Are you looking for a guaranteed job interview?
Our exclusive Cyber Security Package will build you step-by-step into the cyber security professional that businesses around the world are keen to employ thanks to the digital and cybersecurity skills gap that is growing larger by the day.
An all-encompassing set of skills that will boost the career of any IT professional creating a foundation for success in the IT industry, we make sure that no stone is left unturned while giving you a helping hand to work your way up the ladder.
CompTIA, Cisco and Windows
Step 1: Consultation
Unsure what course is right for you? We will walk you through what the options are and how you can benefit by starting it. The consultation is free of charge and we will find the perfect course for your needs.
Step 2 : Online Studying
All courses are delivered online, meaning you will be able to access the materials at any time, 24/7 for the one year that your course is active. This package will build you through CompTIA’s core syllabus: A+, Network+ and Security+ before then moving onto study and master the Microsoft Windows operating system versions 7 & 10, Cisco’s networking technologies. You will then complete your studies with more in depth cyber security CompTIA courses: Linux and CySA.
Step 3: CompTIA A+ and CySA Exams
You will finally be prepared for the official CompTIA A+ and CySA Certifications exams. We will firstly release extensive mock tests for you to practice on and once you are ready we will book your official exams if you have chosen to purchase these.
CompTIA are international leaders in IT certifications and obtaining both your CompTIA A+ and CySA certification will not only qualify you as an IT Technician and later as a Cyber Security Analyst not only in the UK but across the globe.
Step 4: Practical Placement
Once you have completed your online training modules its time to get some hands on experience.
Live-Lab is real computer equipment networked together and conveniently accessible over the internet.
Our hosted platforms are configured to imitate real world configurations by providing sufficient hardware not only to carry out tasks, but also test the impact of those changes
Step 5: Job Interview
Upon completion of all the online courses and Live Lab practical training we will then place you into a role.
We have over 5,000 employers in our recruitment operation so we can arrange interviews all over the country with a number of different companies.
Which of these courses would be the best starting point for my studies?
We recommend starting your studies with the CompTIA A+ course, as it will provide you with the basic knowledge that is essential when starting an IT career.
What is a Live Lab?
A Live Lab consists of computer equipment that you are able to access and manipulate through your browser. You will have the ability to work with real switches, servers and routers in order to gain valuable practical experience.
Do you offer finance?
Choose a payment plan to suit your financial needs with our easy, monthly payment options over 12 months.
Key Learning Points
- Common PC components and how they are assembled to create a working computer.
- Component configurations that improve performance and system compatibility.
- How to build a simple network to share data between PCs.
- Installing, configuring and managing the Microsoft Windows operating system on a desktop PC.
- Applying Group Policies to prevent data and settings being accessed or altered by unauthorised users.
- Monitoring and maintaining PCs to identify and resolve potential problems early.
- Including network security as a basic design consideration.
- Identifying compliance needs for data and network security and building appropriate safeguards.
- Familiarisation with common network threats and vulnerabilities and how they can be blocked or minimised.
- The three levels of security considerations – application, data and host – and how each is to be protected.
- How user accounts and security groups can limit data access to authorised parties and raise security standards.
- The use of encryption to protect sensitive data against unauthorised access or theft.
Microsoft Windows 7, Enterprise Desktop Support Technician (Exam 70-685)
- Key features in Windows 7
- Types of installations and steps and tools needed to upgrade and migrate successfully
- Disc management and device drivers
- File permissions, shared folders and setting up printers
- Using permissions, authentication and authorisation to troubleshoot logon issues
- Active Directory
- Basics of network connectivity
- Troubleshooting network issues
- Benefits that Windows 7 has for laptops and different types of remote access
- Security aspects of the Windows 7 operating system
- Optimising performance aspects of the Windows 7 operating system
- Maintaining Windows 7 through identifying, troubleshooting, and resolving issues
Cisco 100-105: ICND1 Interconnecting Cisco Network Devices Part 1
- Networking 101; including the fundamentals and mechanics of networking
- Switching and Layer 2 Technologies
- Cisco IOS Software & CLI Operation
- IP – Internet Protocol v4/v6
- Routers & Routing Protocols
- Securing the Network
- WAN Technologies
- Mastering the CLI
- Preparing for the official 100-105 exam
CompTIA Linux+ (LX0-101 & LX0-102)
- Common command line operations and how to use Shell commands.
