CompTIA CDIA Plus Certification
The CompTIA CDIA+ certification is the industry standard for computer support technicians. It shows competency as an IT professional. The certification, which is international and vendor-neutral, proves competency in installation, preventative maintenance, networking, security and troubleshooting and other areas in numerous technologies and operating systems from such vendors as Microsoft, Apple, Novell, EC-Council, Oracle, and some of the Linux variations.
Income Expectation
$111,200/yr
The average salary for a CompTIA CDIA Plus Certified Employee is $111,200 in New York City. Salary estimates are provided by CompTIA.
Program Description:
The CompTIA CDIA+ certification is an internationally recognized credential acknowledging competency and professionalism in the document imaging/document management industry. CDIA+ candidates possess critical knowledge of all major areas and technologies used to plan, design and specify an imaging system
 Intended: 
              IT professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as NetWare, Macintosh, UNIX/Linux, and OS/2, who wants to: further a career in Information Technology by acquiring a foundational knowledge of document imaging topics; prepare for the CompTIA CDIA examination or use CDIA as the foundation for specialized workflow, imaging or document storage career roles.
CompTIA CDIA+ Certification Program Objectives:
 Document Storage and Retention 
              Workflow Processing 
              Document Indexing 
              COLD (Computer Output to Laser Disk) 
              Document Security Requirements 
              Business Process Re-engineering 
              Document Scanning 
              Document Output Formats 
CompTIA CDIA+ Certification Program Outline
 The Rationale for Android App Security 
              Identify the Need for Security 
              Identify Security Requirements and Expectations 
              Include Security in Your Development Processes 
              Identify Your Approach to Risk Management 
            
 Gather Business Requirements 
              Define the problem and determine the goal of the solution 
              Determine the internal groups that will work with the solution and assess their skill levels 
              Determine the external groups that will work with the solution 
              Determine where will people access the system, in which locations, using what type of connections 
              Determine the regional and organizational compliance, legal, and standardization requirements (e.g.,document retention rules and laws) 
              Determine the security needs (e.g., access, document security) 
              Determine the project timeline 
              Identify integration requirements (e.g., with legacy systems) 
              Determine the capacity requirements for server processing and storage (e.g., peak processing) 
              Document quantities of documents (both electronic and paper if applicable 
              Determine the long-term storage capacity requirements 
              Define query requirements (e.g., numb er per day, number of query users) 
              Analyze the input requirements (resolution, image size, volume, scanner performance) to select the appropriate input 
              devices and interfaces based on the characteristics of the source documents (e.g.,color, weight, finish) 
              Calculate the amount of image and indexing data (database or file system) to be stored based on the document life cycle requirements 
              Determine the needed capacity, response times, and throughput rates 
              Collect all detailed information required for solution design (e.g., technological environment, infrastructure, types of operating systems, databases) 
              Determine growth needs and plan for scalability 
              Determine the required service levels for maintenance 
              Analyze the current document process and determine the document characteristics Determine and confirm capacity, quantities and types of data to validate the storage requirements and growth estimates 
              Determine the need for back file or data conversion/migration is required 
              Create specific requirements document 
              Document the current records storage management requirements and how the new solution addresses these 
              Determine workflow rules (e.g., flow diagrams) 
              Determine output requirements (fax, email, printing) 
              Determine documents preparation requirements, user interactions, Determine paper handling and disposal process 
              Recommend alternatives for document preparation 
              Define specific retrieval needs and system requirements to support retrieval 
              Document all the information collected during requirements-gathering phase, obtaining user's acceptance sign-off and validation towards them 
            
 Analyze Business Process 
              Gather the business requirements and expectations Scope the different aspects of the current business process (e.g., individual tasks, processes, process owners, interaction with people and processes, outside influences) 
              Analyze all factors that have to do with current business processes 
              Determine the volumes (input/output) for the selected business process 
              Perform a Simulation of the current process to determine the baseline 
              Identify the cost structure and budget (e.g., project and company) 
              Identify the company's vision and mission, goals, characteristics of the business (e.g., business vision, current and future business challenges, business standards, IT infrastructure) 
