Computing
Essentials
Certification Exam Prep
Certification Exam Prep
About the Program
The Computing Essentials Program is for those who want to establish a successful career in IT. Prepare for the most sought-after IT credentials and get the experience and knowledge that employers are looking for!
This program is Instructor-Led.
Training will be held entirely online, with oversight and instruction from a licensed and certified instructor.
Class will include:
Online Learning via Learning Management System
Weekly Virtual Class Meetings
Virtual Labs
E-Books
Exam Review Questions
Duration: 16 Weeks (180 Hours) - Students will have access to the course content for 1 full year.
Prerequisites: HS diploma/GED, basic computer skills and familiarity with the internet
Tuition: $7,740
Tuition does not cover exam fees.
To learn more about ETI’s tuition and financial aid options, click here.
Contact us for next class start dates
Certifications
Upon completion of training, the students are fully prepared to take the following certification exams. However, they are not a requirement for graduation. Vendor certifications are at the student’s expense.
CompTIA A+
CompTIA A+ is the industry standard for establishing a career in IT. It is the only industry recognized credential with performance testing to prove pros can think on their feet to perform critical IT support tasks. CompTIA A+ is trusted by employers around the world to identify the go-to person in end point management & technical support roles. CompTIA A+ appears in more tech support job listings than any other IT credential.
-
The CompTIA A+ Core Series requires candidates to pass two exams: Core 1 (220-1101) and Core 2 (220-1102) covering the following new content, emphasizing the technologies and skills IT pros need to support a hybrid workforce.
Increased reliance on SaaS applications for remote work
More on troubleshooting and how to remotely diagnose and correct common software, hardware, or connectivity problems
Changing core technologies from cloud virtualization and IoT device security to data management and scripting
Multiple operating systems now encountered by technicians on a regular basis, including the major systems, their use cases, and how to keep them running properly
Reflects the changing nature of the job role, where many tasks are sent to specialized providers as certified personnel need to assess whether it’s best to fix something on site, or to save time and money by sending proprietary technologies directly to vendors
-
Help Desk Technician
Field Service Technician
Associate Network Engineer
Junior Systems Administrator
Desktop Support Specialist
System Support Technician
-
CompTIA A+ 220-1101 (Core 1) and 220-1102 (Core 2)
Candidates must complete both 1101 and 1102 to earn certification. Exams cannot be combined across the series.
Exam Launch Date: April 22, 2022
CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing.
CompTIA A+ 220-1102 covers operating systems, security, software and operational procedures.
Maximum of 90 questions per exam
Length of Test: 90 Minutes
Passing Scores:
220-1101: 675 (on a scale of 900)
220-1102: 700 (on a scale of 900)
Recommended Experience: 9 to 12 months hands-on experience in the lab or field
CompTIA Data+
Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making.
-
CompTIA Data+ gives you the confidence to bring data analysis to life.
As the importance for data analytics grows, more job roles are required to set context and better communicate vital business intelligence. Collecting, analyzing, and reporting on data can drive priorities and lead business decision-making. CompTIA Data+ validates certified professionals have the skills required to facilitate data-driven business decisions, including:
Mining data
Manipulating data
Visualizing and reporting data
Applying basic statistical methods
Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle
-
Data Analyst
Reporting Analyst
Business Data Analyst
Clinical Analyst
Marketing Analyst
Operations Analyst
-
DA0-001
The CompTIA Data+ exam will certify the successful candidate has the knowledge and skills required to transform business requirements in support of data-driven decisions through mining and manipulating data, applying basic statistical methods, and analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle.
90 questions
90 Minutes
Passing Score: 675 (on scale of 100–900)
Certified Ethical Hacker (CEH)
CEH v11 provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
-
CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker. Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
Course Benefits:
Incorporating Parrot Security OS
Re-mapped to NIST/NICE Framework
Enhanced Cloud Security & IoT and Operational Technology (OT) Modules
Modern Malware Analysis
The industry’s Most Comprehensive Tools Library
-
Cyber Security Forensic Analyst
Cyber Security Analyst
CND Security Specialist
CND Fusion Analyst
Cyberspace Network Defense (CND) Technician
Cyber Red Team Operator
Cyber Network Defense (CND) Analyst
Cyber Security Forensic Analyst
Computer Network Defense Intrusion Analyst
Cyber Security Engineer
Information Security Engineer
CND Cyber Analyst
Network Security Engineer
Cyber Threat Analyst
SOC Security Analyst
Information Security Analyst
IT Security Compliance Specialist
Global Security Assurance Analyst
Security Analyst Tier 3
Security Operations Analyst
Security Incident Response Analyst
Penetration Tester
Vulnerability Analyst
Sr. Security Threat Analyst
Tier 3 NSOC Analyst
Security Information Assurance Analyst
Technical Security Analyst
Information Security Manager
Risk and Remediation Manager
Systems Administrator
Cybersecurity Network Analyst
Cyber Security Vulnerability Analyst
Risk Assessment- Security Consultant
Information Security Associate – Insider Threat Analyst
Security Architect, Manager
Application Security Analyst
Cyber Security System Engineer
Software Security Analyst
Network Analyst
Information System Security Officer
SOC Security Analyst
Cyber Security Engineer II
Senior Cyber Security Monitoring Analyst
Cyber Security Incident Response, Incident Analyst
Cyber Security Incident Response Engineer
L2 Security Analyst
Senior Information Assurance/ Security Specialist
Technical Operations Network Engineer
IT Security Administrator
-
After taking an authorized course, candidates can attempt the CEH exam. Candidates that successfully pass the exam will receive their CEH certificate and membership privileges. After proving knowledge by achieving the CEH credential, candidates have the added option to proceed to attempt the CEH (Practical) exam to prove their skills and abilities. The CEH (Practical) is a 6-hour practical exam created by subject matter experts in the ethical hacking industry. The exam tests skills and abilities in a timed environment across major operating systems, databases, and networks. Candidates with both the CEH and CEH (Practical) certifications are designated as CEH Masters, having validated the full scope of their abilities.
