Self Paced Online CompTIA Training Package

Get CompTIA certified at your pace, anywhere

Course Overview

This CompTIA Complete Self-Paced Online Bundle will help you in build your skills and prepare for the CompTIA A+, Network+, Security+, Mobility+ and CASP certification exams.

If you plan on obtaining several CompTIA certifications, this bundle is the way to go. By the time you complete A+ you will have the skills and credential to start working in the IT field. When you add on Network+, and Security+, you’ll have a well-rounded foundation that will allow you to advance your IT career in many directions. As you’ve probably seen on and , the more certifications you achieve, the more income you’ll make!

Since CompTIA certifications are vendor neutral by achieving any CompTIA certification you give yourself a broad array of skills to qualify you for a variety of IT positions.



The A+ certification is your entry ticket into the IT World. 92% of employers require IT for entry level IT positions.The U.S. Department of Defense recognizes CompTIA A+ and the Department of Homeland Security requires A+ for anyone working in an IT environment.


The exam covers network technologies, installation and configuration, media and topologies, management, and security. Network+ is the next logical step from A+ to build your skills in the arena of network infrastructure and support. From a fortune 500 company to a simple small business networking is everywhere.


CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents; it ensures that security personnel are anticipating security risks and guarding against them.


The CompTIA Mobility+ exam covers mobile device management, troubleshooting, security, and network infrastructure. It identifies IT professionals who can deploy, integrate, support and manage a mobile environment while ensuring proper security measures are maintained for devices and platforms to mitigate risks and threats.


The CompTIA Advanced Security Practitioner covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level. This certification is approved by U.S. Dept. of Defense to meet IA technical and management certification requirements.

This Course Covers The Following Exams:

CompTIA A+ 220-801
CompTIA A+ 220-802
CompTIA Network+ N10-005
CompTIA Security+ SY0-401
CompTIA Mobility+ MB0-001

Other Training Formats

Public Classroom

Live, instructor-led CompTIA training at our training facilities.

Private Group Onsite

Train large or small groups privately, efficiently, and cost effectively with tailored curriculum delivered to your facility, or to the location of your choice.

Certification Guarantee

If a student completes a course, scoring over 90% on the final exam, and does not pass the vendor exam, we will extend a credit to the student for any of our online or ILT programs for the cost of the exam voucher.Once you complete our program, you will have access to complete an online course at any point within that three year time frame to prepare you to keep your certification current at a reduced fee.

Are CompTIA Certifications Right For Me?

If you are a PC support/maintenance specialists, LAN managers or systems integrators looking to achieve CompTIA Certification or government personnel seeking certification to fulfill to DoD 8570.1 Directive, this is the right course for you.

CompTIA Complete Self-Paced Outline

The following topics are general guidelines for the content covered in the online video program, and on the CompTIA exams. However, other related topics may also appear on any specific delivery of the class and/or exams:

PC Hardware

Configure and apply BIOS settings.
Differentiate between motherboard components, their purposes, and properties.
Compare and contrast RAM types and features.
Install and configure expansion cards.
Install and configure storage devices and use appropriate media.
Differentiate among various CPU types and features and select the appropriate cooling method.
Compare and contrast various connection interfaces and explain their purpose.
Install an appropriate power supply based on a given scenario.
Evaluate and select appropriate components for a custom configuration, to meet customer specifications or needs.
Given a scenario, evaluate types and features of display devices.
Identify connector types and associated cables.
Install and configure various peripheral devices.


Identify types of network cables and connectors.
Categorize characteristics of connectors and cabling.
Explain properties and characteristics of TCP/IP.
Explain common TCP and UDP ports, protocols, and their purpose.
Compare and contrast wireless networking standards and encryption types.
Install, configure, and deploy a SOHO wireless/wired router using appropriate settings.
Compare and contrast Internet connection types and features.
Identify various types of networks.
Compare and contrast network devices, their functions, and features.
Given a scenario, use appropriate networking tools.


Install and configure laptop hardware and components.
Compare and contrast the components within the display of a laptop.
Compare and contrast laptop features.


