• 0800 677 1232
  • info@robustittraining.com
  • Facebook:
  • LinkedIn:
  • Youtube:
  • Black Friday Sale Has Started: Click here to see deals

Cyber Security Specialist Package

£3,500 + VAT
Save £1,250.00 Enquire Now

Who this package is for?

Looking into Cyber Security from a non-technical background, we would recommend completing five internationally recognised certifications that are due to be completed in an order. The certifications recommended are designed to lead onto each other in terms of information. We’ve designed this package for students with limited IT experience that can work their way up to the CEH. The CompTIA courses are highly valued and in some cases a prerequisite for any working opportunities on the MOD and DOD sites.

This training pacakge is made up of five professional certifications, which are are in high demand by employers. These are as follows:

  • Microsoft Technology Associate Server

  • Microsoft Technology Associate Security

  • CompTIA Network+

  • CompTIA Security+

  • Certified Ethical Hacker (CEH)

Benefits of training with us

  • Intuitive and rewarding online training resources

  • 24/7 access to our unique course materials

  • Custom built practical tasks and challenges

  • Official mock examinations to fully prepare you for any final exams

  • Career advice and CV support once training has been completed

  • Full printable course materials, allowing you take your learning offline at your own convenience

Enquiry Form

Request More Information

Cert Description MTA certifications are a great place to start if you would like to get into the technology field. MTA certifications address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility. Note: MTA exams do not qualify for MCP certification, nor are they a prerequisite for MCSA or MCSD certification.

Candidates for this exam are familiar with the concepts and the technologies of Windows Server administration. Candidates should have some hands-on experience with Windows Server, Windows-based networking, Active Directory, account management, and system recovery tools and concepts.
Exam Codes Official Microsoft 98-365 Exam

Candidates must complete the 98-365 to earn certification.
What you will learn
Understanding server installation (10-15%)
Understand device drivers
  • Installation, removal, disabling, update/upgrade, rollback, troubleshooting, Plug & Play, IRQ, interrupts, driver signing, managing through Group Policy
Understand services
  • Which statuses a service can be in, startup types, recovery options, delayed startup, Run As settings for a service, stopping or pausing a service, service accounts, dependencies
Understand server installation options
  • Choose the correct operating system version options; Server core vs. Desktop Experience, Nano Server installation, interactive installs; automated install using WDS; VHD/VHDX installation source, perform unattended installs; perform upgrades, clean installs, and migrations

Understanding server roles (25-30%)
Identify application servers
  • Mail servers, database servers, collaboration servers, monitoring servers, threat management
Understand Web services
  • IIS, WWW, and FTP, installing from Server Manager, separate worker processes, adding components, sites, ports, SSL, certificates
Understand remote access
  • Remote assistance, remote administration tools, Remote Desktop Services, multipoint services, licensing, RD Gateway, VPN, application virtualization, multiple ports
Understand the file and print services
  • Local printers, network printers, printer pools, web printing, web management, driver deployment, file, folder, and share permissions vs. rights, auditing, print job management
Understand server virtualizations
  • Virtual memory, virtual networks, snapshots and saved states, physical to virtual conversions, virtual to physical conversions, VHD and VHDX formats, nested virtualization

Understanding Active Directory (20-25%)
Understand accounts and groups
  • Domain accounts, local accounts, user profiles, computer accounts, group types, default groups, group scopes, group nesting, understand AGDLP and AGUDLP processes to help implement nesting
Understand organizational units and containers
  • Purpose of OUs, purpose of containers, delegation, default containers, uses for different container objects, default hidden and visible containers
Understand Active Directory infrastructure
  • Domain controllers. forests, child domains, operation master roles, domain vs. workgroup, trust relationships, functional levels, deprecated functional levels, namespace, sites, replication, schema, Passport
Understand group policy
  • Group policy processing, Group Policy Management Console, computer policies, user policies, local policies

Understand storage (10-150%)
Identify storage technologies and their typical usage scenarios
  • Advantages and disadvantages of different storage topologies, local storage, network storage, Fibre Channel, iSCSI hardware
Understand RAID redundancy
  • RAID 0, RAID 1, RAID 5, RAID 10 and combinations, hardware and software RAID
Understand disk types
  • Solid State Drive (SSD) and Hard Disk Drive (HDD) types and comparisons, ATA basic disk, dynamic disk, mount points, file systems, mounting a virtual hard disk, distributed file systems

