Due to COVID-19, we are conducting all of our programs ONLINE. Please take a look at our updated schedules or contact us. Thank you!

Hacking Apprentice

 
a+ certification training, security officer training, security guard course, security school, a+ certification online course,

Employment Objective

 

5

Hacking Apprentice Training

Hacking Apprentice is an exclusive 12-15 Month course provided by the Institute of Information Technology. Upon the completion of this course, students will have a strong understanding of networking and cyber security. As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CEH identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. EC-COUNCIL CERTIFIED ETHICAL HACKER (CEH) is for computer hacking to gain the following security analyst skills. Our course consists of the core fundamental course objectives to make sure you have a grasp on the foundation of Hacking & cybersecurity:

Hacking Apprentice is an exclusive program provided by the Institute of Information Technology. This consists of CompTIA Network+ N10-007, CompTIA Security+ CompTIA CySA+, Cisco Certified Network Associate (CCNA) 200-301, CompTIA Server+ certification preparation, Linux Fast Track and Certified Ethical Hacker certification preparation. By taking all of these courses, you will be considered a professional in the cybersecurity world.

Why does someone need any of these courses?

To start off, CompTIA Network+ covers the configuration, management, and troubleshooting of common wired and wireless network devices. Also included are emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.

Cisco Certified Network Associate (CCNA) 200-301 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. for network installation, operations and troubleshooting. Think of the Associate Level as the foundation level of networking certification. Each certification covers a different technology to meet the needs of varying job roles. You not only have to plan engaging classroom lectures, practice tasks and exams, but you must also be a knowledgeable and effective communicator.

The last section of our Hacking Professional course consists of Computer Hacking Forensic Investigator (CHFI) and Certified Ethical Hacker (CEH). Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for the Computer Hacking Forensic Investigator CHFI Certification Program. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. With ethical hacking, you will understand and know how to look for weaknesses and vulnerabilities in targeted systems, and use the same knowledge and tools as a malicious hacker. By taking this full course, you will become much more desirable in the cybersecurity and networking industry, along with a higher paying career.

Call us to customize this class with your own dates, times and location. Institute of Information Technology instructors can teach your team at our location or at yours.

Get immediate feedback on your work through built-in quizzes and tests.
Prepare for the workplace with collaborative projects and presentations.
Connect with the global CISCO Networking Academy community.

More than 1 Year

Hacking Apprentice Objectives

CompTIA A+ 220-1001 Certification Preparation
CompTIA A+ 220-1002 Certification Preparation
Cisco Certified Network Associate CCNA Certification
CompTIA Network+ Certification Preparation
CompTIA Security+ Certification Preparation
CompTIA Server+ Certification Preparation

Linux Fast Track
Cisco Certified Network Associate (CCNA) 200-301
Certified Ethical Hacker Certification Preparation.

Hacking Apprentice Outline

Mobile Devices

  • Given a scenario, install and configure laptop hardware and components
    1. Hardware/device replacement
  • Given a scenario, install components within the display of a laptop
    1. Types
    2. WiFi antenna connector/placement
    3. Webcam
    4. Microphone
    5. Inverter
    6. Digitizer/touchscreen
  • Given a scenario, use appropriate laptop features
    1. Special function keys
    2. Docking station
    3. Port replicator
    4. Physical laptop lock and cable lock
    5. Rotating/removable screens
  • Compare and contrast characteristics of various types of other mobile devices
    1. Tablets
    2. Smartphones
    3. Smartphones
    4. Wearable technology devices
    5. E-readers
    6. GPS
  • Given a scenario, connect and configure accessories and ports of other mobile devices
    1. Connection types
    2. Accessories
  • Given a scenario, configure basic mobile device network connectivity and application support
    1. Wireless/cellular data network (enable/disable)
    2. Bluetooth
    3. Corporate and ISP email configuration
    4. Integrated commercial provider email configuration
    5. PRI updates/PRL updates/ baseband updates
    6. Radio firmware
    7. IMEI vs. IMSI
    8. VPN
  • Given a scenario, use methods to perform mobile device synchronization
    1. Synchronization methods
    2. Types of data to synchronize
    3. Mutual authentication for multiple services (SSO)
    4. Software requirements to install the application on the PC
    5. Connection types to enable synchronization

