Course Syllabi

Preview our Course Syllabus for all our CompTIA courses

  • Network+ Sylabus
  • Security+ Sylabus
  • Certified Ethical Hacker Sylabus
  • Certified Network Defender Sylabus
  • Desktop Support Program
  • Cybersecurity Engineer Program
  • Penetration Tester Program
  • Data Analytics with Python Program

The Network+ course is five (5) weeks long with 45 hours of Live Instructor-led course and hands-on Instructor-led Labs plus Q and A sessions.  The course is led by knowledgeable Instructors and includes the online course of instruction, eBook, Instructor-led Labs as well as Instructor/SME-led question and answer sessions.  Instructor will display demos and additional material to better prepare the student for both the exam and content material.

Week 1

Day 1

    Introduction to Total Cyber and the Network+ course

    CompTIA MasterCert Registration

    Exam Expectations and Review of Material

Lesson 1: Explaining the OSI and TCP/IP Models

  • Topic A: Explain OSI Model Layers
  • Topic B: Explain the TCP/IP Suite

Lesson 2: Explaining Properties of Network Traffic

  • Topic A: Explain Media Types and Access Methods
  • Topic B: Deploy Ethernet Standards
  • Topic C: Configure and Monitor Network Interfaces
    • LAB: Exploring the Lab Environment
    • LAB: Configuring Ethernet Networking

Day 2

Lesson 3: Installing and Configuring Switched Networks

  • Topic A: Install and Configure Hubs and Bridges
  • Topic B: Install and Configure Switches
  • Topic C: Compare and Contrast Network Topologies
  • Topic D: Compare and Contrast Network Types
    • LAB: Designing a Switch Topology

Day 3

Lesson 4: Configuring IP Networks

  • Topic A: Configure IPv4 Addressing Components
  • Topic B: Test IP Interfaces with Command Line Tools
    • LAB: Configuring IPv4 Networking
  • Topic C: Configure IPv4 Subnets
    • LAB: Designing an IP Subnet
    • LAB: Configuring IPv4 Subnets
  • Topic D: Configure Private and Public IPv4 Addressing Schemes
    • LAB: Designing VLSM Subnets

Day4

Lesson 4: Configuring IP Networks

  • Topic E: Configure IPv6 Addressing Components
    • LAB: Configuring IPv6 Networking
  • Topic F: Configure DHCP Services
    • LAB: Configuring Address Assignments

Lesson 5: Installing and Configuring Routed Networks

  • Topic A: Explain Characteristics of Routing
    • LAB: Designing a Branch Office Internetwork
  • Topic B: Install and Configure Routers
    • LAB: Configuring Routing

Week 2

Day 1

Lesson 6: Configuring and Monitoring Ports and Protocols

  • Topic A: Explain the Uses of Ports and Protocols
  • Topic B: Use Port Scanners and Protocol Analyzers
    • LAB: Using Port Scanning Tools
  • Topic C: Explain the Use of Name Resolution Services
  • Topic D: Configure DNS and IPAM Services
    • LAB: Configuring DNS Servers

Day 2

Lesson 7: Explaining Network Application and Storage Services

  • Topic A: Explain the Uses of Network Applications
    • LAB: Configuring Application Protocols
  • Topic B: Explain the Uses of Voice Services and Advanced Networking Devices
  • Topic C: Explain the Uses of Virtualization and Network Storage Services
  • Topic D: Summarize the Concepts of Cloud Services

Day 3

Lesson 8: Monitoring and Troubleshooting Networks

  • Topic A: Monitor Network Interfaces and Logs
    • LAB: Using Event Management and Performance Monitors
  • Topic B: Explain Network Troubleshooting Methodology
  • Topic C: Troubleshoot Common Network Services Issues
    • LAB: Troubleshooting Network Issues

Day 4

Lesson 9: Explaining Networking Attacks and Mitigations

  • Topic A: Summarize Common Networking Attacks
  • Topic B: Explain the Characteristics of VLANs
  • Topic C: Explain the Characteristics of NAT and Port Forwarding

Lesson 10: Installing and Configuring Security Devices

  • Topic A: Install and Configure Firewalls and Proxies
    • LAB: Configuring a NAT Firewall
  • Topic B: Explain the Uses of IDS/IPS and UTM

