
Online or onsite, instructor-led live CompTIA training courses provides through interactive hands-on practice the background knowledge and skills you will require to prepare for the CompTIA certification examinations and become a CompTIA Certified Professional.
CompTIA training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live CompTIA training can be carried out locally on customer premises in Ireland or in NobleProg corporate training centers in Ireland.
NobleProg -- Your Local Training Provider
CompTIA Course Outlines in Ireland
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.
- You will:
- Support operating systems.
- Install and configure PC system unit components and peripheral devices.
- Install, configure, and troubleshoot display and multimedia devices.
- Install, configure, and troubleshoot storage devices.
- Install, configure, and troubleshoot internal system components.
- Install, configure, and maintain operating systems.
- Maintain and troubleshoot Microsoft Windows.
- Explain network infrastructure concepts.
- Configure and troubleshoot network connections.
- Manage users, workstations, and shared resources.
- Implement client virtualization and cloud computing.
- Implement physical security.
- Secure workstations and data.
- Troubleshoot workstation security issues.
- Support and troubleshoot laptops.
- Support and troubleshoot mobile devices.
- Install, configure, and troubleshoot print devices.
- Implement operational procedures.
- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
- Given a scenario, analyze potential indicators to determine the type of attack.
- Given a scenario, analyze potential indicators associated with application and network attacks.
- Explain different threat actors, vectors, and intelligence sources.
- Explain the security concerns associated with various types of vulnerabilities.
- Summarize the techniques used in security assessments.
- Explain the techniques used in penetration testing.
- Explain the importance of security concepts in an enterprise environment.
- Summarize virtualization and cloud computing concepts and authentication and authorication design concepts.
- Summarize secure application development, deployment, and automation concepts.
- Given a scenario, implement cybersecurity resilience.
- Explain the security implications of embedded and specialized systems.
- Explain the importance of physical security controls.
- Summarize the basics of cryptographic concepts.
- Given a scenario, implement secure protocols.
- Given a scenario, implement host or application security solutions and secure network designs.
- Given a scenario, install and configure wireless security settings and implement secure mobile solutions.
- Given a scenario, apply cybersecurity solutions to the cloud.
- Given a scenario, implement identity and account management controls and authentication and authorization solutions.
- Given a scenario, implement public key infrastructure.
- Given a scenario, use the appropriate tool to assess organizational security.
- Summarize the importance of policies, processes, and procedures for incident response.
- Given an incident, utilize appropriate data sources to support an investigation.
- Given an incident, apply mitigation techniques or controls to secure an environment.
- Explain the key aspects of digital forensics.
- Compare and contrast various types of controls.
- Explain the importance of applicable regulations, standards, or
- frameworks that impact organizational security posture.
- Explain the importance of policies to organizational security.
- Summarize risk management processes and concepts.
- Explain privacy and sensitive data concepts in relation to security.
Last Updated: