Skip Navigation or Skip to Content
Sign In  |  View Cart  |    |  Help  |  
Return to Course Catalog

> Business & Technology > Internet Security

Internet Security   

 

 

 

 

  • CompTIA A+ Certification Prep 1: Hardware
  • Fee: $125.00
    Item Number: 2501ILC37014302
    Dates: 6/11/2025 - 8/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Location:
    Room:
    Instructor:
    This class is already in session.  Contact our office at 210-397-8100 for additional information. 

    Discover the inner workings of computers! Learn how to configure and troubleshoot computer hardware in real-world environments with hands-on practice. This online course is the first of three courses necessary to prepare you for the CompTIA A+ Certification.


    Get ready to roll up your sleeves and dive inside your personal computer! The CompTIA A+ Certification Prep 1: Hardware course is the first of three CompTIA courses you will need to take to successfully prepare for your A+ certification. It teaches you about the hardware common to nearly every personal computer, including microprocessors, RAM, power supplies, motherboards, UEFI/BIOS, the system setup utility, the expansion bus, and input/output devices.

    Throughout our CompTIA A+ prep course, you will learn techniques every tech masters for building and troubleshooting all sorts of computers, plus get the inside scoop on how techs work within the enterprise. This computer hardware course also gives you the base knowledge needed to continue your CompTIA A+ certification studies for the 220-1101 and 220-1102 exams.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • It's also recommended that you have a PC that you can take apart and put back together again. Because of the dangers of electro-static discharge (to the machine, not to you), you are not required to tear apart your own primary computer. This is, however, a class that trains you to be a hardware technician - having a machine to play with greatly helps your learning.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    The Art of the Tech

    This lesson will introduce you to the course and to the CompTIA A+ certification, and then move right into essential information for every tech. You'll get the scoop on how the many components of the personal computer work together. The lesson will discuss how professional techs behave and interact with clients. It will then finish off by teaching you a tried-and-true troubleshooting methodology that will apply to all tech situations.

    Desktop PC Basics

    In this lesson, you'll take a tour of a desktop PC, starting with the exterior connectors. You'll explore the details of the interior devices as well. The goal is for you to begin learning proper tech terminology and become familiar with standard computer components. You'll also learn about some common computer roles so that you can better understand why desktop PCs are used in both homes and businesses.

    Laptop PC Basics

    This lesson looks at the ways laptops differ from desktops. You'll learn about laptop hardware, including a variety of support devices such as docking stations and port replicators. You'll find out how to manage laptop power and battery life and how to protect, maintain, and troubleshoot laptops.

    Maintenance and Safety Precautions

    In this lesson we dive into the important safety techniques that every good tech absolutely needs to know. These range from how to clean a computer to methods to avoid tech-induced damage to how to dispose of old parts safely.

    Central Processing Units and RAM

    In this lesson, we'll deliver the goods on central processing units, the core processing component in every PC. We'll explain variations in technology and then give practical information and advice on installing and troubleshooting CPUs. Plus, we'll dig into the details of one of the foundations of the computer: RAM. With RAM, the CPU can make magic happen. Without it? Literally nothing can happen. You'll learn about the different varieties of RAM and proper techniques for installing it. Then, we'll wrap up the lesson with troubleshooting RAM and memory problems.

    Motherboards and Cases

    In this lesson, we'll teach you about the essential programming that makes computers function, what's called the BIOS or UEFI. Plus, you'll learn about the special tools we use for storing configuration options for BIOS and UEFI. It's awesome stuff! We'll also teach you all about motherboards, the bedrock of every PC. You'll learn form factors, types of expansion slots, and installation steps for expansion cards. In this lesson, we'll also cover upgrading, installing, and troubleshooting motherboards.

    Powering the PC

    Today, we'll introduce you to power supplies and the basics of powering a PC. You'll learn about how electricity gets from your wall outlet into your PC, along with how to test that electricity. We'll teach you about the many power supply standards and how to install one inside your PC. Finally, we'll discuss how to troubleshoot a power supply with problems.

    Input Devices

    In this lesson, you'll learn about devices that enable you to input data into your computer. We'll discuss standard input devices (like keyboards and mice) and multimedia devices (like digital cameras and webcams). We'll also teach you about connecting those devices to your computers using connectors like USB and Thunderbolt.

    Storage Technologies

    Today, we'll dig into storage technologies, including traditional hard disk drives and modern solid-state drives. You'll also learn how to install storage devices of several interface types, including SATA and M.2. We'll also explain the fundamentals of troubleshooting storage devices.