Explain the differences between the various printer types and summarize the associated imaging process.
Given a scenario, install, and configure printers.
Given a scenario, perform printer maintenance.

Operational Procedures

Given a scenario, use appropriate safety procedures.
Explain environmental impacts and the purpose of environmental controls.
Given a scenario, demonstrate proper communication and professionalism.
Explain the fundamentals of dealing with prohibited content/activity.

Operating Systems

Compare and contrast the features and requirements of various Microsoft Operating Systems.
Given a scenario, install, and configure the operating system using the most appropriate method.
Given a scenario, use appropriate command line tools.
Given a scenario, use appropriate operating system features and tools.
Given a scenario, use Control Panel utilities.
Setup and configure Windows networking on a client/desktop.
Perform preventive maintenance procedures using appropriate tools.
Explain the differences among basic OS security settings.
Explain the basics of client-side virtualization.


Apply and use common prevention methods.
Compare and contrast common security threats.
Implement security best practices to secure a workstation.
Given a scenario, use the appropriate data destruction/disposal method.
Given a scenario, secure a SOHO wireless network.
Given a scenario, secure a SOHO wired network.

Mobile Devices

Explain the basic features of mobile operating systems.
Establish basic network connectivity and configure email.
Compare and contrast methods for securing mobile devices.
Compare and contrast hardware differences in regards to tablets and laptops.
Execute and configure mobile device synchronization.


Given a scenario, explain the troubleshooting theory.
Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
Given a scenario, troubleshoot common video and display issues.
Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
Given a scenario, troubleshoot operating system problems with appropriate tools.
Given a scenario, troubleshoot common security issues with appropriate tools and best practices.
Given a scenario, troubleshoot, and repair common laptop issues while adhering to the appropriate procedures.
Given a scenario, troubleshoot printers with appropriate tools.

Networking Concepts

Compare the layers of the OSI and TCP/IP models.
Classify how applications, devices, and protocols relate to the OSI model layers.
Explain the purpose and properties of IP addressing.
Explain the purpose and properties of routing and switching.
Identify common TCP and UDP default ports.
Explain the function of common networking protocols.
Summarize DNS concepts and its components.
Given a scenario, implement network troubleshooting methodology
Identify virtual network components.

Network Installation and Configuration

Given a scenario, install and configure routers and switches.
Given a scenario, install and configure a wireless network.
Explain the purpose and properties of DHCP.
Given a scenario, troubleshoot common wireless problems.
Given a scenario, troubleshoot common router and switch problems.
Given a set of requirements, plan and implement a basic SOHO network.

Network Media and Topologies

Categorize standard media types and associated properties.
Categorize standard connector types based on network media.
Compare and contrast different wireless standards.
Categorize WAN technology types and properties.
Describe different network topologies.
Given a scenario, troubleshoot common physical connectivity problems.
Compare and contrast different LAN technologies.
Identify components of wiring distribution.

Network Management

Explain the purpose and features of various network appliances.
Given a scenario, use appropriate hardware tools to troubleshoot connectivity issues.
Given a scenario, use appropriate software tools to troubleshoot connectivity issues.
Given a scenario, use the appropriate network monitoring resource to analyze traffic.
Describe the purpose of configuration management documentation.
Explain different methods and rationales for network performance optimization.

Network Security

Given a scenario, implement appropriate wireless security measures.
Explain the methods of network access security.
Explain methods of user authentication.
Explain common threats, vulnerabilities, and mitigation techniques.
Given a scenario, install and configure a basic firewall.
Categorize different types of network security appliances and methods.

Network Security

Implement security configuration parameters on network devices and other technologies.
Given a scenario, use secure network administration principles.
Explain network design elements and components.
Given a scenario, implement common protocols and services.
Given a scenario, troubleshoot security issues related to wireless networking.

Compliance and Operational Security

Explain the importance of risk related concepts.
Summarize the security implications of integrating systems and data with third parties.
Given a scenario, implement appropriate risk mitigation strategies.
Given a scenario, implement basic forensic procedures.
Summarize common incident response procedures.
Explain the importance of security related awareness and training.
Compare and contrast physical security and environmental controls.
Summarize risk management best practices.
Given a scenario, select the appropriate control to meet the goals of security.

