Curriculum
- 24 Sections
- 143 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Week 1Introduction to Information Security Governance8
- 1.1Overview of CompTIA A+ Certification60 Minutes
- 1.2Understanding IT Job Roles and Responsibilities60 Minutes
- 1.3Mobile Device Types: Smartphones, Tablets, Laptops, Wearables60 Minutes
- 1.4Device Configurations & Setup (iOS, Android, Windows)
- 1.5Laptop Hardware Components: Motherboards, RAM, SSDs, Batteries
- 1.6Laptop Displays: LCD, LED, OLED, Touchscreens
- 1.7Power Management: AC Adapters, Battery Life Optimization
- 1.8Hands-on Lab: Configuring Mobile Device Settings & Features
- Week 2Mobile Device Maintenance & Connectivity8
- 2.1Mobile Device Accessories: Docking Stations, Headsets, Stylus60 Minutes
- 2.2Wireless Connectivity: Bluetooth, NFC, Wi-Fi60 Minutes
- 2.3Synchronization Methods: Cloud Sync, Local Sync, USB Sync60 Minutes
- 2.4Secure Mobile Devices: Screen Locks, Biometrics, Remote Wipe
- 2.5Device Hardening: Encryption, VPNs, App Permissions
- 2.6Mobile OS Updates & Patch Management
- 2.7Troubleshooting Mobile Devices: Slow Performance, Battery Issues
- 2.8Hands-on Lab: Configuring a Mobile VPN & Security Settings
- Week 3Networking Concepts & Infrastructure9
- 3.1OSI Model: 7 Layers Explained60 Minutes
- 3.2IP Addressing: IPv4 vs. IPv660 Minutes
- 3.3Subnetting Basics & CIDR Notation60 Minutes
- 3.4Networking Devices: Routers, Switches, Hubs, Access Points60 Minutes
- 3.5Wireless Standards: 802.11a/b/g/n/ac/ax
- 3.6Enterprise Risk Management (ERM)Copy
- 3.7Networking Cables & Connectors: UTP, STP, Fiber, Coaxial
- 3.8Network Topologies: Star, Mesh, Bus, Ring
- 3.9Hands-on Lab: Setting Up a Small Office/Home Network
- week 4Networking Security & Troubleshooting8
- 4.1Firewalls & Network Security Basics
- 4.2Wireless Encryption: WPA2, WPA3, AES
- 4.3Configuring a Router for Security (MAC Filtering, SSID Hiding)
- 4.4Common Network Protocols: HTTP, HTTPS, FTP, SSH, RDP
- 4.5Network Troubleshooting Commands: Ping, Tracert, Nslookup
- 4.6Diagnosing Connectivity Issues: DNS, DHCP, IP Conflicts
- 4.7Setting Up a VPN for Remote Access
- 4.8Hands-on Lab: Configuring a Firewall and Wi-Fi Security
- week 5Networking Advanced & Virtualization Basics8
- 5.1VPN Concepts & Implementation
- 5.2VLANs & Network Segmentation
- 5.3Quality of Service (QoS) in Networks
- 5.4Intro to Virtualization: VMs, Hypervisors, Containers
- 5.5Cloud Computing Models: IaaS, PaaS, SaaS
- 5.6Configuring a Virtual Machine (VMware, VirtualBox)
- 5.7Cloud Storage Solutions: Google Drive, OneDrive, Dropbox
- 5.8Hands-on Lab: Setting Up a Virtual Machine & Cloud Storage
- week 6Network Troubleshooting Scenarios8
- 6.1Diagnosing Slow Internet & Wi-Fi Issues
- 6.2Fixing Limited Connectivity Errors
- 6.3Troubleshooting Wired vs. Wireless Networks
- 6.4Diagnosing DHCP & DNS Issues
- 6.5Analyzing Network Logs & Packet Captures
- 6.6Using Network Monitoring Tools
- 6.7Troubleshooting VPN Connectivity
- 6.8Hands-on Lab: Real-World Network Troubleshooting
- week 7Computer Components & Peripherals8
- 7.1Motherboards & Chipsets
- 7.2CPUs & Cooling Systems
- 7.3RAM Types & Memory Speeds
- 7.4Storage Devices: HDDs, SSDs, NVMe, RAID
- 7.5Power Supplies & Wattage Calculations
- 7.6Expansion Cards: GPUs, Sound Cards, NICs
- 7.7I/O Ports: USB, HDMI, Thunderbolt, DisplayPort
- 7.8Hands-on Lab: Assembling a PC & Upgrading Components
- week 8Printer Technologies & Maintenance8
- 8.1Inkjet vs. Laser Printers
- 8.2Impact & Thermal Printers
