A+ 1001 (Core 1) & 1002 (Core 2)

Our A+ training program establishes the foundation for a career in Information Technology beginning with an industry standard certification (CompTIA). The program consists of two courses which are aligned with the objectives of the industry’s current A+ 220-1001 and 220-1002 certification examinations.

Satisfactory completion of the training prepares each student to successfully meet the standards of both certification examinations in order to be officially awarded the A+ certification credential. Both courses provide students with fundamental knowledge and skills associated with computer hardware, peripherals, and operating systems.

Concepts of security associated with computer use, network management, and the operation of mobile devices are also presented in these courses. Students will be able to build, configure, optimize and troubleshoot a standalone computer to include familiarizing themselves with the features of Windows 7, 8/8.1, and 10 operating systems for both home and business applications. The course also covers mobile device technology and mobile operating systems such as Android, iOS, and Windows phone.

Exam codes: 220-1001 and 220-1002

Click for Course Outline


This course is designed to provide network technicians and support staff with the foundation-level skills they need to install, operate, manage, maintain and troubleshoot a corporate network. This course will help prepare students for the CompTIA Network+ certification exam.

Upon completion of the course, the student will be qualified for a position in the IT field as a computer technician, field repair technician, or deployment specialist.

Exam codes: N10-007

Click for Course Outline


This course will prepare students to pass the current CompTIA Security+  certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.

CompTIA Exam code: SY0-501

Click for Course Outline


The Linux class was developed to meet the current demands of DOD (Department of Defense) and the growing needs of the computer industry. Provides the student with the level of knowledge needed as part of the DOD and industry requirements for employment as an entry-level computer technician. Provide students with a solid background on how to install, configure and use the Linux operating system.

Exam code: LX0-103 AND LX0-104

Click for Course Outline

MD-100 Configuring Windows 10

This class prepares students for computing operations that will use Microsoft Windows 10 as a desktop operating system in an enterprise, small business, and home environment. They will likely be responsible for implementing and administering any Windows client operating system in a networked environment; as well as install, deploy, and upgrade to Windows 10, ensuring hardware and software compatibility. They will also be able to configure pre and post-installation system settings, Windows security features, network connectivity applications included with Windows 10, and mobile computing. Students will be able to maintain systems, including monitoring and resolving performance and reliability issues.

Key points covered in the class:

  • Managing & Automating Windows 10 installation
  • Configuring hardware and applications
  • Managing users, groups, and security
  • Configuring network connectivity
  • Maintenance, backup, and recovery of Windows 10

70-410 Installing and Configuring Windows Server 2012

The MCP Server 2012 70-410 course is designed to provide a solid foundation-level understanding of Microsoft Windows client and server operating system.

This course covers installing and configuring network services and Active Directory, managing group policy objects (GPOs) and security, configuring TCP/IP, and using virtualization in Server 2012 R2.

Exam Objectives:

  • Install and configure servers (15–20%)
  • Configure server roles and features (15–20%)
  • Configure Hyper-V (15–20%)
  • Deploy and configure core network services (15–20%)
  • Install and administer Active Directory (15–20%)
  • Create and manage Group Policy (15–20%)

70-411 Administering Windows Server 2012

The MCP Server 2012 70-411 course focuses mainly on managing, maintaining and configuring Server 2012.

This course covers deploying, managing and maintaining servers, and configuration of file and print services, network services, routing and remote access, network policies, Active Directory and Group Policies.

Exam Objectives:

  • Deploy, manage, and maintain servers (15–20%)
  • Configure File and Print Services (15–20%)
  • Configure network services and access (15–20%)
  • Configure a Network Policy Server (NPS) infrastructure (10–15%)
  • Configure and manage Active Directory (10–15%)
  • Configure and manage Group Policy (15–20%)

70-412 Configuring Advanced Windows Server 2012

The MCP Server 2012 70-412 The core course objectives in this class are configuring and managing high availability, configuring file and storage solutions, and implementing business continuity and disaster recovery.

