Course Syllabi

Network+ Syllabus

The Network+ course is five (5) weeks long with 45 hours of Live Instructor-led course and hands-on Instructor-led Labs plus Q and A sessions.  The course is led by knowledgeable Instructors and includes the online course of instruction, eBook, Instructor-led Labs as well as Instructor/SME-led question and answer sessions.  Instructor will display demos and additional material to better prepare the student for both the exam and content material.

Week 1

Day 1

Course Introduction
        •     Introduction to Total Cyber and the Network+ course
        •     CompTIA MasterCert Registration
        •     Exam Expectations and Review of Material
Lesson 1: Explaining the OSI and TCP/IP Models
        • Topic A: Explain OSI Model Layers
        • Topic B: Explain the TCP/IP Suite
Lesson 2: Explaining Properties of Network Traffic
        • Topic A: Explain Media Types and Access Methods
        • Topic B: Deploy Ethernet Standards
        • Topic C: Configure and Monitor Network Interfaces
          • LAB: Exploring the Lab Environment
          • LAB: Configuring Ethernet Networking

Day 2

Lesson 3: Installing and Configuring Switched Networks
        • Topic A: Install and Configure Hubs and Bridges
        • Topic B: Install and Configure Switches
        • Topic C: Compare and Contrast Network Topologies
        • Topic D: Compare and Contrast Network Types
          • LAB: Designing a Switch Topology

Day 3

Lesson 4: Configuring IP Networks
        • Topic A: Configure IPv4 Addressing Components
        • Topic B: Test IP Interfaces with Command Line Tools
          • LAB: Configuring IPv4 Networking
        • Topic C: Configure IPv4 Subnets
          • LAB: Designing an IP Subnet
          • LAB: Configuring IPv4 Subnets
        • Topic D: Configure Private and Public IPv4 Addressing Schemes
          • LAB: Designing VLSM Subnets

Day4

Lesson 4: Configuring IP Networks
        • Topic E: Configure IPv6 Addressing Components
          • LAB: Configuring IPv6 Networking
        • Topic F: Configure DHCP Services
          • LAB: Configuring Address Assignments
Lesson 5: Installing and Configuring Routed Networks
      • Topic A: Explain Characteristics of Routing
        • LAB: Designing a Branch Office Internetwork
      • Topic B: Install and Configure Routers
        • LAB: Configuring Routing

Week 2

Day 1

Lesson 6: Configuring and Monitoring Ports and Protocols
        • Topic A: Explain the Uses of Ports and Protocols
        • Topic B: Use Port Scanners and Protocol Analyzers
          • LAB: Using Port Scanning Tools
          • Topic C: Explain the Use of Name Resolution Services
          • Topic D: Configure DNS and IPAM Services
            • LAB: Configuring DNS Servers

Day 2

Lesson 7: Explaining Network Application and Storage Services
        • Topic A: Explain the Uses of Network Applications
          • LAB: Configuring Application Protocols
        • Topic B: Explain the Uses of Voice Services and Advanced Networking Devices
        • Topic C: Explain the Uses of Virtualization and Network Storage Services
        • Topic D: Summarize the Concepts of Cloud Services

Day 3

Lesson 8: Monitoring and Troubleshooting Networks
        • Topic A: Monitor Network Interfaces and Logs
          • LAB: Using Event Management and Performance Monitors
        • Topic B: Explain Network Troubleshooting Methodology
        • Topic C: Troubleshoot Common Network Services Issues
          • LAB: Troubleshooting Network Issues

Day 4

Lesson 9: Explaining Networking Attacks and Mitigations
        • Topic A: Summarize Common Networking Attacks
        • Topic B: Explain the Characteristics of VLANs
        • Topic C: Explain the Characteristics of NAT and Port Forwarding
Lesson 10: Installing and Configuring Security Devices
        • Topic A: Install and Configure Firewalls and Proxies
          • LAB: Configuring a NAT Firewall
        • Topic B: Explain the Uses of IDS/IPS and UTM

Day 5

Lesson 11: Explaining Authentication and Access Controls
      • Topic A: Explain Authentication Controls and Attacks
      • Topic B: Explain the Uses of Authentication Protocols and Directory Services
        • LAB: Securing Appliance Administration with RADIUS Authentication
      • Topic C: Explain the Uses of Port Security and NAC
      • Topic D: Implement Network Device Hardening
      • Topic E: Explain Patch Management and Vulnerability Scanning Processes