Networking

  • Compare and contrast TCP and UDP ports, protocols, and their purposes
    1. Ports and protocols
    2. TCP vs. UDP
  • Compare and contrast common networking hardware devices
    1. Routers
    2. Switches
    3. Access points
    4. Cloud-based network controller
    5. Firewall
    6. Network interface card
    7. Repeater
    8. Hub
    9. Cable/DSL modem
    10. Bridge
    11. Patch panel
    12. Power over Ethernet (PoE)
    13. Ethernet over Power
  • Given a scenario, install and configure a basic wired/wireless SOHO network
    1. Router/switch functionality
    2. Access point settings
    3. IP addressing
    4. NIC configuration
    5. End-user device configuration
    6. IoT device configuration
    7. Cable/DSL modem configuration
    8. Firewall settings
    9. QoS
    10. Wireless settings
  • Compare and contrast wireless networking protocols
    1. 802.11a
    2. 802.11b
    3. 802.11g
    4. 802.11n
    5. 802.11ac
    6. Frequencies
    7. Channels
    8. Bluetooth
    9. NFC
    10. RFID
    11. Zigbee
    12. Z-Wave
    13. 3G
    14. 4G
    15. 5G
    16. LTE
  • Summarize the properties and purposes of services provided by networked hosts
    1. Server roles
    2. Internet appliance
    3. Legacy/embedded systems
  • Explain common network configuration concepts
    1. IP addressing
    2. DNS
    3. DHCP
    4. IPv4 vs. IPv6
    5. Subnet mask
    6. Gateway
    7. VPN
    8. VLAN
    9. NAT
  • Compare and contrast Internet connection types, network types, and their features
    1. Internet connection types
    2. Network types
  • Given a scenario, use appropriate networking tools
    1. Crimper
    2. Cable stripper
    3. Multimeter
    4. Tone generator and probe
    5. Cable tester
    6. Loopback plug
    7. Punchdown tool
    8. WiFi analyzer

Hardware

  • Explain basic cable types, features, and their purposes
    1. Network cables
    2. Video cables
    3. Multipurpose cables
    4. Peripheral cables
    5. Hard drive cables
    6. Adapters
  • Identify common connector types
    1. RJ-11
    2. RJ-45
    3. RS-232
    4. BNC
    5. RG-59
    6. RG-6
    7. USB
    8. Micro-USB
    9. Mini-USB
    10. USB-C
    11. DB-9
    12. Lightning
    13. SCSI
    14. eSATA
    15. Molex
  • Given a scenario, install RAM types
    1. RAM types
    2. Single channel
    3. Dual channel
    4. Triple channel
    5. Error correcting
    6. Parity vs. non-parity
  • Given a scenario, select, install and configure storage devices
    1. Optical drives
    2. Solid-state drives
    3. Magnetic hard drives
    4. Hybrid drives
    5. Flash
    6. Configuration
  • Given a scenario, install and configure motherboards, CPUs, and add-on cards
    1. Motherboard form factor
    2. Motherboard connectors types
    3. BIOS/UEFI settings
    4. CMOS battery
    5. CPU features
    6. Compatibility
    7. Cooling mechanism
    8. Expansion cards
  • Explain the purposes and uses of various peripheral types
    1. Printer
    2. ADF/flatbed scanner
    3. Barcode scanner/QR scanner
    4. Monitors
    5. VR headset
    6. Optical
    7. DVD drive
    8. Mouse
    9. Keyboard
    10. Touchpad
    11. Signature pad
    12. Game controllers
    13. Camera/webcam
    14. Microphone
    15. Speakers
    16. Headset
    17. Projector
    18. External storage drives
    19. KVM
    20. Magnetic reader/chip reader
    21. NFC/tap pay device
    22. Smart card reader
  • Summarize power supply types and features
    1. Input 115V vs. 220V
    2. Output 5.5V vs. 12V
    3. 24-pin motherboard adapter
    4. Wattage rating
    5. Number of devices/types of devices to be powered
  • Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs
    1. Graphic/CAD/CAM design workstation
    2. Audio/video editing workstation
    3. Virtualization workstation
    4. Gaming PC
    5. Standard thick client
    6. Thin client
    7. Network attached storage device
  • Given a scenario, install and configure common devices
    1. Desktop
    2. Laptop/common mobile devices
  • Given a scenario, configure SOHO multifunction devices/printers and settings
    1. Use appropriate drivers for a given operating system
    2. Device sharing
    3. Public/shared devices
  • Given a scenario, install and maintain various print technologies
    1. Laser
    2. Inkjet
    3. Thermal
    4. Impact
    5. Virtual
    6. 3D printers