Exam Objectives:

  • Configure and manage high availability (15–20%)
  • Configure file and storage solutions (15–20%)
  • Implement business continuity and disaster recovery (15–20%)
  • Configure Network Services (15–20%)
  • Configure the Active Directory infrastructure (15–20%)
  • Configure Identity and Access Solutions (15–20%)

Certified Information System Security Professional (CISSP)

The need for professionalism was a serious topic among computer security practitioners for many years. Professionalism was viewed as the way to upgrade this often ill-defined and poorly understood craft to that of a recognized and disciplined profession. By the mid-1980s, a number of professional societies in North America concluded that a certification process attesting to the qualifications of information security personnel would enhance the credibility of the computer security profession. Through the societies' cooperative efforts, the International Information Systems Security Certification Consortium, or (ISC)2, was established in mid-1989 as an independent, nonprofit corporation whose sole charter is to develop and administer a certification programs for information security practitioners. Now firmly established across the globe, the program is quickly the premier certification internationally for security professionals. (ISC)2 membership benefits includes networking with other (ISC)2 credential holders through world-wide local ‘chapters’, members-only meetings during various security conferences, annual (ISC)2 sponsored security conferences, savings on conference attendance, a job board, and (ISC)2 members can save money on other items such as hotels, travel, other household items (Member Perks new to members in 2017).

The United States Department of Defense defines the CISSP commercial certification in Directive 8570.1M as meeting the highest level of qualifications of IAM and IAT level III.

“Directive 8570.1 requires every full- and part-time military service member, defense contractor, civilian and foreign employee with "privileged access" to a DoD system — regardless of job series or occupational specialty — to get a commercial certification credential that has been accredited by the American National Standards Institute (ANSI).”

Here are some of the most frequently asked questions about the CISSP certification:

Q: What does the CISSP exam consist of?
A: The CISSP exam is a 250 question examination, delivered via on-line testing facilities. (e.g. Pearson VUE) Candidates are given 6 hours to complete the exam although most complete it in about 4 hours.

Q: What do the questions cover?
A: Examination questions cover all eight domains in the Common Body of Knowledge (CBK). To validate that candidates are knowledgeable across a broad spectrum of security disciplines. Questions are "scrambled" on the examination; they are not presented in domain order.

The domains are:

* Security and Risk Management
* Asset Security
* Security Architecture and Security Engineering
* Communication and Network Security
* Identity and Access Management
* Security Assessment and Testing
* Security Operations
* Software Development Security

Q: Are the pre-test questions identified?
A: No. They are scrambled into the examination along with the scored items.

Q: What types of questions are there?
A: All test questions are multiple choice and advanced innovative questions (drag and drop). They are designed to test a candidate's knowledge of information security facts and concepts and their application.

Q: How hard is the examination?
A: The candidates are expected to have 3-5 year cumulative experience, such as a security analyst, network architect, systems engineer, etc. It is designed to test for the minimum level of competency acceptable for someone to be certified as an information systems security professional. A knowledgeable candidate should not find the examination difficult.

Q: If the examination isn't particularly difficult, why don't more people pass it?
A: What makes the examination difficult is the expansive knowledge base it covers. It's difficult to develop expertise in all eight domains.

Q: Are the questions in the Study Guides really representative of examination questions?
A: The study guides questions are good examples of the format and type of questions you would see on the exam but are not necessarily representative of the difficulty.

Q: Which domains are the hardest?
A: The domains that are not commonly used in everyday security management such as cryptography, system architecture and physical security usually score the lowest.

Q: How current is the examination?
A: Each year between 100 and 150 new questions are added to the question pool, many are based on new security technologies. You can expect to find questions on current technologies, practices, and standards.

Q: Are there questions on NT or UNIX?
A: The CISSP examination is not a vendor or commercial product specific. There are questions on the security models and methodologies used by these systems but only security products that are commonly used and freely available (i.e., SATAN) are acceptable for examination questions.

Q: What's the passing score?
A: The cut score for each question is calculated by equating the scoring values associated with each question. Passing score is a 700 out of a possible 1000 points. Less than 8% of those tested achieve scores higher than 85%.

Q: How detailed are the questions, what depth of knowledge is being tested
A: The CISSP examination is designed to evaluate the ability of a security manager, engineer or architect to properly evaluate, select, deploy and assess security measures. A candidate should have a detailed enough knowledge of security designs, measures, vulnerabilities, etc. to successfully accomplish these tasks.

Q: Does the CISSP certification expire?
A: Yes, the CISSP certification expires 3 years after successfully passing the exam, passing the endorsement review process and agreeing to the (ISC)2 Code of Ethics. In order to maintain the CISSP certification beyond the 3 years without having to retake the exam; (ISC)2 maintains a Continuing Professional Education (CPE) program where during each 3 year cycle, if members pay an Annual Maintenance Fee (AMF) and submitting a minimum 120 CPE’s (required 40 CPE’s annually) for review the certification is extended for another 3 years. Types of CPE’s allowed are:

> Type A: Domain-related Activities

* Reading a magazine
* Attending a conference, educational course, seminar or presentation
* Volunteering for government, public sector, and other charitable organization
* Publishing an article, book or whitepaper
* Etc.

> Type B: Professional Development Knowledge Sharing (i.e. not pertaining to one of the CBKs)

* A Higher academic course
* Obtaining additional non-technical professional certifications
* Etc.

Q: Does passing the test mean the candidate automatically obtains the CISSP membership?
A: No, once successfully passing the CISSP exam candidates must complete Online Endorsement Application and have an (ISC)2 credential holder in good standing recommend the candidate for membership. Candidates must also have a minimum of 5 years of experience in 2 or more of the eight domains of the CISSP CBK. (ISC)2 will require a current resume showing the relevant work experience for the endorser and (ISC)2 to review for compliance. Until the candidate meets this requirement they are considered an Associate of (ISC)2 and still meet all the CPE requirements


Certified Ethical Hacker (CEH)

The CEH exam is designed for individuals with practical experience in network and computer system security. Some students will know a great deal about computer networking and many will have practical experience implementing some type of security on computers and networks. It is critical that the students have hands-on experience with the hacking tools in order to successfully pass the exam.

Click for Course Outline


The CCNA program is a complete training package that was developed to meet current demands of government contractors and the growing needs of CISCO certified professionals in the computer industry.

This training program provides the student with the requirements needed for employment with the government and the computer industry as a Cisco Certified Network Associate.

Includes topics on Network Types, Network Media, Switching Fundamentals, TCP/IP, IP Addressing and Routing, WAN Technologies, Operating and Configuring IOS Devices, and Managing Network Environments. The exam will certify that the successful candidate has important knowledge and skills necessary to describe and identify the major network, and WAN components, along with their function and purpose.


  • Upon successful completion of the course, the student will receive a course completion certificate. They will then be scheduled for the corresponding certification exams.
  • When all courses in the program have been passed, and certification achieved, the student will be issued a certificate of graduation from the program.

Click for Course Outline

CyberSec First Responder (CFR)

This course is designed for information assurance professionals whose job functions include development, operations, management, and enforcement of secure systems and networks. CyberSec First Responder covers Threat Detection and Response, which equips individuals with the high-stakes skills needed to serve their organization before, during, and after a breach.


  • Upon successful completion of the course, the student will receive a course completion certificate. They will then be scheduled for the corresponding certification exams.
  • When all courses in the program have been passed, and certification achieved, the student will be issued a certificate of graduation from the program.

ITIL Foundation Certificate in IT Service Management

The purpose of the ITIL Foundation certificate in IT Service Management is to certify that the candidate has gained knowledge of the ITIL terminology, structure and basic concepts and has comprehended the core principles of ITIL practices for service management.

The ITIL Foundation certificate in IT Service Management is not intended to enable the holders of the certificate to apply the ITIL practices for service management without further guidance.

Target Group
The target group of the ITIL Foundation certificate in IT Service Management is drawn from:
• Individuals who require a basic understanding of the ITIL framework and how it may be used to enhance the quality of IT service management within an organization.
• IT professionals that are working within an organization that has adopted and adapted ITIL who need to be informed about and thereafter contributes to an ongoing service improvement programme.

This may include but is not limited to, IT professionals, business managers, and business process