Week 3

Day 1

Lesson 12: Deploying and Troubleshooting Cabling Solutions
        • Topic A: Deploy Structured Cabling Systems
        • Topic B: Deploy Twisted Pair Cabling Solutions
        • Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions
        • Topic D: Deploy Fiber Optic Cabling Solutions
Lesson 13: Implementing and Troubleshooting Wireless Technologies
        • Topic A: Install and Configure Wireless Technologies
        • Topic B: Troubleshoot Wireless Performance Issues
        • Topic C: Secure and Troubleshoot Wireless Connectivity
          • LAB: Configuring a Wireless Router

Day 2

Lesson 14: Comparing and Contrasting WAN Technologies
        • Topic A: Compare and Contrast WAN Core Service Types
        • Topic B: Compare and Contrast WAN Subscriber Service Types
        • Topic C: Compare and Contrast WAN Framing Service Types
        • Topic D: Compare and Contrast Wireless and IoT WAN Technologies
Lesson 15: Using Remote Access Methods
        • Topic A: Use Remote Access VPNs
        • Topic B: Use Remote Access Management Methods
          • LAB: Configuring Secure Access Channels

Day 3

    • Lesson 16: Identifying Site Policies and Best Practices
      • Topic A: Manage Networks with Documentation and Diagrams
      • Topic B: Summarize the Purposes of Physical Security Devices
      • Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts
      • Topic D: Identify Policies and Best

Week 4

Day 1

Remedial Review of lessons covered.
        • Q&A with Instructor
        • Additional Lab environments through CompTIA and Instructor demo
        • Practice Exam

Day 2

Remedial Review of lessons
        • Q&A with Instructor
        • Additional Lab environments through CompTIA and Instructor demo
        • Practice Exam

Day 3

Remedial Review of lessons covered.
        • Q&A with Instructor
        • Additional Lab environments through CompTIA and Instructor demo
        • Practice Exam

Day 4

Remedial Review of lessons covered.
      • Q&A with Instructor
      • Additional Lab environments through CompTIA and Instructor demo
      • Practice Exam
      • Exam Review/Expectations

Total Cyber Security+ Course Syllabus

The Network+ course is five (5) weeks long with 45 hours of Live Instructor led course and hands-on Instructor led Labs plus and Q and A sessions. The course is led by knowledgeable Instructors and include the online course of instruction, eBook and Hard cover book, Instructor led Labs as well as Instructor/SME led question and answer sessions.

Domain 1.0 Threats, Attacks and Vulnerabilities

1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
1.2 Compare and contrast types of attacks
1.2.1 Social Engineering
1.2.2 Application / Service attacks
1.2.3 Cryptographic attacks
1.2.4 Hijacking
1.2.5 Network / Wireless attacks
1.3 Explain threat actor types and attributes
1.3.1 Types of actors
1.3.2 Attributes of actors
1.4 Explain penetration testing concepts
1.4.1 Penetration testing process
1.4.1.1 Reconnaissance
1.4.1.2 Initial exploitation
1.4.1.3 Persistence
1.4.1.4 Pivot
1.4.1.5 Escalation of privilege
1.4.2 Penetration testing vs. Vulnerability scanning
1.4.3 Black box vs. Gray box vs. White box
1.5 Explain vulnerability scanning concepts
1.5.1 Identifying
1.5.1.1 Vulnerability / Unpatched system or application
1.5.1.2 Lack of security controls
1.5.1.3 common misconfigurations
1.5.2 Intrusive vs. non-intrusive
1.5.3 Credentialed vs. non-credentialed
1.6 Explain the impact associated with types of vulnerabilities
1.6.1 Configuration issues
1.6.2 Access control
1.6.3 Cryptography, certificate and key management
1.6.4 Application vulnerabilities
1.6.5 Application input handling