Virtualization and Cloud Computing

  • Compare and contrast cloud computing concepts
    1. Common cloud models
    2. Shared resources
    3. Rapid elasticity
    4. On-demand
    5. Resource pooling
    6. Measured service
    7. Metered
    8. Off-site email applications
    9. Cloud file storage services
    10. Virtual application streaming/ cloud-based applications
    11. Virtual desktop
  • Given a scenario, set up and configure client-side virtualization
    1. Purpose of virtual machines
    2. Resource requirements
    3. Emulator requirements
    4. Security requirements
    5. Network requirements
    6. Hypervisor

Hardware and Network Troubleshooting

  • Given a scenario, use the best practice methodology to resolve problems
    1. Always consider corporate policies, procedures, and impacts before implementing changes
  • Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power
    1. Common symptoms
  • Given a scenario, troubleshoot hard drives and RAID arrays
    1. Common symptoms
  • Given a scenario, troubleshoot video, projector, and display issues
    1. Common symptoms
  • Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
    1. Common symptoms
    2. Disassembling processes for proper reassembly
  • Given a scenario, troubleshoot printers
    1. Common symptoms
  • Given a scenario, troubleshoot common wired and wireless network problem
    1. Common symptoms

Operating Systems

  • Compare and contrast common operating system types and their purposes
    1. 32-bit vs. 64-bit
    2. Workstation operating systems
    3. Cell phone/tablet operating systems
    4. Vendor-specific limitations
    5. Compatibility concerns between operating systems
    6. >
  • Compare and contrast features of Microsoft Windows versions
    1. Windows 7
    2. Windows 8
    3. Windows 8.1
    4. Windows 10
    5. Corporate vs. personal needs
    6. Desktop styles/user interface
  • Summarize general OS installation considerations and upgrade methods.
    1. Boot methods
    2. Type of installations
    3. Partitioning - Dynamic
    4. File system types/formatting
    5. Load alternate third-party drivers when necessary
    6. Workgroup vs. Domain setup
    7. Time/date/region/language settings
    8. Driver installation, software, and Windows updates
    9. Factory recovery partition
    10. Properly formatted boot drive with the correct partitions/format
    11. Prerequisites/hardware compatibility
    12. Application compatibility
    13. OS compatibility/upgrade path
  • Given a scenario, use appropriate Microsoft command line tools
    1. Navigation
    2. ipconfig
    3. ping
    4. tracert
    5. netstat
    6. nslookup
    7. shutdown
    8. dism
    9. sfc
    10. chkdsk
    11. diskpart
    12. taskkill
    13. gpupdate
    14. gpresult
    15. format
    16. copy
    17. xcopy
    18. robocopy
    19. net use
    20. net user
    21. [command name] /?
    22. Commands available with standard privileges vs. administrative privileges
  • Given a scenario, use Microsoft operating system features and tools
    1. Administrative
    2. MSConfig
    3. Task Manager
    4. Disk Management
    5. System utilities
  • Given a scenario, use Microsoft Windows Control Panel utilities
    1. Internet Options
    2. Display/Display Settings
    3. User Accounts
    4. Folder Options
    5. System
    6. Windows Firewall
    7. Power Options
    8. Credential Manager
    9. Programs and features
    10. HomeGroup
    11. Devices and Printers
    12. Sound
    13. Troubleshooting
    14. Network and Sharing Center
    15. Device Manager
    16. Bitlocker
    17. Sync Center
  • Summarize application installation and configuration concepts
    1. System requirements
    2. OS requirements
    3. Methods of installation and deployment
    4. Local user permissions
    5. Security considerations
  • Given a scenario, configure Microsoft Windows networking on a client/desktop
    1. HomeGroup vs. Workgroup
    2. Domain setup
    3. Network shares/administrative shares/mapping drives
    4. Printer sharing vs. network printer mapping
    5. Establish networking connections
    6. Proxy settings
    7. Remote Desktop Connection
    8. Remote Assistance
    9. Home vs. Work vs. Public network settings
    10. Firewall settings
    11. Configuring an alternative IP address in Windows
    12. Network card properties
  • Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems
    1. Best practices
    2. Tools
    3. Features
    4. Basic Linux commands

