Skip to content
Cybersecurity , CompTIA Network+ Security+ CCNA cover image

Cybersecurity , CompTIA Network+ Security+ CCNA
Fortray Global Services LTD

Earn up-to 55K OR Your Money Back

Summary

Price
£2,999.99 inc VAT
Or £250.00/mo. for 12 months...
Study method
Online + live classes
Course format
Video
Duration
3 months · Part-time
Certifications
CompTIA Network+
CompTIA Security+
Cisco CCNA Routing and Switching
Professional certification What's this?
Additional info
  • Tutor is available to students
  • Job guarantee programme is included in this course

1 student purchased this course

Add to basket or enquire

Buy with Apple Pay
Buy with Google Pay

Overview

  • Are you looking to launch a new career in IT Networking / Cyber Security in a Physical /Virtual Classroom with 20 years of experienced trainers and consultants?
  • Are you bored with Video-based training programs, where you cannot interact with trainers and cannot find any guide for LAB?
  • Are you looking for the best classroom training environment and career advice from a 15 to 20-year Industry experienced team?
  • Look no further, with our IT networking and Cyber Security program, you are guaranteed to be offered world classroom experienced in a live and interactive environment with a 100% money-back guarantee.

Certifications

CompTIA Network+

CompTIA Security+

Awarded by CompTIA

Cisco CCNA Routing and Switching

Awarded by Cisco Systems

Course media

Description

  • The course consists of 10 days of classroom-based training during weekdays or weekends, including hands-on learning experience with Cisco and other vendors like juniper, Check Point, Palo Alto, Fortinet, and major networking and security products.
  • We are so confident you will be offered world-class training that is if for any reason you were not, we will refund 100% of your course fees back to you.

Lesson 1: Explaining the OSI Model and TCP/IP Models

Lesson 2: Explaining Properties of Network Traffic

Lesson 3: Installing and Configuring Switched Networks

Lesson 4: Configuring IP Networks

Lesson 5: Installing and Configuring Routed Networks

Lesson 6: Configuring and Monitoring Ports and Protocols

Lesson 7: Explaining Network Applications and Storage Services

Lesson 8: Monitoring and Troubleshooting Networks

Lesson 9: Explaining Networking Attacks and Mitigations

Lesson 10: Installing and Configuring Security Devices

Lesson 11: Explaining Authentication and Access Controls

Lesson 12: Deploying and Troubleshooting Cabling Solutions

Lesson 13: Implementing and Troubleshooting Wireless Technologies

Lesson 14: Comparing and Contrasting WAN Technologies

Lesson 15: Using Remote Access Methods

Lesson 16: Identifying Site Policies and Best Practices

NETWORK+ LABS:

Exploring the Lab Environment
Configuring Ethernet Networking
Configuring IPv4 Networking
Configuring IPv4 Subnets
Configuring IPv6 Networking
Configuring Address Assignments
Configuring Routing
Using Port Scanning Tools
Configuring DNS Servers
Configuring Application Protocols
Using Event Management and Performance Monitors
Configuring a NAT Firewall
Securing Appliance Administration with RADIUS Authentication
Configuring Secure Access Channels

SECURITY+ TOPICS:

Topics Covered

Lesson 1: Comparing Security Roles and Security Controls

Lesson 2: Explaining Threat Actors and Threat Intelligence

Lesson 3: Performing Security Assessments

Lesson 4: Identifying Social Engineering and Malware

Lesson 5: Summarizing Basic Cryptographic Concepts

Lesson 6: Implementing Public Key Infrastructure

Lesson 7: Implementing Authentication Controls

Lesson 8: Implementing Identity and Account Management Controls

Lesson 9: Implementing Secure Network Designs

Lesson 10: Implementing Network Security Appliances

Lesson 11: Implementing Secure Network Protocols

Lesson 12: Implementing Host Security Solutions

Lesson 13: Implementing Secure Mobile Solutions

Lesson 14: Summarizing Secure Application Concepts

Lesson 15: Implementing Secure Cloud Solutions

Lesson 16: Explaining Data Privacy and Protection Concepts

Lesson 17: Performing Incident Response

Lesson 18: Explaining Digital Forensics

Lesson 19: Summarizing Risk Management Concepts

Lesson 20: Implementing Cybersecurity Resilience

Lesson 21: Explaining Physical Security

SECURITY+ LAB:

Labs Available:

Assisted Lab: Exploring the Lab Environment

Assisted Lab: Scanning and Identifying Network Nodes

Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools

Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan

Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor

APPLIED LAB: Performing Network Reconnaissance and Vulnerability Scanning

Assisted Lab: Managing the Lifecycle of a Certificate

Assisted Lab: Managing Certificates with OpenSSL

Assisted Lab: Auditing Passwords with a Password Cracking Utility

Assisted Lab: Managing Centralized Authentication

Assisted Lab: Managing Access Controls in Windows Server

Assisted Lab: Configuring a System for Auditing Policies

Assisted Lab: Managing Access Controls in Linux

APPLIED LAB: Configuring Identity and Access Management Controls

Assisted Lab: Implementing a Secure Network Design

Assisted Lab: Configuring a Firewall

Assisted Lab: Configuring an Intrusion Detection System

Assisted Lab: Implementing Secure Network Addressing Services

Assisted Lab: Implementing a Virtual Private Network

Assisted Lab: Implementing a Secure SSH Server

Assisted Lab: Implementing Endpoint Protection

APPLIED LAB: Securing the Network Infrastructure

Assisted Lab: Identifying Application Attack Indicators

Assisted Lab: Identifying a Browser Attack

Assisted Lab: Implementing PowerShell Security

Assisted Lab: Identifying Malicious Code

APPLIED LAB: Identifying Application Attacks

Assisted Lab: Managing Data Sources for Incident Response

Assisted Lab: Configuring Mitigation Controls

Assisted Lab: Acquiring Digital Forensics Evidence

Assisted Lab: Backing Up and Restoring Data in Windows and Linux

APPLIED LAB: Managing Incident Response, Mitigation and Recovery

CCNA TOPICS:

Implementing VLANs and Trunks
Routing Between VLANs
Introducing OSPF
Building Redundant Switched Topologies
Improving Redundant Switched Topologies with EtherChannel
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Explaining Basics of ACL
Enabling Internet Connectivity
Introducing QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Explaining the Evolution of Intelligent Networks
Introducing System Monitoring
Managing Cisco Devices
Examining the Security Threat Landscape
Implementing Threat Defense Technologies
Securing Administrative Access
Implementing Device Hardening

CCNA LABS:

Lab outline


Get Started with Cisco Command-Line Interface (CLI)
Observe How a Switch Operates
Perform Basic Switch Configuration
Implement the Initial Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Implement an Initial Router Configuration
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Implement IPv4 Static Routing
Implement IPv6 Static Routing
Configure VLAN and Trunk
Troubleshoot VLANs and Trunk
Configure a Router on a Stick
Implement Multiple VLANs and Basic Routing Between the VLANs
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Improve Redundant Switched Topologies with EtherChannel
Configure and Verify IPv4 ACLs
Implement Numbered and Named IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and Port Address Translation (PAT)
Implement PAT
Log into the WLC
Monitor the WLC
Configure a Dynamic (VLAN) Interface
Configure a DHCP Scope
Configure a WLAN
Define a Remote Access Dial-In User Service (RADIUS) Server
Explore Management Options
Explore the Cisco DNAâ„¢ Center
Configure and Verify NTP
Configure System Message Logging
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Secure Device Administrative Access
Configure and Verify Port Security
Implement Device Hardening

Who is this course for?

The courses are for those who want to make a career in IT and Networking /Cyber Security or already working as a Help desk / Service Desk Role or Desktop role.

Requirements

  • No experience or qualification needed

Career path

After this students will be able to apply for the following jobs:

  • IT Technician
  • Cybersecurity Analyst
  • Network Support Engineer
  • Network Engineer
  • Network Security Engineer

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2026. All rights reserved.