Hands-On Cybersecurity Technical Trainer Bootcamp Training Courses
Why Choose Us | CompTIA CySA+ Plus Cert Prep Employment Objective
- Description
- Schedule
- What You'll Learn
- Outline
- Prerequisites
- Income Expectations
- Next Step
- Tuition Fee
- Exam
Hands-On Cybersecurity Technical Trainer Bootcamp Training Classes
CompTIA CSA+ courses launches on 15th Feb 2017 to bridge the skills gap between CompTIA Security+ and the CompTIA Advanced Security Practitioner (CASP) exam and creates a vendor-neutral certification.
CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral IT professional certification that applies behavioral analytics to improve the overall state of IT security. It validates the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.
Intended Audience For This CompTIA Cybersecurity Analyst (CySA+) Certification Course
The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.
CompTIA PenTest+ Certification Preparation Training Classes(PT0-001)
CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.
CompTIA PenTest+ joins CompTIA Cybersecurity Analyst (CySA+) at the intermediate-skills level of the cybersecurity career pathway. Depending on your Program of study, PenTest+ and CySA+ can be taken in any order but typically follows the skills learned in Security+. While CySA+ focuses on defense through incident detection and response, PenTest+ focuses on offense through penetration testing and vulnerability assessment.
Although the two exams teach opposing skills, they are dependent on one another. The most qualified cybersecurity professionals have both offensive and defensive skills. Earn the PenTest+ certification to grow your career within the CompTIA recommended cybersecurity career pathway.
Intended Audience For This CompTIA PenTest+ Certification (Exam PT0-001) Program
- Penetration Tester
- Vulnerability Tester
- Security Analyst (II)
- Vulnerability Assessment Analyst
- Network Security Operations
- Application Security Vulnerability
The CompTIA Advanced Security Practitioner (CASP+) is the program you will need to take if your job responsibilities include securing complex enterprise environments. In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. Today's IT climate demands individuals with demonstrable skills, and the information and activities in this course can help you develop the skill set you need to confidently perform your duties as an advanced security professional.
This program can also benefit you if you intend to pass the CompTIA Advanced Security Practitioner (CAS-003) certification examination. CASP+ certification is an international, vendor-neutral exam that proves competency in enterprise security. What you learn and practice in this course can be a significant part of your preparation.
The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.
Learning Modalities
- Instructor-led Classroom Training
- BootCamp Training
- Online Training
- Corporate Training
- Onsite Training
- One-on-One Training
What's Included
- Facilitated Training
- Books
- Labs
Intended Audience For This CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-003)
This program is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.
The candidates seeking the CompTIA Advanced Security Practitioner (CASP+) certification and who want to prepare for Exam CAS-003.
CompTIA CTT Plus Cert Prep Train The Trainer Training
CompTIA Certified Technical Trainer (CTT+) Certification is a cross-industry credential that provides recognition that an instructor has attained a standard of excellence in the training field.
Institute of Information Technology CompTIA CTT+ course is the only 5-day class that prepares you for all three CompTIA CTT+ exams. The course not only focuses on traditional classroom style instruction, but also on delivering training virtually. IIT has packaged this unique and comprehensive program while considering the co-existence of both classroom and virtual training styles, and the growing adoption/popularity of virtual training.
Institute of Information Technology's CompTIA CTT+ is a highly interactive and participant-driven course designed to cultivate the technical training and concept delivery skills in trainers, technicians, subject matter experts, presenters, sales and support staff in any organization. The participants will connect abilities, theories and situations to create their most effective instructional styles. This course is accepted by Microsoft and ProSoft towards their MCT.
In this course, each student will be required to prepare training materials and to serve as the class instructor for a minimum of 5 hours.
Earning the CTT+ certification designates you as a recognized trainer in your field. As an instructor, you not only have to plan engaging classroom lectures, practice tasks and exams, but you must also be a knowledgeable and effective communicator. CTT+ certification provides comprehensive training standards to validate your skills in a traditional or virtual classroom environment, and ensures that you can teach effectively and step up to the front of the class with confidence.
CTT+ is trusted by leading organizations
Corporations such as Dell, Microsoft, Adobe, Cisco, IBM and Ricoh accept CompTIA CTT+ as proof that an instructor is qualified to teach their programs.