- Software installation and management using RPM, Apt-Get and other libraries.
- How to configure and access hardware resources from the Linux operating system.
- Partitioning and managing hard disk drive space and filesystems.
- Managing files and security permissions to protect corporate data.
- Understanding and managing the Linux boot process.
- Deploying and configuring the X desktop user interface to simplify management and usage of the Linux system.
- Administering the Linux operating system, and improving operations in a networked environment.
- Configuring and troubleshooting basic networking services including DHCP and IP addressing.
- Writing scripts to automate common database and email management tasks.
- Improving security to prevent unauthorised access to data or system resources.
- Module 1 – The Pen Test Engagement
In this module, you will learn how to work with a client and prepare for a penetration testing engagement. The topics are:
1. Penetration Testing Overview
In this topic, you will learn what a penetration test is, the steps taken to prepare for a pentest, tools used, communicating with the client and your team, and pen testing standards and frameworks.
2. Engagement Planning
In this topic, you will learn about the logistics of planning for a pentest engagement including setting scope, determining end goals and deliverables, assessment types, threat modeling, and scheduling.
3. Engagement Documents
In this topic, you will learn about documentation required for a professional pentest engagement including contracts, authorizations, rules of engagement, impact analysis, disclaimers, and support resources.
4. Prepare to Go Live
In this topic, you will prepare both the client and your team to start the actual test.
Module 2 – Passive Reconnaissance
In this module, you will learn how to gather background information on your target. The topic is:
In this topic, you will learn about passive reconnaissance through open source intelligence gathering, including using websites, social media, Google hacking, DNS querying, and other tools.
Activities include using Whois, Google Hacking Database, theHarvester, Recon-ng, FOCA, dig, nslookup, and Shodan.
Module 3 – Active Reconnaissance
In this module, you will learn how to actively search for targets. The topics are:
1. Host Discovery and Port Scanning
In this topic, you will learn about the different tools and methods for discovering target systems and the services they provide.
Activities include using the command line, nmap, and Metasploit.
In this topic, you will learn how to obtain additional information from network services, Windows and Linux systems, as you prepare to exploit those systems.
Activities include using Windows and Linux command line commands, nmap, netcat, telnet, rpcclient, dirbuster, and Metasploit.
3. Vulnerability Scanning
In this topic, you will use different types of scans including packet crafting to discover exploitable vulnerabilities on hosts, websites, network services, and network devices.
Activities include using OpenVAS, nmap NSE scripts, Metasploit Pro, sqlmap, Nikto, MBSA, hping3, airmon-ng, aircrack-ng, Fern Wi-Fi Cracker, mdk3, and Kismet.
Module 4 – Physical Security
In this module, you will learn how to test physical security controls. The topic is:
1. Physical Security Tests
In this topic, you will learn about ways to circumvent physical security controls to gain access to restricted areas.
Activities include RFID badge cloning
Module 5 – Social Engineering
In this topic, you will learn about social engineering. The topic is:
1. Social Engineering Attacks
In this topic, you will learn how to execute both technical and non-technical social engineering attacks.
Activities include using msfvenom and Metasploit for USB stick baiting, and the Kali Social Engineering Toolkit for website login cloning, phishing, and credential interception.
Module 6 – Vulnerability Scan Analysis
In this module, you will learn how to examine vulnerability scan results to choose the best exploit against discovered targets. The topic is:
1. Vulnerability Scan Results
In this topic, you will learn how to assess vulnerability scan results, weed out false positives, adjudicate and prioritize findings, and map vulnerabilities to exploits. You will also learn about both the value and limits of using automated vulnerability scans in your pentest engagement.