- 8.3Printer Troubleshooting (Paper Jams, Streaks, Ghosting)
- 8.4Print Server Configuration
- 8.5Wireless Printing: AirPrint, Google Cloud Print
- 8.6Replacing Ink, Toner & Print Heads
- 8.7Print Queue Management & Drivers
- 8.8Hands-on Lab: Setting Up a Network Printer
- week 9Security Metrics and Reporting8
- 9.1Key Performance Indicators (KPIs) for SecurityCopy
- 9.2Security Dashboard and Metrics ReportingCopy
- 9.3Aligning Security Metrics with Business ObjectivesCopy
- 9.4Measuring the Effectiveness of Security ControlsCopy
- 9.5Security Budget Planning Based on MetricsCopy
- 9.6Continuous Security Improvement Based on MetricsCopy
- 9.7Benchmarking Security PerformanceCopy
- 9.8Security Reporting Best PracticesCopy
- week 10Incident Handling and Auditing8
- 10.1Incident Response Frameworks (NIST, ISO 27035)Copy
- 10.2Digital Forensics and Incident InvestigationCopy
- 10.3Reporting Security Incidents and Compliance ViolationsCopy
- 10.4Audit Logging and Log Analysis for Incident DetectionCopy
- 10.5Fraud Detection and Insider Threat MonitoringCopy
- 10.6Role of Artificial Intelligence in Incident DetectionCopy
- 10.7Cyber Threat Intelligence IntegrationCopy
- 10.8Lessons Learned from Major Security IncidentsCopy
- week 11Security Program Management Fundamentals8
- 11.1Role of a CISO in Security Program ManagementCopy
- 11.2Establishing a Security Program RoadmapCopy
- 11.3Integrating Security with Business OperationsCopy
- 11.4Key Security Management FrameworksCopy
- 11.5Building and Managing a Security TeamCopy
- 11.6Managing Security Budgets and ResourcesCopy
- 11.7Security Operations Center (SOC) ManagementCopy
- 11.8Developing a Security StrategyCopy
- week 12Information Security Projects and Integration8
- 12.1Security Project Management PrinciplesCopy
- 12.2Change Management in Security ProjectsCopy
- 12.3Security Integration into DevOps and Agile EnvironmentsCopy
- 12.4Security Testing in Software Development Lifecycle (SDLC)Copy
- 12.5Managing Security in IT and Business ProjectsCopy
- 12.6Secure Configuration ManagementCopy
- 12.7Security Control AutomationCopy
- 12.8Security Documentation and ReportingCopy
- week 13Security Operations and Threat Management8
- 13.1Threat Intelligence and Cyber Threat HuntingCopy
- 13.2Vulnerability Management and Patch ManagementCopy
- 13.3Intrusion Detection and Prevention Systems (IDS/IPS)Copy
- 13.4Endpoint Detection and Response (EDR)Copy
- 13.5Security Incident Monitoring and ManagementCopy
- 13.6Advanced Persistent Threats (APT) DetectionCopy
- 13.7Security Operations Best PracticesCopy
- 13.8Case Studies in Security OperationsCopy
- week 14Business Continuity and Disaster Recovery8
- 14.1Disaster Recovery Planning (DRP)Copy
- 14.2Business Continuity Planning (BCP)Copy
- 14.3Crisis Management in CybersecurityCopy
- 14.4Recovery Strategies and Backup ManagementCopy
- 14.5Disaster Recovery Testing and ExercisesCopy
- 14.6Cloud-Based Disaster Recovery SolutionsCopy
- 14.7Incident Communication PlansCopy
- 14.8Lessons Learned from Major Cybersecurity IncidentsCopy
- week 15Security Program Performance and Metrics6
- week 16Security Strategic Planning4
- week 17Financial Planning for Security Programs3
- week 18Security Vendor Management3
- week 19Security Compliance Audits and Governance3
- week 20Security Leadership and Board Communication3
- week 21Advanced Security Strategy and Risk Management2
- week 22Security Case Studies and Lessons Learned2
- week 23Certification and Exam Preparation2
- week 24Career Development and Final Assessment2