CompTIA Certification Bundle with 4 Exams

CompTIA Certification Bundle with 4 Exams

From: £139.83 Inc. VAT per month for 6 months

Clear

Description

The Computing Technology Industry Association (CompTIA) is the association representing the international technology community. Its goal is to provide a unified voice, global advocacy and leadership, and to advance industry growth through standards, professional competence, and education and business solutions. In order to most efficiently serve the industry and its members, CompTIA has developed specialized initiatives and programs dedicated to major areas within the IT industry. They include, convergence technology, e-commerce, IT training, software services, certification, public policy and workforce development.

 

Who are CompTIA? Watch this video to find out.

 
This bundle offers incredible value for money for anyone looking to get CompTIA certified. It covers 4 separate certification courses, spanning a variety of disciplines and technical fields from IT technician skills, to networking, and IT security.
 

CompTIA A+ certification

An example of a CompTIA A+ certification you can gain through this course.

 
What’s included in this certification bundle?
 
This bundle contains 4 separate certification courses and 4 official CompTIA certification exams. Click on a title to see a full breakdown of the course syllabus. Save BIG when you purchase this bundle.
 
As part of this bundle, you will also get access to a MeasureUP practice test for each certification course. Scroll down to read more about the MeasureUP practice tests and how they will help you pass your exams the first time.
 
Certification courses included:
 



Module 1 Introduction To Personal Computers And IT Certification
1.1 Personal Computer ConceptsPart 1
1.2 Personal Computer Concepts Part 2
1.3 Becoming An IT Professional
1.4 Certification Basics
1.5 Review
 
Module 2 Internal Hardware Components
2.1 Motherboards Part 1
2.2 Motherboards Part 2
2.3 BIOS Part 1
2.4 BIOSPart 2
2.5 BIOSPart 3
2.6 Power Supplies Part 1
2.7 Power SuppliesPart 2
2.8 Central Processing Unit Part 1
2.9 Central Processing UnitPart 2
2.10 Central Processing Unit Part 3
2.11 MemoryPart 1
2.12 MemoryPart 2
2.13 Review
 
Module 3 Storage Fundamentals
3.1 Storage Overview
3.2 Magnetic Drives
3.3 Solid State And Flash Drives
3.4 Optical Drives
3.5 RAID Technologies
3.6 Tape Drives
3.7 Installing Hard Drives
3.8 Review
 
Module 4 Expanding Hardware Capabilities
4.1 Expansion Components OvereviewPart 1
4.2 Expansion Components OvereviewPart 2
4.3 Expansion TechnologiesPart 1
4.4 Expansion TechnologiesPart 2
4.5 Video CardsPart 1
4.6 Video CardsPart 2
4.7 Sound Cards
4.8 Networking Interface Cards
4.9 Alternative Expansion Devices
4.10 Review
 
Module 5 Working With Peripheral Devices
5.1 Peripheral Devices Overview
5.2 Input Devices Part 1
5.3 Input DevicesPart 2
5.4 Input Devices Part 3
5.5 Output Devices Video MonitorsPart 1
5.6 Output DevicesVideo MonitorsPart 2
5.7 Output Devices Video Monitors Part 3
5.8 Output DevicesPrinters And ScannersPart1
5.9 Output Devices Printers And Scanners Part2
5.10 Output DevicesPrinters And ScannersPart 3
5.11 Output Devices Printers And ScannersPart 4
5.12 Input And Output Devices
5.13 Review
 
Module 6 Mobiles Devices
6.1 Mobile Devices Overview
6.2 Laptop Computer Components Part 1
6.3 Laptop Computer ComponentsPart 2
6.4 Laptop Computer Expansion Capabilities
6.5 Replacing Portable Computer ComponentsPart 1
6.6 Replacing Portable Computer ComponentsPart 2
6.7 Additional Mobile Devices Part 1
6.8 Additional Mobile DevicesPart 2
6.9 Mobile Device Ports And Connectors
6.10 Review
 
Module 7 Computer Networking
7.1 Networking FundamentalsPart 1
7.2 Networking Fundamentals Part 2
7.3 Network DevicesPart 1
7.4 Network Devices Part 2
7.5 Cable And Connectors Part 1
7.6 Cable And ConnectorsPart 2
7.8 TCP/IP FundamentalsPart 1
7.9 TCP/IP FundamentalsPart2
7.10 TCP/IP FundamentalsPart3
7.11 TCP/IP Fundamentals Part 4
7.12 TCP/IP FundamentalsPart 5
7.13 Internet Connectivity
7.14 Wireless Networks Part 1
7.15 Wireless NetworksPart 2
 