CTT+ lets you teach with confidence
CompTIA CTT+ validates that you have the necessary skills and knowledge to prepare, present, facilitate and evaluate a training session. By requiring a video submission of the training session instruction as part of the certification, CTT+ ensures that candidates have effective teaching skills.
CTT+ verifies essential teaching modalities
In a survey conducted by the Training Associates, 87% of respondents use instructor-led training (ILT) as a primary learning modality. Moreover, 74% of organizations take a blended approach to learning, augmenting ILT delivery with either a mobile, video, or social component. Earning a CTT+ certification can validate your skills as a recognized trainer in either a virtual or physical classroom.
CompTIA CTT+ is a qualifying certification towards your MCT status validating your instructional skills. Please note that simply taking the CTT+ course or passing the exams won't grant you a MCT status. You will need to meet other Microsoft requirements in addition to achieving your CTT+ certification.
Institute of Information Technology CTT+ Student Care:
- Maximum of 8 students per class: Hands-On Personalized Training Care
- Exam Preparation Included
- We not only record your videos, but also review your video files prior to submission, and convert the files for you based on CompTIA accepted formats.
- We strongly recommend preparing for all 3 exams even though only 2 exams are required for a CompTIA CTT+ certification designation. Both Classroom and Virtual based are equally important given the industry trends.
Intended Audience For This CompTIA Train The Trainer (CTT+) Certification Program
This certification is targeted towards all training professionals and can be applied to all industries that provide technical and non-technical training and education.
SCHEDULE DATES - 205 Hour Program
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays)
Start Date & Graduation Date
05/21/2020 to 05/25/2020
5 Days (40 Hours) a Week for 1 Week
|
||||
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays)
Start Date & Graduation Date
06/06/2020 to 06/15/2020
5 Days (40 Hours) a Week for 1 Week
|
||||
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekends)
Start Date & Graduation Date
06/30/2020 to 07/29/2020
2 Days (16 Hours) a Week for 5 Weeks
|
||||
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays)
Start Date & Graduation Date
07/07/2020 to 07/06/2020
5 Days (40 Hours) a Week for 1 Week
|
||||
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays)
Start Date & Graduation Date
07/23/2020 to 07/27/2020
5 Days (40 Hours) a Week for 1 Week
|
||||
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays)
Start Date & Graduation Date
07/13/2020 to 07/17/2020
5 Days (40 Hours) a Week for 1 Week
|
||||
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekends)
Start Date & Graduation Date
08/14/2020 to 04/07/2020
2 Days (16 Hours) a Week for 5 Weeks
|
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
05/21/2020
05/25/2020 |
5 Days (40 Hours) a Week for 1 Week | |
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
06/06/2020
06/15/2020 |
5 Days (40 Hours) a Week for 1 Week | |
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekends) |
Start Date
Graduation Date |
06/30/2020
07/29/2020 |
2 Days (16 Hours) a Week for 5 Weeks | |
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
07/07/2020
07/06/2020 |
5 Days (40 Hours) a Week for 1 Week | |
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
07/23/2020
07/27/2020 |
5 Days (40 Hours) a Week for 1 Week | |
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekdays) |
Start Date
Graduation Date |
07/13/2020
07/17/2020 |
5 Days (40 Hours) a Week for 1 Week | |
Cybersecurity Technical Trainer Bootcamp
9AM - 5PM (Weekends) |
Start Date
Graduation Date |
08/14/2020
04/07/2020 |
2 Days (16 Hours) a Week for 5 Weeks |
Hands-On Cybersecurity Technical Trainer Bootcamp Program Objectives
CompTIA Cybersecurity Analyst (CySA+) Certification
CompTIA PenTest+
CompTIA CASP+
CompTIA CTT+
Hands-On Cybersecurity Technical Trainer Bootcamp Training Courses
Threat Management
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
- Given a scenario, analyze the results of a network reconnaissance
- Given a network-based threat, implement or recommend the appropriate response and countermeasure
