Course overview
If you’ve ever considered working within the cybersecurity industry but felt you lacked the knowledge or skills to launch your career, this might be what you’re looking for.
This course bundle is aimed at absolute beginners to IT who want to start a career in cybersecurity or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cybersecurity and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies such as computer systems and networks, which you will be taught through this course.
This course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this bundle, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the IT security industry
From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cybersecurity will gradually begin to develop.
Upon completion of the course, you will exit with a series of globally respected certifications and a deeper knowledge of cybersecurity concepts. You will also possess a set of cybersecurity skills you can apply to a vast range of cybersecurity job roles.
The course bundle is comprised of six separate courses in total. Three of which are skills based only with no exam, and three certification courses with a final exam after each course. The final course being the CompTIA Security+. Two of the non-certification courses provide a soft introduction to modern day cyber security practices. These course titles include Cyber Security Awareness and Prevention; and Data Security Compliance. The skills and certifications that you gain through this course will offer you scope to work in other areas aside from cyber security. These include IT support, networking, systems administration, and data compliance.
Job outcomes
- Cyber Security Engineer
- Cyber Security Analyst
- Cyber Security Investigator
- Cyber Threat Analyst
- Cyber Threat Consultant
- IT Security Specialist
- IT Security Consultant
- IT Support Technician
- Network Engineer
- Network Consultant
- Data Centre Manager
- IT Manager
- IT Sales Account Manager
- IT Consultant
- Systems Administrator
Recognition

Study method
- Online
- Blended
- In-class
Awards
Duration study load
Some people finish their course faster than others. Each certification course is between 12-30 hours. If you choose to only do one of the certification courses from this bundle, then it will take you less time than if you do two or three or all of them. No matter what though, you will always have 12 months to complete your course.
Course features
- Expert Instructor-Led Training
- Visual Demonstrations & Multimedia Presentations
- Quizzes & Exam Simulators
- Social Learning & Networking
- Flash Cards & Educational Games
- Navigation & Controls
MeasureUP practice tests:
- Questions are similar to exam questions, allowing you to test your knowledge of exam objectives
- Detailed explanations for both correct and distractor answers reinforce the material
- ‘Study Mode’ covers all objectives ensuring topics are covered
- ‘Certification Mode’ (timed) prepares students for exam taking conditions
- Instant, drill-down score reports tell you exactly the areas to focus on
Assessment
Certification exams included:
- CompTIA A+ 220-1001
- CompTIA A+ 220-1002
- CompTIA Network+ N10-007
- CompTIA Security+ SY0-601
MeasureUP practice tests included:
- CompTIA A+ 220-1001
- CompTIA A+ 220-1002
- CompTIA Network+ N10-007
- CompTIA Security+ SY0-601
Materials
All you need is an internet connection and a device, such as a smartphone, tablet, laptop or PC, and an internet connection. To get the most out of the course, we recommend you access it using either a laptop or desktop computer through Google Chrome.
Delivery
All courses are online and self-paced, meaning you do it in your own home, in your own time, at your own pace and best of all… anywhere in the world, providing you have access to a laptop, PC or desktop computer, and an internet connection. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. The lessons are multi-media based, which means video and audio are used to teach the lessons. Your tutor will PowerPoint slides, illustrations, diagrams and give demonstrations to teach each class. Most lessons are also interactive, prompting the learner to participate. This might involve answering on-screen questions, participating in tasks.
Subjects
IT Concepts and Terminology
- Understand the basics of computing
- Understand basic terminology
- Comprehend notational systems
- Explain the value of data and troubleshooting
Infrastructure
- Setting up and installing common peripheral devices
Applications and Software
- Manage applications software
- Understand various components of an operating system
- Explain the purpose of methods of application architecture
Software Development
- Comprehend programming language categories
- Interpret logic
- Understand the purpose of programming concepts
Database Fundamentals
- Explain database concepts
- Explain structures
- Explain purpose
- Understand the methods used to interface
Security
- Understand confidentiality
- Understand integrity
- Understand the availability concerns of secure devices
- Understand best practice methods of secure devices
CompTIA A+ 220-1001
- Module 1: Mobile Devices
- Module 2: Networking
- Module 3: Hardware
- Module 4: Virtualization and Cloud Computing
- Module 5: Hardware and Network Troubleshooting
CompTIA A+ 220-1002
- Module 1: Operating Systems
- Module 2: Security
- Module 3: Software Troubleshooting
- Module 4: Operational Procedures
- Module 1: Introduction
- Module 2: Managing Mobile Device Security
- Module 1: Data Breaches And ID Theft
- Module 2: Device Security Basics
- Module 3: Avoiding Inadvertent Disclosure
- Module 4: Physical And Technical Safeguards
- Module 1 Introduction To Networking
- Module 2 Networking Standards
- Module 3 Network Cabling And Transmission
- Module 4 Understanding TCP/IP
- Module 5 Network Devices
- Module 6 Wireless Network
- Module 7 Wide Area Network
- Module 8 Remote Access
- Module 9 Network Security
- Module 10 Building Scalable High-Performance Networks
- Module 11 Monitoring And Troubleshooting Networks
- Compare and contrast different types of social engineering techniques
- Analyse potential indicators to determine the type of attack
- Analyse potential indicators associated with application attacks
- Analyse potential indicators associated with network attacks
- Explain different threat actors, vectors, and intelligence sources
- Explain the security concerns associated with various types of vulnerabilities
- Summarise the techniques used in security assessments
- Explain the techniques used in penetration testing
- Explain the importance of security concepts in an enterprise environment
- Summarise virtualisation and cloud computing concepts
- Summarise secure application development, deployment, and automation concepts
- Summarise authentication and authorisation design concepts
- Implement cybersecurity resilience
- Explain the security implications of embedded and specialised systems
- Explain the importance of physical security controls
- Summarise the basics of cryptographic concepts
- Implement secure protocols
- Implement host or application security solutions
- Implement secure network designs
- Install and configure wireless security settings
- Implement secure mobile solutions
- Apply cybersecurity solutions to the cloud
- Implement identity and account management controls
- Implement authentication and authorisation solutions
- Implement public key infrastructure
- Use the appropriate tool to assess organisational security
- • Summarise the importance of policies, processes, and procedures for incident response
- Utilise appropriate data sources to support an investigation
- Apply mitigation techniques or controls to secure an environment
- Explain the key aspects of digital forensics
- Compare and contrast various types of controls
- Explain the importance of applicable regulations, standards, or frameworks that impact the organisational security posture
- Explain the importance of policies to organisational security
- Summarise risk management processes and concepts
- Explain privacy and sensitive data concepts in relation to security.
About Hudson
In the confusing world of e-learning, Hudson is quite simply one of the best at what they do. Why? Because they offer first-class customer service. The Hudson Learning Center puts their customers’ needs before anything else. If there’s something they can do to help you, Hudson will climb mountains to do it.
The Hudson online courses, certifications, and diplomas are highly effective, offering a whole range of features designed to get you certified faster. Some of these incredible features include video and audio based training so you can see and hear your tutor, 24/7 online tutor support, and online labs to practice your skills in a simulated environment.
Come and give Hudson a try. They’ll change the way you think about learning.