CompTIA Secure Infrastructure Specialist (CSIS)

Closed Caption

Certificate

Dedicated Tutors

89 Videos
28 Hours
250 Test Questions

CompTIA Secure Infrastructure Specialist (CSIS)

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

28 Hours
89 Videos

CompTIA Secure Infrastructure Specialist (CSIS)

Course Description

28 Hours

89 Videos

CompTIA Secure Infrastructure Specialist (CSIS)

The CompTIA Secure Infrastructure Specialist (CSIS) certification program is designed for IT professionals who want to develop a comprehensive understanding of securing and managing IT infrastructures. This certification validates the essential skills required to design, implement, and maintain secure network and system infrastructures. Covering a wide range of topics including network security, server security, endpoint protection, incident response, and risk management, the CSIS certification equips participants with the knowledge to protect organizational assets against evolving cyber threats. Ideal for network administrators, system administrators, security analysts, and IT professionals, this certification ensures proficiency in securing IT infrastructures.

Key Features:

  • Network Security: Learn the fundamentals of network security, including the implementation of firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and virtual private networks (VPNs) to protect network infrastructures from unauthorized access and cyber attacks.
  • Server Security: Gain expertise in securing server environments, including the configuration and management of secure server operating systems, access controls, patch management, and hardening techniques to protect against vulnerabilities and exploits.
  • Endpoint Protection: Understand the importance of securing endpoints such as desktops, laptops, and mobile devices. Learn to implement antivirus solutions, endpoint detection and response (EDR) tools, and encryption to safeguard endpoint devices.
  • Identity and Access Management (IAM): Develop skills in managing user identities and access controls, including implementing multi-factor authentication (MFA), role-based access control (RBAC), and identity lifecycle management to ensure secure access to resources.
  • Incident Response and Management: Learn how to develop and implement effective incident response plans, including the steps for detecting, analyzing, containing, and recovering from security incidents. Understand best practices for incident management and communication.
  • Risk Management and Assessment: Gain proficiency in assessing and managing risks within IT infrastructures. Learn to conduct risk assessments, identify potential threats and vulnerabilities, and implement risk mitigation strategies to protect organizational assets.
  • Compliance and Regulatory Requirements: Understand the regulatory and legal requirements related to IT infrastructure security. Learn how to ensure compliance with standards such as GDPR, HIPAA, PCI-DSS, and other relevant regulations.
  • Data Protection and Privacy: Explore methods for protecting data within IT infrastructures, including data classification, encryption, data loss prevention (DLP), and secure data storage to ensure the confidentiality, integrity, and availability of information.
  • Security Monitoring and Management: Learn to monitor and manage security within IT infrastructures using tools such as Security Information and Event Management (SIEM) systems, network monitoring solutions, and log management to detect and respond to security events.
  • Certification: Upon completing the training and passing the certification exam, participants receive the CompTIA Secure Infrastructure Specialist (CSIS) certification, validating their expertise in securing IT infrastructures and enhancing their career opportunities in the IT and cybersecurity fields.

This CompTIA Secure Infrastructure Specialist (CSIS) certification program is ideal for network administrators, system administrators, security analysts, and IT professionals seeking to enhance their skills in securing and managing IT infrastructures. By completing this certification, participants will be well-equipped to protect their organizations against a wide range of cyber threats and ensure the security and reliability of their IT environments.


Talk to a Career Coach!


Train & Earn with Guaranteed Career Coaching Success!

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

Share on:

Proudly Display Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.