- Explain the purpose of practices used to secure a corporate environment
Vulnerability Management
- Given a scenario, implement an information security vulnerability management process
- Given a scenario, analyze the output resulting from a vulnerability scan
- Compare and contrast common vulnerabilities found in the following targets within an organization
Cyber Incident Response
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident
- Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
- Explain the importance of communication during the incident response process
- Given a scenario, analyze common symptoms to select the best course of action to support incident response
- Summarize the incident recovery and post-incident response process
Security Architecture and Tool Sets
- Explain the relationship between frameworks, common policies, controls, and procedures
- Given a scenario, use data to recommend remediation of security issues related to identity and access management
- Given a scenario, review security architecture and make recommendations to implement compensating controls
- Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
- Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
CompTIA Pentest+ Certification Training Classes
CompTIA Pentest+ Certification Training Classes
CompTIA PenTest+ Certification Classes (Exam PT0-001)
Planning and Scoping
1. Explain the importance of planning for an engagement
Understanding the target audience
Rules of engagement
Communication escalation path
Resources and requirements
- Confidentiality of findings
- Known vs. unknown
Budget
Impact analysis and remediation timelines
Disclaimers
- Point-in-time assessment
- Comprehensiveness
Technical constraints
Support resources
- WSDL/WADL
- SOAP project file
- SDK documentation
- Swagger document
- XSD
- Sample application requests
- Architectural diagrams
- Explain key legal concepts
- Contracts
- SOW
- MSA
- NDA
- Environmental differences
- Export restrictions
- Local and national government restrictions
- Corporate policies
- Written authorization
- Obtain signature from proper signing authority
- Third-party provider authorization when necessary
- Explain the importance of scoping an engagement properly
Types of assessment
- Goals-based/objectives-based
- Compliance-based
- Red team
- Special scoping considerations
- Premerger
- Supply chain
- Target selection
- Targets
- Internal
- On-site vs. off-site
- Considerations
- White-listed vs. black-listed
- Security exceptions
- IPS/WAF whitelist
- NAC
- Certificate pinning
- Company’s policies
- Black box vs. white box vs. gray box
- Risk acceptance
- Tolerance to impact
- Scheduling
- Scope creep
- Threat actors
- Adversary tier
- APT
- Adversary tier
- Compliance-based assessments, limitations, and caveats
- Rules to complete assessment
- Password policies
- Data isolation
- Key management
- Limitations
- Limited network access
- Limited storage access
2. Information Gathering and Vulnerability Identification
- Given a scenario, conduct information gathering using appropriate techniques
- Scanning
- Enumeration
- Hosts
- Networks
- Domains
- Users
- Groups
- Network shares
- Web pages
- Applications
- Services
- Tokens
- Social networking sites
- Packet crafting
- Packet inspection
- Fingerprinting
- Cryptography
- Certificate inspection
- Eavesdropping
- RF communication monitoring
- Sniffing
- Wired
- Wireless
- Decompilation
- Debugging
- Open Source Intelligence Gathering
- Sources of research
- CERT
- NIST
- JPCERT
- CAPEC
- Full disclosure
- CVE
- CWE
- Given a scenario, perform a vulnerability scan
- Credentialed vs. non-credentialed
- Types of scans
- Discovery scan
- Full scan
- Stealth scan
- Compliance scan
- Container security
- Application scan
- Dynamic vs. static analysis
- Considerations of vulnerability scanning
- Time to run scans
- Protocols used
- Network topology
- Bandwidth limitations
- Query throttling
- Fragile systems/non-traditional assets
- Given a scenario, analyze vulnerability scan results.
- Asset categorization
- Adjudication
- False positives
- Prioritization of vulnerabilities
- Common themes
- Vulnerabilities
- Observations
- Lack of best practices
- Explain the process of leveraging information to prepare for exploitation.
