This course is aimed at anyone looking to gain entry into the IT field as an IT Support Technician. Support Technicians are the backbone of any IT department. They ensure the smooth running of the IT within a company or organisation and offer guidance to anyone needing assistance. As a result, technical support is one of the most abundant jobs available within the IT industry. Demand for Support Technicians has been growing since 2004.
The skills you will gain through this course will not only prepare you for a role in IT Support, but in other roles too, such as networking and IT security.
Each course leads to a certification. Scroll down to view the details of each course. We have provided a salary guide below to give you an idea of how much you can potentially earn by gaining just one of the certifications listed.
Watch this video to learn what the CompTIA A+ has done for some people.
What’s included in this certification bundle?
This bundle contains 5 separate certification courses. To see what you’ll be learning in each course, just click on the title below.
The Average IT Support Specialist Profile:
Courses included:
1 and 2. CompTIA A+ 220-1001 and 1002 (NO EXAM)
CompTIA A+ 220-1001
Mobile Devices
• 1.0 What are we covering?
• 1.1 Given a scenario, install and configure laptop hardware and components
• 1.2 Given a scenario, install components within the display of a laptop
• 1.3 Given a scenario, use appropriate laptop features
• 1.4 Compare and contrast characteristics of various types of other mobile devices
• 1.5 Given a scenario, connect and configure accessories and ports of other mobile devices
• 1.6 Given a scenario, configure basic mobile device network connectivity and application support
• 1.7 Given a scenario, use methods to perform mobile device synchronization Networking
• 2.0 What are we covering?
• 2.1 Compare and contrast TCP and UDP ports, protocols and their purpose
• 2.2 Compare and contrast common networking hardware devices
• 2.3 Given a scenario, install and configure a basic wired/wireless SOHO network
• 2.4 Compare and contrast wireless networking protocols
• 2.5 Summarize the properties and purposes of services provided by networked hosts
• 2.6 Explain common network configuration concepts
• 2.7 Compare and contrast internet connection types, network types and their features
• 2.8 Given a scenario, use appropriate networking tools Hardware
• 3.0 What are we covering?
• 3.1 Explain basic cable types, features and their purposes
• 3.2 Identify common connector types
• 3.3 Given a scenario, install RAM types
• 3.4 Given a scenario, select, install and configure storage devices
• 3.5 Given a scenario, install and configure motherboards, CPUs and add-on cards
• 3.6 Explain the purposes and uses of various peripheral types
• 3.7 Summarize power supply types and features
• 3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications/needs
• 3.9 Given a scenario, install and configure common devices
• 3.10 Given a scenario, configure SOHO multifunction devices/printers and settings
• 3.11 Given a scenario, install and maintain various print technologies Virtualization and Cloud Computing
• 4.1 Compare and contrast cloud computing concepts
• 4.2 Given a scenario, set up and configure client-side virtualization Hardware and Network Troubleshooting
• 5.0 What are we covering?
