Hands-On Core Technical Trainer Bootcamp Training Courses Near Me
Why Choose Us | Employment Objective
- Description
- Schedule
- What You'll Learn
- Outline
- Prerequisites
- Income Expectations
- Next Step
- Tuition Fee
- Exam
Core Technical Trainer Bootcamp Training Classes
At Institute of Information Technology, you can learn the basics of computer hardware, software, mobile computing, networking, troubleshooting, and emerging technologies.In this course, students will identify PC components, work with files and folders, and conduct basic software installations. This course will provide students with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers. In addition, it covers the essential skills and information needed to set up, configure, maintain, troubleshoot, and perform preventative maintenance of the hardware and software components of a basic personal computer workstation and basic wireless devices. Students will also implement basic security measures and implement basic computer and user support practices. The ITF+ certification is for individuals considering a career in IT. It is an ideal stepping stone to more advanced certifications such as CompTIA A+, and with specialized experience, CompTIA Network+ and CompTIA Security+. The new ITF+ exam focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.
Network and System Administrator Manager program that prepares individuals to manage the computer operations and control the system configurations emanating from a specific site or network hub. Includes instruction in computer hardware and software and applications; local area (LAN) and wide area (WAN) networking; principles of information systems security; disk space and traffic load monitoring; data backup; resource allocation; and setup and takedown procedures.
Course Intended
This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician.
CompTIA Certified Technical Trainer (CTT+) Certification is a cross-industry credential that provides recognition that an instructor has attained a standard of excellence in the training field.
Institute of Information Technology CompTIA CTT+ course is the only 5-day class that prepares you for all three CompTIA CTT+ exams. The course not only focuses on traditional classroom style instruction, but also on delivering training virtually. IIT has packaged this unique and comprehensive program while considering the co-existence of both classroom and virtual training styles, and the growing adoption/popularity of virtual training.
Institute of Information Technology's CompTIA CTT+ is a highly interactive and participant-driven course designed to cultivate the technical training and concept delivery skills in trainers, technicians, subject matter experts, presenters, sales and support staff in any organization. The participants will connect abilities, theories and situations to create their most effective instructional styles. This course is accepted by Microsoft and ProSoft towards their MCT.
In this course, each student will be required to prepare training materials and to serve as the class instructor for a minimum of 5 hours.
Earning the CTT+ certification designates you as a recognized trainer in your field. As an instructor, you not only have to plan engaging classroom lectures, practice tasks and exams, but you must also be a knowledgeable and effective communicator. CTT+ certification provides comprehensive training standards to validate your skills in a traditional or virtual classroom environment, and ensures that you can teach effectively and step up to the front of the class with confidence.
CTT+ is trusted by leading organizations
Corporations such as Dell, Microsoft, Adobe, Cisco, IBM and Ricoh accept CompTIA CTT+ as proof that an instructor is qualified to teach their programs.
CTT+ lets you teach with confidence
CompTIA CTT+ validates that you have the necessary skills and knowledge to prepare, present, facilitate and evaluate a training session. By requiring a video submission of the training session instruction as part of the certification, CTT+ ensures that candidates have effective teaching skills.
CTT+ verifies essential teaching modalities
In a survey conducted by the Training Associates, 87% of respondents use instructor-led training (ILT) as a primary learning modality. Moreover, 74% of organizations take a blended approach to learning, augmenting ILT delivery with either a mobile, video, or social component. Earning a CTT+ certification can validate your skills as a recognized trainer in either a virtual or physical classroom.
CompTIA CTT+ is a qualifying certification towards your MCT status validating your instructional skills. Please note that simply taking the CTT+ course or passing the exams won't grant you a MCT status. You will need to meet other Microsoft requirements in addition to achieving your CTT+ certification.
Institute of Information Technology CTT+ Student Care:
- Maximum of 8 students per class: Hands-On Personalized Training Care
- Exam Preparation Included
- We not only record your videos, but also review your video files prior to submission, and convert the files for you based on CompTIA accepted formats.
- We strongly recommend preparing for all 3 exams even though only 2 exams are required for a CompTIA CTT+ certification designation. Both Classroom and Virtual based are equally important given the industry trends.
Intended Audience For This CompTIA Train The Trainer (CTT+) Certification Program
This certification is targeted towards all training professionals and can be applied to all industries that provide technical and non-technical training and education.