Threats and Vulnerabilities

Explain types of malware.
Summarize various types of attacks.
Summarize social engineering attacks and the associated effectiveness with each attack.
Explain types of wireless attacks.
Explain types of application attacks.
Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
Explain the proper use of penetration testing versus vulnerability scanning.

Application, Data and Host Security

Explain the importance of application security controls and techniques.
Summarize mobile security concepts and technologies.
Given a scenario, select the appropriate solution to establish host security.
Implement the appropriate controls to ensure data security.
Compare and contrast alternative methods to mitigate security risks in static environments.

Access Control and Identity Management

Compare and contrast the function and purpose of authentication services.
Given a scenario, select the appropriate authentication, authorization or access control.
Install and configure security controls when performing account management, based on best practices.


Given a scenario, utilize general cryptography concepts.
Given a scenario, use appropriate cryptographic methods.
Given a scenario, use appropriate PKI, certificate management and associated components.

Enterprise Security

Distinguish which cryptographic tools and techniques are appropriate for a given situation.
Distinguish and select among different types of virtualized, distributed and shared computing
Explain the security implications of enterprise storage
Integrate hosts, networks, infrastructures, applications and storage into secure comprehensive solutions
Distinguish among security controls for hosts
Explain the importance of application security
Given a scenario, distinguish and select the method or tool that is appropriate to conduct an assessment

Risk Management, Policy / Procedure and Legal

Analyze the security risk implications associated with business decisions
Execute and implement risk mitigation strategies and controls
Explain the importance of preparing for and supporting the incident response and recovery process
Implement security and privacy policies and procedures based on organizational requirements.

Research and Analysis

Analyze industry trends and outline potential impact to the enterprise
Carry out relevant analysis for the purpose of securing the enterprise

Integration of Computing, Communications and Business Disciplines

Integrate enterprise disciplines to achieve secure solutions
Explain the security impact of inter-organizational change
Select and distinguish the appropriate security controls with regard to communications and collaboration
Explain advanced authentication tools, techniques and concepts
Carry out security activities across the technology life cycle

Over the Air Technolgies

802.11 Wireless Technologies
Radio Frequency
RF Power
Antenna Options
Issues With RF
NON 802.11 Wireless
Governing Bodies And Regulations

Training Camp offers the highest quality education and certification training course package specifically designed for the needs and ease of our students. No matter the location or delivery method of the course, we attend to every detail so our students can focus solely on learning and certification objectives.

 Boot Camp Certification Delivery Expert Instruction
Our instructors – ranging from renowned authors to senior information technology professionals - draw on an average of 15+ years of experience in the fields in which they teach.
 Exam Voucher and Certification Testing On-Site Certification Testing
Training Camp is an authorized testing center for most major vendor exams, allowing students to take exams as soon as they are ready at class.
 Training Hotel Package Hospitality Packages
Some of our locations offer optional hotel & travel packages,featuring round trip airfare for select boot camp courses.
 Curriculum Award-Winning Courseware
Our ideas™ methodology design focuses on achieving learning goals for any topics or exams required from all of our courses, for use in and beyond the classroom.
Extended  Certification Training Lab Access 100% Up To Date Content
Training Camp's award-winning curriculum team delivers courseware comprised of a mix of proprietary and partner-driven content to successfully prepare our students for exam success.
 Certification Boot Camp Training Guarantee Certification Pass Guarantee
Certification exam protection, online mentoring, and course re-sits are available options for all of our programs to get you to your outcome.
Should a student complete any of our Self Paced Online CompTIA Training Package Training Camp Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year. Students will only be responsible for accommodation and vendor exam fees.

*Examination vouchers & on-site testing is not available for PMP, CISA, CISM, and CRISC boot camps.

Training Camp is proud to share in our students' success. Here is what they are saying about us:

Processing ...
View  Training Schedule and Pricing
Download Brochure
Request Quote
Add to Cart