    Working with Storage Devices

    In this lesson, you'll learn how to prepare a storage device such as a hard disk drive or solid-state drive for use by an operating system. You'll also learn about partitioning and formatting and how to maintain your data using several included Windows utilities.

    Removable Media and RAID

    In this lesson, you'll explore various forms of mass storage that you can take with you, such as USB flash media, memory cards, optical drives, and external drives. You'll also discover how RAID arrays improve storage performance and/or reliability.

    Operational Procedures

    As we wrap up the course, you'll learn about all the other stuff that goes into making IT work, such as documentation, change management, ticketing systems, and disaster prevention and recovery.


    What you will learn

    • Learn proper tech terminology and how all the components of the PC work together
    • Discover important safety techniques that every good tech needs to know
    • Gain practical information and advice on installing and troubleshooting CPUs
    • Learn about the different varieties of RAM and proper techniques for installing it
    • Obtain everything you need to know about motherboard form factors, types of expansion slots, and installation steps for expansion cards
    • Gain knowledge of hard drive technologies and the fundamentals of protecting data with RAID technology

    How you will benefit

    • Learn the skills you need to promote yourself as a PC hardware technician capable of solving various computer issues
    • Gain the confidence you need to successfully perform integral computer support in the workplace
    • Become an indispensable part of any organization that uses computers daily
    • Complete the first of three courses needed to prepare for your CompTIA A+ certification

    Mike Meyers

    Mike Meyers, also known as the "Alpha Geek," is widely recognized as the leading authority on CompTIA Certifications in the industry. He co-founded Total Seminars, LLC and National Cyber Group, LLC, and has been providing PC and network repair seminars, books, videos, and courseware to thousands of organizations worldwide. With his extensive experience in the computer and network repair industry since 1987, Mike has worked as a technician, instructor, author, consultant, and speaker.

    Mike is the author of several popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He also serves as the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series. Mike has sold over a million IT and certification books.


 

  • Explore a Career in Cybersecurity
  • Fee: $129.00
    Item Number: 2501ILC37074802
    Dates: 6/11/2025 - 8/30/2025
    Times: 7:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Location:
    Room:
    Instructor:
    This class is already in session.  Contact our office at 210-397-8100 for additional information. 

    This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you. This course is designed to explore the basics of cybersecurity and the types of jobs found in the cybersecurity field.


    This course explores a career in cybersecurity and reviews various topics, including cybersecurity roles, job requirements, problem-solving techniques, and cybersecurity concepts. This course will help you decide whether a career in cybersecurity is something that aligns with your talents and interests and, if so, the best next steps to pursue this lucrative career path.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    There are no instructional material requirements to take this course.



    Introduction to Cybersecurity

    This lesson will introduce the course and give you an overview of cybersecurity and its major components. You will dive into the history and evolution of cybersecurity so you can see how it has grown throughout the years to become a significant business and technology concern. Finally, as you consider a career in cybersecurity, it is essential to understand what education and experience you will need, so you will take a look at those and other requirements, too.

    Cybersecurity Roles and Industries

    In this lesson, you will learn about the various roles in cybersecurity that you may take on in an organization. You will also examine the industries where cybersecurity is particularly important as well as why it is so important. Then, you will get the scoop on the types of roles and industries you may want to pursue when you enter cybersecurity.

    Problem Solving

    Although you may think of cybersecurity as a purely technical field, cybersecurity professionals also need essential soft skills. We will dive into the important communication skills required when dealing with clients, employees, management, and outside groups. In your cybersecurity career, you will most likely be working on teams, so we will look at teams in the workplace and how important team skills are. We will learn the characteristics of a problem solver. Lastly, you will explore the troubleshooting process and why it is important to follow the steps to identify a problem and correct it now and prevent it in the future.

    Cybersecurity Basics

    This lesson will look at the different kinds of cybersecurity risks companies face. You will explore the tools and the data used to discover, identify, and mitigate attack threats. We will take a look at cybersecurity laws and regulations, why they exist, and how they impact cybersecurity.

    Types of Information Security

    Hackers and other bad actors can attack various levels of public and private computing. In this lesson, we dive into types of information security that affect all of us, from critical infrastructure vital to the operation of the country to corporate networks, the cloud, and even appliances in our homes through the Internet of Things. We will define critical infrastructure security and explore its parts. We will look at how security works in different areas to help secure our infrastructure. Next, we will examine other ways to protect the things that make our lives easier—and that people often do not realize need protecting.

    Common Concepts and Terminology

    In this lesson, we will explore the common concepts in cybersecurity and the specialized terminology its professionals use. We will dive into cryptography by defining and showing examples and how it is used. Next, we will explore why obfuscation is important in cybersecurity and the differences between threats and vulnerabilities. Smart businesses have a plan for when attacks happen, so we will look at Incident Response Plans, how they are created, and what they should contain. Finally, we will examine Identity and Access Management (IAM) and the IAM framework—authentication, authorization, and accounting.

