IT Academy

0860 000 895
021 914 1789

SPEAK TO AN EXPERT 0860 000 895

Security Bundle SUBSCRIPTION

The Security Bundle Bundle includes all five courses CompTIA Security+, CompTIA CySA, CompTIA CASP, CEH and CISA.

Estimated Course Duration: 100 Hours (Should you study 1 hour per day you could complete the Security Bundle courses in less than 4 months).

Courses are accessible on a Laptop, Desktop computer, Tablet or Smartphone. Courses are designed in video with audio and coupled with unlimited advanced mentoring.

Course Fee: R6 995.00 or R7 495.00 on terms with R3 223.00 deposit and 9 monthly installments of R474.67.

To register for the Security Bundle course please click here.

CompTIA Security+ SY0-501

CompTIA Security+: The Present Threat Landscape
CompTIA Security+: Types of Malware
CompTIA Security+: Social Engineering and Related Attacks
CompTIA Security+: Application and Service Attacks
CompTIA Security+: Cryptographic and Wireless Attacks
CompTIA Security+: Penetration Testing and Vulnerability Scanning
CompTIA Security+: Impacts from Vulnerability Types
CompTIA Security+: Components Supporting Organizational Security
CompTIA Security+: Security Assessment Using Software Tools
CompTIA Security+: Cryptography
CompTIA Security+: Public Key Infrastructure
CompTIA Security+: Wireless Security Settings
CompTIA Security+: Analyzing Output from Security Technologies
CompTIA Security+: Deploying Mobile Devices Securely
CompTIA Security+: Implementing Secure Protocols
CompTIA Security+: Troubleshooting Common Security Issues
CompTIA Security+: Identity Concepts and Access Services
CompTIA Security+: Identity and Access Management Controls
CompTIA Security+: Common Account Management Practices
CompTIA Security+: Framework, Guidelines, and Physical Security
CompTIA Security+: Implement Secure Network Architecture Concepts
CompTIA Security+: Secure System and Application Design and Deployment
CompTIA Security+: Understanding Cloud, Virtualization, and Resiliency Concepts
CompTIA Security+: Policies, Plans, and Procedures
CompTIA Security+: Business Impact Analysis and Risk Management
CompTIA Security+: Incident Response, Forensics, Disaster Recovery, and Security Controls

CompTIA Cybersecurity Analyst: CSA+

CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues

CompTIA Advanced Security Practitioner: CASP+

CompTIA CASP CAS-003: Business and Industry Influences and Risks
CompTIA CASP CAS-003: Organizational Security and Privacy Policies
CompTIA CASP CAS-003: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-003: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-003: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-003: Integrating Security Controls for Host Devices
CompTIA CASP CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-003: Selecting Software Security Controls
CompTIA CASP CAS-003: Conducting Security Assessments
CompTIA CASP CAS-003: Implementing Incident Response and Recovery
CompTIA CASP CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise

Certified Ethical Hacker: CEH

CEHv10: Ethical Hacking Overview and Threats
CEHv10: Hacking Concepts
CEHv10: Security Controls
CEHv10: Security Controls Part 2
CEHv10: Pentesting, Laws, and Standards
CEHv10: Footprinting
CEHv10: Host Discovery and Scanning with Nmap
CEHv10: ProxyChains and Enumeration
CEHv10: Vulnerability Analysis Concepts and Tools
CEHv10: Password Attacks
CEHv10: Password Attacks Part 2
CEHv10: Privilege Escalation
CEHv10: Covert Data Gathering
CEHv10: Hidden Files and Covering Tracks
CEHv10: Malware Threats
CEHv10: Malware Distribution
CEHv10: Network Sniffing
CEHv10: Denial of Service
CEHv10: Session Hijacking
CEHv10: Evading IDS, Firewalls, and Honeypots
CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
CEHv10: Hacking Web Servers
CEHv10: Common Web App Threats
CEHv10: Common Web App Threats Part 2
CEHv10: Practical Web App Hacking
CEHv10: SQL Injection
CEHv10: SQL Injection Types and Tools
CEHv10: Wireless Hacking Concepts
CEHv10: Wireless Hacking Tools
CEHv10: Wireless Hacking Common Threats
CEHv10: Cracking and Mobile Hacking
CEHv10: IoT Concepts
CEHv10: IoT Attacks
CEHv10: Clouding Computing Concepts
CEHv10: Cloud Computer Attacks
CEHv10: Cryptography Concepts
CEHv10: Cryptography Concepts Part 2
CEHv10: Cryptography Concepts Part 3
CEHv10: Cryptography Attacks
CEHv10: IoT Hacking and Countermeasures

Certified Information Systems Auditor: CISA

Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice

How our courses work:

Learners need a computer, laptop or tablet and internet connection. On enrolment we issue our learners with an username and password to access their courses for a 12 month subscription. At the end of each module you will be required to answer multiple choice questions, these marks are registered in our database. Should you obtain 70% and above you will receive IT Academy Course Mastery Certification by mail, at no additional cost.

International exams are written at any Pearson Vue Testing Centre in South Africa. Discounted international exam vouchers can be purchased through IT Academy at R550.00 each.

Courses include:

Mobile ready (accessible on a Tablet or Smartphone)
Courses are printable and downloadable
Unlimited Advanced Mentoring
e-mail Support
Free Cram Tests
Discounted international exam vouchers
12 months Subscription
IT Academy Course Mastery Certification

Send Enquiry

Register Now

Free Trial

Course Reviews

What's Included


Our Training is Trusted By


Head Office: 0860 000 895
Bellville: 021 914 1789
Cape Town: 021 403 6388
Johannesburg: 011 881 5623
Fax: 021 914 1676
VAT No: 484 0244 588

  • Avanti Towers, B4 1 North Block

    35 Carl Cronje Drive, Tygerfalls, Bellville, 7435
  • 2nd Floor West Tower, Nelson Mandela Square

    Maude Street Sandown, Johannesburg, 2146
  • Dock Road Building, Cnr Stanley & Dock Rd

    Junction, V&A Waterfront, Cape Town, 8000





Terms & Conditions
© 2020 - IT Academy - All Rights Reserved