Security

  • Summarize the importance of physical security measures
    1. Mantrap
    2. Badge reader
    3. Smart card
    4. Security guard
    5. Door lock
    6. Biometric locks
    7. Hardware tokens
    8. Cable locks
    9. Server locks
    10. USB locks
    11. Privacy screen
    12. Key fobs
    13. Entry control roster
  • Explain logical security concepts
    1. Active Directory
    2. Software tokens
    3. MDM policies
    4. Port security
    5. MAC address filtering
    6. Certificates
    7. Antivirus/Anti-malware
    8. Firewalls
    9. User authentication/strong passwords
    10. Multifactor authentication
    11. Directory permissions
    12. VPN
    13. DLP
    14. Access control lists
    15. Smart card
    16. Email filtering
    17. Trusted/untrusted software sources
    18. Principle of least privilege
  • Compare and contrast wireless security protocols and authentication methods
    1. Protocols and encryption
    2. Authentication
  • Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
    1. Malware
    2. Tools and methods
  • Compare and contrast social engineering, threats, and vulnerabilities
    1. Social engineering
    2. DDoS
    3. DoS
    4. Zero-day
    5. Man-in-the-middle
    6. Brute force
    7. Dictionary
    8. Rainbow table
    9. Spoofing
    10. Non-compliant systems
    11. Zombie
  • Compare and contrast the differences of basic Microsoft Windows OS security settings
    1. User and groups
    2. NTFS vs. share permissions
    3. Shared files and folders
    4. System files and folders
    5. User authentication
    6. Run as administrator vs. standard user
    7. BitLocker
    8. BitLocker To Go
    9. EFS
  • Given a scenario, implement security best practices to secure a workstation
    1. Password best practices
    2. Account management
    3. Disable autorun
    4. Data encryption
    5. Patch/update management
  • Given a scenario, implement methods for securing mobile devices
    1. Screen locks
    2. Remote wipes
    3. Locator applications
    4. Remote backup applications
    5. Failed login attempts restrictions
    6. Antivirus/Anti-malware
    7. Patching/OS updates
    8. Biometric authentication
    9. Full device encryption
    10. Multifactor authentication
    11. Authenticator applications
    12. Trusted sources vs. untrusted sources
    13. Firewalls
    14. Policies and procedures
  • Given a scenario, implement appropriate data destruction and disposal methods
    1. Physical destruction
    2. Recycling or repurposing best practices
  • Given a scenario, configure security on SOHO wireless and wired networks
    1. Wireless
    2. Change default usernames and passwords
    3. Enable MAC filtering
    4. Assign static IP addresses
    5. Firewall settings
    6. Port forwarding/mapping
    7. Disabling ports
    8. Content filtering/parental controls
    9. Update firmware
    10. Physical security

Software Troubleshooting

  • Given a scenario, troubleshoot Microsoft Windows OS problems
    1. Common symptoms
    2. Common solutions
  • Given a scenario, troubleshoot and resolve PC security issues
    1. Common symptoms
  • Given a scenario, use best practice procedures for malware removal
    1. Identify and research malware symptoms.
    2. Quarantine the infected systems.
    3. Disable System Restore (in Windows).
    4. Remediate the infected systems.
    5. Schedule scans and run updates.
    6. Enable System Restore and create a restore point (in Windows).
    7. Educate the end user
  • Given a scenario, troubleshoot mobile OS and application issues
    1. Common symptoms
  • Given a scenario, troubleshoot mobile OS and application security issues
    1. Common symptoms