Module 8 Hardware And Network Troubleshooting
Troubleshooting Models Part 1
Troubleshooting ModelsPart 2
Troubleshooting Physical IssuesPart 1
Troubleshooting Physical Issues Part 2
Troubleshooting Physical IssuesPart 3
Troubleshooting Networking Issues Part 1
Troubleshooting Networking IssuesPart 2
Troubleshooting Mobile Devices
Troubleshooting Printers




Module 1: Introduction To Operating Systems
1.1 Introduction
1.2 Operating Systems Overview Part 1
1.3 Operating Systems Overview Part 2
1.4 Operating Systems Functions Part 1
1.5 Operating Systems Functions Part 2
1.6 Windows OS Versions Part 1
1.7 Windows OS Versions Part 2
1.8 Windows OS Versions Part 3
1.9 Basic Navigation And Management Part 1
1.10 Basic Navigation And Management Part 2
 
Module 2: Installing Windows Operating Systems
2.1 PreInstalling Task
2.2 Performing Clean Installs Part 1
2.3 Performing Clean Installs Part 2
2.4 Performing Upgrades
2.5 Migrating User Data
 
Module 3: Configuration And Management In Windows
3.1 Using Control Panel And PC Settings Part 1
3.2 Using Control Panel And PC Settings Part 2
3.3 Using Control Panel And PC Settings Part 3
3.4 Using Graphical Administrative Tools Part 1
3.5 Using Graphical Administrative Tools Part 2
3.6 Using Graphical Administrative Tools Part 3
3.7 Using Graphical Administrative Tools Part 4
3.8 Using Command Line Administrative Tools
3.9 Configuring Networking Part 1
3.10 Configuring Networking Part 2
3.11 Configuring Networking Part 3
3.12 Operating System Security Part 1
3.13 Operating System Security Part 2
3.14 Operating System Security Part 3
3.15 Windows Preventative Maintenance
 
Module 4: Utilizing Alternative Operating Systems
4.1 Mac And Linux Overview
4.2 OS Features And Tools
4.3 Best Practices Using Alternative Operating Systems
4.4 Basic Command Line Administration In Linux
4.5 Network Operating Systems Part 1
4.6 Network Operating Systems Part 2
 
Module 5: Virtualization And Cloud Computing
5.1 Understanding Virtualization
5.2 Basic Cloud Concepts
 
Module 6: Managing Mobile Devices
6.1 Mobile Devices Overview
6.2 Mobile Operating Systems
6.3 Network Connectivity And Email
6.4 Mobile Device Synchronization
 
Module 7: Understanding System Security
7.1 Understanding Threats To Security Part 1
7.2 Understanding Threats To Security Part 2
7.3 Understanding Threats To Security Part 3
7.4 Understanding Common Prevention Methods Part 1
7.5 Understanding Common Prevention Methods Part 2
7.6 Understanding Common Prevention Methods Part 3
 
Module 8: Troubleshooting And Operational Procedures
8.1 Troubleshooting Theory
8.2 Communication And Professionalism Part 1
8.3 Communication And Professionalism Part 2
8.4 Operational And Safety Procedures
8.5 Security And Privacy Guidelines For Troubleshooting
8.6 Troubleshooting Operating Systems Part 1
8.7 Troubleshooting Operating Systems Part 2
8.8 Troubleshooting Mobile Devices Part 1
8.9 Troubleshooting Mobile Devices Part 2
8.10 Troubleshooting Common Security Issues Part 1
8.11 Troubleshooting Common Security Issues Part 2
8.12 Conclusion




