:00
Security Fundamentals
The Information Security Cycle 00:37:00
Information Security Controls 00:36:00
Authentication Methods 00:09:00
Cryptography Fundamentals 00:56:00
Security Policy Fundamentals 00:11:00
Identifying Security Threats and Vulnerabilities
Social Engineering 00:32:00
Malware 00:25:00
Software-Based Threats 00:22:00
Based Threats 00:39:00
Wireless Threats and Vulnerabilities 00:43:00
Physical Threats and Vulnerabilities 00:09:00
Managing Data, Application, and Host Security
Manage Data Security 00:47:00
Manage Application Security 00:55:00
Manage Device and Host Security 01:08:00
Manage Mobile Security 00:10:00
Implementing Network Security
Configure Security Parameters on Network Devices and Technologies 00:49:00
Network Design Elements and Components 00:26:00
Implement Networking Protocols and Services 01:09:00
Apply Secure Network Administration Principles 00:12:00
Secure Wireless Traffic 00:31:00
Implementing Access Control, Authentication, and Account Management
Access Control and Authentication Services 00:42:00
Implement Account Management Security Controls 00:33:00
Managing Certificates
Install a CA Hierarchy 00:25:00
Enroll Certificates 00:13:00
Secure Network Traffic by Using Certificates 00:03:00
Renew Certificates 00:01:00
Back Up and Restore Certificates and Private Keys 00:05:00
Revoke Certificates 00:07:00
Implementing Compliance and Operational Security
Physical Security 00:20:00
Legal Compliance 00:10:00
Security Awareness and Training 00:11:00
Integrate Systems and Data with Third Parties 00:08:00
Risk Management
A Risk Analysis 00:17:00
Implement Vulnerability Assessment Tools and Techniques 00:05:00
Scan for Vulnerabilities 00:27:00
Mitigation and Deterrent Techniques 00:19:00
Troubleshooting and Managing Security Incidents
Respond to Security Incidents 00:23:00
Recover from a Security Incident 00:10:00
Business Continuity and Disaster Recovery Planning
What is Acupressure? 00:02:00
How to Apply Pressure to Acupressure Points 00:02:00
Potent Points to Clear Channel Pain 1 00:01:00
Healthcare IT Fundamentals
Core Concepts in Healthcare IT 00:06:00
EMR EHR Issues 00:05:00
Regulations, Standards, and Stakeholders 00:14:00
HIPAA Controls and Compliance 00:08:00
The Medical Environment
Healthcare Organizations 00:14:00
Medical Terminology, Equipment, and Software 00:12:00
Medical Coding and Billing 00:05:00
Medical Computer Interfaces 00:06:00
Using IT in the Medical Workplace
Roles and Responsibilities 00:10:00
Manage Communication and Ethics Issues 00:15:00
Legal Best Practices, Requirements, and Documentation 00:09:00
Medical Document Imaging 00:04:00
Sanitation Management 00:03:00
Healthcare IT Technical Components
Computing Essentials 00:05:00
Networking 00:33:00
Manage Servers and Software 00:27:00
Hardware Support 00:14:00
Providing Medical IT Support
Set Up a Workstation 00:08:00
Troubleshoot Basic IT Issues 00:15:00
Troubleshoot Medical IT Issues 00:20:00
Implementation of an EMR EHR System 00:34:00
Change Control 00:08:00
Security
Manage Physical and Logical Security 00:36:00
Implement Security Best Practices and Threat Mitigation Techniques 00:13:00
Manage Remote Access 00:06:00
Manage Wireless Security 00:15:00
Perform Backups and Disaster Recovery 00:16:00
Installation
Linux Introduction 00:25:00
Pre-installation Tasks 00:09:00
Linux Installation 00:18:00
Using Linux
Graphical User Interfaces 00:26:00
Command Line Linux 00:56:00
File and Directory Management
Directory Organization 00:33:00
File Management 00:58:00
Removable Storage 00:19:00
System Administration
Users and Groups 00:57:00
File and Directory Permissions 00:53:00
User Environment Configuration 00:29:00
GUI Configuration 00:18:00
Application Management
Packages and Package Managers 00:30:00
Source Code Software 00:20:00
System Configuration
Disk Management 00:46:00
File System Management 00:29:00