Operational Procedures

  • Compare and contrast best practices associated with types of documentation
    1. Network topology diagrams
    2. Knowledge base/articles
    3. Incident documentation
    4. Regulatory and compliance policy
    5. Acceptable use policy
    6. Password policy
    7. Inventory management
  • Given a scenario, implement basic change management best practices
    1. Documented business processes
    2. Purpose of the change
    3. Scope the change
    4. Risk analysis
    5. Plan for change
    6. End-user acceptance
    7. Change board
    8. Backout plan
    9. Document changes
  • Given a scenario, implement basic disaster prevention and recovery methods
    1. Backup and recovery
    2. Backup testing
    3. UPS
    4. Surge protector
    5. Cloud storage vs. local storage backups
    6. Account recovery options
  • Explain common safety procedures
    1. Equipment grounding
    2. Proper component handling and storage
    3. Toxic waste handling
    4. Personal safety
    5. Compliance with government regulations
  • Explain environmental impacts and appropriate controls
    1. MSDS documentation for handling and disposal
    2. Temperature, humidity level awareness, and proper ventilation
    3. Power surges, brownouts, and blackouts
    4. Protection from airborne particles
    5. Dust and debris
    6. Compliance to government regulations
  • Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts
    1. Incident response
    2. Licensing/DRM/EULA
    3. Regulated data
    4. Follow all policies and security best practices
  • Given a scenario, use proper communication techniques and professionalism
    1. Use proper language and avoid jargon, acronyms, and slang, when applicable
    2. Maintain a positive attitude/ project confidence
    3. Actively listen (taking notes) and avoid interrupting the customer
    4. Be culturally sensitive - Use appropriate professional titles, when applicable
    5. Be on time (if late, contact the customer)
    6. Avoid distractions
    7. Dealing with difficult customers or situations
    8. Set and meet expectations/timeline and communicate status with the customer
    9. Deal appropriately with customer's confidential and private materials
  • Identify the basics of scripting
    1. Script file types
    2. Environment variables
    3. Comment syntax
    4. Basic script constructs
    5. Basic data types
  • Given a scenario, use remote access technologies
    1. RDP
    2. Telnet
    3. SSH
    4. Third-party tools
    5. Security considerations of each access method

CompTIA Network+ Certification Courses
1.0 Networking Concepts
2.0 Infrastructure
3.0 Network Operations
4.0 Network Security
5.0 Network Troubleshooting and Tools

CompTIA Security+ Certification Training
1.0 Identify the fundamental components of information security
2.0 Analyze risk
3.0 Identify various threats to information security
4.0 Conduct security assessments to detect vulnerabilities
5.0 Implement security for hosts and software
6.0 Implement security for networks
7.0 Manage identity and access
8.0 Implement cryptographic solutions in the organization
9.0 Implement security at the operational level
10.0 Address security incidents
11.0 Ensure the continuity of business operations in the event of an incident

CompTIA Server+ Certification

Server Architecture

  • Purpose and function of server form factors
  • Install, configure and maintain server components
  • Compare and contrast power and cooling components

Server Administration

  • Install and configure server operating systems
  • Compare and contrast server roles and requirements for each
  • Use access and control methods to administer a server
  • Perform proper server maintenance techniques
  • Importance of asset management and documentation
  • Purpose and operation of virtualization components

Storage

  • Install and deploy primary storage devices based on given specifications and interfaces
  • Configure RAID using best practices
  • Hardware and features of various storage technologies
  • Calculate appropriate storage capacity and plan for future growth

Security

  • Compare and contrast physical security methods and concepts
  • Apply server hardening techniques
  • Basic network security systems and protocols
  • Implement logical access control methods based on company policy
  • Implement data security methods and secure storage disposal techniques
  • Implement proper environmental controls and techniques

Networking

  • Configure servers to use IP addressing and network infrastructure services
  • Compare and contrast various ports and protocols
  • Install cables and implement proper cable management procedures

Disaster Recovery

  • Importance of disaster recovery principles
  • Implement appropriate backup techniques

Troubleshooting

  • Troubleshooting theory and methodologies
  • Troubleshoot hardware problems and appropriate tools and methods
  • Troubleshoot software problems and appropriate tools and methods
  • Diagnose network problems and appropriate tools and methods
  • Troubleshoot storage problems and appropriate tools and methods
  • Diagnose security issues and appropriate tools and methods

Intended Audience For This CompTIA Server+ Certification Prep (Exam SK0-004)

  • Server Support Technician
  • IT/Server Technician
  • Server Administrator
  • Storage Administrator

Cisco Certified Network Associate CCNA Certification Training Courses

This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos.