Course Syllabus

Chapter One:
  •  1.1 Introduction to the Course, Meet the Instructor
  •    1.2 Appropriate Safety Procedures
  •    1.3 PC Components
  •    1.4 Guidlines for PC Disassembly
  •    1.5 Motherboards
  •    1.6 CPU Sockets
  •    1.7 PCI Bus
  •    1.8 Storage Bus (SATA and IDE)
  •    1.9 Discussing PC Components
  •    1.10 Common Connection Interfaces
  •    1.11 Wired and Wireless Connection Standards
  •    1.12 Install Peripheral Devices
  •    1.13 Guidlines and Discussion for Installing Peripheral Devices
Chapter Two:
  •    2.1 Displays and Multimedia
  •    2.2 Display Device Connections and Cables
  •    2.3 Discussing Display Device Installation and Configuration
  •    2.4 Troubleshoot Display Devices
  •    2.5 Guidelines for Troubleshooting Display Devices
  •    2.6 Discussing Display Device Troubleshooting
  •    2.7 Install and Configure Multimedia Devices
  •    2.8 Discussing Multimedia Device Installation and Configuration
Chapter Three:
  • 3.1 Supporting Multiple Drive Types and Memory
  •    3.2 Memory Types
  •    3.3 RAM Types
  •    3.4 Memory Modules
  •    3.5 DIMM and SO-DIMM Technologies
  •    3.6 Parity and ECC RAM
  •    3.7 Memory Compatibility Issues
  •    3.8 Discussing System Memory Installation
  •    3.9 Install and Configure Mass Storage Devices
  •    3.10 Storage Adapters and Cables
  •    3.11 Solid State Drives
  •    3.12 Guidlines for Installing Mass Storage Devices
  •    3.13 Discussing Mass Storage Device Installation and Configuration
  •    3.14 Install and Configure Removable Storage
  •    3.15 Discussing Removable Storage Device Istallation and Configuration
  •    3.16 Configure RAID
  •    3.17 RAID Configuration Options
  •    3.18 Discussing RAID Configuration
  •    3.19 Troubleshoot Storage Devices
  •    3.20 Boot Failures
  •    3.21 Discussing Storage Device Troubleshooting
Chapter Four:
  • 4.1 Install Upgrade CPUs
  •    4.2 Multiprocessing and Multicore Processors
  •    4.3 Discussing CPU Upgrades
  •    4.4 Configure and Update BIOS UEFI
  •    4.5 Discussing BOIS-UEFI Configuration and Updates
  •    4.6 Install Power Supplies
  •    4.7 Discussing Power Supply Installation
  •    4.8 Troubleshoot Internal System Components
  •    4.9 POST and Boot Problems
  •    4.10 Boot Troubleshooting and Log Entries
  •    4.11 Motherboard Component Problems
  •    4.12 Discussing System Component Troubleshooting
Chapter Five:
  • 5.1 Wired Networks
  •    5.2 Common Ethernet Network Implementations
  •    5.3 Taps and Mirrors
  •    5.4 Discussing Wired Networks
  •    5.5 Network Hardware Devices
  •    5.6 Switches
  •    5.7 Power Over Ethernet
  •    5.8 Discussing Network Hardware Devices
  •    5.9 Wireless Networks
  •    5.10 Access Points and Wireless Network Modes
  •    5.11 Discussing Wireless Networks
  •    5.12 Internet Connection Types
  •    5.13 Wireless Internet Service Providers WISP
  •    5.14 Discussing Internet Connection Types
  •    5.15 Network Configuration Concepts
  •    5.16 The TCIP-IP Protocol Suite
  •    5.17 Internet Protocol and IP Addressing
  •    5.18 Public and Private IP Addresses
  •    5.19 IPv6
  •    5.20 Discussing Network Configuration Concepts
  •    5.21 Network Services
  •    5.22 DNS
  •    5.23 Dynamic and Static IP Configurations
  •    5.24 DNS Records MX and A
  •    5.25 Web Servers and HTTP-HTTPS
  •    5.26 Discussing Network Services
Chapter Six:
  •  6.1 Configuring and Troubleshooting Networks
  •    6.2 Network Connections in Windows
  •    6.3 Install and Configure SOHO Networks
  •    6.4 Configure SOHO Network Security
  •    6.5 Firewalls
  •    6.6 Port Fowarding and Port Triggering
  •    6.7 Windows Firewall
  •    6.8 Network Security and Embedded Appliances
  •    6.9 Configure Remote Access
  •    6.10 Discussing Remote Access Configuration
  •    6.11 Troubleshoot Network Connections
  •    6.12 IP Configuration Issues
  •    6.13 Routing Issues
  •    6.14 Discussing Network Connection Troubleshooting
Chapter Seven:
  • 7.1 Configure Client-Side Virtulaization
  •    7.2 Hypervisors
  •    7.3 Processor Support and Resource Requirements
  •    7.4 Virtual Networks
  •    7.5 Client-Side Virtualization
  •    7.6 Cloud Computing Concepts
  •    7.7 Internal and External Shared Resources
  •    7.8 Cloud Service Options
  •    7.9 Virtual Desktops
  •    7.10 Software-Defined Networking (SDN)
  •    7.11 Discussing Cloud Computing Concepts
Chapter Eight:
  • 8.1 Use Laptop Features
  •    8.2 Expansion Options
  •    8.3 Discussing Laptop Features
  •    8.4 Install and Configure Laptop Hardware
  •    8.5 Discussing Laptop Hardware Installation and Configuration
  •    8.6 Troubleshoot Common Laptop Issues
  •    8.7 Discussing Troubleshooting Common laptop Issues
Chapter Nine:
  • 9.1 Syncing and Setup of Mobile Devices
  •    9.2 Connect and Configure Mobile Devices
  •    9.3 Configure Mobile Device Network Connectivity
  •    9.4 Mobile VPN Configuration
  •    9.5 Email Configuration Options
  •    9.6 Discussing Mobile Device Network Connectivity Configuration
  •    9.7 Support Mobile Apps
  •    9.8 Discussing Mobile App Support
Chapter Ten:
  •  10.1 All Things Printing
  •    10.2 Discussing Laser Printer Maintenance
  •    10.3 Maintain Inkjet Printers
  •    10.4 Discussing Inkjet Printer Maintenance
  •    10.5 Maintain Impact, Thermal, and 3D Printers
  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
  •    10.7 Install and Configure Printers
  •    10.8 Discussing Printer Installation and Configuration
  •    10.9 Troubleshoot Print Device Issues
  •    10.10 Install and Configure Imaging Devices
  •    10.11 Discussing Device Installation and Configuration

$99.95

$99.95

Share on:

You Will Get Certification After Completion of This Course.

