CompTIA IT Fundamentals+

Discover the essentials of IT with CompTIA IT Fundamentals+ (ITF+). Perfect for beginners, this course covers foundational IT concepts, including hardware, software, networks, databases, and security. Build confidence in troubleshooting and decision-making for IT environments while preparing for the CompTIA ITF+ certification exam  (FC0-U61).
Course Details

Price:

Days:

5

Location:

Virtual

Course Overview

Discover the essentials of IT with CompTIA IT Fundamentals+ (ITF+). Perfect for beginners, this course covers foundational IT concepts, including hardware, software, networks, databases, and security. Build confidence in troubleshooting and decision-making for IT environments while preparing for the CompTIA ITF+ certification exam  (FC0-U61).

On course completion, participants will be able to: – Set up a computer workstation and use basic software applications. – Explain the functions and types of devices used within a computer system. – Apply basic computer maintenance and support principles. – Describe some principles of software and database development. – Configure computers and mobile devices to connect to home networks and to the Internet. – Identify security issues affecting the use of computers and networks.

1 – Assessing Cybersecurity Risk

  • Identify the importance of risk management
  • Assess and mitigate risk
  • Integrate documentation into risk processes

2 – Analyzing the Threat Landscape

  • Classify threats and threat profiles
  • Analyze trends affecting security posture

3 – Analyzing Reconnaissance Threats to Computing and Network Environments

  • Implement threat modeling
  • Assess the impact of reconnaissance and social engineering

4 – Analyzing System Hacking Attacks

  • Assess the impact of system, web-based, and malware attacks
  • Evaluate threats like hijacking, impersonation, DoS, mobile and cloud vulnerabilities

5 – Analyzing Post-Attack Techniques

  • Assess techniques including command & control, lateral movement, exfiltration, and anti-forensics

6 – Assessing the Organization’s Security Posture

  • Perform cybersecurity audits
  • Conduct vulnerability assessments and penetration testing

7 – Collecting Cybersecurity Intelligence

  • Set up intelligence platforms
  • Collect data from host-based and network-based sources

8 – Analyzing Log Data

  • Use SIEM tools and log analysis for threat detection

9 – Performing Active Asset and Network Analysis

  • Investigate incidents using Windows and Linux tools
  • Analyze indicators of compromise

10 – Responding to Cybersecurity Incidents

  • Deploy incident handling architecture
  • Mitigate incidents and support forensic handoff

11 – Investigating Cybersecurity Incidents

  • Apply forensic investigation methods
  • Collect, analyze, and follow up on digital evidence
Class Dates & Times
Filters Sort results
Reset Apply
No results found. Clear filters and try again?
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.