Activities include using Metasploit Pro to validate vulnerability scan findings and determine the appropriate exploit modules that can be used to penetrate the vulnerable systems.
Module 7 – Password Cracking
In this module, you will learn the basics of password cracking. The topic is:
1. Password Cracking Types
In this topic, you will learn about dictionary, rainbow table, and brute force attacks. You will learn how to brute force network service authentication, intercept a network authentication, and pass-the-hash.
Activities include using Medusa, John-the-Ripper, Wireshark, and Metasploit.
NOTE: You will learn additional password cracking techniques in subsequent modules.
Module 8 – Penetrating Wired Networks
In this module, you will learn how to penetrate a wired Ethernet network. The topic is:
1. Common Network Exploits
In this topic, you will learn how to sniff wired network activity, intercept file transfers, read transmitted email, conduct Man-in-the-Middle attacks using ARP poisoning, hijack TCP sessions, execute network-based denial-of-service attacks, and exploit common network services.
Activities include using Wireshark, ettercap, Low Orbit Ion Cannon, nmap, the Searchsploit database, gcc, and Metasploit.
Module 9 – Penetrating Wireless Networks
In this module, you will learn how attack wireless networks. The topic is:
1. Wireless Network Exploits
In this topic you will learn how to sniff and jam Wi-Fi networks, crack WEP, WPA/WPA2 and WPS, conduct Evil Twin attacks, and attack BlueTooth.
Activities include using Netcut, Wireshark, and airmon-ng, besside-ng, bettercap, and Wi-Fi Pumpkin.
Module 10 – Windows Exploits
In this module, you will learn how to exploit Windows hosts. The topics are:
1. Common Windows-Based Vulnerabilities
In this topic you will learn about common Windows vulnerabilities, exploits, and payloads.
Activities include using Metasploit, the Searchsploit database, and command-line commands.
2. Password Cracking in Windows
In this topic, you will learn about cracking Windows passwords.
Activities include using Cain & Abel, John-the-Ripper and L0pht 7
3. Windows Components
In this topic, you will learn how to exploit standard Windows components including default protocols and configurations, the file system, the kernel, and memory. You will also learn how to leverage these components to escalate privilege on a compromised host.
Activities include using Metasploit and the Searchsploit database.
4. Windows Accounts
In this topic you will learn how to exploit default and user-defined Windows accounts.
Activities include using Metasploit and command-line commands.
In this topic, you will learn about using sandboxing to contain hacking attempts.
Module 11 – Linux Exploits
In this module, you will learn how to hack Linux systems. The topics are:
1. Common Linux/Unix-Based Vulnerabilities
In this topic you will learn about common Linux vulnerabilities, exploits, and payloads.
Activities include using Metasploit, the Searchsploit database, and command-line commands.
2. Password Cracking in Linux
In this topic you will learn how to crack Linux passwords.
Activities include using command-line commands, unshadow, and John-the-Ripper.
3. Vulnerable Linux Components
In this topic, you will learn how to exploit standard Linux components including default protocols and configurations, the file system, the kernel, and memory. You will also learn how to leverage these components to escalate privilege on a compromised host.
Activities include using command-line commands, Metasploit and the Searchsploit database.
4. Linux Accounts
In this topic, you will learn how to attack default Linux accounts.
Activities include using Linux bash commands.
Module 12 – Mobile Devices
In this module, you will learn how to attack mobile devices. The topics are:
1. Android Exploits
In this topic, you will learn how to exploit common Android vulnerabilities
Activities include using msfvenom and Metasploit to compromise and remotely control an Android phone.
2. Apple Exploits
In this topic, you will learn how to exploit common Apple vulnerabilities
Activities include using nmap and WinSCP to access a compromised iPhone.