Module 1: Networking Concepts
1.1 Basic Networking
• Intro to networking
• Networking architectures
• Activity: Basic Networking
1.2 OSI Model
• Layer 7 – Application
• Layer 6 – Presentation
• Layer 5 – Session
• Layer 4 – Transport
• Layer 3 – Network
• Layer 2 – Data Link
• Layer 1 – Physical
• Activity: Exploring the OSI Model
1.3 Protocols and Ports
• Protocols and ports overview
• Activity: Examining Protocols and Ports
• Connection-oriented vs. connectionless
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Activity: Comparing TCP and UDP
• Internet Protocol (IP)
• Internet Control Messaging Protocol (ICMP)
• Internet Group Messaging Protocol (IGMP)
• Activity: Examining the Lower Layer Protocols
• Layer 7 Remote Control Protocols
• Layer 7 File Transfer Protocols
• Layer 7 Messaging Protocols
• Activity: Examining Messaging Protocols
• Layer 7 Web Traffic Protocols
• Layer 7 Streaming Media Protocols
• Layer 7 Infrastructure Management Protocols
1.4 Switching
• Properties of Network Traffic
• Contention Management
• Activity: Creating Collision and Broadcast Domains
• Interface Properties and Segmentation
• Activity: Creating a Basic Network Segment
• Switching prt 2
• Activity: Switching
• Switching Loop Management
• Activity: Managing Switching Loops
• VLANs
• Activity: Creating VLANs
1.5 Routing
• ARP
• Activity: Examining ARP
• IP Addressing Basics
• Activity: Configuring IP
• Routers
• Activity: Setting Up a Router
• Routing Basics
• Activity Adding Static Routes
• VLAN Routing
• Activity: Routing Between VLANs
• NAT/PAT
• Activity: Configuring NAT/PAT
• Routing Protocols
• Activity Configuring a Routing Protocol
• Firewalls
• Activity: Configuring Firewalls
1.6 Advanced Switching and Routing Concepts
• IPv6 Concepts
• Activity: Exploring IPv6
• Performance Concepts
• Distributed Switching
• Software-defined Networking
1.7 IP Addressing
• Public vs. Private
• Loopback and Reserved
• Subnet Mask
• Default Gateway
• Virtual IP
• Subnetting
• Activity: Learning to Subnet
• Address Assignments
1.8 Network Types and Topologies
• Wired Topologies
• Wireless Topologies
• Network Types
• Technologies that Facilitate the Internet Of Things (IoT)
1.9 Wireless Technologies
• Radio Basics
• 802.11 Standards
• Wi-Fi Frequencies
• Wi-Fi Antenna Concepts
• Bluetooth
• Cellular
• Site Surveys
• Activity: Using an RF Spectrum Analyzer
1.10 Cloud Concepts
• Types of Services
• Cloud Delivery Models
• Security Implications/Considerations
• Activity: Exploring Cloud Services
1.11 Network Services
• DNS Service
• Activity: Setting up DNS
• DHCP Service
• Activity: Setting Up DHCP
• NTP
• IPAM
Module 2 – Infrastructure
2.1 Cabling Solutions
• Media Types
• Activity: Testing a Fiber Optic Cable
• Plenum vs.PVC
• Connector Types
• Activity: Crimping on an RJ-45 Connector
• Transceivers
• Termination Points
• Activity: Terminating Cable to a 110 Block
• Copper Cable Standards
• Copper Termination Standards
• Activity: Creating a Crossover Cable
• Ethernet Deployment Standards
2.2 Network Device Placement and Installation
• Network Interface
• Repeater
• Hub
• Bridge
• Switch
• Router
• Modem
• Wireless Access Point
• Activity Setting up a WAP
• Firewall
• Media Converter
• Wireless Range Extender
• VoIP Endpoint
2.3 Advanced Network Devices
• Multilayer Switch
• Wireless Controller
• Load Balancer
• IDS/IPS
• Proxy Server
• Activity Configuring Proxy Settings
• VPN Concentrator
• AAA/RADIUS Server
• UTM Appliance
• NGFW/Layer 7 Firewall
• VoIP PBX
• VoIP Gateway
• Content Filter
2.4 Virtualization and Network Storage Technologies
• Virtual Networking Components
• Network Storage Types
• Connection Types
• Jumbo Frames
2.5 WAN Technologies
• Service Types
• Transmission Mediums
• Characteristics of Service
• Activity Configuring WAN Links
• Termination
Module 3 – Network Operations
3.1 Documentation