Day 5

Lesson 11: Explaining Authentication and Access Controls

  • Topic A: Explain Authentication Controls and Attacks
  • Topic B: Explain the Uses of Authentication Protocols and Directory Services
    • LAB: Securing Appliance Administration with RADIUS Authentication
  • Topic C: Explain the Uses of Port Security and NAC
  • Topic D: Implement Network Device Hardening
  • Topic E: Explain Patch Management and Vulnerability Scanning Processes

Week 3

Day 1

Lesson 12: Deploying and Troubleshooting Cabling Solutions

  • Topic A: Deploy Structured Cabling Systems
  • Topic B: Deploy Twisted Pair Cabling Solutions
  • Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions
  • Topic D: Deploy Fiber Optic Cabling Solutions

Lesson 13: Implementing and Troubleshooting Wireless Technologies

  • Topic A: Install and Configure Wireless Technologies
  • Topic B: Troubleshoot Wireless Performance Issues
  • Topic C: Secure and Troubleshoot Wireless Connectivity
    • LAB: Configuring a Wireless Router

Day 2

Lesson 14: Comparing and Contrasting WAN Technologies

  • Topic A: Compare and Contrast WAN Core Service Types
  • Topic B: Compare and Contrast WAN Subscriber Service Types
  • Topic C: Compare and Contrast WAN Framing Service Types
  • Topic D: Compare and Contrast Wireless and IoT WAN Technologies

Lesson 15: Using Remote Access Methods

  • Topic A: Use Remote Access VPNs
  • Topic B: Use Remote Access Management Methods
    • LAB: Configuring Secure Access Channels

Day 3

Lesson 16: Identifying Site Policies and Best Practices

  • Topic A: Manage Networks with Documentation and Diagrams
  • Topic B: Summarize the Purposes of Physical Security Devices
  • Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts
  • Topic D: Identify Policies and Best

Week 4

Day 1

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam

Day 2

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam

Day 3

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam

Day 4

Remedial Review of lessons covered.

  • Q&A with Instructor
  • Additional Lab environments through CompTIA and Instructor demo
  • Practice Exam
  • Exam Review/Expectations

The Total Cyber Security+ Course syllabus

The Network+ course is five (5) weeks long with 45 hours of Live Instructor led course and hands-on Instructor led Labs plus and Q and A sessions. The course is led by knowledgeable Instructors and include the online course of instruction, eBook and Hard cover book, Instructor led Labs as well as Instructor/SME led question and answer sessions.