    Types of Threats

    This lesson will teach you about the types of threats companies face as they do their day-to-day work. After learning about the types of threats, we will examine how they happen and, most importantly, how they can be avoided. Not every threat is malicious; sometimes unwitting employees inadvertently give away information or an unsuspecting person bites on a phishing attempt. We will explore social engineering by defining it, giving examples, and learning about the four steps of the social engineering process.

    Secure Coding

    While you don't need to be a programmer to be a cybersecurity professional, coding is important in protecting software from hackers. This lesson will deliver the goods on secure coding. You will first learn why it is crucial and see the qualities of secure coding. Next, you will look at frameworks created to give developers a process for implementing secure coding in both new and older applications. Finally, you will take a look at secure coding framework examples.

    Protecting the Business

    In this lesson, we will learn about cybersecurity from the perspective of the company or organization. We will explore how companies respond to attacks, and know how companies try to ensure their organization will recover from an attack after surviving and dealing with it. Then, we will revisit the various types of data important to businesses and how companies can protect that data. This is where cybersecurity specialists really shine!

    Developing a Security Awareness Program

    In this lesson, we will explore cybersecurity in business. You will learn about security awareness and how to bring it to employees of a company, including how to develop a good Security Awareness Program (SAP). We will explore how to create a good security culture as well as a cybersecurity culture. These cultures are essential because when security is relevant to everyone in the company, they will participate in the process of cybersecurity for the company.

    Employment and the Future of Cybersecurity

    In this lesson, you will look at employment prospects and the future expectations for cybersecurity employment. You will explore some strategies to identify positions in the cybersecurity field that are best suited for a new cybersecurity employee. Since cybersecurity is a large profession with many different positions, it is important to home in on attributes important to you in a job and learn how to find the job best suited to you. Next, you will explore remote work and how it relates to a cybersecurity specialist. You will examine the benefits and challenges of working remotely for both an employee and the business. Finally, you will dive into the projected growth of cybersecurity and specific sub-areas where the most significant job growth is expected to occur.

    Next Steps

    As we wrap up the course, we will look at the best education paths, various cybersecurity certifications, and degrees that are in demand for different cybersecurity specialties. You will learn about the importance of and the types of continuing education. Finally, you will explore how to catch a company's attention with specific and highly developed resumes and cover letters to help you land a job.


    What you will learn

    • Explore cybersecurity as a career path
    • Identify cybersecurity job roles and industries
    • Describe the soft skills that cybersecurity professionals need
    • Explain the threats that cyberattacks pose to modern businesses
    • Explain the importance of securing information
    • Define common cybersecurity terms and concepts
    • Explain the role of secure coding in preventing cyberattacks
    • Identify the ways that cybersecurity professionals protect a business
    • Describe the key elements of a security awareness program
    • Identify employment opportunities and career steps in the cybersecurity field

    How you will benefit

    • Learn if a career in cybersecurity is right for you
    • Explore the basics of the cybersecurity industry
    • Discover potential career paths in the cybersecurity field

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author, a former college professor, and is passionate about teaching the next generation of cybersecurity professionals. Sara has an MS in Cybersecurity and Information Assurance from WGU Washington and a BS in Information Systems Security from the University of Phoenix.


 

  • Introduction to Cybersecurity
  • Fee: $129.00
    Item Number: 2501ILC37073601
    Dates: 6/2/2025 - 8/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Location:
    Room:
    Instructor:
    This class is already in session.  Contact our office at 210-397-8100 for additional information. 

    This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry.


    This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.

    You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices.


    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.



    1. Cybersecurity Foundations
    2. Operating Systems
    3. Windows Command Line Foundations
    4. Network Fundamentals
    5. Cloud Computing Fundamentals
    6. Cybersecurity Policy, Framework, and Guidelines
    7. Cybersecurity Audit Foundations
    8. Risk Management
    9. Penetration Testing - Demonstration

    What you will learn

    • Understand what cybersecurity entails
    • Identify the three most common operating systems
    • Execute simple commands
    • Learn about cloud computing and networking
    • Learn about cybersecurity policies, frameworks, audits, and risk management

    How you will benefit

    • Learn if a career in cybersecurity could be right for you
    • Increase your baseline knowledge of foundational cybersecurity concepts
    • Learn tips and tricks from a working cybersecurity professional
    • Follow along with hands-on demonstrations to develop and practice your foundational skills
    • Finish in three months or less

    Self-Study

 

Some Title