Domain 2.0 Technologies and Tools

2.1 Install and configure network components, both hardware and software-based, to support
organizational security
2.1.1 Network equipment: Router, Switch, Bridge, Load Balancer, Proxy
2.1.2 Gateways: Email, Media
2.1.3 Access Points
2.1.4 Firewall
2.1.5 NAC
2.1.6 VPN / SSL/TLS accelerators & decryptors
2.1.7 NIPS/ NIDS
2.1.8 DLP
2.1.9 SIEM
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization
2.2.1 Network scanners
2.2.2 Protocol analyzer
2.2.3 Wireless scanners / crackers
2.2.4 Exploitation frameworks
2.2.5 Passive vs Active
2.2.6 Scanners: Vulnerability, Configuration compliance and inventory
2.2.7 Password crackers
2.2.8 Backup Utilities
2.2.9 Honeypot / Honeynet
2.2.10 Steganography
2.2.11 Command line tools: Unix/Linux and Windows
2.3 Given a scenario, troubleshoot common security issues
2.3.1 Personnel
2.3.2 Asset Management / Misconfigured devices
2.3.3 Identity, Access, Authentication, Authorization and Audit (IAAAA)
2.3.4 Encryption
2.4 Given a scenario, analyze and interpret output from security technologies
2.4.1 Network security technologies
2.4.2 Host security technologies
2.4.3 Data security technologies
2.5 Given a scenario, deploy mobile devices securely
2.5.1 Connection methods
2.5.2 Mobile device management concepts
2.5.3 Enforcement and monitoring
2.5.4 Deployment models
2.6 Given a scenario, implement secure protocols
2.6.1 Protocols
2.6.2 Use cases

Domain 3.0 Architecture and Design

3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
3.1.1 Industry-standard frameworks and reference architectures
3.1.2 Benchmarks/secure configuration guides
3.1.3 Defense-in-depth/layered security
3.2 Given a scenario, implement secure network architecture concepts.
3.2.1 Zones/topologies
3.2.2 Segregation/segmentation/isolation
3.2.3 VPN / Tunneling
3.2.4 Security device/technology placement
3.2.5 Software Defined Networks (SDN)
3.3 Given a scenario, implement secure systems design
3.3.1 Hardware/firmware security
3.3.2 Operating System Security
3.3.3 Peripherals
3.4 Explain the importance of secure staging deployment concepts
3.4.1 Secure baseline
3.4.2 Sandboxing
3.4.3 Environment
3.4.4 Integrity measurement
3.5 Explain the security implications of embedded systems.
3.5.1 ICS / SCADA
3.5.2 IoT / Smart Devices
3.5.3 Printers / MFDs
3.5.4 Camera systems
3.5.5 Special purpose
3.6 Summarize secure application development and deployment concepts
3.6.1 Development life-cycle models
3.6.2 Secure DevOps / SecDevOps
3.6.3 Version control and change management
3.6.4 Provisioning and deprovisioning
3.6.5 Secure coding techniques
3.6.6 Code quality and testing
3.7 Summarize cloud and virtualization concepts
3.7.1 Hypervisor
3.7.2 Virtual Machine (VM)
3.7.3 Cloud computing
3.7.3.1 Deployment models
3.7.3.2 Storage
3.7.3.3 Access
3.8 Explain how resiliency and automation strategies reduce risk
3.8.1 Automation/scripting
3.8.2 Master image
3.8.3 Non-persistence
3.8.4 Forms and functions
3.9 Explain the importance of physical security controls

Domain 4.0 Identity and Access Management

4.1 Compare and contrast identity and access management concepts.
4.1.1 Identification, authentication, authorization and accounting (AAA)
4.1.2 Multifactor authentication
4.1.3 Single Sign-On (SSO) / Federation
4.2 Given a scenario, install and configure identity and access services
4.3 Given a scenario, implement identity and access management controls
4.3.1 Access Control Models
4.3.2 Physical Access Control
4.3.3 Biometrics
4.3.4 Tokens
4.3.5 Certificate-based authentication
4.3.6 Authorization: file-system and database
4.4 Given a scenario, differentiate common account management practices.
4.4.1 General concepts
4.4.2 Account types
4.4.3 Account policy enforcement

Domain 5.0 Risk Management

5.1 Explain the importance of policies, plans and procedures related to organizational security
5.1.1 Standard operating procedures
5.1.2 Agreement types
5.1.3 Personnel management
5.1.4 General security policies
5.2 Summarize business impact analysis concepts
5.3 Explain risk management processes and concepts
5.3.1 Threat assessment
5.3.2 Risk assessment
5.3.3 Change management
5.4 Given a scenario, follow incident response procedures
5.4.1 Incident response plan
5.4.2 Incident response process
5.5 Summarize basic concepts of forensics
5.5.1 Data acquisition
5.5.2 Preservation / Order of volatility
5.5.3 Chain of custody
5.5.4 Legal hold
5.5.5 Recovery
5.6 Explain disaster recovery and continuity of operations concepts
5.6.1 Backup concepts
5.6.2 Geographic considerations
5.6.3 Continuity of operations planning
5.6.4 Recovery sites
5.6.5 Order of restoration
5.7 Compare and contrast various types of controls
5.7.1 Administrative
5.7.2 Technical
5.7.3 Physical
5.7.4 Corrective
5.7.5 Preventive
5.7.6 Detective
5.7.7 Deterrent
5.7.8 Compensating
5.8 Given a scenario, carry out data security and privacy practices
5.8.1 Data sensitivity labeling and handling
5.8.2 Data roles
5.8.3 Data destruction and media sanitization
5.8.4 Legal and compliance