• Diagram Symbols
• Standard Operating Procedures/Work Instructions
• Logical vs. Physical Diagrams
• Rack Diagrams
• Change Management Documentation
• Wiring and Port Locations
• IDF/MDF Documentation
• Labeling
• Network Configuration and Performance Baselines
• Inventory Management
• Activity Using Documentation
3.2 Business Continuity and Disaster Recovery
• Availability Concepts
• Recovery
• Activity Backing Up Your Data
• MTTR
• MTBF
• SLA Requirements
3.3 Scanning, Monitoring, and Patching
• Processes
• Event Management
• SNMP Monitors
• Metrics
• Activity: Testing the Network
3.4 Remote Access Methods
• VPN
• RDP
• SSH
• VNC
• Telnet
• HTTPS/Management URL
• Remote File Access
• Out-of-Band Management
• Activity: Making Remote Connections
3.5 Policies and Best Practices
• Privileged User Agreement
• Password Policy
• On-boarding/Off-boarding Procedures
• Licensing Restrictions
• International Export Controls
• Data Loss Prevention
• Remote Access Policies
• Incident Response Policies
• BYOD
• AUP
• NDA
• System Life Cycle
• Safety Procedures And Policies
• Activity: Creating Policies and Procedures
Module 4 – Network Security
4.1 Physical Security Devices
• Detection
• Prevention
4.2 Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
4.3 Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
4.4 Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
4.5 Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
4.6 Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot
Module – Network Troubleshooting and Tools
5.1 Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
5.2 Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools
5.3 Troubleshoot Wired Connectivity and Performance
• Signal Issues:
o Attenuation
o Latency
o Jitter
o Crosstalk
o EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
o Open/short
o Incorrect pin-out
o Incorrect Cable Type
o Bad Port
o Damaged cable
o Bent pins
• Transceiver Issues:
o Transceiver mismatch
o TX/RX reverse
o Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
o Bottleneck
o VLAN mismatch
o Network connection LED status indicators
5.4 Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
o Attenuation
o Reflection
o Refraction
o Absorption
• Latency & Jitter
• Antenna Issues:
o Incorrect antenna type
o Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
o Interference
o Channel overlap
o Overcapacity
o Distance limitations
o Frequency mismatch
o Power levels
o Signal-to-noise ratio
• WAP Misconfiguration:
o Wrong SSID
o Wrong passphrase
o Security type mismatch
• Activity Troubleshooting WAP Issues
5.5 Troubleshoot Common Network Service Issues
• Common Network Issues:
o Physical Connectivity
o Incorrect IP Address
o Incorrect Gateway
o Incorrect Netmask
o Names Not Resolving
o Untrusted SSL Certificate
• DHCP Issues:
o Duplicate IP Addresses
o Expired IP Address
o Rogue DHCP
o Exhausted DHCP Scope
• Firewall/ACL Issues:
o Blocked TCP/UDP Ports
o Incorrect Host-based Firewall Settings
o Incorrect ACL Settings
• Advanced Network Issues:
o DNS Server Issues
o Duplicate MAC Addresses
o Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue



Module 1: Networking Terminology
1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4
 
Module 2: Locking Down Or Network
2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices
 
Module 3: Wireless
3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared
 
Module 4: Intro To Security Terminology
4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2
 
Module 5: Policies And Standards
5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2
 
Module 6: Physical Security
6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls
 
Module 7: Risk Analysis
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies
 
Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore
 
Module 9: Introduction To Computer Forensics
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response
 
Module 10: Types Of Attacks
 
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks
 
Module 11: System Security Threats
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware
 
Module 12: Security Assessments
12.1 Types Of Assessments
12.2 Penetration Testing
 
Module 13: Monitoring And Auditing
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing
 
Module 14: Authentication
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication
 
Module 15: Access Control
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2
 
Module 16: Mitigating Security Threats
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2
 
Module 17: Implementing System Security
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing
 
Module 18: Cryptography
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses
 
Module 19: Public Key Infrastructure
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion


 
Certification exams included:
 

  1. CompTIA A+ 220-901
  2. CompTIA A+ 220-902
  3. CompTIA Network+ N10-007
  4. CompTIA Security+ SY0-501

 
MeasureUP practice exams included:
 

  1. CompTIA A+ 220-901
  2. CompTIA A+ 220-902
  3. CompTIA Network+ N10-007
  4. CompTIA Security+ SY0-501

 

 
Features of MeasureUP practice tests:
 

  • Questions are similar to exam questions, allowing you to test your knowledge of exam objectives
  • Detailed explanations for both correct and distractor answers reinforce the material
  • ‘Study Mode’ covers all objectives ensuring topics are covered
  • ‘Certification Mode’ (timed) prepares students for exam taking conditions
  • Instant, drill-down score reports tell you exactly the areas to focus on
  •  

    Watch this video to learn more about MeasureUP practice tests.

