Computing
Essentials

Certification Exam Prep

 
 
 

About the Program

The Computing Essentials Program is for those who want to establish a successful career in IT. Prepare for the most sought-after IT credentials and get the experience and knowledge that employers are looking for!

This program is Instructor-Led.

Training will be held entirely online, with oversight and instruction from a licensed and certified instructor.

Class will include:

  • Online Learning via Learning Management System

  • Weekly Virtual Class Meetings

  • Virtual Labs

  • E-Books

  • Exam Review Questions

Duration: 16 Weeks (180 Hours) - Students will have access to the course content for 1 full year.

Prerequisites: HS diploma/GED, basic computer skills and familiarity with the internet

Tuition: $7,740

Tuition does not cover exam fees.

To learn more about ETI’s tuition and financial aid options, click here.

Contact us for next class start dates


Certifications

Upon completion of training, the students are fully prepared to take the following certification exams. However, they are not a requirement for graduation. Vendor certifications are at the student’s expense.

CompTIA A+

CompTIA A+ is the industry standard for establishing a career in IT. It is the only industry recognized credential with performance testing to prove pros can think on their feet to perform critical IT support tasks. CompTIA A+ is trusted by employers around the world to identify the go-to person in end point management & technical support roles. CompTIA A+ appears in more tech support job listings than any other IT credential.

  • The CompTIA A+ Core Series requires candidates to pass two exams: Core 1 (220-1101) and Core 2 (220-1102) covering the following new content, emphasizing the technologies and skills IT pros need to support a hybrid workforce.

    • Increased reliance on SaaS applications for remote work

    • More on troubleshooting and how to remotely diagnose and correct common software, hardware, or connectivity problems

    • Changing core technologies from cloud virtualization and IoT device security to data management and scripting

    • Multiple operating systems now encountered by technicians on a regular basis, including the major systems, their use cases, and how to keep them running properly

    • Reflects the changing nature of the job role, where many tasks are sent to specialized providers as certified personnel need to assess whether it’s best to fix something on site, or to save time and money by sending proprietary technologies directly to vendors

    • Help Desk Technician

    • Field Service Technician

    • Associate Network Engineer

    • Junior Systems Administrator

    • Desktop Support Specialist

    • System Support Technician

  • CompTIA A+ 220-1101 (Core 1) and 220-1102 (Core 2)

    Candidates must complete both 1101 and 1102 to earn certification. Exams cannot be combined across the series.

    Exam Launch Date: April 22, 2022

    CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing.

    CompTIA A+ 220-1102 covers operating systems, security, software and operational procedures.

    Maximum of 90 questions per exam

    Length of Test: 90 Minutes

    Passing Scores:

    • 220-1101: 675 (on a scale of 900)

    • 220-1102: 700 (on a scale of 900)

    Recommended Experience: 9 to 12 months hands-on experience in the lab or field

 

CompTIA Data+

Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making.

  • CompTIA Data+ gives you the confidence to bring data analysis to life.

    As the importance for data analytics grows, more job roles are required to set context and better communicate vital business intelligence. Collecting, analyzing, and reporting on data can drive priorities and lead business decision-making. CompTIA Data+ validates certified professionals have the skills required to facilitate data-driven business decisions, including:

    • Mining data

    • Manipulating data

    • Visualizing and reporting data

    • Applying basic statistical methods

    • Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle

    • Data Analyst

    • Reporting Analyst

    • Business Data Analyst

    • Clinical Analyst

    • Marketing Analyst

    • Operations Analyst

  • DA0-001

    The CompTIA Data+ exam will certify the successful candidate has the knowledge and skills required to transform business requirements in support of data-driven decisions through mining and manipulating data, applying basic statistical methods, and analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle.

    90 questions

    90 Minutes

    Passing Score: 675 (on scale of 100–900)

 

Certified Ethical Hacker (CEH)

CEH v11 provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.

  • CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker. Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

    Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

    Course Benefits:

    • Incorporating Parrot Security OS

    • Re-mapped to NIST/NICE Framework

    • Enhanced Cloud Security & IoT and Operational Technology (OT) Modules

    • Modern Malware Analysis

    • The industry’s Most Comprehensive Tools Library

    • Cyber Security Forensic Analyst

    • Cyber Security Analyst

    • CND Security Specialist

    • CND Fusion Analyst

    • Cyberspace Network Defense (CND) Technician

    • Cyber Red Team Operator

    • Cyber Network Defense (CND) Analyst

    • Cyber Security Forensic Analyst

    • Computer Network Defense Intrusion Analyst

    • Cyber Security Engineer

    • Information Security Engineer

    • CND Cyber Analyst

    • Network Security Engineer

    • Cyber Threat Analyst

    • SOC Security Analyst

    • Information Security Analyst

    • IT Security Compliance Specialist

    • Global Security Assurance Analyst

    • Security Analyst Tier 3

    • Security Operations Analyst

    • Security Incident Response Analyst

    • Penetration Tester

    • Vulnerability Analyst

    • Sr. Security Threat Analyst

    • Tier 3 NSOC Analyst

    • Security Information Assurance Analyst

    • Technical Security Analyst

    • Information Security Manager

    • Risk and Remediation Manager

    • Systems Administrator

    • Cybersecurity Network Analyst

    • Cyber Security Vulnerability Analyst

    • Risk Assessment- Security Consultant

    • Information Security Associate – Insider Threat Analyst

    • Security Architect, Manager

    • Application Security Analyst

    • Cyber Security System Engineer

    • Software Security Analyst

    • Network Analyst

    • Information System Security Officer

    • SOC Security Analyst

    • Cyber Security Engineer II

    • Senior Cyber Security Monitoring Analyst

    • Cyber Security Incident Response, Incident Analyst

    • Cyber Security Incident Response Engineer

    • L2 Security Analyst

    • Senior Information Assurance/ Security Specialist

    • Technical Operations Network Engineer

    • IT Security Administrator

  • After taking an authorized course, candidates can attempt the CEH exam. Candidates that successfully pass the exam will receive their CEH certificate and membership privileges. After proving knowledge by achieving the CEH credential, candidates have the added option to proceed to attempt the CEH (Practical) exam to prove their skills and abilities. The CEH (Practical) is a 6-hour practical exam created by subject matter experts in the ethical hacking industry. The exam tests skills and abilities in a timed environment across major operating systems, databases, and networks. Candidates with both the CEH and CEH (Practical) certifications are designated as CEH Masters, having validated the full scope of their abilities.

    CEH (ANSI)

    • Exam Title: Certified Ethical Hacker (ANSI)

    • Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)

    • Number of Questions: 125

    • Test Format: Multiple Choice

    • Duration: 4 Hours

    • Availability: ECC EXAM* / VUE

    • Local proctor for Private and in-person courses.

    • Live remote proctor for online ECC Exam option.

    • Passing Score: Please refer tohttps://cert.eccouncil.org/faq.html

    CEH (Practical)

    • Exam Title: Certified Ethical Hacker (Practical)

    • Number of Practical Challenges: 20

    • Test Format: iLabs Cyber Range

    • Duration: 6 Hours

    • Availability: Aspen-iLabs

    • Passing Score: 70%


Course Breakdown

  • 1.0 Mobile Devices

    • Install and configure laptop hardware and components

    • Compare and contrast the display components of mobile devices

    • Set up and configure accessories and ports of mobile devices

    • Configure basic mobile-device network connectivity and application support

    2.0 Networking

    • Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes

    • Compare and contrast common networking hardware

    • Compare and contrast protocols for wireless networking

    • Summarize services provided by networked hosts

    • Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks

    • Compare and contrast common network configuration concepts

    • Compare and contrast Internet connection types, network types, and their features

    • Given a scenario, use networking tools

    3.0 Hardware

    • Explain basic cable types and their connectors, features, and purposes

    • Given a scenario, install the appropriate RAM

    • Given a scenario, select and install storage devices

    • Given a scenario, install and configure motherboards, central processing units (CPUs), and addon cards

    • Given a scenario, install or replace the appropriate power supply

    • Given a scenario, deploy and configure multifunction devices/ printers and settings

