What you'll learn
- Having confidence in passing the CompTIA A+ certification test
- Understand computer security, including its functions and components
- Perform fundamental security configurations
- Topologies of networks
- Threat assessment
Who is this course for
- Anyone looking to pass CompTIA A+ 220-1001 exam and get the CompTIA A+ Certification
- Anyone who wants to advance their career as a computer or IT technician
- Anyone with interest in security
- Those who have a basic understanding of security and want to expand their expertise
- Those who have a career objective in the sector of the security
- Those who want to get into the realm of security
After finishing this course, you will have a thorough understanding of computer security and be able to better protect your company's data.
With this, you can get free access to
- Course Materials for Life
- Expertise in all elements of computer security and CompTIA A+ certification test
About Us
Over 100,000 students have received instruction from this online academy in topics including Lift Style, Fitness Training, Cyber Security, Ethical Hacking, Facebook Ads, SEO, Email Marketing, eCommerce, Business Investing, Social Media Marketing, Launching Your Own Business, and Marketing/Ad Agency!
We provide a wide variety of top-notch online courses that educate through real-world examples from subject matter experts and tried-and-true research, all supported by top-notch, studio vocally narrated videos! Teaching practical life skills, which are crucial in today's environment, is the focus.
Every course offered by this online learning academy is instructed by subject-matter specialists who genuinely love what they do and want to share it with others.
Course Curriculum
- 2. Content of the Network Fundamentals (1:07)
- 3. Basic Terms of Networking (5:36)
- 4. Reference Models (0:24)
- 5. TCPIP (Networking) Basics (13:43)
- 6. OSI Reference Model vs. TCPIP Reference Model (2:33)
- 7. Network Layers in Real World (7:59)
- 8. Layer 2 - Data Link Layer (3:50)
- 9. Layer 2 Ethernet - Principles, Frames & Headers (4:06)
- 10. Layer 2 ARP - Address Resolution Protocol (6:10)
- 11. Layer 2 Analysing ARP Packets (3:14)
- 12. Layer 2 VLANs (Virtual Local Area Networks) (4:03)
- 13. Layer 2 WLANs (Wireless Local Area Networks) (7:01)
- 14. Layer 3 - Network Layer (1:37)
- 15. Layer 3 IP (Internet Protocol) (2:49)
- 16. Layer 3 IPv4 Addressing System (1:56)
- 17. Layer 3 IPv4 Packet Header (2:56)
- 18. Layer 3 Subnetting - Classful Networks (2:35)
- 19. Layer 3 Subnetting Masks (2:59)
- 20. Layer 3 Understanding IPv4 Subnets (3:09)
- 21. Layer 3 IPv4 Address Shortage (1:41)
- 22. Layer 3 Private Networks (3:59)
- 23. Layer 3 Private Networks - Demonstration (3:01)
- 24. Layer 3 NAT (Network Address Translation) (4:30)
- 25. Layer 3 IPv6, Packet Header & Addressing (8:30)
- 26. Layer 3 DHCP - How the Mechanism Works (9:23)
- 27. Layer 3 ICMP (Internet Control Message Protocol) (2:02)
- 28. Layer 3 Traceroute (9:51)
- 29. Layer 4 - Transport Layer (2:40)
- 30. Layer 4 TCP (Transmission Control Protocol) (6:59)
- 31. Layer 4 TCP Header (2:27)
- 32. Layer 4 UDP (User Datagram Protocol) (3:56)
- 33. Layer 5-7 - Application Layer (0:55)
- 34. Layer 7 DNS (Domain Name System) (5:56)
- 35. Layer 7 HTTP (Hyper Text Transfer Protocol) (3:09)
- 36. Layer 7 HTTPS (1:56)
- 37. GNS3 - Graphical Network Simulator (3:30)
- 38. GNS3 Setting Up the First Project (7:57)
- 39. GNS3 Tool Components (2:56)
- 40. GNS3 Building the Network (15:45)
- 41. GNS3 Attaching VMware VMs (Including Kali) to the Network (6:31)
- 42. GNS3 Configuring Switch & Router (Cisco) and creating VLANs (5:13)
- 43. Active Network Devices Router, Switch, Hub (4:44)
- 44. Wireless Access Point(WAP) (1:06)
- 45. Summary of Network Fundamentals (1:23)
- 1. View the File with more Command (2:22)
- 2. View the File with less Command (1:23)
- 3. Print First Lines with head Command (1:15)
- 4. Print Last Lines with tail Command (1:39)
- 5. Global Regular Expression Print - grep Command (3:35)
- 6. Unix Name - uname Command (0:47)
- 7. Output Redirection (2:37)
- 8. Output Redirection Pipe “” (2:17)
- 9. Make Directory - mkdir Command (1:22)
- 10. Create File & Modify Date - touch Command (1:20)
- 11. Remove Files or Directories - rm Command (2:07)
- 12. Copy and Move Files or Directories - cp & mv Command (1:58)
- 13. Find Files and Directories - find Command (2:24)
- 14. Cut Parts of Lines - cut Command (2:51)
- 15. Change Ownership of a Given File - chown Command (1:32)
- 1. Characteristics of Cloud Computing (9:19)
- 2. What is Cloud Computing (3:38)
- 3. Cloud Service Modules - 1 (7:31)
- 4. Cloud Service Modules - 2 (6:27)
- 5. What is Cloud Security (3:33)
- 6. How does cloud security work (3:19)
- 7. What makes cloud security different (3:24)
- 8. Why is cloud security important (2:26)
- 9. Cloud Security Benefits& Disadvantages (7:14)
- 1. What is Security (2:23)
- 2. Privacy-Integrity-Availability (3:15)
- 3. Encryption and Access Control (2:54)
- 4. A Rule (Authentication, Authorization and Accounting) (3:53)
- 5. What is a Hacker (6:27)
- 6. What is Attack What are the Stages (3:19)
- 7. Terms Asset, Threat, Vulnerability, Risk, Exploit (3:08)
- 8. What is a Zero-day Attack (4:19)
- 9. What are BotBotnet and Zombies (1:45)
- 10. What are DoS and DDoS Attacks (2:57)
- 11. Malware Types (1:45)
Frequently Asked Questions
When does the course start and finish?
The course has begun and will never stop! You set the start and end dates for this entirely self-paced online course.
How long do I have access to the course?
Lifetime access—how does that sound? You receive unrestricted access to this course after registering for as long as you like, on any device you own.
Do I get a certificate?
Yes, when you complete the course, you will receive a certificate of completion which you can happily add to your resume or LinkedIn profile.
Can I cancel my subscription?
Yes you can. You have a 15-days money-back guarantee.