- Map vulnerabilities to potential exploits
- Prioritize activities in preparation for penetration test
- Describe common techniques to complete attack
- Cross-compiling code
- Exploit modification
- Exploit chaining
- Proof-of-concept development (exploit development)
- Social engineering
- Credential brute forcing
- Dictionary attacks
- Rainbow tables
- Deception
- Explain weaknesses related to specialized systems
- ICS
- SCADA
- Mobile
- IoT
- Embedded
- Point-of-sale system
- Biometrics
- Application containers
- RTOS
3. Attacks and Exploits
- Compare and contrast social engineering attacks
- Phishing
- Spear phishing
- SMS phishing
- Voice phishing
- Whaling
- Elicitation
- Business email compromise
- Interrogation
- Impersonation
- Shoulder surfing
- USB key drop
- Motivation techniques
- Authority
- Scarcity
- Social proof
- Urgency
- Likeness
- Fear
- Given a scenario, exploit network-based vulnerabilities
- Name resolution exploits
- NETBIOS name service
- LLMNR
- SMB exploits
- SNMP exploits
- SMTP exploits
- FTP exploits
- DNS cache poisoning
- Pass the hash
- Man-in-the-middle
- ARP spoofing
- Replay
- Relay
- SSL stripping
- Downgrade
- DoS/stress test
- NAC bypass
- VLAN hopping
- Name resolution exploits
- Given a scenario, exploit wireless and RF-based vulnerabilities
- Evil twin
- Karma attack
- Downgrade attack
- Deauthentication attacks
- Fragmentation attacks
- Credential harvesting
- WPS implementation weakness
- Bluejacking
- Bluesnarfing
- RFID cloning
- Jamming
- Repeating
- Evil twin
- Given a scenario, exploit application-based vulnerabilities
- Injections
- SQL
- HTML
- Command
- Code
- Authentication
- Credential brute forcing
- Session hijacking
- Redirect
- Default credentials
- Weak credentials
- Kerberos exploits
- Authorization
- Parameter pollution
- Insecure direct object reference
- Cross-site scripting (XSS)
- Stored/persistent
- Reflected
- DOM
- Cross-site request forgery (CSRF/XSRF)
- Clickjacking
- Security misconfiguration
- Directory traversal
- Cookie manipulation
- File inclusion
- Local
- Remote
- Unsecure code practices
- Comments in source code
- Lack of error handling
- Overly verbose error handling
- Hard-coded credentials
- Race conditions
- Unauthorized use of functions/unprotected APIs
- Hidden elements
- Sensitive information in the DOM
- Lack of code signing
- Injections
- Given a scenario, exploit local host vulnerabilities
- OS vulnerabilities
- Windows
- Mac OS
- Linux
- Android
- iOS
- OS vulnerabilities
- Unsecure service and protocol configurations
- Privilege escalation
- Linux-specific
- SUID/SGID programs
- Unsecure SUDO
- Ret2libc
- Sticky bits
- Windows-specific
- Cpassword
- Clear text credentials in LDAP
- Kerberoasting
- Credentials in LSASS
- Unattended installation
- SAM database
- DLL hijacking
- Exploitable services
- Unquoted service paths
- Writable services
- Unsecure file/folder permissions
- Keylogger
- Scheduled tasks
- Kernel exploits
- Default account settings
- Sandbox escape
- Shell upgrade
- VM
- Container
- Physical device security
- Cold boot attack
- JTAG debug
- Serial console
- Summarize physical security attacks related to facilities
- Piggybacking/tailgating
- Fence jumping
- Dumpster diving
- Lock picking
- Lock bypass
- Egress sensor
- Badge cloning
- Given a scenario, perform post-exploitation techniques
- Lateral movement
- RPC/DCOM
- PsExec
- WMI
- Scheduled tasks
- PS remoting/WinRM
- SMB
- RDP
- Apple Remote Desktop
- VNC
- X-server forwarding
- Telnet
- SSH
- RSH/Rlogin
- Lateral movement
- Persistence
- Scheduled jobs
- Scheduled tasks
- Daemons
- Back doors
- Trojan
- New user creation
- Covering your tracks
Penetration Testing Tools
- Given a scenario, use Nmap to conduct information gathering exercises
- SYN scan (-sS) vs. full connect scan (-sT)
- Port selection (-p)
- Service identification (-sV)
- OS fingerprinting (-O)
- Disabling ping (-Pn)
- Target input file (-iL)
- Timing (-T)
- Output parameters
- -oA
- -oN
- -oG
- -oX
- Compare and contrast various use cases of tools
- Use cases
- Reconnaissance
- Enumeration
- Vulnerability scanning
- Credential attacks
- Offline password cracking
- Brute-forcing services
- Persistence
- Configuration compliance
- Evasion
- Decompilation
- Forensics