    • Given a scenario, install and replace printer consumables

    4.0 Virtualization and Cloud Computing

    • Summarize cloud-computing concepts

    • Summarize aspects of client-side virtualization

    5.0 Hardware and Network Troubleshooting

    • Given a scenario, apply the best practice methodology to resolve problems

    • Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power

    • Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays

    • Given a scenario, troubleshoot video, projector, and display issues

    • Given a scenario, troubleshoot common issues with mobile devices

    • Given a scenario, troubleshoot and resolve printer issues

    • Given a scenario, troubleshoot problems with wired and wireless networks

  • 1.0 Operating Systems

    • Compare and contrast common operating system types and their purposes

    • Compare and contrast features of Microsoft Windows versions

    • Summarize general OS installation considerations and upgrade methods

    • Given a scenario, use appropriate Microsoft command line tools

    • Given a scenario, use Microsoft operating system features and tools

    • Given a scenario, use Microsoft Windows Control Panel utilities

    • Summarize application installation and configuration concepts

    • Given a scenario, configure Microsoft Windows networking on a client/desktop

    • Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems

    2.0 Security

    • Summarize the importance of physical security measures

    • Explain logical security concepts

    • Compare and contrast wireless security protocols and authentication methods

    • Given a scenario, detect, remove, and prevent malware using appropriate tools and methods

    • Compare and contrast social engineering, threats, and vulnerabilities

    • Compare and contrast the differences of basic Microsoft Windows OS security settings

    • Given a scenario, implement security best practices to secure a workstation

    • Given a scenario, implement methods for securing mobile devices

    • Given a scenario, implement appropriate data destruction and disposal methods

    • Given a scenario, configure security on SOHO wireless and wired networks

    3.0 Software Troubleshooting

    • Given a scenario, troubleshoot and resolve printer issues

    • Given a scenario, troubleshoot and resolve PC security issues

    • Given a scenario, use best practice procedures for malware removal

    • Given a scenario, troubleshoot mobile OS and application issues

    • Given a scenario, troubleshoot mobile OS and application security issues

    4.0 Operational Procedures

    • Compare and contrast best practices associated with types of documentation

    • Given a scenario, implement basic change management best practices

    • Given a scenario, implement basic disaster prevention and recovery methods

    • Explain common safety procedures

    • Explain environmental impacts and appropriate controls

    • Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts

    • Given a scenario, use proper communication techniques and professionalism

    • Identify the basics of scripting

    • Given a scenario, use remote access technologies

  • 1.0 Data Concepts and Environments

    • Identify basic concepts of data schemas and dimensions

    • Compare and contrast different data types

    • Compare and contrast common data structures and file formats

    2.0 Data Mining

    • Explain data acquisition concepts

    • Identify common reasons for cleansing and profiling datasets

    • Given a scenario, execute data manipulation techniques

    • Explain common techniques for data manipulation and query optimization

    3.0 Data Analysis

    • Given a scenario, apply the appropriate descriptive statistical methods

    • Explain the purpose of inferential statistical methods

    • Summarize types of analysis and key analysis techniques

    • Identify common data analytics tools

    4.0 Visualization

    • Given a scenario, translate business requirements to form a report

    • Given a scenario, use appropriate design components for reports and dashboards

    • Given a scenario, use appropriate methods for dashboard development

    • Given a scenario, apply the appropriate type of visualization

    • Compare and contrast types of reports

    5.0 Data Governance, Quality, and Controls 14%

    • Summarize important data governance concepts

    • Given a scenario, apply data quality control concepts

    • Explain master data management (MDM) concepts

    • Introduction to Ethical Hacking

    • Foot-printing and Reconnaissance

    • Scanning Networks

    • Enumeration

    • Vulnerability Analysis

    • System Hacking

    • Malware Threats

    • Sniffing

    • Social Engineering

    • Denial-of-Service

    • Session Hijacking

    • Evading IDS, Firewalls, and Honeypots

    • Hacking Web Servers

    • Hacking Web Applications

    • SQL Injection

    • Hacking Wireless Networks

    • Hacking Mobile Platforms

    • IoT and OT Hacking

    • Cloud Computing

    • Cryptography