Module 13 – Specialized Systems
In this module, you will learn about specialized systems. The topics are:
In this topic, you will learn about common vulnerabilities of industrial control ICS and SCADA systems
2. Embedded Systems
In this topic, you will learn about common vulnerabilities of embedded systems such as point-of-sale and real-time operating systems
Activities include using a Raspberry PI to attack an internal network.
3. 13.3 IoT
In this topic, you will learn about common and emerging threats related to the Internet of Things
4. 13.4 Hardware Attacks
In this topic, you will learn about additional hardware-based attacks that can be conducted against specialized systems.
Module 14 – Scripts
In this module, you will learn the basics of scripting, as pertains to penetration testing. The topics are:
1. Scripting Basics
In this topic, you will learn about the basics of Bash, PowerShell, Python, and Ruby scripting
2. Common Scripting Elements
In this topic, you will learn about common scripting elements found in all of the scripting languages including variables, substitution, arrays, operations, logic, and error handling.
Activities include writing simple scripts.
Module 15 – Application Testing
In this module you will learn about testing application code for vulnerabilities. The topics are:
1. Static Code Analysis
In this topic, you will learn how to analyze static, non-running code
2. Dynamic Code Analysis
In this topic, you will learn how to test running code.
Activity includes fuzz testing an application for potential buffer overflow vulnerabilities.
3. Reverse Engineering
In this topic, you will learn about application reverse-engineering techniques including de-compilation, disassembly, and debugging.
Module 16 – Web App Exploits
In this module, you will learn how to exploit web apps. The topics are:
1. Common Web Application Vulnerabilities
In this topic, you will learn how to exploit authentication, authorization, misconfigurations, browser sessions, and insecure code.
2. Injection Attacks
In this topic, you will learn about various injection techniques.
Activities include using a browser, sqlmap, and Metasploit to inject code and SQL commands into a web app form.
3. Cross-Site Attacks
In this topic, you will learn how to conduct Cross-Site Scripting and Cross-Site Request Forgery attacks.
Activities include using a browser and other tools to perform XSS attacks.
4. Other Web-Based Attacks
In this topic, you will learn how to conduct other types of web-based attacks including clickjacking, file inclusion, and webshells.
Module 17 – Lateral Movement
In this module, you will learn how to move around in a compromised network. The topic is:
1. Lateral Movement Techniques
In this topic, you will learn how to use lateral movement techniques including migrating malicious code to another process, pivoting, and using proxy chains.
Activities include using Metasploit to migrate code and pivot through the target network, and Armitage Team Server to pass control to another attacker.
Module 18 – Persistence
In this module, you will learn how to maintain control of a compromised system. The topics are:
1. Persistence Techniques
In this topic, you will learn about common persistence techniques.
In this topic, you will learn how to plant persistent back doors on a compromised system.
Activities include using ProRAT Trojan builder
3. Bind and Reverse Shells
In this topic, you will learn the difference between bind and reverse shells, and when it is appropriate to use either.
Activities include using Metasploit to create bind and reverse connections to a compromised target.
In this topic, you will learn how to use netcat to set up a persistent back door.
Activities include using netcat to launch both bind and reverse shells.
5. Scheduled Tasks
In this topic, you will learn how to maintain persistence through scheduled tasks.
Activities include using the task scheduler to regularly launch a netcat session that exfiltrates updated data out of the target and back to the attacker.
Module 19 – Cover Your Tracks
In this module, you will learn how to remove evidence of your hacking activities. The topic is:
1. Anti-forensics Techniques
In this topic, you will learn how to hide malicious activity from a forensic investigator
Activities include clearing logs, changing file timestamps, and impersonating another user when conducting malicious activity.
Module 20 – The Report
In this module, you will learn how to analyze your pentest findings and write a report as the final deliverable for your client. The topics are:
1. Data Analysis
In this topic, you will categorize and prioritize the data you have collected during the penetration test.
