IT Academy on Facebook IT Academy on Instagram IT Academy on Linked In IT Academy on Trust Pilot 

Sign up to receive monthly newsletter.
Never miss an update.

Free Demo
Register Now

SPEAK TO AN EXPERT 0860 000 895

CompTIA A+
CompTIA Bundle
Technical Bundle
Technical or Microsoft Bundle & Laptop
A+ N+ CCNA Bundle
Web & Graphics Bundle
Network Engineer Bundle
A+ N+ MCSE & MCSA 2016
Business Skills Development Bundle
Security Bundle
A+ N+ MCSA 2016
A+ N+ MCSE 2012
MCSA 2016
MCSE 2012
IT Engineer Bundle
Software Development
Office 2013 Bundle
Microsoft Bundle
A+ N+ Microsoft Bundle
IT Professional
ITIL Foundations
Computer Course

Security Bundle SUBSCRIPTION

The Security Bundle Bundle includes all five courses CompTIA Security+, CompTIA CySA, CompTIA CASP, CEH and CISA.

Estimated Course Duration: 100 Hours (Should you study 1 hour per day you could complete the Security Bundle courses in less than 4 months).

Courses are accessible on a Laptop, Desktop computer, Tablet or Smartphone. Courses are designed in video with audio and coupled with unlimited advanced mentoring.

Course Fee: R6 995.00 or R7 495.00 on terms with R3 223.00 deposit and 9 monthly installments of R474.67.

To register for the Security Bundle course please click here.

CompTIA Security+ SY0-501 course:

CompTIA Security+ SY0-501: The Present Threat Landscape
CompTIA Security+ SY0-501: Types of Malware
CompTIA Security+ SY0-501: Social Engineering and Related Attacks
CompTIA Security+ SY0-501: Application and Service Attacks
CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
CompTIA Security+ SY0-501: Impacts from Vulnerability Types
CompTIA Security+ SY0-501: Components Supporting Organizational Security
CompTIA Security+ SY0-501: Security Assessment Using Software Tools
CompTIA Security+ SY0-501: Cryptography
CompTIA Security+ SY0-501: Public Key Infrastructure
CompTIA Security+ SY0-501: Wireless Security Settings
CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
CompTIA Security+ SY0-501: Implementing Secure Protocols
CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
CompTIA Security+ SY0-501: Identity Concepts and Access Services
CompTIA Security+ SY0-501: Identity and Access Management Controls
CompTIA Security+ SY0-501: Common Account Management Practices
CompTIA Security+ SY0-501: Framework, Guidelines, and Physical Security
CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
CompTIA Security+ SY0-501: Understanding Cloud, Virtualization, and Resiliency Concepts
CompTIA Security+ SY0-501: Policies, Plans, and Procedures
CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
CompTIA Security+ SY0-501: Incident Response, Forensics, Disaster Recovery, and Security Controls

CompTIA Advanced Security Practitioner: CASP

CompTIA CASP CAS-003: Business and Industry Influences and Risks
CompTIA CASP CAS-003: Organizational Security and Privacy Policies
CompTIA CASP CAS-003: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-003: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-003: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-003: Integrating Security Controls for Host Devices
CompTIA CASP CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-003: Selecting Software Security Controls
CompTIA CASP CAS-003: Conducting Security Assessments
CompTIA CASP CAS-003: Implementing Incident Response and Recovery
CompTIA CASP CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise

Certified Ethical Hacker: CEH

CEHv10: Ethical Hacking Overview and Threats
CEHv10: Hacking Concepts
CEHv10: Security Controls
CEHv10: Security Controls Part 2
CEHv10: Pentesting, Laws, and Standards
CEHv10: Footprinting
CEHv10: Host Discovery and Scanning with Nmap
CEHv10: ProxyChains and Enumeration
CEHv10: Vulnerability Analysis Concepts and Tools
CEHv10: Password Attacks
CEHv10: Password Attacks Part 2
CEHv10: Privilege Escalation
CEHv10: Covert Data Gathering
CEHv10: Hidden Files and Covering Tracks
CEHv10: Malware Threats
CEHv10: Malware Distribution
CEHv10: Network Sniffing
CEHv10: Denial of Service
CEHv10: Session Hijacking
CEHv10: Evading IDS, Firewalls, and Honeypots
CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
CEHv10: Hacking Web Servers
CEHv10: Common Web App Threats
CEHv10: Common Web App Threats Part 2
CEHv10: Practical Web App Hacking
CEHv10: SQL Injection
CEHv10: SQL Injection Types and Tools
CEHv10: Wireless Hacking Concepts
CEHv10: Wireless Hacking Tools
CEHv10: Wireless Hacking Common Threats
CEHv10: Cracking and Mobile Hacking
CEHv10: IoT Concepts
CEHv10: IoT Attacks
CEHv10: Clouding Computing Concepts
CEHv10: Cloud Computer Attacks
CEHv10: Cryptography Concepts
CEHv10: Cryptography Concepts Part 2
CEHv10: Cryptography Concepts Part 3
CEHv10: Cryptography Attacks
CEHv10: IoT Hacking and Countermeasures

Certified Information Systems Auditor: CISA

Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice

How our courses work:

We issue learners with an username and password to access their courses for a 12 month subscription. Courses are designed in video with audio and coupled with unlimited advanced mentoring. At the end of each module learners are required to answer multiple choice questions, these marks are registered in our database in real time.

On successful course completion of 70% and above learners will receive IT Academy Course Mastery Certification via registered mail, at no additional cost.

International exams are written at any Pearson Vue Testing Centre in South Africa. CompTIA discounted International exam vouchers can be purchased through IT Academy.

Courses include:

Mobile ready (accessible on a Tablet or Smartphone)
Courses are printable and downloadable
Unlimited Advanced Mentoring
e-mail Support
Free Cram Tests
Discounted international exam vouchers
12 months Subscription
IT Academy Course Mastery Certification

Our training is trusted by ...

Skillsoft  123 Print  Anglo American  J Hillebrand  MyTelnet  One Logix  RCI  Scan RF  Sea Harvest  Syntell  Web Africa 

Tel: 086 000 0895
Tel: 021 403 6388
Tel: 021 914 1789
Fax: 021 914 1676
Avanti Towers
B4 1 North Block
35 Carl Cronje Drive
Tygerfalls, Bellville, 7535



Terms & Conditions
© 2019 - IT Academy - All Rights Reserved