$99.95

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Related Products

Recently Viewed

Description

CompTIA Secure Infrastructure Specialist (CSIS)

The CompTIA Secure Infrastructure Specialist (CSIS) certification program is designed for IT professionals who want to develop a comprehensive understanding of securing and managing IT infrastructures. This certification validates the essential skills required to design, implement, and maintain secure network and system infrastructures. Covering a wide range of topics including network security, server security, endpoint protection, incident response, and risk management, the CSIS certification equips participants with the knowledge to protect organizational assets against evolving cyber threats. Ideal for network administrators, system administrators, security analysts, and IT professionals, this certification ensures proficiency in securing IT infrastructures.

Key Features:

  • Network Security: Learn the fundamentals of network security, including the implementation of firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and virtual private networks (VPNs) to protect network infrastructures from unauthorized access and cyber attacks.
  • Server Security: Gain expertise in securing server environments, including the configuration and management of secure server operating systems, access controls, patch management, and hardening techniques to protect against vulnerabilities and exploits.
  • Endpoint Protection: Understand the importance of securing endpoints such as desktops, laptops, and mobile devices. Learn to implement antivirus solutions, endpoint detection and response (EDR) tools, and encryption to safeguard endpoint devices.
  • Identity and Access Management (IAM): Develop skills in managing user identities and access controls, including implementing multi-factor authentication (MFA), role-based access control (RBAC), and identity lifecycle management to ensure secure access to resources.
  • Incident Response and Management: Learn how to develop and implement effective incident response plans, including the steps for detecting, analyzing, containing, and recovering from security incidents. Understand best practices for incident management and communication.
  • Risk Management and Assessment: Gain proficiency in assessing and managing risks within IT infrastructures. Learn to conduct risk assessments, identify potential threats and vulnerabilities, and implement risk mitigation strategies to protect organizational assets.
  • Compliance and Regulatory Requirements: Understand the regulatory and legal requirements related to IT infrastructure security. Learn how to ensure compliance with standards such as GDPR, HIPAA, PCI-DSS, and other relevant regulations.
  • Data Protection and Privacy: Explore methods for protecting data within IT infrastructures, including data classification, encryption, data loss prevention (DLP), and secure data storage to ensure the confidentiality, integrity, and availability of information.
  • Security Monitoring and Management: Learn to monitor and manage security within IT infrastructures using tools such as Security Information and Event Management (SIEM) systems, network monitoring solutions, and log management to detect and respond to security events.
  • Certification: Upon completing the training and passing the certification exam, participants receive the CompTIA Secure Infrastructure Specialist (CSIS) certification, validating their expertise in securing IT infrastructures and enhancing their career opportunities in the IT and cybersecurity fields.

This CompTIA Secure Infrastructure Specialist (CSIS) certification program is ideal for network administrators, system administrators, security analysts, and IT professionals seeking to enhance their skills in securing and managing IT infrastructures. By completing this certification, participants will be well-equipped to protect their organizations against a wide range of cyber threats and ensure the security and reliability of their IT environments.


Talk to a Career Coach!


Train & Earn with Guaranteed Career Coaching Success!

4 reviews for CompTIA Secure Infrastructure Specialist (CSIS)

  1. Lauren Mitchell

    IT Tutor Pro delivered a fantastic learning experience with the CompTIA Secure Infrastructure Specialist program. The hands-on labs and real-world scenarios were extremely helpful in understanding how to apply what I learned. This course is perfect for anyone who wants to strengthen both networking and security skills.

  2. Maria Castillo

    I really liked how this CSIS training balanced theory and practice. IT Tutor Pro provided excellent guidance on infrastructure design, threat mitigation, and incident response. The explanations were clear, and the study materials made preparing for the exams easier.

  3. Ahmad Khalid

    This training bundle was exactly what I needed to round out my infrastructure and security knowledge. IT Tutor Pro’s instructors were knowledgeable and kept the content engaging. I’m now much more confident in my ability to design and secure IT environments.

  4. Dev Sharma

    As someone working in IT support, this course gave me a clear pathway into security roles. IT Tutor Pro made sure to link foundational knowledge from Network+ and Security+ into the bigger picture of securing infrastructures. I feel much better equipped to protect systems in my current job.

Add a review

Your email address will not be published. Required fields are marked *