Course Syllabi

Preview our Course Syllabus for all our CompTIA courses

  • Network+ Sylabus
  • Security+ Sylabus

The Network+ course is five (5) weeks long with 45 hours of Live Instructor-led course and hands-on Instructor-led Labs plus Q and A sessions.  The course is led by knowledgeable Instructors and includes the online course of instruction, eBook, Instructor-led Labs as well as Instructor/SME-led question and answer sessions.  Instructor will display demos and additional material to better prepare the student for both the exam and content material.

 

Week 1 Dates: 9 – 13 November

Day 1

    Introduction to Total Cyber and the Network+ course

    CompTIA MasterCert Registration

    Exam Expectations and Review of Material

Lesson 1: Explaining the OSI and TCP/IP Models

  • Topic A: Explain OSI Model Layers
  • Topic B: Explain the TCP/IP Suite

Lesson 2: Explaining Properties of Network Traffic

  • Topic A: Explain Media Types and Access Methods
  • Topic B: Deploy Ethernet Standards
  • Topic C: Configure and Monitor Network Interfaces
    • LAB: Exploring the Lab Environment
    • LAB: Configuring Ethernet Networking

Day 2

Lesson 3: Installing and Configuring Switched Networks

  • Topic A: Install and Configure Hubs and Bridges
  • Topic B: Install and Configure Switches
  • Topic C: Compare and Contrast Network Topologies
  • Topic D: Compare and Contrast Network Types
    • LAB: Designing a Switch Topology

Day 3

Lesson 4: Configuring IP Networks

  • Topic A: Configure IPv4 Addressing Components
  • Topic B: Test IP Interfaces with Command Line Tools
    • LAB: Configuring IPv4 Networking
  • Topic C: Configure IPv4 Subnets
    • LAB: Designing an IP Subnet
    • LAB: Configuring IPv4 Subnets
  • Topic D: Configure Private and Public IPv4 Addressing Schemes
    • LAB: Designing VLSM Subnets

Day4

Lesson 4: Configuring IP Networks

  • Topic E: Configure IPv6 Addressing Components
    • LAB: Configuring IPv6 Networking
  • Topic F: Configure DHCP Services
    • LAB: Configuring Address Assignments

Lesson 5: Installing and Configuring Routed Networks

  • Topic A: Explain Characteristics of Routing
    • LAB: Designing a Branch Office Internetwork
  • Topic B: Install and Configure Routers
    • LAB: Configuring Routing

Week 2 Dates: 16 – 20 November

Day 1

Lesson 6: Configuring and Monitoring Ports and Protocols

  • Topic A: Explain the Uses of Ports and Protocols
  • Topic B: Use Port Scanners and Protocol Analyzers
    • LAB: Using Port Scanning Tools
  • Topic C: Explain the Use of Name Resolution Services
  • Topic D: Configure DNS and IPAM Services
    • LAB: Configuring DNS Servers

Day 2

Lesson 7: Explaining Network Application and Storage Services

  • Topic A: Explain the Uses of Network Applications
    • LAB: Configuring Application Protocols
  • Topic B: Explain the Uses of Voice Services and Advanced Networking Devices
  • Topic C: Explain the Uses of Virtualization and Network Storage Services
  • Topic D: Summarize the Concepts of Cloud Services

Day 3

Lesson 8: Monitoring and Troubleshooting Networks

  • Topic A: Monitor Network Interfaces and Logs
    • LAB: Using Event Management and Performance Monitors
  • Topic B: Explain Network Troubleshooting Methodology
  • Topic C: Troubleshoot Common Network Services Issues
    • LAB: Troubleshooting Network Issues

Day 4

Lesson 9: Explaining Networking Attacks and Mitigations

  • Topic A: Summarize Common Networking Attacks
  • Topic B: Explain the Characteristics of VLANs
  • Topic C: Explain the Characteristics of NAT and Port Forwarding

Lesson 10: Installing and Configuring Security Devices

  • Topic A: Install and Configure Firewalls and Proxies
    • LAB: Configuring a NAT Firewall
  • Topic B: Explain the Uses of IDS/IPS and UTM

Day 5

Lesson 11: Explaining Authentication and Access Controls

  • Topic A: Explain Authentication Controls and Attacks
  • Topic B: Explain the Uses of Authentication Protocols and Directory Services
    • LAB: Securing Appliance Administration with RADIUS Authentication
  • Topic C: Explain the Uses of Port Security and NAC
  • Topic D: Implement Network Device Hardening
  • Topic E: Explain Patch Management and Vulnerability Scanning Processes

Week 3 Dates: 23 – 25 November

Day 1

Lesson 12: Deploying and Troubleshooting Cabling Solutions

  • Topic A: Deploy Structured Cabling Systems
  • Topic B: Deploy Twisted Pair Cabling Solutions
  • Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions
  • Topic D: Deploy Fiber Optic Cabling Solutions