Domain 6.0 Cryptography and PKI

6.1 Compare and contrast basic concepts of cryptography
6.1.1 Symmetric algorithms
6.1.2 Asymmetric algorithms
6.1.3 Hashing
6.1.4 Keys and key exchange
6.1.5 Digital signatures
6.1.6 Common use cases
6.2 Explain cryptography algorithms and their basic characteristics
6.2.1 Symmetric algorithms
6.2.2 Cipher modes
6.2.3 Asymmetric algorithms
6.2.4 Hashing algorithms
6.3 Given a scenario, install and configure wireless security settings
6.3.1 Cryptographic protocols
6.3.2 Authentication protocols
6.3.3 Methods
6.4 Given a scenario, implement public key infrastructure
6.4.1 Components
6.4.2 Concepts
6.4.3 Types of certificates
6.4.4 Certificate formats

Total Cyber Certified Ethical Hacker Course Syllabus

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

Course Outline:

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

Total Cyber Certified Network Defender Course Syllabus

Learn the skills that matter! EC-Council’s vendor-neutral network security certifications provide an unbiased approach to learning secure networking practices, as well as how to analyze and harden computing systems prevalent in the current IT infrastructure.

CND v2 has earned a reputation as the only program in the market that is 100% focused on network security and defense.

IT professionals need to be part of the cybersecurity ecosystem, especially in a post-COVID Digital Transformation era. If you think cybersecurity is the responsibility of cyber teams alone, think again!

Certified Network Defender v2 has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats, while leveraging Threat Intelligence to Predict them before they happen. CND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.

Course Outline:

Module 01: Network Attacks and Defense Strategies
Module 02: Administrative Network Security
Module 03: Technical Network Security
Module 04: Network Perimeter Security
Module 05: Endpoint Security-Windows Systems
Module 06: Endpoint Security-Linux Systems
Module 07: Endpoint Security- Mobile Devices
Module 08: Endpoint Security-IoT Devices
Module 09: Administrative Application Security
Module 10: Data Security
Module 11: Enterprise Virtual Network Security
Module 12: Enterprise Cloud Network Security
Module 13: Enterprise Wireless Network Security
Module 14: Network Traffic Monitoring and Analysis
Module 15: Network Logs Monitoring and Analysis
Module 16: Incident Response and Forensic Investigation
Module 17: Business Continuity and Disaster Recovery
Module 18: Risk Anticipation with Risk Management
Module 19: Threat Assessment with Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence

Total Cyber Desktop Support Program

Fundamentals of Information Technology  

  • IT Concepts and Terminology 
  • Infrastructure Setup 
  • Applications & Software 
  • Software Development 
  • Database Fundamentals 
  • Security Essentials 

Fundamentals and intermediate skills of Software and Hardware support  

  • Hardware 
  • Operating Systems 
  • Software Troubleshooting 
  • Networking 
  • Hardware & Network Troubleshooting 
  • Security 
  • Mobile Devices 
  • Virtualization & Cloud Computing 
  • Operational Procedures 

End User Awareness 

  • Information Protection 
  • Cyber Terrorism 
  • Social Engineering 
  • Remote Worker Security 
  • Virus Protection 
  • Password Security 
  • Web Browser Security 
  • Email Security 
  • Instant Messaging Security 
  • Telephone Security 
  • Mobile Security 

Intermediate Network Concepts 

  • Networking Concepts 
  • Infrastructure 
  • Network Operations 
  • Network Security 
  • Network Troubleshooting & Tools 

Intermediate Security Concepts 

  • Attacks, Threats and Vulnerabilities 
  • Architecture and Design 
  • Implementation 
  • Operations and Incident Response 
  • Governance, Risk and Compliance

Total Cyber Cybersecurity Engineer Program

Fundamentals of Information Technology 

  • IT Concepts and Terminology 
  • Infrastructure Setup 
  • Applications & Software 
  • Software Development 
  • Database Fundamentals 
  • Security Essentials 

Intermediate Network Concepts 

  • Networking Concepts 
  • Infrastructure 
  • Network Operations 
  • Network Security 
  • Network Troubleshooting & Tools 