- Debugging
- Software assurance
- Fuzzing
- SAST
- DAST
- Tools
- Scanners
- Nikto
- OpenVAS
- SQLmap
- Nessus
- Credential testing tools
- Hashcat
- Medusa
- Hydra
- Cewl
- John the Ripper
- Cain and Abel
- Mimikatz
- Patator
- Dirbuster
- W3AF
- Debuggers
- OLLYDBG
- Immunity debugger
- GDB
- WinDBG
- IDA
- Software assurance
- Findbugs/findsecbugs
- Peach
- Dynamo
- AFL
- SonarQube
- YASCA
- OSINT
- Whois
- Nslookup
- Foca
- Theharvester
- Shodan
- Maltego
- Recon-NG
- Censys
- Wireless
- Aircrack-NG
- Kismet
- WiFite
- Web proxies
- OWASP ZAP
- Burp Suite
- Social engineering tools
- SET
- BeEF
- Remote access tools
- SSH
- NCAT
- NETCAT
- Proxychains
- Networking tools
- Wireshark
- Hping
- Mobile tools
- Androzer
- APKX
- APK studio
- MISC
- Searchsploit
- Powersploit
- Responder
- Impacket
- Empire
- Metasploit framework
- Given a scenario, analyze tool output or data related to a penetration test
- Password cracking
- Pass the hash
- Setting up a bind shell
- Getting a reverse shell
- Proxying a connection
- Uploading a web shell
- Injections
- Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)
- Logic
- Looping
- Flow control
- I/O
- File vs. terminal vs. network
- Substitutions
- Variables
- Common operations
- String operations
- Comparisons
- Error handling
- Arrays
- Encoding/decoding
- Logic
Reporting and Communication
- Given a scenario, use report writing and handling best practices
- Normalization of data
- Written report of findings and remediation
- Executive summary
- Methodology
- Findings and remediation
- Metrics and measures
- Risk rating
- Conclusion
- Risk appetite
- Storage time for report
- Secure handling and disposition of reports
- Explain post-report delivery activities
- Post-engagement cleanup
- Removing shells
- Removing tester-created credentials
- Removing tools
- Client acceptance
- Lessons learned
- Follow-up actions/retest
- Attestation of findings
- Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- Solutions
- People
- Process
- Technology
- Findings
- Shared local administrator credentials
- Weak password complexity
- Plain text passwords
- No multifactor authentication
- SQL injection
- Unnecessary open services
- Remediation
- Randomize credentials/LAPS
- Minimum password requirements/password filters
- Encrypt the passwords
- Implement multifactor authentication
- Sanitize user input/parameterize queries
- System hardening
- Solutions
- Explain the importance of communication during the penetration testing process
- Communication path
- Communication triggers
- Critical findings
- Stages
- Indicators of prior compromise
- Reasons for communication
- Situational awareness
- De-escalation
- De-confliction
- Goal reprioritization
- Communication path
CompTIA Advanced Security Practitioner (CASP+) Program
- Enterprise Security
- Identifying security concerns in scenarios
- Exploring cryptographic techniques
- Advanced PKI concepts
- Distinguishing between cryptographic concepts
- Entropy
- Confusion and diffusion
- Chain of trust
- Securing enterprise storage
- Examining storage types and protocols
- Secure storage management
- Analyzing network security architectures
- Designing secure networks
- Employing virtual networking solutions
- Troubleshooting security controls for hosts
- Host security: trusted OS, end-point, host hardening
- Vulnerabilities in co-mingling of hosts
- Differentiating application vulnerabilities
- Web application security
- Application security concerns
- Mitigating client-side vs. server-side processing
- Identifying security concerns in scenarios
- Risk Management and Incident Response
- Interpreting business and industry influences and risks
- Analyzing risk scenarios
- Identifying the impact of de-perimeterization
- Executing risk mitigation planning, strategies and control
- Assessing the CIA aggregate scores
- Making risk determination
- Privacy policies and procedures
- Developing policies to support business objectives
- Safeguarding Personally Identifiable Information (PII)
- Conduct incident response and recovery procedures
- Constructing a data inventory with e-discovery
- Minimizing the severity of data breaches
- Interpreting business and industry influences and risks
- Research, Analysis and Assessment