     
    If you’re looking to get ahead of the crowd and don’t have any technical experience, then you might want to consider adding live labs to your course.
     
    Learn More About Live Practice Labs
     
    Salary and job prospect information
     
    We use two excellent third-party resources to allow you to check your earning potential and job prospects before starting this course.
     

     
    The first is IT JobsWatch, which allows you to check what employers are paying people on average with specific certifications, such as the ones contained in this bundle. Click here and enter the name of the certification you would like to see salary information on. Remember to check the earning potential for all the certifications in the bundle, especially the more advanced ones as these will offer the highest salary.
     

     
    The second is Payscale, which also does the above, but allows you to see what types of job titles are paying more based around the certification you enquire about. Click here and enter the name of the certification you would like to see salary and job title information on. Again, remember to check the earning potential for all the certifications in the bundle, especially the more advanced ones as these will provide information on higher level job roles. Although some higher level roles may require experience, the information will give you an idea of future earning potential and career prospects.
     
    What career paths are available to me through this course?
     

    • IT Support Technician
    • Network Engineer
    • Network Consultant
    • Data Centre Manager
    • IT Manager
    • IT Sales Account Manager
    • IT Security Specialist
    • IT Security Consultant
    • IT Consultant
    • Systems Administrator

     
    How is each course taught?
     

    All courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace.  Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to.  The lessons are multi-media based, which means video and audio are used to teach the lessons.  Most lessons are also interactive, prompting the learner to participate.  This might involve answering on-screen questions, participating in tasks, and using simulators as if you were using the real software program.

     

    Watch this video to learn what the CompTIA A+ has done for some people.

     
    How long will it take me to complete each course?
     

    As mentioned above, our courses are self-paced.  Some people finish their course faster than others.  Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this bundle, then it will take you less time than if you do two or three or all of them.  No matter what though, you will always have 12 months to complete your course.

     
    How do I book my exams?
     
    When you’re ready to sit your exams, email [email protected] with your request along with the title of the exam you wish to take. We will then send you an email with instructions on how to complete your exam booking. The exams for this course must be sat at your local test center, which we will locate for you.
     
    What do I need?
     

    All you need is an internet connection and a PC.  While most of the lessons work on MACs, we recommend you use a PC for the best performance.  Certain parts of the course may not display properly on older MACs.  Once you’ve logged into your course, you may be prompted to down certain free plugins such as Java.  Just follow the on-screen prompts.

     
    Course Features
     
    With Hudson’s e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our learning system gives you all of the benefits of a live class at just a fraction of the cost. Courses include:
     
    hudson-expert-instructor-led-training

    Expert Instructor-Led Training

    We only use the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

     
    hudson-visual-demonstrations-multimedia-presentations

    Visual Demonstrations & Multimedia Presentations

    Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

     
    hudson-quizzes-exam-simulators

    Quizzes & Exam Simulators

    Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.
     
    This will allow you to gauge your effectiveness before moving to the next module in your course. Hudson courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

     
    hudson-social-learning-networking

    Social Learning & Networking

    Hudson has designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students and staff, form study groups, engage in discussions in our [email protected] Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

     
    hudson-flash-cards-educational-games

    Flash Cards & Educational Games

    Hudson knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

     
    hudson-navigation-controls

    Navigation & Controls

    Hudson’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.
     


     
    Add experience to your CV with Live Labs

     
    If you’re looking to get ahead of the crowd and don’t have any technical experience, then you might want to consider adding live labs to your course. Because many IT jobs take place at the virtual level (i.e. behind a keyboard and mouse), the experience you’ll gain through a live lab is very similar to experience you’ll gain in the workplace. Consequently many employers regard live lab experience as a valued asset on a CV.
     
    Live labs are also a great tool for experienced technicians as they allow individuals to put their newly acquired course skills to practice. To find out more about our range of live labs, including costs, and how they can enhance your skills, click here.
     
     
    Learn More About Live Practice Labs
     

    Additional information

    Payment options

    4 monthly installments, 5 monthly installments, 6 monthly installments, Single payment