Instructor-Led (Lecture)

Exploring the Functions of Networking

Introducing the Host-to-Host Communications Model

Operating Cisco IOS Software

Introducing LANs

Exploring the TCP/IP Link Layer

Starting a Switch

Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets

Explaining the TCP/IP Transport Layer and Application Layer

Exploring the Functions of Routing

Configuring a Cisco Router

Exploring the Packet Delivery Process

Troubleshooting a Simple Network

Introducing Basic IPv6

Configuring Static Routing

Implementing VLANs and Trunks

Routing Between VLANs

Introducing OSPF

Improving Redundant Switched Topologies with EtherChannel

Explaining Basics of ACL

Enabling Internet Connectivity

Explaining the Evolution of Intelligent Networks

Introducing System Monitoring

Managing Cisco Devices

Securing Administrative Access

Implementing Device Hardening

Self-Study

Building Redundant Switched Topologies

Exploring Layer 3 Redundancy

Introducing WAN Technologies

Introducing QoS

Explaining Wireless Fundamentals

Introducing Architectures and Virtualization

Examining the Security Threat Landscape

Implementing Threat Defense Technologies

Lab outline

Get Started with Cisco Command-Line Interface (CLI)

Observe How a Switch Operates

Perform Basic Switch Configuration

Implement the Initial Switch Configuration

Inspect TCP/IP Applications

Configure an Interface on a Cisco Router

Configure and Verify Layer 2 Discovery Protocols

Implement an Initial Router Configuration

Configure Default Gateway

Explore Packet Forwarding

Troubleshoot Switch Media and Port Issues

Troubleshoot Port Duplex Issues

Configure Basic IPv6 Connectivity

Configure and Verify IPv4 Static Routes

Configure IPv6 Static Routes

Implement IPv4 Static Routing

Implement IPv6 Static Routing

Configure VLAN and Trunk

Troubleshoot VLANs and Trunk

Configure a Router on a Stick

Implement Multiple VLANs and Basic Routing Between the VLANs

Configure and Verify Single-Area OSPF

Configure and Verify EtherChannel

Improve Redundant Switched Topologies with EtherChannel

Configure and Verify IPv4 ACLs

Implement Numbered and Named IPv4 ACLs

Configure a Provider-Assigned IPv4 Address

Configure Static NAT

Configure Dynamic NAT and Port Address Translation (PAT)

Implement PAT

Log into the WLC

Monitor the WLC

Configure a Dynamic (VLAN) Interface

Configure a DHCP Scope

Configure a WLAN

Define a Remote Access Dial-In User Service (RADIUS) Server

Explore Management Options

Explore the Cisco DNA Center

Configure and Verify NTP

Configure System Message Logging

Create the Cisco IOS Image Backup

Upgrade Cisco IOS Image

Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI

Secure Console and Remote Access

Enable and Limit Remote Access Connectivity

Secure Device Administrative Access

Configure and Verify Port Security

Implement Device Hardening

Linux Fast Track

The Linux Foundation

Linux Philosophy and Concepts

Linux Basics and System Startup

Graphical Interface

System Configuration from the Graphical Interface

Common Applications

Command Line Operations

Finding Linux Documentation

Processes

File Operations

Text Editors

User Environment

Manipulating Text

Network Operations

The Bash Shell and Basic Scripting

More on Bash Shell Scripting

Printing

Local Security Principles

Certified Ethical Hacker Certification Classes
1.0 Introduction to Ethical Hacking
2.0 Footprinting and Reconnaissance
3.0 Scanning Networks
4.0 Enumeration
5.0 Vulnerability Analysis
6.0 System Hacking
7.0 Malware Threats
8.0 Sniffing
9.0 Social Engineering
10.0 Denial-of-Service
11.0 Session Hijacking
12.0 Evading IDS, Firewalls, and Honeypots
13.0 Hacking Web Servers
14.0 Hacking Web Applications
15.0 SQL Injection
16.0 Hacking Wireless Networks
17.0 Hacking Mobile Platforms
18.0 IoT Hacking
19.0 Cloud Computing
20.0 Cryptography

