• Part-time Classes (Morn, Afternoon, Eve)
  • Microsoft Certified Tutors
  • Practical Hands-on
  • Job Support
  • No Entry Requirements
  • Blended Learning
Our government funded training course offers a blended learning path from Foundation to Advanced level, and is focused on building the management and technical knowledge to deliver effective cyber security in any organisation.

What will I learn? Course Content

Module 1. Communications and Employability Skills in IT
Module 2. Computer Systems
Module 3. Managing Networks
Module 4. Organisational System Security
Module 5. Computer Networks
Module 6. IT Technical Support
Module 7. Maintaining Computer Systems
Module 8. Installing and Upgrading Software
Module 9. Networked Systems Security

Need Help

Our friendly Advisors can answer any questions you have. Start the journey towards a rewarding and fulfilling career NOW!

CompTIA A+ 220-901

Module 1: Introduction To Personal Computers And IT Certification
Module 2: Internal Hardware Components
Module 3: Storage Fundamentals
Module 4: Expanding Hardware Capabilities
Module 5: Working With Peripheral Devices
Module 6: Mobiles Devices
Module 7: Computer Networking
Module 8: Hardware And Network Troubleshooting

CompTIA A+ 220-902

Module 1: Introduction To Operating Systems
Module 2: Installing Windows Operating Systems
Module 3: Configuration And Management In Windows
Module 4: Utilizing Alternative Operating Systems
Module 5: Virtualization And Cloud Computing
Module 6: Managing Mobile Devices
Module 7: Understanding System Security
Module 8: Troubleshooting And Operational Procedures

CompTIA Network+

Module 1 Introduction To Networking
Module 2 Networking Standards
Module 3 Network Cabling And Transmission
Module 4 Understanding TCP/IP
Module 5 Network Devices
Module 6 Wireless Network
Module 7 Wide Area Network
Module 8 Remote Access
Module 9 Network Security
Module 10 Building Scalable High Performance Networks
Module 11 Monitoring And Troubleshooting Networks

CompTIA Security

Module 1: Threats, Attacks and Vulnerabilities
Module 2: Technologies and Tools
Module 3: Architecture and Design
Module 4: Identity and Access Management
Module 5: Risk Management
Module 6: Cryptography and PKI

Computer Hacking Forensic Investigator (CHFI)

Module 1 Computer Forensics Introduction
Module 2 Forensics Investigation Process
Module 3 Searching and Seizing
Module 4 Digital Evidence
Module 5 First Responder Procedures
Module 6 Forensics Lab
Module 7 Hard Disks and File Systems
Module 8 Windows Forensics
Module 9 Data Acquisition and Duplication
Module 10 Recovering Deleted Files and Partitions
Module 11 Using Access Data FTK
Module 12 Using EnCase
Module 13 Steganography
Module 14 Password Crackers
Module 15 Log Correlation
Module 16 Network Forensics
Module 17 Wireless Attacks
Module 18 Web Attacks
Module 19 Email Crimes
Module 20 Mobile Investigation
Module 21 Investigative Reports
Module 22 Expert Witness

Certified Ethical Hacker (CEH)

Module 1 Intro to Course
Module 2 Footprinting and Reconnaisssance
Module 3 Scanning Networks
Module 4 Enurmeration
Module 5 System Hacking
Module 6 Trojans and Backdoors
Module 7 Viruses and Worms
Module 8 Denial of Service
Module 9 Social Engineering
Module 10 Sniffers
Module 11 Session Hijacking
Module 12 Hacking Webservers
Module 13 Hacking Web Applications
Module 14 SQL Injection
Module 15 Hacking Wireless Networks
Module 16 Evading IDS Firewalls and Honeypots
Module 17 Buffer Overflow
Module 18 Cryptography
Module 19 Penetration Testing


Trainee Cyber Security
Security Analyst
Security Operations Analyst
Application Security Test
Information Security Analyst

Call 0121 450 9300

contact form

awarding body

Pearson IT Certification is a leader in IT Certification solutions, with a long tradition of delivering proven learning tools and educational training materials that have helped instructors teach, students learn, and certification exam candidates succeed.