TOIT Training

Instructor | ToIT

Network Defender Professional

  • Describe Network and Security concepts
  • Better understand threats, attacks, and vulnerabilities
  • Implement Security policies
12h
0
48

Certified Information Systems Auditor (CISA)

  • Auditing information systems process
  • Protection of information assets
  • Governance and management of IT
20h
0
31

Certified Information Security Manager (CISM)

  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
19h
0
38

Certified in Risk and Information Systems Control® (CRISC®)

  • Better understand corporate IT governance
  • Perform IT risk assessment
  • Perform risk response and reporting
15h
0
52

CompTIA Security+

  • Mitigate Threats
  • Use Cryptography
  • Authenticate systems
32h
0
5

CompTIA Network+ (N10-009)

  • Design and implement functional networks
  • Describe Wifi systems and deploy WLANs
  • Configure, manage, and maintain essential network devices
24h
0
56

CompTIA A+ (220-1101)

  • Configure, network, synchronize, and troubleshoot of mobile devices
  • Better understanding of networking and wireless networking protocols
  • Contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes
18h
0
149

CompTIA A+ (220-1102)

  • Identify basic features of Microsoft Windows editions
  • Use the appropriate Microsoft command-line tool
  • Use features and tools of the Microsoft Windows 10 operating system (OS)
18h
0
106

CompTIA Project+ (PK0–004)

  • Purpose of a project charter
  • Project manager’s role in the organizational structure
  • Project process groups
16h
0
0

CompTIA Linux+ (XK0-005)

  • Better understand of the Command Line Interface, CLI, and Bash shell
  • Set up permissions
  • Describe Kernel modules
14h 45m
0
21

CompTIA Cloud+ (CV0-003)

  • Make effective cloud models
  • Cloud Security
  • Resource Management
16h
0
12

CompTIA CASP+ (CAS-004)

  • IT governance in the enterprise with an emphasis on managing risk
  • Use research and analysis to secure the enterprise
  • Integrate advanced authentication and authorization techniques
24h
0
0