• 5.1 Given a scenario, use the best practice methodology to resolve problems
• 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs and power
• 5.3 Given a scenario, troubleshoot hard drives and RAID arrays
• 5.4 Given a scenario, troubleshoot video, projector and display issues
• 5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures
• 5.6 Given a scenario, troubleshoot printers
• 5.7 Given a scenario, troubleshoot common wires and wireless network problems
CompTIA A+ 220-1002
Operating Systems
• 1.1 Compare and contrast common operating system types and their purposes
• 1.2 Compare and contrast features of Microsoft Windows versions
• 1.3 Summarize general OS installation considerations and upgrade methods
• 1.4 Given a scenario, use appropriate Microsoft command line tools
• 1.5 Given a scenario, use Microsoft operating system features and tools
• 1.6 Given a scenario, use Microsoft Windows Control Panel utilities
• 1.7 Summarize application installation and configuration concepts
• 1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop
• 1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems Security
• 2.1 Summarize the importance of physical security measures
• 2.2 Explain logical security concepts
• 2.3 Compare and contrast wireless security protocols and authentication methods
• 2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• 2.5 Compare and contrast social engineering, threats, and vulnerabilities
• 2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings
• 2.7 Given a scenario, implement security best practices to secure a workstation
• 2.8 Given a scenario, implement methods for securing mobile devices
• 2.9 Given a scenario, implement appropriate data destruction and disposal methods
• 2.10 Given a scenario, configure security on SOHO wireless and wired networks Software Troubleshooting
• 3.1 Given a scenario, troubleshoot Microsoft Windows OS problems
• 3.2 Given a scenario, troubleshoot and resolve PC security issues
• 3.3 Given a scenario, use best practice procedures for malware removal
• 3.4 Given a scenario, troubleshoot mobile OS and application issues
• 3.5 Given a scenario, troubleshoot mobile OS and application security issues Operational Procedures
• 4.1 Compare and contrast best practices associated with types of documentation
• 4.2 Given a scenario, implement basic change management best practices
• 4.3 Given a scenario, implement basic disaster prevention and recovery methods
• 4.4 Explain common safety procedures
• 4.5 Explain environmental impacts and appropriate controls
• 4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts
• 4.7 Given a scenario, use proper communication techniques and professionalism
• 4.8 Identify the basics of scripting
3. CompTIA Network+ N10-007 (NO EXAM)
Module 1: Networking Concepts 1.1 Basic Networking
• Intro to networking
• Networking architectures
• Activity: Basic Networking 1.2 OSI Model
• Layer 7 – Application
• Layer 6 – Presentation
• Layer 5 – Session
• Layer 4 – Transport
• Layer 3 – Network
• Layer 2 – Data Link
• Layer 1 – Physical
• Activity: Exploring the OSI Model 1.3 Protocols and Ports
• Protocols and ports overview
• Activity: Examining Protocols and Ports
• Connection-oriented vs. connectionless
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Activity: Comparing TCP and UDP
• Internet Protocol (IP)
• Internet Control Messaging Protocol (ICMP)
• Internet Group Messaging Protocol (IGMP)
• Activity: Examining the Lower Layer Protocols
• Layer 7 Remote Control Protocols
• Layer 7 File Transfer Protocols
• Layer 7 Messaging Protocols
• Activity: Examining Messaging Protocols
• Layer 7 Web Traffic Protocols
• Layer 7 Streaming Media Protocols
• Layer 7 Infrastructure Management Protocols 1.4 Switching
• Properties of Network Traffic
• Contention Management
• Activity: Creating Collision and Broadcast Domains
• Interface Properties and Segmentation
• Activity: Creating a Basic Network Segment
• Switching prt 2
• Activity: Switching
• Switching Loop Management
• Activity: Managing Switching Loops
• VLANs
• Activity: Creating VLANs 1.5 Routing
• ARP
• Activity: Examining ARP
• IP Addressing Basics
• Activity: Configuring IP
• Routers
• Activity: Setting Up a Router
• Routing Basics
• Activity Adding Static Routes
• VLAN Routing
• Activity: Routing Between VLANs
• NAT/PAT
• Activity: Configuring NAT/PAT
• Routing Protocols
• Activity Configuring a Routing Protocol
• Firewalls
• Activity: Configuring Firewalls 1.6 Advanced Switching and Routing Concepts
• IPv6 Concepts
• Activity: Exploring IPv6
• Performance Concepts
• Distributed Switching
• Software-defined Networking 1.7 IP Addressing
• Public vs. Private
• Loopback and Reserved
• Subnet Mask
• Default Gateway
• Virtual IP
• Subnetting
• Activity: Learning to Subnet
• Address Assignments 1.8 Network Types and Topologies
• Wired Topologies
• Wireless Topologies
• Network Types
• Technologies that Facilitate the Internet Of Things (IoT) 1.9 Wireless Technologies
• Radio Basics
• 802.11 Standards
• Wi-Fi Frequencies
• Wi-Fi Antenna Concepts
• Bluetooth
• Cellular
• Site Surveys
• Activity: Using an RF Spectrum Analyzer 1.10 Cloud Concepts
• Types of Services
• Cloud Delivery Models
• Security Implications/Considerations
• Activity: Exploring Cloud Services 1.11 Network Services
• DNS Service
• Activity: Setting up DNS
• DHCP Service
• Activity: Setting Up DHCP
• NTP
• IPAM Module 2 – Infrastructure 2.1 Cabling Solutions
• Media Types
• Activity: Testing a Fiber Optic Cable
• Plenum vs.PVC
• Connector Types
• Activity: Crimping on an RJ-45 Connector
• Transceivers
• Termination Points
• Activity: Terminating Cable to a 110 Block
• Copper Cable Standards
• Copper Termination Standards
• Activity: Creating a Crossover Cable
• Ethernet Deployment Standards 2.2 Network Device Placement and Installation
• Network Interface
• Repeater
• Hub
• Bridge
• Switch
• Router
• Modem
• Wireless Access Point
• Activity Setting up a WAP
• Firewall
• Media Converter
• Wireless Range Extender
• VoIP Endpoint 2.3 Advanced Network Devices
• Multilayer Switch
• Wireless Controller
• Load Balancer
• IDS/IPS
• Proxy Server
• Activity Configuring Proxy Settings
• VPN Concentrator
• AAA/RADIUS Server
• UTM Appliance
• NGFW/Layer 7 Firewall
• VoIP PBX
• VoIP Gateway
• Content Filter 2.4 Virtualization and Network Storage Technologies
• Virtual Networking Components
• Network Storage Types
• Connection Types
• Jumbo Frames 2.5 WAN Technologies
• Service Types
• Transmission Mediums
• Characteristics of Service
• Activity Configuring WAN Links
• Termination Module 3 – Network Operations
3.1 Documentation
• Diagram Symbols
• Standard Operating Procedures/Work Instructions
• Logical vs. Physical Diagrams
• Rack Diagrams
• Change Management Documentation
• Wiring and Port Locations
• IDF/MDF Documentation
• Labeling
• Network Configuration and Performance Baselines
• Inventory Management
• Activity Using Documentation 3.2 Business Continuity and Disaster Recovery
• Availability Concepts
• Recovery
• Activity Backing Up Your Data
• MTTR
• MTBF
• SLA Requirements 3.3 Scanning, Monitoring, and Patching
• Processes
• Event Management
• SNMP Monitors
• Metrics
• Activity: Testing the Network 3.4 Remote Access Methods
• VPN
• RDP
• SSH
• VNC
• Telnet
• HTTPS/Management URL
• Remote File Access
• Out-of-Band Management
• Activity: Making Remote Connections 3.5 Policies and Best Practices
• Privileged User Agreement
• Password Policy
• On-boarding/Off-boarding Procedures
• Licensing Restrictions
• International Export Controls
• Data Loss Prevention
• Remote Access Policies
• Incident Response Policies
• BYOD
• AUP
• NDA
• System Life Cycle
• Safety Procedures And Policies
• Activity: Creating Policies and Procedures Module 4 – Network Security
4.1 Physical Security Devices
• Detection
• Prevention 4.2 Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms 4.3 Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security 4.4 Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack 4.5 Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports 4.6 Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot Module – Network Troubleshooting and Tools 5.1 Network Troubleshooting Methodology
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes 5.2 Using the Appropriate Tool
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity: Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity: Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity: Using Command Line Tools 5.3 Troubleshoot Wired Connectivity and Performance
• Signal Issues:
o Attenuation
o Latency
o Jitter
o Crosstalk
o EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
o Open/short
o Incorrect pin-out
o Incorrect Cable Type
o Bad Port
o Damaged cable
o Bent pins
• Transceiver Issues:
o Transceiver mismatch
o TX/RX reverse
o Duplex/speed mismatch
• Activity: Troubleshooting Transceiver Problems
• Traffic Flow Issues:
o Bottleneck
o VLAN mismatch
o Network connection LED status indicators 5.4 Troubleshoot Wireless Connectivity and Performance
• Signal Loss:
o Attenuation
o Reflection
o Refraction
o Absorption
• Latency & Jitter
• Antenna Issues:
o Incorrect antenna type
o Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
o Interference
o Channel overlap
o Overcapacity
o Distance limitations
o Frequency mismatch
o Power levels
o Signal-to-noise ratio
• WAP Misconfiguration:
o Wrong SSID
o Wrong passphrase
o Security type mismatch
• Activity Troubleshooting WAP Issues 5.5 Troubleshoot Common Network Service Issues
• Common Network Issues:
o Physical Connectivity
o Incorrect IP Address
o Incorrect Gateway
o Incorrect Netmask
o Names Not Resolving
o Untrusted SSL Certificate
• DHCP Issues:
o Duplicate IP Addresses
o Expired IP Address
o Rogue DHCP
o Exhausted DHCP Scope
• Firewall/ACL Issues:
o Blocked TCP/UDP Ports
o Incorrect Host-based Firewall Settings
o Incorrect ACL Settings
• Advanced Network Issues:
o DNS Server Issues
o Duplicate MAC Addresses
o Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue
4. CompTIA Linux+ XK0-004 (NO EXAM)
Module 1: Intro & Performing Basic Linux Tasks
Instructor Introduction
Course Introduction
Identify The Linux Design Philosophy
Enter Shell Commands
Shell Commands Activity
Get Help with Linux Module 2: Managing Users and Groups
Assume Superuser and Groups
Create, Modify, and Delete Users
Create, Modify, and Delete Groups
Query Users and Groups
Configure Account Profiles Module 3: Managing Permissions and Ownership
Modify File and Directory Permissions
Modify File and Directory Ownership
Configure Special Permissions and Attributes
Troubleshoot Permissions Issues Module 4: Managing Storage
Create Partitions
Manage Logical Volumes
Mount File Systems
Manage File Systems
Navigate the Linux Directory Structure
Troubleshoot Storage Issues Module 5: Managing Files and Directories
Create and Edit Text Files
Search for Files
Perform Operations on Files and Directories
Process Text Files
Manipulate File Output Module 6: Managing Kernel Modules Module 7: Managing the Linux Boot Process Module 8: Managing System Components
Configure Localization Options
Configure GUIs
Manage Services
Troubleshoot Process Issues
Troubleshoot CPU and Memory Issues Module 9: Managing Devices
Identify the Types of Linux
Configure Devices
Monitor Devices
Troubleshoot Hardware Issues Module 10: Managing Networking
Identify TCP/IP Fundamentals
Identify Linux Server Roles
Connect to a Network
Configure DHCP and DNS Client Services
Configure Cloud and Virtualization Technologies
Troubleshoot Networking Issues Module 11: Managing Packages and Software
Identify Package Managers
Manage RPM Packages with YUM
Manage Debian Packages with APT
Configure Repositories
Acquire Software
Build Software from Source Code
Troubleshoot Software Dependency Issues Module 12: Securing Linux Systems
Implement Cybersecurity Best Practices
Implement Identity and Access Management Methods
Configure SELinux or AppArmor
Configure Firewalls
Implement Logging Services
Back Up, Restore, and Verify Data Module 13: Working with Bash Scripts
Customize the Bash Shell Environment
Identify Scripting and Programming Fundamentals
Write and Execute a Simple Bash Script
Incorporate Control Statements in Bash Scripts Module 14: Automating Tasks
Schedule Jobs
Implement Version Control Using Git
Identify Orchestration Concepts Module 15: Installing Linux
Prepare for Linux Installation
Perform the Installation
5. Microsoft Azure Fundamentals AZ-900 (NO EXAM)
Module 1: Introduction
Instructor Introduction
Course Overview
Expectations Module 2: Cloud Fundamentals
What is the Cloud
Basic Terms
Types of cloud computing
Cloud Service Models Module 3: Azure’s Architecture
Regions and Availability
Resource Groups and Management
Azure Marketplace
Demo- Azure Console Exploration Module 4: Compute
Virtual Machines
Containers
Demo – Containers
Functions
Demo – Functions
Windows Virtual Desktop and App Services Module 5: Networking and CDN
Virtual Networks
Load Balancers
Gateways
Content Delivery Network
Network Security
Demo – Connecting two VMs Module 6: Storage
Storage
Big Data and Analytics
Databases
Demo – SQL Database
Database Migration Module 7: Azure Solutions
IoT
Demo – IoT Hub
AI
Serverless Computing Module 8: Administration
Security
Identity and Access Management
Demo – Adding Users and Groups
Governance
Demo – Resource Locks
Privacy and Compliance Module 9: Pricing and Service Level Agreements
Managing Costs
Demo – Pricing Calculator
Service Level Agreements and Service Lifecycles Module 10: Exam Preparation
Exam Layout
Best Practices and Study Tips
Overview and Conclusion Module 11: Review Questions
Module 11 pt 1
Module 11 pt 2
Module 11 pt 3
Module 11 pt 4
****CERTIFICATION EXAMS NOT INCLUDED****
Watch this video to learn more about MeasureUP practice tests.