In this topic, you will formulate recommendations for the client based on the data you collected during the penetration test.
3. Writing the Report
In this topic, you will normalize the data you have collected, and organize it into an actionable report aimed at multiple audiences.
4. Handling the Report
In this topic, you will securely hand over the report to your client.
The activity includes examining real world report examples.
Module 21 – Post Engagement Cleanup
In this module, you will learn about the tasks you must perform after completing a professional penetration test. The topic is:
1. Post Engagement Activities
In this topic, you will learn about the cleanup tasks required after a typical pentest engagement, including removing artifacts, client acceptance of the findings, lessons learned, and follow up actions.
- Physical network cable types and the situations in which each would be used.
- Building LANs and WANs and the correct topology to use for a specific business need.
- How to monitor and manage the traffic passing through network hardware to ensure a consistently high performance for service users.
- The basic principles of network security, using features built-in to routers and switches to prevent unauthorised access and data theft.
Microsoft Windows 7, Enterprise Desktop Administrator (Exam 70-686)
- Understand how to manage an enterprise environment
- Tools used to deploy operating systems
- Desktop configurations
Microsoft Windows 10, Configuring Windows Devices (Exam 70-697)
- How to synchronise a Microsoft account across multiple devices
- Sideloading LOB apps using PowerShell and DISM
- Deploying apps using Microsoft Intune
- How to support authentication and authorisation
- How to configure Homegroups, and differentiating workgroup and domain authentication
- How to migrate user data
- Working with Hyper-V in Windows 10
- Mobility options – how to configure and work with options in Windows 10
- Configuring mobile device security
- Supporting mobile devices
- Connecting mobile devices to Azure and using Microsoft Intune
- Configure networking, IP settings and network security
- Configure data access and protection
- Remote connections and access
- System and file recovery and updates
Cisco CCNA and CCNA Security
- How to use the Cisco Router SDM security audit feature to identify unauthorised network resource usage.
- Securing routers to prevent hackers from gaining access to key network resources.
- The Authentication, Authorisation and Accounting philosophy – key to implementing Cisco-approved security solutions that work.
- Using Access Control Lists to limit network access, mitigate threats and minimise attack surfaces.
- The use of stateful firewalls to identify and block low level hacking attempts automatically.
- Securing inter-site VPNs and data transfer using SDM on Cisco routers.
CompTIA Cyber Security Analyst (CySA+)
- Identifying vulnerabilities, risks and threats to an organisation
- Secure and protect applications and systems within an organisation
- Prevent, detect and combat security threats
- Cyber incident response
Computer Hacking Prevention
- Giving Out Personal Information
- Online Banking
- Protecting Children Online
- Protecting Your Identity
- Securing Your Computer and Network
- Spam, viruses and more
- Opening Emails and Attachments
What People Are Saying
It was easy to set up and I had great support from Vince throughout the duration of the course. I start my new IT role on Monday and can’t wait to hit the ground running using the new knowledge I have learned.Andrew Jones
The course was tough, but after passing it I just got my first job in the IT industry! Can’t wait to see what the future holds and where this industry takes me.Rachel Graham
I purchased the New to IT Package course through IT Career Swap I had great support and service throughout and Michael had a detailed CV review before being forwarded to their recruitment partner.
I have now started my career in IT through this method. I would highly recommend IT Career Swap for other those who wish to start a career in IT.
Best decision I’ve ever made. Thank you!Imran Khan
Working with Vince has been easy. Courses are tough but with effort have got through them. All round great serviceJennifer Barton
I love that these courses are globally recognised. Me and my boyfriend were planning on moving to Dubai with his work and now I can go with him and get a job out there.Adeline West
We're Here To Help!
Beta House, Culpeper Close,
Laser Quay, Medway City Estate,
Rochester, ME2 4HU
Mon - Fri: 8am - 6.30pm
Sat - Sun: 9am - 2pm
01634 931 004