SCHEDULE DATES - 230 Hour Program
Core Technical Trainer Bootcamp
9AM - 5PM (Sunday)
Start Date & Graduation Date
04/19/2020 to 05/17/2020
1 Day (8 Hours) a Week for 5 Weeks
|
||||
Core Technical Trainer Bootcamp
9AM - 5PM (M-F)
Start Date & Graduation Date
04/13/2020 to 04/17/2020
5 Days (40 Hours) a Week for 1 Week
|
||||
Core Technical Trainer Bootcamp
9AM - 2PM (M-Th)
Start Date & Graduation Date
04/13/2020 to 04/23/2020
4 Days (20 Hours) a Week for 2 Weeks
|
Core Technical Trainer Bootcamp
9AM - 5PM (Sunday) |
Start Date
Graduation Date |
04/19/2020
05/17/2020 |
1 Days (8 Hours) a Week for 5 Weeks | |
Core Technical Trainer Bootcamp
9AM - 5PM (M-F) |
Start Date
Graduation Date |
04/13/2020
04/17/2020 |
5 Days (40 Hours) a Week for 1 Week | |
Core Technical Trainer Bootcamp
9AM - 2PM (M-Th) |
Start Date
Graduation Date |
04/13/2020
04/23/2020 |
4 Days (20 Hours) a Week for 2 Weeks |
Core Technical Trainer Bootcamp Training Courses Objectives
CompTIA IT Fundamentals
CompTIA A+ 220-1001
CompTIA A+ 220-1002
CompTIA Network+ Certification N10-007
CompTIA Security+ Certification SYO-501
CompTIA CTT+ Teacher Trainer Certification
Technical Trainer Bootcamp Program Outline
Hardware
BIOS
Networking
- Cables & Connectors
- Cable Characteristics.
- TCP/IP
- TCP/IP & UDP Ports
- WIFI Networking.
- SOHO Networking, Install and Configure.
- Connection Types
- Connection Devices.
- Networking Tools of the Trade.
Mobile Devices
- Laptop Hardware & Components
- Laptop Components
- Laptop Features.
- Other Mobile Devices: Tablets, Phones, etc.
- Accessories and Ports’
Hardware and Network Troubleshooting
- This objective covered in 1.0 above
- This objective covered in 1.0 above
- This objective covered in 1.0 above
- This objective covered in 2.0 above
- This objective covered in 1.0, 2.0, or 3.0 above.
- This objective covered in 1.0 above.
Windows Operating Systems
- Compare Operating Systems Windows Vista, 7, 8, & 8.1
- Operating System Installation
- Command Line Tools.
- OS Features and Tools.
- The Control Panel
- Install Networking on a Desktop.
- Preventative Maintenance and Tools
Other Operating Systems
- MAC OS and Linux
- Virtualization
- The Cloud
- Network Hosts
- Mobile Operating Systems: Android, IOS, etc.
- Install and Configure Mobile OS systems.
- Mobile Data synchronization
Security
- Common Threats and Vulnerabilities
- Prevention
- OS Security Settings.
- Deploy Security Best Practices per Workstation
- Securing the mobile device
- Data Disposal and Destruction
- Secure a SOHO wired and wireless network.
- Software Troubleshooting
- Operational Procedures.