Lesson 13: Implementing and Troubleshooting Wireless Technologies

  • Topic A: Install and Configure Wireless Technologies
  • Topic B: Troubleshoot Wireless Performance Issues
  • Topic C: Secure and Troubleshoot Wireless Connectivity
    • LAB: Configuring a Wireless Router

Day 2

Lesson 14: Comparing and Contrasting WAN Technologies

  • Topic A: Compare and Contrast WAN Core Service Types
  • Topic B: Compare and Contrast WAN Subscriber Service Types
  • Topic C: Compare and Contrast WAN Framing Service Types
  • Topic D: Compare and Contrast Wireless and IoT WAN Technologies

Lesson 15: Using Remote Access Methods

  • Topic A: Use Remote Access VPNs
  • Topic B: Use Remote Access Management Methods
    • LAB: Configuring Secure Access Channels

Day 3

Lesson 16: Identifying Site Policies and Best Practices

  • Topic A: Manage Networks with Documentation and Diagrams
  • Topic B: Summarize the Purposes of Physical Security Devices
  • Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts
  • Topic D: Identify Policies and Best

Week 4 Dates: 30 November – 4 December

Day 1

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam

Day 2

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam

Day 3

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam

Day 4

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam
  • Exam Review/Expectations

The Total Cyber Security+ Course syllabus

The Network+ course is five (5) weeks long with 45 hours of Live Instructor led course and hands-on Instructor led Labs plus and Q and A sessions. The course is led by knowledgeable Instructors and include the online course of instruction, eBook and Hard cover book, Instructor led Labs as well as Instructor/SME led question and answer sessions.

Week 1 dates: 17 – 21 August

Day 1:

Domain 1.0 Threats, Attacks and Vulnerabilities
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
1.2 Compare and contrast types of attacks
1.2.1 Social Engineering
1.2.2 Application / Service attacks
1.2.3 Cryptographic attacks
1.2.4 Hijacking
1.2.5 Network / Wireless attacks
1.3 Explain threat actor types and attributes
1.3.1 Types of actors
1.3.2 Attributes of actors
1.4 Explain penetration testing concepts
1.4.1 Penetration testing process
1.4.1.1 Reconnaissance
1.4.1.2 Initial exploitation
1.4.1.3 Persistence
1.4.1.4 Pivot
1.4.1.5 Escalation of privilege
1.4.2 Penetration testing vs. Vulnerability scanning
1.4.3 Black box vs. Gray box vs. White box
1.5 Explain vulnerability scanning concepts
1.5.1 Identifying
1.5.1.1 Vulnerability / Unpatched system or application
1.5.1.2 Lack of security controls
1.5.1.3 common misconfigurations
1.5.2 Intrusive vs. non-intrusive
1.5.3 Credentialed vs. non-credentialed
1.6 Explain the impact associated with types of vulnerabilities
1.6.1 Configuration issues
1.6.2 Access control
1.6.3 Cryptography, certificate and key management
1.6.4 Application vulnerabilities
1.6.5 Application input handling
Domain 2.0 Technologies and Tools
2.1 Install and configure network components, both hardware and software-based, to support
organizational security
2.1.1 Network equipment: Router, Switch, Bridge, Load Balancer, Proxy
2.1.2 Gateways: Email, Media
2.1.3 Access Points
2.1.4 Firewall
2.1.5 NAC
2.1.6 VPN / SSL/TLS accelerators & decryptors
2.1.7 NIPS/ NIDS
2.1.8 DLP
2.1.9 SIEM
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization
2.2.1 Network scanners
2.2.2 Protocol analyzer
2.2.3 Wireless scanners / crackers
2.2.4 Exploitation frameworks
2.2.5 Passive vs Active
2.2.6 Scanners: Vulnerability, Configuration compliance and inventory
2.2.7 Password crackers
2.2.8 Backup Utilities
2.2.9 Honeypot / Honeynet
2.2.10 Steganography
2.2.11 Command line tools: Unix/Linux and Windows
2.3 Given a scenario, troubleshoot common security issues
2.3.1 Personnel
2.3.2 Asset Management / Misconfigured devices
2.3.3 Identity, Access, Authentication, Authorization and Audit (IAAAA)
2.3.4 Encryption
2.4 Given a scenario, analyze and interpret output from security technologies
2.4.1 Network security technologies
2.4.2 Host security technologies
2.4.3 Data security technologies
2.5 Given a scenario, deploy mobile devices securely
2.5.1 Connection methods
2.5.2 Mobile device management concepts
2.5.3 Enforcement and monitoring
2.5.4 Deployment models
2.6 Given a scenario, implement secure protocols
2.6.1 Protocols
2.6.2 Use cases
Domain 3.0 Architecture and Design
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
3.1.1 Industry-standard frameworks and reference architectures
3.1.2 Benchmarks/secure configuration guides
3.1.3 Defense-in-depth/layered security
3.2 Given a scenario, implement secure network architecture concepts.
3.2.1 Zones/topologies
3.2.2 Segregation/segmentation/isolation
3.2.3 VPN / Tunneling
3.2.4 Security device/technology placement
3.2.5 Software Defined Networks (SDN)
3.3 Given a scenario, implement secure systems design
3.3.1 Hardware/firmware security
3.3.2 Operating System Security
3.3.3 Peripherals
3.4 Explain the importance of secure staging deployment concepts.
3.4.1 Secure baseline
3.4.2 Sandboxing
3.4.3 Environment
3.4.4 Integrity measurement
3.5 Explain the security implications of embedded systems.
3.5.1 ICS / SCADA
3.5.2 IoT / Smart Devices
3.5.3 Printers / MFDs
3.5.4 Camera systems
3.5.5 Special purpose
3.6 Summarize secure application development and deployment concepts.
3.6.1 Development life-cycle models
3.6.2 Secure DevOps / SecDevOps
3.6.3 Version control and change management
3.6.4 Provisioning and deprovisioning
3.6.5 Secure coding techniques
3.6.6 Code quality and testing
3.7 Summarize cloud and virtualization concepts.
3.7.1 Hypervisor
3.7.2 Virtual Machine (VM)
3.7.3 Cloud computing
3.7.3.1 Deployment models
3.7.3.2 Storage
3.7.3.3 Access
3.8 Explain how resiliency and automation strategies reduce risk.
3.8.1 Automation/scripting
3.8.2 Master image
3.8.3 Non-persistence
3.8.4 Forms and functions
3.9 Explain the importance of physical security controls.
Domain 4.0 Identity and Access Management
4.1 Compare and contrast identity and access management concepts.
4.1.1 Identification, authentication, authorization and accounting (AAA)
4.1.2 Multifactor authentication
4.1.3 Single Sign-On (SSO) / Federation
4.2 Given a scenario, install and configure identity and access services.
4.3 Given a scenario, implement identity and access management controls.
4.3.1 Access Control Models
4.3.2 Physical Access Control
4.3.3 Biometrics
4.3.4 Tokens
4.3.5 Certificate-based authentication
4.3.6 Authorization: file-system and database
4.4 Given a scenario, differentiate common account management practices.
4.4.1 General concepts
4.4.2 Account types
4.4.3 Account policy enforcement
Domain 5.0 Risk Management
5.1 Explain the importance of policies, plans and procedures related to organizational security.
5.1.1 Standard operating procedures
5.1.2 Agreement types
5.1.3 Personnel management
5.1.4 General security policies
5.2 Summarize business impact analysis concepts.
5.3 Explain risk management processes and concepts.
5.3.1 Threat assessment
5.3.2 Risk assessment
5.3.3 Change management
5.4 Given a scenario, follow incident response procedures.
5.4.1 Incident response plan
5.4.2 Incident response process
5.5 Summarize basic concepts of forensics.
5.5.1 Data acquisition
5.5.2 Preservation / Order of volatility
5.5.3 Chain of custody
5.5.4 Legal hold
5.5.5 Recovery
5.6 Explain disaster recovery and continuity of operations concepts.
5.6.1 Backup concepts
5.6.2 Geographic considerations
5.6.3 Continuity of operations planning
5.6.4 Recovery sites
5.6.5 Order of restoration
5.7 Compare and contrast various types of controls.
5.7.1 Administrative
5.7.2 Technical
5.7.3 Physical
5.7.4 Corrective
5.7.5 Preventive
5.7.6 Detective
5.7.7 Deterrent
5.7.8 Compensating
5.8 Given a scenario, carry out data security and privacy practices
5.8.1 Data sensitivity labeling and handling
5.8.2 Data roles
5.8.3 Data destruction and media sanitization
5.8.4 Legal and compliance
Domain 6.0 Cryptography and PKI
6.1 Compare and contrast basic concepts of cryptography.
6.1.1 Symmetric algorithms
6.1.2 Asymmetric algorithms
6.1.3 Hashing
6.1.4 Keys and key exchange
6.1.5 Digital signatures
6.1.6 Common use cases
6.2 Explain cryptography algorithms and their basic characteristics.
6.2.1 Symmetric algorithms
6.2.2 Cipher modes
6.2.3 Asymmetric algorithms
6.2.4 Hashing algorithms
6.3 Given a scenario, install and configure wireless security settings.
6.3.1 Cryptographic protocols
6.3.2 Authentication protocols
6.3.3 Methods
6.4 Given a scenario, implement public key infrastructure.
6.4.1 Components
6.4.2 Concepts
6.4.3 Types of certificates
6.4.4 Certificate formats