Domain 1.0 Threats, Attacks and Vulnerabilities
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
1.2 Compare and contrast types of attacks
1.2.1 Social Engineering
1.2.2 Application / Service attacks
1.2.3 Cryptographic attacks
1.2.4 Hijacking
1.2.5 Network / Wireless attacks
1.3 Explain threat actor types and attributes
1.3.1 Types of actors
1.3.2 Attributes of actors
1.4 Explain penetration testing concepts
1.4.1 Penetration testing process
1.4.1.1 Reconnaissance
1.4.1.2 Initial exploitation
1.4.1.3 Persistence
1.4.1.4 Pivot
1.4.1.5 Escalation of privilege
1.4.2 Penetration testing vs. Vulnerability scanning
1.4.3 Black box vs. Gray box vs. White box
1.5 Explain vulnerability scanning concepts
1.5.1 Identifying
1.5.1.1 Vulnerability / Unpatched system or application
1.5.1.2 Lack of security controls
1.5.1.3 common misconfigurations
1.5.2 Intrusive vs. non-intrusive
1.5.3 Credentialed vs. non-credentialed
1.6 Explain the impact associated with types of vulnerabilities
1.6.1 Configuration issues
1.6.2 Access control
1.6.3 Cryptography, certificate and key management
1.6.4 Application vulnerabilities
1.6.5 Application input handling
Domain 2.0 Technologies and Tools
2.1 Install and configure network components, both hardware and software-based, to support
organizational security
2.1.1 Network equipment: Router, Switch, Bridge, Load Balancer, Proxy
2.1.2 Gateways: Email, Media
2.1.3 Access Points
2.1.4 Firewall
2.1.5 NAC
2.1.6 VPN / SSL/TLS accelerators & decryptors
2.1.7 NIPS/ NIDS
2.1.8 DLP
2.1.9 SIEM
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization
2.2.1 Network scanners
2.2.2 Protocol analyzer
2.2.3 Wireless scanners / crackers
2.2.4 Exploitation frameworks
2.2.5 Passive vs Active
2.2.6 Scanners: Vulnerability, Configuration compliance and inventory
2.2.7 Password crackers
2.2.8 Backup Utilities
2.2.9 Honeypot / Honeynet
2.2.10 Steganography
2.2.11 Command line tools: Unix/Linux and Windows
2.3 Given a scenario, troubleshoot common security issues
2.3.1 Personnel
2.3.2 Asset Management / Misconfigured devices
2.3.3 Identity, Access, Authentication, Authorization and Audit (IAAAA)
2.3.4 Encryption
2.4 Given a scenario, analyze and interpret output from security technologies
2.4.1 Network security technologies
2.4.2 Host security technologies
2.4.3 Data security technologies
2.5 Given a scenario, deploy mobile devices securely
2.5.1 Connection methods
2.5.2 Mobile device management concepts
2.5.3 Enforcement and monitoring
2.5.4 Deployment models
2.6 Given a scenario, implement secure protocols
2.6.1 Protocols
2.6.2 Use cases
Domain 3.0 Architecture and Design
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
3.1.1 Industry-standard frameworks and reference architectures
3.1.2 Benchmarks/secure configuration guides
3.1.3 Defense-in-depth/layered security
3.2 Given a scenario, implement secure network architecture concepts.
3.2.1 Zones/topologies
3.2.2 Segregation/segmentation/isolation
3.2.3 VPN / Tunneling
3.2.4 Security device/technology placement
3.2.5 Software Defined Networks (SDN)
3.3 Given a scenario, implement secure systems design
3.3.1 Hardware/firmware security
3.3.2 Operating System Security
3.3.3 Peripherals
3.4 Explain the importance of secure staging deployment concepts.
3.4.1 Secure baseline
3.4.2 Sandboxing
3.4.3 Environment
3.4.4 Integrity measurement
3.5 Explain the security implications of embedded systems.
3.5.1 ICS / SCADA
3.5.2 IoT / Smart Devices
3.5.3 Printers / MFDs
3.5.4 Camera systems
3.5.5 Special purpose
3.6 Summarize secure application development and deployment concepts.
3.6.1 Development life-cycle models
3.6.2 Secure DevOps / SecDevOps
3.6.3 Version control and change management
3.6.4 Provisioning and deprovisioning
3.6.5 Secure coding techniques
3.6.6 Code quality and testing
3.7 Summarize cloud and virtualization concepts.
3.7.1 Hypervisor
3.7.2 Virtual Machine (VM)
3.7.3 Cloud computing
3.7.3.1 Deployment models
3.7.3.2 Storage
3.7.3.3 Access
3.8 Explain how resiliency and automation strategies reduce risk.
3.8.1 Automation/scripting
3.8.2 Master image
3.8.3 Non-persistence
3.8.4 Forms and functions
3.9 Explain the importance of physical security controls.
Domain 4.0 Identity and Access Management
4.1 Compare and contrast identity and access management concepts.
4.1.1 Identification, authentication, authorization and accounting (AAA)
4.1.2 Multifactor authentication
4.1.3 Single Sign-On (SSO) / Federation
4.2 Given a scenario, install and configure identity and access services.
4.3 Given a scenario, implement identity and access management controls.
4.3.1 Access Control Models
4.3.2 Physical Access Control
4.3.3 Biometrics
4.3.4 Tokens
4.3.5 Certificate-based authentication
4.3.6 Authorization: file-system and database
4.4 Given a scenario, differentiate common account management practices.
4.4.1 General concepts
4.4.2 Account types
4.4.3 Account policy enforcement
Domain 5.0 Risk Management
5.1 Explain the importance of policies, plans and procedures related to organizational security.
5.1.1 Standard operating procedures
5.1.2 Agreement types
5.1.3 Personnel management
5.1.4 General security policies
5.2 Summarize business impact analysis concepts.
5.3 Explain risk management processes and concepts.
5.3.1 Threat assessment
5.3.2 Risk assessment
5.3.3 Change management
5.4 Given a scenario, follow incident response procedures.
5.4.1 Incident response plan
5.4.2 Incident response process
5.5 Summarize basic concepts of forensics.
5.5.1 Data acquisition
5.5.2 Preservation / Order of volatility
5.5.3 Chain of custody
5.5.4 Legal hold
5.5.5 Recovery
5.6 Explain disaster recovery and continuity of operations concepts.
5.6.1 Backup concepts
5.6.2 Geographic considerations
5.6.3 Continuity of operations planning
5.6.4 Recovery sites
5.6.5 Order of restoration
5.7 Compare and contrast various types of controls.
5.7.1 Administrative
5.7.2 Technical
5.7.3 Physical
5.7.4 Corrective
5.7.5 Preventive
5.7.6 Detective
5.7.7 Deterrent
5.7.8 Compensating
5.8 Given a scenario, carry out data security and privacy practices
5.8.1 Data sensitivity labeling and handling
5.8.2 Data roles
5.8.3 Data destruction and media sanitization
5.8.4 Legal and compliance
Domain 6.0 Cryptography and PKI
6.1 Compare and contrast basic concepts of cryptography.
6.1.1 Symmetric algorithms
6.1.2 Asymmetric algorithms
6.1.3 Hashing
6.1.4 Keys and key exchange
6.1.5 Digital signatures
6.1.6 Common use cases
6.2 Explain cryptography algorithms and their basic characteristics.
6.2.1 Symmetric algorithms
6.2.2 Cipher modes
6.2.3 Asymmetric algorithms
6.2.4 Hashing algorithms
6.3 Given a scenario, install and configure wireless security settings.
6.3.1 Cryptographic protocols
6.3.2 Authentication protocols
6.3.3 Methods
6.4 Given a scenario, implement public key infrastructure.
6.4.1 Components
6.4.2 Concepts
6.4.3 Types of certificates
6.4.4 Certificate formats