Understanding server performance management (10-15%)
Identify major server hardware components
  • Memory, disk, processor, network, 32-bit and 64-bit architecture, removable drives, graphic cards, cooling, power usage, ports
Understand performance monitoring
  • Methodology, procedures, effect of network, CPU, memory and disk, creating a baseline, Performance Monitor, Resource Monitor, Task Manager, performance counters, Data Collector Sets
Understand logs and alerts, Event Viewer
  • Purpose of performance logs and alerts

Understanding server maintenance (15-20%)
Identify steps in the startup process
  • BIOS, UEFI, TPM, bootsector, bootloader, MBR, boot.ini, POST, Safe Mode
Understand business continuity
  • Backup and restore, disaster recovery planning, clustering, AD restore, folder redirection, data redundancy, uniterruptible power supply (UPS)
Understand updates
  • Software, driver, operating systems, applications, Windows Update, Windows Server Update Service (WSUS)
Understand troubleshooting methodology
  • Processes, procedures, best practices; systematic vs. specific approach, Performance Monitor, Event Viewer, Resource Monitor, Information Technology Infrastructure Library, central logging, event filtering, default logs
Cert Description MTA certifications are a great place to start if you would like to get into the technology field. MTA certifications address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility. Note: MTA exams do not qualify for MCP certification, nor are they a prerequisite for MCSA or MCSD certification.

This exam validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices, and network ports.
Exam Codes Official Microsoft 98-367 Exam

Candidates must complete the 98-367 to earn certification.
What you will learn
Understand security layers (25-30%)
Understand core security principles
  • Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
  • Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
  • Browser security settings; secure websites
Understand wireless security
  • Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

Understand operating system security (35-40%)
Understand user authentication
  • Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
  • File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
  • Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
  • Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption
  • Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Understand malware
  • Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks

Understand network security (20-25%)
Understand dedicated firewalls
  • Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
  • Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
  • Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

Understand security software (15-20%)
Understand client protection
  • Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
  • Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
  • Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)

Cert Description The CompTIA Network+ certification is a worldwide recognised qualification that validates the skills of networking professionals. The qualification recognises a technician's ability to describe the features and functions of network components and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.

This certification will verify that the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be able to configure, maintain, and troubleshoot network devices using appropriate network tools and understand the features and purpose of network technologies. Candidates will be able to make basic solution recommendations, analyse network traffic, and be familiar with common protocols and media types.

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.
Exam Codes CompTIA A+ N10-007

Candidates must complete the N10-007 to earn certification.
What you will learn
  • Networking Concepts:
    Explain the purpose of a variety of networking concepts and implement them appropriately
  • Infrastructure:
    Comprehend the financial aspects of engaging a cloud provider, as well as the business aspects of managing vendor relations in cloud adoptions.
  • Network Operations:
    Use best practices to manage the network, determine policies & ensure business continuity
  • Network Security:
    Summarize physical security & common attacks while securing the wired and wireless network
  • Network Troubleshooting & Tools:
    Explain the network troubleshooting methodology & appropriate tools to support connectivity & performances
Cert Description The CompTIA Security+™ certification is designed for learners whose job responsibilities include securing network services, devices, and traffic. Our self-paced online course content will prepare you for the CompTIA Security+ examination, the SY0-501.

CompTIA’s Security+ syllabus covers the most important principles for securing a network and managing risks in a working enterprise environment. This course will build your knowledge and professional experience with computer hardware, operating systems, and networks – undertaking this training program will allow you to acquire the specific skills required to implement basic security services on any type of computer network.

This course has been built for Information Technology (IT) professionals who have networking and administrative skills in Windows-based TCP/IP networks and familiarity with operating systems such as NetWare, OS X, UNIX/Linux, and OS/2. These IT professionals will be looking to further their career in IT by acquiring a foundational knowledge of security topics and earn an official qualification as they do so.

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
Exam Codes CompTIA SY0-501

Candidates must complete SY0-501 to earn certification.
What is leanrt
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to
  • install and configure systems to secure applications

  • networks and devices

  • perform threat analysis and respond with appropriate mitigation techniques

  • participate in risk mitigation activities

  • operate with an awareness of applicable policies

  • laws and regulations
The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Cert Description A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, "To beat a hacker, you need to think like a hacker".
Exam Codes 312-50 (ECC EXAM), 312-50 (VUE)

Candidates must complete the 312-50 to earn certification.
What is leanrt
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography


Enquire now

If you are interested in any of these training packages get in touch with us today. One of our friendly and expert course advisors will be in touch.



Our training is trusted and accredited
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1