              Define the methodology of the business analysis (e.g., using a holistic approach) and the necessary tools 
              Perform continuous monitoring to track the current process evolution, additional new processes, and confirm capacity, quantity and type of data to confirm storage requirements and growth estimates 
              Use the information gathered to determine whether a document imaging/document management solution is viable
              Create a communication plan (e.g., types, content, and media) in order to disseminate project goals and benefits at strategic and operational levels 
              Define informal aspects of the business process 
              Identify the business culture and organizational hierarchy 
              Determine the current document security process 
              Identify the current technology (e.g., scanners, PCs, servers, software) and determine whether a record storage management process/solution currently exists 
              Harden Internal Systems and Services 
              Harden DHCP Servers 
              Harden Network File and Print Servers 
              Harden Application Servers 
            
 Recommend Solution 
              Identify the possible business scenarios to determine a variety of solutions (e.g., minimal solution, comfort zone solution, best practice solution) 
              Review and validate the requirements with all parties affected by the proposed solution (e.g., end users, IT, CIO, administrators, help desk, support) 
              Quantify the alternative solutions by identifying the features, benefits, ROI 
              3.4 Identify the consequences of each of the alternative solutions 
              Identify the impact of proposed solution on the network 
              Identify the impact of proposed solution to the end user (e.g., revisions to job roles, departmental organization, training, physical document security) 
              Identify, verify, and document assumptions, risks, and issues related to the project 
              Propose the optimal solution 
              Present proposed solution design to client for review (e.g., prototype/mock-up screens or flow diagram of requirements process) 
              Compare the proposed solution to the current process 
              Gather feedback from presentations in an interactive session and get commitment from the client 
 Design Solution 
              Select and configure hardware, software, and define the infrastructure 
              Select required image enhancement tools 
              Determine the appropriate types of storage 
              Determine server/client/network/ web operating systems and databases 
              Define components of the solution and identify the reuse of existing components 
              Calculate image size and volume of both input and output to estimate the impact on network performance based upon solution requirements (e.g., intranet and Internet)
              Define the indexing structure (indices, document classes, attributes) 
              Define integration aspects (e.g., legacy systems, desktop applications, CRM/ERP/B2B/B2C/B2All) 
              Define the database management solution 
              Define the user interface 
              Select the required retrieval devices (e.g., monitors: size, resolution and refresh rate) based upon the characteristics of the source documents and on the characteristics of use (e.g., multiple exhibition)
              Design the input environment 
              Document the capture process (e.g., format transformation or conversion, image import, scanning, faxes, email, or combination, exception process) 
              Design how automated techniques such as OCR/ICR/OMR/MICR Barcodes/Forms Recognition, will be utilized to reduce data entry while extracting data from the documents is carried out 
              Design the output environment 
              Select the required interfaces based upon the characteristics of both the source documents and the output devices 
              Design the document management environment (e.g., security, authorization, versioning) 
              Design the storage architecture based on the storage performance issues (e.g., physical location, cost, speed, retrieval time, environment) 
              Test the design (e.g., convert (scan etc.) a suitable quantity and types of documents) 
              Design the backlog conversion strategy and methodology
              Define and design the roles and responsibilities to maintain and administer the solution 
              Design the appropriate levels of system security 4.23 Design the rules for the business processes that apply to the documents managed via workflow tools integrated to the DM/DI system (e.g., ad hoc or structured) 
              Design the backup/disaster recovery methodology 
              Define the types of users and the associated user profile 
              Obtain and document client's agreement towards the results accomplished during this phase 
            
 Developing the Project Schedule
              Develop the implementation plan (e.g., timeline, objectives, quality assurance) 
              Determine the need for change management 
              Explain the responsibilities and plan for implementing the solution 
              Assess entry level skills and develop a training plan for selected groups and individuals 
              Obtain and document client's agreement towards the results accomplished during this phase 
  Entrance Requirements: 
              Bachelors of other than computer field: 
              Computer related experience or one or two classes for computer basics in college 
              H.S. Diploma plus one year of experience in computer Industry. 
