IT Academy

0860 000 895

SPEAK TO AN EXPERT 0860 000 895


Security Bundle SUBSCRIPTION

The Security Bundle Bundle includes all five courses - CompTIA Security+, CompTIA CySA, CompTIA CASP, CEH and CISA.

Estimated Course Duration: 100 Hours (Should you study 1 hour per day you could complete the Security Bundle courses in less than 4 months).

Included:

FREE VIRTUAL LABS: Gain hands-on, practical skills in a Live Environment

FREE MENTORING: One-on-One Mentor

Courses are accessible on a Laptop, Desktop computer, Tablet or Smartphone. Courses are designed in video with audio and coupled with unlimited advanced mentoring.

Course Fee: R6 995.00 or R7 495.00 on terms with R3 223.00 deposit and 9 monthly installments of R474.67.

To register for the Security Bundle course please click here.

CompTIA Security+ SY0-601

SY0-601 CompTIA Security+: Social Engineering Techniques & Attack Types
SY0-601 CompTIA Security+: Analyzing Application & Network Attacks
SY0-601 CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
SY0-601 CompTIA Security+: Security Assessments & Penetration Testing Techniques
SY0-601 CompTIA Security+: Security Concepts in an Enterprise Environment
SY0-601 CompTIA Security+: Implementing Cybersecurity Resilience
SY0-601 CompTIA Security+: Virtualization, Cloud Computing, and Cloud Cybersecurity Solutions
SY0-601 CompTIA Security+: Controls & Application Development, Deployment, & Automation
SY0-601 CompTIA Security+: Authentication & Authorization Design Concepts
SY0-601 CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
SY0-601 CompTIA Security+: Physical Security Controls
SY0-601 CompTIA Security+: Basic Cryptography & Public Key Infrastructure
SY0-601 CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
SY0-601 CompTIA Security+: Implementing Secure Network Designs
SY0-601 CompTIA Security+: Wireless Mobile, & Embedded Device Security
SY0-601 CompTIA Security+: Organizational Security Assessment tools & Mitigation Controls
SY0-601 CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
SY0-601 CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
SY0-601 CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
SY0-601 CompTIA Security+: Monitoring, Visibility, & Reporting

CompTIA Cybersecurity Analyst: CSA+

CompTIA Cybersecurity Analyst+ CS0-002: Threat Intelligence
CompTIA Cybersecurity Analyst+ CS0-002: Business Continuity
CompTIA Cybersecurity Analyst+ CS0-002: Attack Types
CompTIA Cybersecurity Analyst+ CS0-002: Malware Threats
CompTIA Cybersecurity Analyst+ CS0-002: Encryption & Hashing
CompTIA Cybersecurity Analyst+ CS0-002: Hardware & Security
CompTIA Cybersecurity Analyst+ CS0-002: Cloud Computing
CompTIA Cybersecurity Analyst+ CS0-002: Threat Monitoring
CompTIA Cybersecurity Analyst+ CS0-002: User Account Security
CompTIA Cybersecurity Analyst+ CS0-002: Network Infrastructure Security
CompTIA Cybersecurity Analyst+ CS0-002: Software Development Security
CompTIA Cybersecurity Analyst+ CS0-002: Data Privacy
CompTIA Cybersecurity Analyst+ CS0-002: Digital Forensics
CompTIA Cybersecurity Analyst+ CS0-002: Network Scanning & Traffic Analysis
CompTIA Cybersecurity Analyst+ CS0-002: IT Security Risk Mitigation

CompTIA Advanced Security Practitioner: CASP+

CompTIA CASP CAS-003: Business and Industry Influences and Risks
CompTIA CASP CAS-003: Organizational Security and Privacy Policies
CompTIA CASP CAS-003: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-003: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-003: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-003: Integrating Security Controls for Host Devices
CompTIA CASP CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-003: Selecting Software Security Controls
CompTIA CASP CAS-003: Conducting Security Assessments
CompTIA CASP CAS-003: Implementing Incident Response and Recovery
CompTIA CASP CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise

Certified Ethical Hacker: CEH

CEHv10: Ethical Hacking Overview and Threats
CEHv10: Hacking Concepts
CEHv10: Security Controls
CEHv10: Security Controls Part 2
CEHv10: Pentesting, Laws, and Standards
CEHv10: Footprinting
CEHv10: Host Discovery and Scanning with Nmap
CEHv10: ProxyChains and Enumeration
CEHv10: Vulnerability Analysis Concepts and Tools
CEHv10: Password Attacks
CEHv10: Password Attacks Part 2
CEHv10: Privilege Escalation
CEHv10: Covert Data Gathering
CEHv10: Hidden Files and Covering Tracks
CEHv10: Malware Threats
CEHv10: Malware Distribution
CEHv10: Network Sniffing
CEHv10: Denial of Service
CEHv10: Session Hijacking
CEHv10: Evading IDS, Firewalls, and Honeypots
CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
CEHv10: Hacking Web Servers
CEHv10: Common Web App Threats
CEHv10: Common Web App Threats Part 2
CEHv10: Practical Web App Hacking
CEHv10: SQL Injection
CEHv10: SQL Injection Types and Tools
CEHv10: Wireless Hacking Concepts
CEHv10: Wireless Hacking Tools
CEHv10: Wireless Hacking Common Threats
CEHv10: Cracking and Mobile Hacking
CEHv10: IoT Concepts
CEHv10: IoT Attacks
CEHv10: Clouding Computing Concepts
CEHv10: Cloud Computer Attacks
CEHv10: Cryptography Concepts
CEHv10: Cryptography Concepts Part 2
CEHv10: Cryptography Concepts Part 3
CEHv10: Cryptography Attacks
CEHv10: IoT Hacking and Countermeasures

Certified Information Systems Auditor: CISA

Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice

How our courses work:

Learners need a computer, laptop or tablet and internet connection. On enrolment we issue our learners with an username and password to access their courses for a 12 month subscription. At the end of each module you will be required to answer multiple choice questions, these marks are registered in our database. Should you obtain 70% and above you will receive IT Academy Course Mastery Certification by mail, at no additional cost.

International exams are written at any Pearson Vue Testing Centre in South Africa. Discounted CompTIA international exam vouchers can be purchased through IT Academy.

Courses include:

Mobile ready (available on Tablet)
Courses are printable
Advanced Instant Mentoring
e-mail Support
Free Cram Tests
Discounted international exam vouchers
12 months Subscription
IT Academy Course Mastery Certification



Send Enquiry

Register Now

Free Trial

Course Reviews

What's Included


Testimonials


Our Training is Trusted By

CONTACT DETAILS:

Head Office: 0860 000 895
Fax: 021 914 1676
VAT No: 484 0244 588
E-mail: info@it-academy.co.za
HEAD OFFICE

  • Avanti Towers, B4 1 North Block

    35 Carl Cronje Drive, Tygerfalls, Bellville, 7435
  •  
  •  
FOLLOW US

Facebook

Instagram

Linkedin

Trustpilot



COMPTia Microsoft MICT SETA ICDL ITA
Terms & Conditions | Privacy
© 2021 - IT Academy - All Rights Reserved
Optimi College