Local Area Networks
- Topologies and the OSI Model
- Key Features of Networks
- Network Topologies
- The OSI Model
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Upper Layers
- OSI Model Summary
- Labs
- VM Orientation
- Ethernet
- Transmission Media
- Media Access Control
- Broadcast Domains
- Ethernet Frames
- Ethernet Deployment Standards
- MAC Addressing
- Address Resolution Protocol (ARP)
- Packet Sniffers
- Labs
- Configuring Ethernet Networking
- Hubs, Bridges, and Switches
- Hubs and Bridges
- Switches
- Switch Interface Configuration
- Spanning Tree Protocol (STP)
- Power over Ethernet (PoE)
- Infrastructure and Design
- Network Infrastructure Implementations
- Planning an Enterprise Campus Network
- Network Hierarchy and Distributed Switching
- Software Defined Networking
- Planning a SOHO Network
- TCP/IP Protocol Suite
- Policies and Best Practices
- Procedures and Standards
- Safety Procedures
- Incident Response Policies
- Security and Data Policies
- Password Policy
- Employee Policies
IP Addressing
- Internet Protocol
- IPv4
- IPv4 Address Structure
- Subnet Masks
- IP Routing Basics
- ipconfig / ifconfig
- ICMP and ping
- Labs
- Configuring IPv4 Networking
- IPv4 Addressing
- IPv4 Addressing Schemes
- Classful Addressing
- Public versus Private Addressing
- Subnetting and Classless Addressing
- Planning an IPv4 Addressing Scheme
- Public Internet Addressing
- Variable Length Subnet Masks (VLSM)
- Labs
- Configuring IPv4 Subnets
- IPv6 Addressing
- IPv6 Address Format
- IPv6 Addressing Schemes
- IPv6 Address Autoconfiguration
- Migrating to IPv6
- Labs
- Configuring IPv6 Networking DHCP and APIPA
- IPv4 Address Autoconfiguration
- Configuring DHCP
- DHCPv6
- Labs
- Configuring Address Autoconfiguration
Internetworking
- Routing
- Routing Basics
- Routing Algorithms and Metrics
- Dynamic Routing Protocols
- Administrative Distance and Route Redistribution
- IPv4 and IPv6 Internet Routing
- High Availability Routing
- Installing and Configuring Routers
- Routing Troubleshooting Tools
- Labs
- Configuring Routing TCP and UDP
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- TCP and UDP Ports
- Port Scanners
- Protocol Analyzers
- Labs
- TCP and Port Scanning Name Resolution and IPAM
- Host Names and FQDNs
- Domain Name System
- Configuring DNS Servers
- Resource Records
- Name Resolution Tools
- IP Address Management (IPAM)
- Labs Configuring Name Resolution and IPAM Monitoring and Scanning
- Performance Monitoring
- Network Monitoring Utilities
- Logs and Event Management
- Simple Network Management Protocol
- Analyzing Performance Metrics
- Patch Management
- Vulnerability Scanning
- Labs
- Performance Testing and Monitoring Network Troubleshooting
- Troubleshooting Procedures
- Identifying the Problem
- Establishing a Probable Cause
- Establishing a Plan of Action
- Troubleshooting Hardware Failure Issues
- Troubleshooting Addressing Issues
- Troubleshooting DHCP Issues
- Troubleshooting Name Resolution
- Troubleshooting Services
Applications and Security
- Applications and Services
- TCP/IP Services
- HTTP and Web Servers
- SSL / TLS and HTTPS
- Email (SMTP / POP / IMAP)
- Voice Services (VoIP and VTC)
- Real-time Services Protocols
- Quality of Service
- Traffic Shaping Bottlenecks and Load Balancing
- Multilayer Switches
- Labs
- Configuring Application Protocols
- Virtualization, SAN, and Cloud Services
- Virtualization Technologies
- Network Storage Types
- Fibre Channel and InfiniBand
- iSCSI
- Cloud Computing
- Configuring Cloud Connectivity
- Network Security Design
- Security Basics
- Common Networking Attacks
- Network Segmentation and DMZ
- Virtual LANs (VLAN)
- VLAN Trunks
- Network Address Translation (NAT)
- Device and Service Hardening
- Honeypots and Penetration Tests Network Security Appliances
- Basic Firewalls
- Stateful Firewalls
- Deploying a Firewall
- Configuring a Firewall
- Deploying a Proxy
- Intrusion Detection Systems (IDS)
- Denial of Service
- Labs
- Configuring a NAT Firewall
- Authentication and Endpoint Security
- Authentication and Access Controls
- Social Engineering
- Authentication Technologies
- PKI and Digital Certificates
- Local Authentication
- RADIUS and TACACS+
- Directory Services
- Endpoint Security
- Network Access Control
- Labs
- Secure Appliance Administration
Operations and Infrastructure
- Network Site Management
- Network Cabling Solutions
- Distribution Frames
- Change and Configuration Management
- Network Documentation and Diagrams
- Labeling Physical Security Devices
- Business Continuity and Disaster Recovery
- Network Link Management
- Power Management
- Backup Management
- Labs
- Network Inventory Management Installing Cabled Networks
- Twisted Pair Cable (UTP / STP / ScTP)
- Twisted Pair Connectors
- Wiring Tools and Techniques