Hacking Apprentice Program Prerequisites
 
  • This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician.
  • CompTIA A+
  • HS Diploma/GED
 

Income Expectation

$111,200/yr

The average salary for a Hacking Professional Certified Employee is $111,200 in New York City. Salary estimates are provided by Cybersecurity.

 

Hacking Apprentice Employment Objective

Upon completion of this course, and the certifying exam(s), the student will be qualified to take a job as a

Cybersecurity Analyst
Hacker Specialist
Networking Executive
Security Administrator.

Hacking Apprentice Career Pathways

an overview of network programmability and the related controller types and tools that are available to support software defined network architectures A full suite of labs have been developed using the virtual IOS environment with flexible topologies that reinforce concepts with hands-on, guided discovery and challenge labs that align to each lesson module. By taking this course, you will become much more desirable in the cybersecurity industry, and have a higher paying career.

Hacking Professional Career pathways include: cybersecurity, support engineer, network administrator, network designer, computer security engineer, network engineer, and more.

CompTIA Network+ Certification Preparation

CompTIA Network+ Certification Preparation

CompTIA Security+ Certification Preparation

CompTIA Server+ Certification Preparation

Linux Fast Track

Cisco Certified Network Associate (CCNA) 200-301

Certified Ethical Hacker Certification Preparation

Tuition

$19,900

CERTIFICATION EXAM TITLE:
CompTIA A+ 220-1001 Certification Preparation
CompTIA A+ 220-1002 Certification Preparation
CompTIA Network+ Certification Preparation
CompTIA Security+ Certification Preparation
CompTIA Server+ Certification Preparation
Linux Fast Track

Cisco Certified Network Associate (CCNA) 200-301
Certified Ethical Hacker Certification

Availability: Exams are delivered across the world through its Authorized Test Partner, PearsonVUE.
5 days (9:00 – 5:00)

 
900 HOURS PROGRAM SCHEDULE DATES
 
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date & Graduation Date
05/21/2020 to 05/25/2020
5 Days (40 Hours)
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date & Graduation Date
06/06/2020 to 06/15/2020
5 Days (40 Hours)
Hacking Apprentice
9AM - 5PM (Weekends)
Start Date & Graduation Date
06/30/2020 to 07/29/2020
2 Days (16 Hours)
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date & Graduation Date
07/02/2020 to 07/06/2020
5 Days (40 Hours)
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date & Graduation Date
07/23/2020 to 07/27/2020
5 Days (40 Hours)
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date & Graduation Date
08/13/2020 to 08/17/2020
5 Days (40 Hours)
Hacking Apprentice
9AM - 5PM (Weekends)
Start Date & Graduation Date
09/14/2020 to 10/07/2020
2 Days (16 Hours)
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date
Graduation Date
05/21/2020
05/25/2020
5 Days (40 Hours) Enroll Now
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date
Graduation Date
06/06/2020
06/15/2020
5 Days (40 Hours) Enroll Now
Hacking Apprentice
9AM - 5PM (Weekends)
Start Date
Graduation Date
06/30/2020
07/29/2020
2 Days (16 Hours) Enroll Now
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date
Graduation Date
07/02/2020
07/06/2020
5 Days (40 Hours) Enroll Now
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date
Graduation Date
07/23/2020
07/27/2020
5 Days (40 Hours) Enroll Now
Hacking Apprentice
9AM - 5PM (Weekdays)
Start Date
Graduation Date
08/13/2020
08/17/2020
5 Days (40 Hours) Enroll Now
Hacking Apprentice
9AM - 5PM (Weekends)
Start Date
Graduation Date
09/14/2020
10/07/2020
2 Days (16 Hours) Enroll Now