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

Course Outline:

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

Learn the skills that matter! EC-Council’s vendor-neutral network security certifications provide an unbiased approach to learning secure networking practices, as well as how to analyze and harden computing systems prevalent in the current IT infrastructure.

CND v2 has earned a reputation as the only program in the market that is 100% focused on network security and defense.

IT professionals need to be part of the cybersecurity ecosystem, especially in a post-COVID Digital Transformation era. If you think cybersecurity is the responsibility of cyber teams alone, think again!

Certified Network Defender v2 has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats, while leveraging Threat Intelligence to Predict them before they happen. CND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.

Course Outline:

Module 01: Network Attacks and Defense Strategies
Module 02: Administrative Network Security
Module 03: Technical Network Security
Module 04: Network Perimeter Security
Module 05: Endpoint Security-Windows Systems
Module 06: Endpoint Security-Linux Systems
Module 07: Endpoint Security- Mobile Devices
Module 08: Endpoint Security-IoT Devices
Module 09: Administrative Application Security
Module 10: Data Security
Module 11: Enterprise Virtual Network Security
Module 12: Enterprise Cloud Network Security
Module 13: Enterprise Wireless Network Security
Module 14: Network Traffic Monitoring and Analysis
Module 15: Network Logs Monitoring and Analysis
Module 16: Incident Response and Forensic Investigation
Module 17: Business Continuity and Disaster Recovery
Module 18: Risk Anticipation with Risk Management
Module 19: Threat Assessment with Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence

In the Desktop support program students will learn: 

Fundamentals of Information Technology  

Students will learn how to address issues including: 

IT Concepts and Terminology 

Infrastructure Setup 

Applications & Software 

Software Development 

Database Fundamentals 

Security Essentials 

  

Fundamentals and intermediate skills of Software and Hardware support 

Students will learn how to address issues including: 

Hardware 

Operating Systems 

Software Troubleshooting 

Networking 

Hardware & Network Troubleshooting 

Security 

Mobile Devices 

Virtualization & Cloud Computing 

Operational Procedures 

  

End User Awareness 

Students will learn how to address issues including: 

Information Protection 

Cyber Terrorism 

Social Engineering 

Remote Worker Security 

Virus Protection 

Password Security 

Web Browser Security 

Email Security 

Instant Messaging Security 

Telephone Security 

Mobile Security 

  

Intermediate Network Concepts 

Students will learn how to address issues including: 

Networking Concepts 

Infrastructure 

Network Operations 

Network Security 

Network Troubleshooting & Tools 

  

Intermediate Security Concepts 

Students will learn how to address issues including: 

Attacks, Threats and Vulnerabilities 

Architecture and Design 

Implementation 

Operations and Incident Response 

Governance, Risk and Compliance

In the Cybersecurity Engineer Program students will learn: 

Fundamentals of Information Technology 

Students will learn how to address issues including: 

IT Concepts and Terminology 

Infrastructure Setup 

Applications & Software 

Software Development 

Database Fundamentals 

Security Essentials 

  

Intermediate Network Concepts 

Students will learn how to address issues including: 

Networking Concepts 

Infrastructure 

Network Operations 

Network Security 

Network Troubleshooting & Tools 

  