If you’re looking to get ahead of the crowd and don’t have any technical experience, then you might want to consider adding live labs to your course.
Salary and job prospect information
We use two excellent third-party resources to allow you to check your earning potential and job prospects before starting this course.
The first is IT JobsWatch, which allows you to check what employers are paying people on average with specific certifications, such as the ones contained in this bundle. Click here and enter the name of the certification you would like to see salary information on. Remember to check the earning potential for all the certifications in the bundle, especially the more advanced ones as these will offer the highest salary.
The second is Payscale, which also does the above, but allows you to see what types of job titles are paying more based around the certification you enquire about. Click here and enter the name of the certification you would like to see salary and job title information on. Again, remember to check the earning potential for all the certifications in the bundle, especially the more advanced ones as these will provide information on higher level job roles. Although some higher level roles may require experience, the information will give you an idea of future earning potential and career prospects.
What career paths are available to me through this course?
Just because the title of this course bundle is IT Support Technician, doesn’t mean you are limited to just this job. We’ve provided a list of other career paths you can consider through this course bundle. These include:
Network Engineer
Network Consultant
Data Center Manager
IT Manager
IT Sales Account Manager
IT Consultant
Microsoft Certified Solutions Associate
Systems Administrator
Office 365 Administrator
Who are CompTIA? Watch this video to find out.
How is each course taught?
All courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. The lessons are multi-media based, which means video and audio are used to teach the lessons. Most lessons are also interactive, prompting the learner to participate. This might involve answering on-screen questions, participating in tasks, and using simulators as if you were using the real software program.
How long will it take me to complete each course?
As mentioned above, our courses are self-paced. Some people finish their course faster than others. Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this bundle, then it will take you less time than if you do two or three or all of them. No matter what though, you will always have 12 months to complete your course.
Watch this video to learn more about CompTIA certifications.
What do I need?
All you need is an internet connection and a PC. While most of the lessons work on MACs, we recommend you use a PC for the best performance. Certain parts of the course may not display properly on older MACs. Once you’ve logged into your course, you may be prompted to down certain free plugins such as Java. Just follow the on-screen prompts.
Course Features
With Hudson’s e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our learning system gives you all of the benefits of a live class at just a fraction of the cost. Courses include:
Expert Instructor-Led Training
We only use the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
Visual Demonstrations & Multimedia Presentations
Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.
Quizzes & Exam Simulators
Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.
This will allow you to gauge your effectiveness before moving to the next module in your course. Hudson courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.
Social Learning & Networking
Hudson has designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students and staff, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.
Flash Cards & Educational Games
Hudson knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.
Navigation & Controls
Hudson’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.
Add experience to your CV with Live Labs
If you’re looking to get ahead of the crowd and don’t have any technical experience, then you might want to consider adding live labs to your course. Because many IT jobs take place at the virtual level (i.e. behind a keyboard and mouse), the experience you’ll gain through a live lab is very similar to experience you’ll gain in the workplace. Consequently many employers regard live lab experience as a valued asset on a CV.
Live labs are also a great tool for experienced technicians as they allow individuals to put their newly acquired course skills to practice. To find out more about our range of live labs, including costs, and how they can enhance your skills, click here.