Device Management 00:13:00
Process and Module Management
Process Management 00:35:00
Process Priority and Execution 00:12:00
Kernel Modules 00:24:00
System Maintenance
Backup and Restore 00:38:00
Scheduling Tasks 00:14:00
Performance Monitoring 00:26:00
Logging 00:39:00
Networking
Networking Basics 00:58:00
Network Services 00:36:00
Domain Name Services 00:29:00
File Sharing and Printing
Network File Resources 00:25:00
Printing 00:16:00
Interoperability
Network Interoperability 00:18:00
Remote Desktop Access 00:08:00
Security
System Security 00:23:00
Network Security 00:32:00
Web Environment
Web Services 00:43:00
MySQL Services 00:13:00
FTP and Email Services
FTP Services 00:36:00
Mail Services 00:05:00
Troubleshooting and Maintenance
Booting Linux 00:28:00
Network Troubleshooting 00:11:00
Scripting Basics 00:08:00
The Enterprise Security Architecture
The Basics of Enterprise Security 01:00:00
 The Enterprise Structure 00:21:00
Enterprise Security Requirements 00:09:00
The Enterprise Security Technology
Common Network Security Components and Technologies 00:55:00
Communications and Collaboration Security 00:40:00
Cryptographic Tools and Techniques 00:56:00
Advanced Authentication 00:14:00
Enterprise Resource Technology
Enterprise Storage Security Issues 01:18:00
Distributed, Shared, and Virtualized Computing 00:26:00
Cloud Computing and Security 00:10:00
Security Design and Solutions
Network Security Design 02:22:00
Conduct a Security Assessment 00:55:00
Host Security 01:19:00
Managing Risk in Projects
Create a Risk Management Plan 01:15:00
Identify Risks and Their Causes 00:11:00
Analyze Risks 00:19:00
Develop a Risk Response Plan 00:07:00
Integrating Advanced Authentication and Authorization Techniques
Implement Authentication 00:19:00
Implement Advanced 00:07:00
Implementing Cryptographic Techniques
Describe Cryptographic Concepts 00:19:00
Choose Cryptographic Techniques 00:31:00
Choose Cryptographic Implementation 00:07:00
Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture
Implement Security Standards in the Enterprise 00:13:00
Select Technical Deployment Models 00:28:00
 The Enterprise Structure 00:21:00
Secure Enterprise Application Integration Enablers 00:21:00
Security Research and Analysis
Perform an Industry Trends and Impact Analysis 00:41:00
Perform an Enterprise Security Analysis 00:26:00
Disaster Recovery and Business Continuity
BCP Fundamentals 00:21:00
BCP Implementation 00:10:00
DRP Fundamentals 00:18:00
DRP Implementation 00:03:00
Responding to and Recovering from Incidents
Design Systems to Facilitate Incident Response 00:14:00
Conduct Incident and Emergency Responses 00:20:00
Legal Issues
Computer Crime Laws and Regulations 00:16:00
Computer Crime Incident Response 00:17:00
Judgment and Decision-Making
Develop Critical Thinking Skills 00:12:00
Determine the Root of a Problem 00:06:00
Use Judgment to Make Sound Decisions 00:18:00
Mock Exam
Final Exam

Certificate of Achievement

CPD Accredited Certification

You will be eligible for CPD Accredited Certificates after completing this Course successfully.
Certification is available –
  1. In PDF for £2.99
  2. Hard copy for £8.99
Thames-College-Certificate

Course Reviews

4.9

4.9
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

  • PRIVATE
  • 1 year
  • Number of Units320
  • Number of Quizzes0
  • 4 days, 12 hours
EVERYTHING FOR LIFETIME £129
537 STUDENTS ENROLLED
    Thames-college-logo-white-2021

    We are a business that specialises in providing CPD & QLS accredited courses for anyone looking to advance their professional career.

    Address : 75 Nansen Road, Saltley, Birmingham, England, B8 3JP

    Email : info@thamescollege.org

    Phone Number : ​020 8124 5465

    Useful Links

    Payment Methods

    lead-payment-logos

    Copyright © 2024 Thames College. All Right Reserved.

    top