CEH (ANSI)
Exam Title: Certified Ethical Hacker (ANSI)
Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
Number of Questions: 125
Test Format: Multiple Choice
Duration: 4 Hours
Availability: ECC EXAM* / VUE
Local proctor for Private and in-person courses.
Live remote proctor for online ECC Exam option.
Passing Score: Please refer tohttps://cert.eccouncil.org/faq.html
CEH (Practical)
Exam Title: Certified Ethical Hacker (Practical)
Number of Practical Challenges: 20
Test Format: iLabs Cyber Range
Duration: 6 Hours
Availability: Aspen-iLabs
Passing Score: 70%
Course Breakdown
-
1.0 Mobile Devices
Install and configure laptop hardware and components
Compare and contrast the display components of mobile devices
Set up and configure accessories and ports of mobile devices
Configure basic mobile-device network connectivity and application support
2.0 Networking
Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes
Compare and contrast common networking hardware
Compare and contrast protocols for wireless networking
Summarize services provided by networked hosts
Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks
Compare and contrast common network configuration concepts
Compare and contrast Internet connection types, network types, and their features
Given a scenario, use networking tools
3.0 Hardware
Explain basic cable types and their connectors, features, and purposes
Given a scenario, install the appropriate RAM
Given a scenario, select and install storage devices
Given a scenario, install and configure motherboards, central processing units (CPUs), and addon cards
Given a scenario, install or replace the appropriate power supply
Given a scenario, deploy and configure multifunction devices/ printers and settings
Given a scenario, install and replace printer consumables
4.0 Virtualization and Cloud Computing
Summarize cloud-computing concepts
Summarize aspects of client-side virtualization
5.0 Hardware and Network Troubleshooting
Given a scenario, apply the best practice methodology to resolve problems
Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power
Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays
Given a scenario, troubleshoot video, projector, and display issues
Given a scenario, troubleshoot common issues with mobile devices
Given a scenario, troubleshoot and resolve printer issues
Given a scenario, troubleshoot problems with wired and wireless networks
-
1.0 Operating Systems
Compare and contrast common operating system types and their purposes
Compare and contrast features of Microsoft Windows versions
Summarize general OS installation considerations and upgrade methods
Given a scenario, use appropriate Microsoft command line tools
Given a scenario, use Microsoft operating system features and tools
Given a scenario, use Microsoft Windows Control Panel utilities
Summarize application installation and configuration concepts
Given a scenario, configure Microsoft Windows networking on a client/desktop
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems
2.0 Security
Summarize the importance of physical security measures
Explain logical security concepts
Compare and contrast wireless security protocols and authentication methods
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
Compare and contrast social engineering, threats, and vulnerabilities
Compare and contrast the differences of basic Microsoft Windows OS security settings
Given a scenario, implement security best practices to secure a workstation
Given a scenario, implement methods for securing mobile devices
Given a scenario, implement appropriate data destruction and disposal methods
Given a scenario, configure security on SOHO wireless and wired networks
3.0 Software Troubleshooting
Given a scenario, troubleshoot and resolve printer issues
Given a scenario, troubleshoot and resolve PC security issues
Given a scenario, use best practice procedures for malware removal
Given a scenario, troubleshoot mobile OS and application issues
Given a scenario, troubleshoot mobile OS and application security issues
4.0 Operational Procedures
Compare and contrast best practices associated with types of documentation
Given a scenario, implement basic change management best practices
Given a scenario, implement basic disaster prevention and recovery methods
Explain common safety procedures
Explain environmental impacts and appropriate controls
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts
Given a scenario, use proper communication techniques and professionalism
Identify the basics of scripting
Given a scenario, use remote access technologies
-
1.0 Data Concepts and Environments
Identify basic concepts of data schemas and dimensions
Compare and contrast different data types
Compare and contrast common data structures and file formats
2.0 Data Mining
Explain data acquisition concepts
Identify common reasons for cleansing and profiling datasets
Given a scenario, execute data manipulation techniques
Explain common techniques for data manipulation and query optimization
3.0 Data Analysis
Given a scenario, apply the appropriate descriptive statistical methods
Explain the purpose of inferential statistical methods
Summarize types of analysis and key analysis techniques
Identify common data analytics tools
4.0 Visualization
Given a scenario, translate business requirements to form a report
Given a scenario, use appropriate design components for reports and dashboards
Given a scenario, use appropriate methods for dashboard development
Given a scenario, apply the appropriate type of visualization
Compare and contrast types of reports
5.0 Data Governance, Quality, and Controls 14%
Summarize important data governance concepts
Given a scenario, apply data quality control concepts
Explain master data management (MDM) concepts
-
Introduction to Ethical Hacking
Foot-printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing
Cryptography