- Cable Testing Tools
- Troubleshooting Wired Connectivity
- Other Copper Cable Types
- Fiber Optic Cable and Connectors
- Transceivers and Media Converters Installing Wireless Networks
- Wireless Standards (IEEE 802.11)
- Wireless Network Topologies
- Wireless Site Design
- Troubleshooting Wireless Connectivity
- Wireless Security
- Wi-Fi Authentication
- Extensible Authentication Protocol
- Troubleshooting Wireless Security
- Wireless Controllers Installing WAN Links
- Wide Area Networks (WAN)
- Telecommunications Networks
- Modern Telecommunications Networks
- Local Loop Services Installing WAN Links
- Wireless WAN Services
- Internet of Things Configuring Remote Access
- Remote Access Services (RAS)
- MPLS and PPP SIP Trunks
- Virtual Private Networks (VPN)
- SSL / TLS / DTLS VPNs
- IPsec Internet Key Exchange / ISAKMP
- Remote Access Servers
- Remote Administration Tools
- Managing Network Appliances
- Remote File Access
- Labs
- Configuring Secure Access Channels
- Configuring a Virtual Private Network
Introduction to Ethical Hacking & Footprinting and Reconnaissance
- Information Security Overview
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Penetration Testing Concepts
- Information Security Laws and Standards
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Competitive Intelligence
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Penetration Testing
Scanning Networks & Enumeration
- Network Scanning Concepts
- Scanning Tools
- Scanning Techniques
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Draw Network Diagrams
- Scanning Pen Testing
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
- Enumeration Pen Testing
Vulnerability Analysis & System Hacking
- Vulnerability Assessment Concepts
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
- System Hacking Concepts
- Cracking Passwords
- Escalating Privileges
- Executing Applications
- Hiding Files
- Covering Tracks
- Penetration Testing
Malware Threats & Sniffing
- Malware Concepts
- Trojan Concepts
- Virus and Worm Concepts
- Malware Analysis
- Countermeasures
- Anti-Malware Software
- Malware Penetration Testing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Countermeasures
- Sniffing Detection Techniques
- Sniffing Pen Testing
Social Engineering & Denial-of-Service
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Countermeasures
- Social Engineering Pen Testing
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Tools
- Countermeasures
- DoS/DDoS Protection Tools
- DoS/DDoS Penetration Testing
CompTIA CTT+ Certified Technical Trainer Certification Preparation
Planning Prior to the Program
- Preparing for Class - Logical Approach to Training
- Needs assessment
- Training Objectives
- Preparation Checklist
Methods and Media for Instructional Delivery
- Preparing for Class - Logical Approach to Training
- Adult learning
- Delivery techniques
- Using Visual Aids
Instructor Credibility and Communication
- Preparing for Class - Logical Approach to Training
- Presentation Skills
- Body language
- Proxemics (use of space)
- Developing your voice
- Vocabulary
Group Facilitation
- Linking
- Questioning
- Ending the training
- Classroom management
Evaluate the Training Event
- Feedback
- Evaluation
- Three-levels of evaluation
- Burnout
Virtual
- Introduction on Virtual Classroom Training
- Virtual Classroom tools
- Roles in a Virtual Classroom
- CTT+ Requirements for a Successful Virtual Demo
- Practice on virtual presentation
- Recording of virtual presentation
- Practice CTT+ Exam Review
- Finalizing submission requirements
CompTIA CTT+ Train The Trainer
- CompTIA's CTT+
- Microsoft's MCT and MOUS Certified Instructor
- Corporations such as Dell, Microsoft, Adobe, Cisco, IBM and Ricoh accept
- CompTIA CTT+ as proof that an instructor is qualified to teach their programs
Core Technical Trainer Bootcamp Training Courses
- This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician.
- HS Diploma/GED
Income Expectation
$87,200/yr
The average salary for a Core Technical Trainer Bootcamp is $87,200 in New York City. Salary estimates are provided by CompTIA.
Technical Trainer Bootcamp Employment Objective
Upon completion of this course, and the certifying exam(s), the student will be qualified to take a job as a
Core Technical Trainer Bootcamp
Network Administrator
Educator
Professor
Core Technical Trainer Bootcamp Training Classes
CompTIA CASP+
CompTIA Cybersecurity Analyst CySA+
CompTIA PenTest+
CompTIA Linux+
Certified Ethical Hacker
Core Technical Trainer Bootcamp Training Courses
Tuition Fee $8,500
Core Technical Trainer Bootcamp Training Classes
CompTIA IT Fundamentals
CompTIA A+ 220-1001
CompTIA A+ 220-1002
CompTIA Network+ Certification N10-007
CompTIA Security+ Certification SYO-501
CompTIA CTT+ Teacher Trainer Certification