CompTIA Training Courses in the UAE

CompTIA Training Courses

Online or onsite, instructor-led live CompTIA training courses provides through interactive hands-on practice the background knowledge and skills you will require to prepare for the CompTIA certification examinations and become a CompTIA Certified Professional.

CompTIA training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live CompTIA trainings in the UAE can be carried out locally on customer premises or in NobleProg corporate training centers.

NobleProg -- Your Local Training Provider

CompTIA Course Outlines in the UAE

Course Name
Duration
Overview
Course Name
Duration
Overview
35 hours
Overview
Learning Objectives

In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

- You will:
- Support operating systems.
- Install and configure PC system unit components and peripheral devices.
- Install, configure, and troubleshoot display and multimedia devices.
- Install, configure, and troubleshoot storage devices.
- Install, configure, and troubleshoot internal system components.
- Install, configure, and maintain operating systems.
- Maintain and troubleshoot Microsoft Windows.
- Explain network infrastructure concepts.
- Configure and troubleshoot network connections.
- Manage users, workstations, and shared resources.
- Implement client virtualization and cloud computing.
- Implement physical security.
- Secure workstations and data.
- Troubleshoot workstation security issues.
- Support and troubleshoot laptops.
- Support and troubleshoot mobile devices.
- Install, configure, and troubleshoot print devices.
- Implement operational procedures.
35 hours
Overview
In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks.

- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
35 hours
Overview


Compare and contrast different types of social engineering techniques.

- Given a scenario, analyze potential indicators to determine the type of attack.
- Given a scenario, analyze potential indicators associated with application and network attacks.
- Explain different threat actors, vectors, and intelligence sources.
- Explain the security concerns associated with various types of vulnerabilities.
- Summarize the techniques used in security assessments.
- Explain the techniques used in penetration testing.
- Explain the importance of security concepts in an enterprise environment.
- Summarize virtualization and cloud computing concepts and authentication and authorication design concepts.
- Summarize secure application development,deployment, and automation concepts.
- Given a scenario, implement cybersecurity resilience.
- Explain the security implications of embedded and specialized systems.
- Explain the importance of physical security controls.
- Summarize the basics of cryptographic concepts.
- Given a scenario, implement secure protocols.
- Given a scenario, implement host or application security solutions and secure network designs.
- Given a scenario, install and configure wireless security settings and implement secure mobile solutions.
- Given a scenario, apply cybersecurity solutions to the cloud.
- Given a scenario, implement identity and account management controls and authentication and authorization solutions.
- Given a scenario, implement public key infrastructure.
- Given a scenario, use the appropriate tool to assess organizational security.
- Summarize the importance of policies, processes, and procedures for incident response.
- Given an incident, utilize appropriate data sources to support an investigation.
- Given an incident, apply mitigation techniques or controls to secure an environment.
- Explain the key aspects of digital forensics.
- Compare and contrast various types of controls.
- Explain the importance of applicable regulations, standards, or
- frameworks that impact organizational security posture.
- Explain the importance of policies to organizational security.
- Summarize risk management processes and concepts.
- Explain privacy and sensitive data concepts in relation to security.

Upcoming CompTIA Courses in the UAE

Online CompTIA courses, Weekend CompTIA courses, Evening CompTIA training, CompTIA boot camp, CompTIA instructor-led, Weekend CompTIA training, Evening CompTIA courses, CompTIA coaching, CompTIA instructor, CompTIA trainer, CompTIA training courses, CompTIA classes, CompTIA on-site, CompTIA private courses, CompTIA one on one training

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

This site in other countries/regions