- Determining industry trends impact to the enterprise
- Performing ongoing research to support best practices
- Researching security requirement for contracts
- Appropriate security document usage
- Assessing the CIA aggregate scores
- Making risk determination
- Request for Information (RFI)
- Request for Quote (RFQ)
- Evaluating scenarios to determine how to secure the enterprise
- Conducting cost benefit and security solution analysis
- Reviewing effectiveness of existing security controls
- Conducting an assessment and analyzing the results
- Determining appropriate tools for data gathering
- Identifying methods to perform assessments
- Determining industry trends impact to the enterprise
- Integrating Computing, Communications and Business Disciplines
- Collaborating across diverse business units to achieve security goals
- Communicating with stakeholders
- Interpreting security requirements and providing guidance
- Identifying secure communications goals
- Selecting controls for secure communications
- Utilizing unified collaboration tools
- Mobile devices
- Applying over the air technologies
- b. Implementing security across technology life cycle
- Selecting security controls
- Developing Security Requirements Traceability Matrices
- Collaborating across diverse business units to achieve security goals
- Technical Integration of Enterprise Components
- Integrate devices into a secure enterprise architecture
- Securing data following existing security standards
- Applying technical deployment models
- Integrating storage and applications into the enterprise
- Integrating advanced authentication and authorization technologies
- Implementing certificate-based and SSO authentication
- Applying federation solutions
- Integrate devices into a secure enterprise architecture
CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-003)
Course Benefits
CompTIA Advanced Security Practitioner meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).
CompTIA CTT Plus Certified Technical Trainer Certification Preparation
Planning Prior to the Program
- Preparing for Class - Logical Approach to Training
- Needs assessment
- Training Objectives
- Preparation Checklist
Methods and Media for Instructional Delivery
- Preparing for Class - Logical Approach to Training
- Adult learning
- Delivery techniques
- Using Visual Aids
Instructor Credibility and Communication
- Preparing for Class - Logical Approach to Training
- Presentation Skills
- Body language
- Proxemics (use of space)
- Developing your voice
- Vocabulary
Group Facilitation
- Linking
- Questioning
- Ending the training
- Classroom management
Evaluate the Training Event
- Feedback
- Evaluation
- Three-levels of evaluation
- Burnout
Virtual
- Introduction on Virtual Classroom Training
- Virtual Classroom tools
- Roles in a Virtual Classroom
- CTT+ Requirements for a Successful Virtual Demo
- Practice on virtual presentation
- Recording of virtual presentation
- Practice CTT+ Exam Review
- Finalizing submission requirements
CompTIA CTT Plus Cert Prep Train The Trainer Training Courses Benefits
- CompTIA's CTT+
- Microsoft's MCT and MOUS Certified Instructor
- Corporations such as Dell, Microsoft, Adobe, Cisco, IBM and Ricoh accept
- CompTIA CTT+ as proof that an instructor is qualified to teach their programs
Hands-On Cybersecurity Technical Trainer Bootcamp Training Courses
- HS Diploma/GED
Income Expectation
$112,600/yr
The average salary for a CompTIA CySA+ Certified Employee is $112,600 in New York City. Salary estimates are provided by CompTIA.
Hands-On Cybersecurity Technical Trainer Bootcamp Employment Objective
Upon completion of this course, and the certifying exam(s), the student will be qualified to take a job as a
Security Specialist/Administrator
Security Consultant
Cybersecurity Analyst
Cybersecurity Instructor
Cybersecurity Professor
Hands-On Cybersecurity Technical Trainer Bootcamp Training Classes
CompTIA Advanced Security Practitioner Certification CASP+
Hacking Apprentice
Hacking Professional
Hacking Master
Cybersecurity Master
Hands-On Cybersecurity Technical Trainer Bootcamp Training Classes
$9,500
Hands-On Cybersecurity Technical Trainer Bootcamp Training Courses
CompTIA Cybersecurity Analyst CySA+
CompTIA PenTest+
CompTIA CASP+
CompTIA CTT+