Intermediate Security Concepts 

Students will learn how to address issues including: 

Attacks, Threats and Vulnerabilities 

Architecture and Design 

Implementation 

Operations and Incident Response 

Governance, Risk and Compliance 

  

Cloud Computing 

Students will learn how to address issues including: 

Cloud Architecture & Design 

Cloud Security 

Cloud Deployment 

Operations & Support 

Troubleshooting 

  

Operating System and Server and Workstation Concepts 

Students will learn how to address issues including: 

  

Vulnerability Assessment and Risk Management 

Students will learn how to address issues including: 

Vulnerability Assessment Frameworks 

Vulnerability Assessment Techniques 

Vulnerability Assessment Tools 

Detect and Respond to Vulnerabilities 

Preform a Vulnerability Assessment 

  

Cyber Policy and Compliance 

Students will learn how to address issues including: 

Risk Assessment Fundamentals 

Steps to Risk Assessment Process 

Risk Assessment Procedures 

Risk Reduction and Management 

  

Critical Controls 

Students will learn how to address issues including: 

  

Security and Network Operations Center Concepts 

Students will learn how to address issues including: 

Fundamentals of Security and Network Operations Center 

Incident Detection and Response 

Security Event and Information Management (SEIM) or 

Security information and event management (SIEM) 

SEIM Deployment and Operations 

In the Penetration Tester Program students will learn: 

Intermediate Network Concepts 

Students will learn how to address issues including: 

Networking Concepts 

Infrastructure 

Network Operations 

Network Security 

Network Troubleshooting & Tools 

  

Intermediate Security Concepts 

Students will learn how to address issues including: 

Attacks, Threats and Vulnerabilities 

Architecture and Design 

Implementation 

Operations and Incident Response 

Governance, Risk and Compliance 

  

Vulnerability Assessment 

Students will learn how to address issues including: 

Vulnerability Assessment Frameworks 

Vulnerability Assessment Techniques 

Vulnerability Assessment Tools 

Detect and Respond to Vulnerabilities 

Preform a Vulnerability Assessment 

  

Fundamentals of Ethical Hacking and Penetration Testing 

Students will learn how to address issues including: 

Emerging Attack Vectors 

Enumeration 

Malware and Reverse Engineering 

Cloud Computing 

Hacking Web Applications 

Operation Technologies 

WIFI Cracking 

Penetration testing Labs 

  

Intermediate Ethical Hacking and Penetration Testing 

Students will learn how to address issues including: 

Planning & Scoping 

Information Gathering & Vulnerability Identification 

Attacks & Exploits 

Penetration Testing Tools 

Reporting & Communication 

Ethical Hacking Labs 

  

  

Advanced Ethical Hacking and Penetration Testing 

Students will learn how to address issues including: 

Penetration Testing: What You Should Know 

Getting Comfortable with Kali Linux 

Command Line Fun 

Practical Tools 

Bash Scripting 

Passive Information Gathering 

Active Information Gathering 

Vulnerability Scanning 

Web Application Attacks 

Introduction to Buffer Overflows 

Windows Buffer Overflows 

Linux Buffer Overflows 

Client-Side Attacks 

Locating Public Exploits 

Fixing Exploits 

File Transfers 

Antivirus Evasion 

Privilege Escalation 

Password Attacks 

Port Redirection and Tunneling 

Active Directory Attacks 

The Metasploit Framework 

PowerShell Empire 

Penetration Testing Labs

Python Fundamentals 

Students will learn how to address issues including: 

Installing the latest version of Python 

Working with Jupyter Notebooks 

Python data types, operators, and variable names 

Python strings, lists, ranges, and constructors 

Controlling the flow of Python programs 

Modularizing code with functions 

Handling data with tuples, sets, and dictionaries 

Developing Python modules 

Encapsulation with Python classes 

Building an intelligent Texas Hold’em Poker application 

  

Data Analysis 

Students will learn how to address issues including: 

Introduction to pandas 

Selecting subsets of data 

Essential pandas commands 

Grouping data with pandas 

Analyzing time series data 

Exploring text with regular expressions 

Cleaning and transforming data 

Joining multiple datasets together 

Building professional data analytics reports 

  

SQL 

Students will learn how to address issues including: 

Connecting to SQL databases 

Querying databases with the SELECT statement 

Translating pandas to SQL 

  

Data visualization 

Students will learn how to address issues including: 

Learning the data visualization landscape in Python 

Building interactive data analytics dashboards