Intermediate Security Concepts 

  • Attacks, Threats and Vulnerabilities 
  • Architecture and Design 
  • Implementation 
  • Operations and Incident Response 
  • Governance, Risk and Compliance 

Cloud Computing  

  • Cloud Architecture & Design 
  • Cloud Security 
  • Cloud Deployment 
  • Operations & Support 
  • Troubleshooting 

Operating System and Server and Workstation Concepts   

  • Vulnerability Assessment and Risk Management 
  • Students will learn how to address issues including: 
  • Vulnerability Assessment Frameworks 
  • Vulnerability Assessment Techniques 
  • Vulnerability Assessment Tools 
  • Detect and Respond to Vulnerabilities 
  • Preform a Vulnerability Assessment 

Cyber Policy and Compliance 

  • Risk Assessment Fundamentals 
  • Steps to Risk Assessment Process 
  • Risk Assessment Procedures 
  • Risk Reduction and Management 

Critical Controls 

Security and Network Operations Center Concepts

  • Fundamentals of Security and Network Operations Center 
  • Incident Detection and Response 
  • Security Event and Information Management (SEIM) or 
  • Security information and event management (SIEM) 
  • SEIM Deployment and Operations 

Total Cyber Penetration Tester Program

Intermediate Network Concepts 

  • Networking Concepts
  • Infrastructure 
  • Network Operations 
  • Network Security 
  • Network Troubleshooting & Tools 

Intermediate Security Concepts 

  • Attacks, Threats and Vulnerabilities 
  • Architecture and Design 
  • Implementation 
  • Operations and Incident Response 
  • Governance, Risk and Compliance 

Vulnerability Assessment 

  • Vulnerability Assessment Frameworks 
  • Vulnerability Assessment Techniques 
  • Vulnerability Assessment Tools 
  • Detect and Respond to Vulnerabilities 
  • Preform a Vulnerability Assessment 

Fundamentals of Ethical Hacking and Penetration Testing 

  • Emerging Attack Vectors 
  • Enumeration 
  • Malware and Reverse Engineering 
  • Cloud Computing 
  • Hacking Web Applications 
  • Operation Technologies 
  • WIFI Cracking 
  • Penetration testing Labs 

Intermediate Ethical Hacking and Penetration Testing 

  • Planning & Scoping 
  • Information Gathering & Vulnerability Identification 
  • Attacks & Exploits 
  • Penetration Testing Tools 
  • Reporting & Communication 
  • Ethical Hacking Labs 

Advanced Ethical Hacking and Penetration Testing 

  • Penetration Testing: What You Should Know 
  • Getting Comfortable with Kali Linux 
  • Command Line Fun 
  • Practical Tools 
  • Bash Scripting 
  • Passive Information Gathering 
  • Active Information Gathering 
  • Vulnerability Scanning 
  • Web Application Attacks 
  • Introduction to Buffer Overflows 
  • Windows Buffer Overflows 
  • Linux Buffer Overflows 
  • Client-Side Attacks 
  • Locating Public Exploits 
  • Fixing Exploits 
  • File Transfers 
  • Antivirus Evasion 
  • Privilege Escalation 
  • Password Attacks 
  • Port Redirection and Tunneling 
  • Active Directory Attacks 
  • The Metasploit Framework 
  • PowerShell Empire 
  • Penetration Testing Labs

Total Cyber Python Fundamentals 

Students will learn how to address issues including: 

  • Installing the latest version of Python 
  • Working with Jupyter Notebooks 
  • Python data types, operators, and variable names 
  • Python strings, lists, ranges, and constructors 
  • Controlling the flow of Python programs 
  • Modularizing code with functions 
  • Handling data with tuples, sets, and dictionaries 
  • Developing Python modules 
  • Encapsulation with Python classes 
  • Building an intelligent Texas Hold’em Poker application 

  

Data Analysis 

Students will learn how to address issues including: 

  • Introduction to pandas 
  • Selecting subsets of data 
  • Essential pandas commands 
  • Grouping data with pandas 
  • Analyzing time series data 
  • Exploring text with regular expressions 
  • Cleaning and transforming data 
  • Joining multiple datasets together 
  • Building professional data analytics reports 

  

SQL 

Students will learn how to address issues including: 

  • Connecting to SQL databases 
  • Querying databases with the SELECT statement 
  • Translating pandas to SQL 

  

Data visualization 

Students will learn how to address issues including: 

  • Learning the data visualization landscape in Python 
  • Building interactive data analytics dashboards