SCHEDULE DATES - 35 Hour Hands-On Program
| CompTIA CDIA+ 9AM - 5PM (Weekdays)  Start Date & Graduation Date  03/21/2022 to 03/25/2022 5 Days (35 Hours) a Week for 1 Week | ||||
| CompTIA CDIA+ 9AM - 5PM (Weekdays)  Start Date & Graduation Date  04/11/2022 to 04/15/2022 5 Days (35 Hours) a Week for 1 Week | ||||
| CompTIA CDIA+ 9AM - 5PM (Weekdays)  Start Date & Graduation Date  05/02/2022 to 05/06/2022 5 Days (35 Hours) a Week for 1 Week | ||||
| CompTIA CDIA+ 9AM - 5PM (Weekdays)  Start Date & Graduation Date  06/13/2022 to 06/17/2022 5 Days (35 Hours) a Week for 1 Week | ||||
| CompTIA CDIA+ 9AM - 5PM (Weekdays)  Start Date & Graduation Date  07/11/2022 to 07/15/2022 5 Days (35 Hours) a Week for 1 Week | ||||
| CompTIA CDIA+ 9AM - 5PM (Weekdays) |  Start Date   Graduation Date | 03/21/2022 03/25/2022 | 5 Days (35 Hours) a Week for 1 Week | |
| CompTIA CDIA+ 9AM - 5PM (Weekdays) |  Start Date   Graduation Date | 04/11/2022 04/15/2022 | 5 Days (35 Hours) a Week for 1 Week | |
| CompTIA CDIA+ 9AM - 5PM (Weekdays) |  Start Date   Graduation Date | 05/02/2022 05/06/2022 | 5 Days (35 Hours) a Week for 1 Week | |
| CompTIA CDIA+ 9AM - 5PM (Weekdays) |  Start Date   Graduation Date | 06/13/2022 06/17/2022 | 5 Days (35 Hours) a Week for 1 Week | |
| CompTIA CDIA+ 9AM - 5PM (Weekdays) |  Start Date   Graduation Date | 07/11/2022 07/15/2022 | 5 Days (35 Hours) a Week for 1 Week | |
- CompTIA
- CISCO
- EC-Council
As an authorized CompTIA partner, Institute of Information Technology offers up-to-date CompTIA training and certification courses. A CompTIA certification is an international industry credential.
- CompTIA A+
- CompTIA Network+
- CompTIA A+ and Network+ Boot Camp
- IT Professional Bootcamp
- CompTIA Security+
- CompTIA Server+
- CompTIA Project+
- CompTIA Cybersecurity Analyst (CySA+)
- CompTIA Train The Trainer (CTT+)
- CompTIA Cloud+ Training
- CompTIA PenTest+ Certification Training
- CompTIA CDIA+
- CompTIA Linux+ Powered by LPI
- CompTIA Advanced Security Practitioner (CASP) Training
- Network and System Administrator
- Computer Support Specialist
- Computer Systems Networking and Telecommunications Specialist
- Network and System Administrator Manager
- Computer Support Aadministrator
- Computer And Information Systems Security Analyst
- Computer Systems Networking and Telecommunications Administrator
- Computer Systems Networking And Telecommunications Manager
- Network And System Administrator Manager Professional
Institute of Information Technology is honored to be an authorized CISCO Network Academy Training Institute. CISCO is the worldwide leader in networking. CISCO has shaped the future of the internet by transforming how people connect, communicate and collaborate.
- CISCO MASTER
- Interconnecting Cisco Networking Devices, Part 1 - ICND1
- Interconnecting Cisco Networking Devices, Part 2 - ICND2
- CCNA Routing and Switching
- CCNP Routing and Switching
- CISCO-Individualized CCNA Routing and Switching
- CCNA Security
- CCNP Security
- CCNA Collaboration
- CCNP Collaboration
- CCNA Service Provider
- CCNP Service Provider
- Implementing Cisco Collaboration Devices
- Implementing Cisco Video Network Devices
- Troubleshooting Cisco IP Telephony & Video
- Implementing Cisco Collaboration Application
- Implementing Cisco IP Telephony & Video, Part 1
- Implementing Cisco IP Telephony & Video, Part 2
Institute of Information Technology has the honor of being an authorized EC-Council Accredited Training Center. EC-Council is the worldwide leader in Cyber Security course content. EC-Council has changed the future of the internet by transforming how people deal with and prevent cyberattack.
- Hacking Apprentice
- Hacking Professional
- Cybersecurity Master
- Hacking Master
- Certified Ethical Hacker Training Program C| EH
- Certified Ethical Hacker Practical C| EH
- Certified Network Defender Certification C| ND
- Licensed Penetration Tester Master L| PT (Master)
- Computer Hacking Forensic Investigator Certification C| HFI
- EC-Council Certified Security Analyst (ECSA) Penetration Testing
- Certified Secure Computer User C| SCU
- Certified Network Defense Architect C| NDA
- Project Management in IT Security P| MIT
- EC-Council Network Security Administrator E| NSA
- Certified Cyber Marketing Professional C| CMP
- EC- Council Certified Incident Handler Program E| CIH
- EC-Council Certified Security Specialist E| CSS
- EC-Council Certified Secure Programmer .NET E| CSP
- EC-Council Certified Disaster Recovery E| CDR
- Virtualization Technology Professional E| CVT
- EC-Council Certified Encryption Specialist E| CES
- EC-COUNCIL DISASTER RECOVERY PROFESSIONAL E| DRP
- Advanced Network Defense (CAST 614)
- Certified Application Security Engineer (CASE)
- Cyber Security Boot Camp

