• 020 38 757 7827
  • info@robustittraining.com
  • Facebook:
  • LinkedIn:
  • Youtube:

Beginner Cyber Security Specialist Package

Who is this package for?

Looking into Cyber Security from a non-technical background, we would recommend completing five internationally recognised certifications that are due to be completed in an order. The certifications recommended are designed to lead onto each other in terms of information. We’ve designed this package for students with limited IT experience that can work their way up to the CEH. The CompTIA courses are highly valued and in some cases a prerequisite for any working opportunities on the MOD and DOD sites.

This training package is made up of five professional certifications, which are in high demand by employers. These are as follows:

  • Windows Server Administration Fundamentals (98-365)

  • Microsoft MTA Security Fundamentals (98-367)

  • CompTIA Network+ (N10-007)

  • CompTIA Security+ (SY0-601)

  • Certified Ethical Hacker (CEH) v11 - (312-50)


There are no Prerequisites for our Beginner Cyber Security Specialist Package although it would be helpful if you can use a pc as an end-user. This package takes you from a non-technical background and assumes no prior Knowledge.

Job Roles

The roles you can expect to start your new career are Security Administrator, Cyber Security Analyst, Security Engineer / Analyst, Cyber Threat Intelligence Analyst, IT Auditors, Cyber Security Engineer, Pen tester, DevOps / Software Developer, junior Cyber Security or Ethical Hacker.

Why choose Robust IT?

Not only are we Microsoft Gold Partners we are also partnered with CompTIA, NCSC (National Cyber Security Centre) and are a Pearson Vue testing centre. We supply training to the MOD and the DWP as well an many blue-chip companies. You can study with confidence as all of our trainers and support staff are UK based and fully certified, with many years’ experience training and providing support at all ability levels. This mean we can offer support unlike any other IT training company in the UK. For example, if you’re having difficulties we welcome all students to come in to our office and talk to our support or training staff. Or, if they prefer they can opt to have one-to-one support either online, telephone or in a classroom and go through any part of the course they wish. Being an official testing centre exams can be sat directly with us. Which means they won’t be booked via a third party, like over 80% of other training providers.

When you pass your exam you will receive official certifications from training with us, giving you the best opportunity to prepare for your chosen career.

We also have an in-house recruitment team that will support you in your endeavour, even if you are looking for a new role within the IT industry. Not just CV formatting, but your online presence and helping place you in to the work place.

How do you get started?

Our Cyber Security Training package is designed to deliver the knowledge and qualifications you need to get started on your professional cyber security journey. No previous IT experience is required and we are specialists in providing guidance to individuals as they move from beginner to expert level in a short period.

Not only will you gain industry recognised certifications but our unique recruitment advice service will help you find your first job. This includes CV and LinkedIn formatting, interview techniques, and arranging for job interviews in your local area.

See what's included

What's included?

  • Accredited training courses from CompTIA, Microsoft & CEH.
  • Official Exams for MTA Security, MTA Server, CompTIA Network+, CompTIA Security+ and CEH (5 exams)
  • Official Mock Exams
  • Livelab for your practical work
  • Live webinars
  • One to one support (in class or online)
  • Freephone support with certified trainers
  • Expert tutor support
  • Career Support
  • Recruitment support C.V and LinkedIn formatting
  • Unlimited access for 2 year
  • Official Pearson Vue test centre
  • Flexible payment options

Training certified by:

Brand 1 Brand 1 Brand 1 Brand 1 Brand 1 Brand 1
Info If you are NEW to I.T and are working towards a career as an I.T. security specialist, working with Microsoft Windows servers and network operating systems, the MTA Security Fundamentals course is the perfect starting point. it goes to teach the fundamentals you need to work in a real world environment

It is globally recognised and once passed, potential employers/companies can contact Microsoft to check your credentials and confirm your qualifications.

What to know about questions in Microsoft 98-367 Exam

Whilst the number of exam questions may change once in a while, it is approximately 30 – 50 questions. You are given 50 minutes to do the exam. The questions are in the format of multiple choice and the passing score is 70% . The main objectives of the exam is distributed in the following categories:

  • Security layers 25 to 30 %

  • Operating system security 35 - 40%

  • Understanding Network Security 20 - 25%

  • Understanding Security Software 15 – 20%
Cert Description MTA certifications are a great place to start if you would like to get in to the technology field. MTA certifications address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility. Note: MTA exams do not qualify for MCP certification, nor are they a prerequisite for MCSA or MCSD certification.

Candidates for this exam are familiar with the concepts and the technologies of Windows Server administration. Candidates should have some hands-on experience with Windows Server, Windows-based networking, Active Directory, account management, and system recovery tools and concepts.
Exam Codes Official Microsoft 98-365 Exam

Candidates must complete the 98-365 to earn certification.
What you will learn

Understand device drivers
  • Installation, removal, disabling, update/upgrade, rollback, troubleshooting, Plug & Play, IRQ, interrupts, driver signing, managing through Group Policy
Understand services
  • Which statuses a service can be in, startup types, recovery options, delayed startup, Run As settings for a service, stopping or pausing a service, service accounts, dependencies
Understand server installation options
  • Choose the correct operating system version options; Server core vs. Desktop Experience, Nano Server installation, interactive installs; automated install using WDS; VHD/VHDX installation source, perform unattended installs; perform upgrades, clean installs, and migrations

Identify application servers
  • Mail servers, database servers, collaboration servers, monitoring servers, threat management
Understand Web services
  • IIS, WWW, and FTP, installing from Server Manager, separate worker processes, adding components, sites, ports, SSL, certificates
Understand remote access
  • Remote assistance, remote administration tools, Remote Desktop Services, multipoint services, licensing, RD Gateway, VPN, application virtualization, multiple ports
Understand the file and print services
  • Local printers, network printers, printer pools, web printing, web management, driver deployment, file, folder, and share permissions vs. rights, auditing, print job management
Understand server virtualizations
  • Virtual memory, virtual networks, snapshots and saved states, physical to virtual conversions, virtual to physical conversions, VHD and VHDX formats, nested virtualization

Understand accounts and groups
  • Domain accounts, local accounts, user profiles, computer accounts, group types, default groups, group scopes, group nesting, understand AGDLP and AGUDLP processes to help implement nesting
Understand organizational units and containers
  • Purpose of OUs, purpose of containers, delegation, default containers, uses for different container objects, default hidden and visible containers
Understand Active Directory infrastructure
  • Domain controllers. forests, child domains, operation master roles, domain vs. workgroup, trust relationships, functional levels, deprecated functional levels, namespace, sites, replication, schema, Passport
Understand group policy
  • Group policy processing, Group Policy Management Console, computer policies, user policies, local policies

Identify storage technologies and their typical usage scenarios
  • Advantages and disadvantages of different storage topologies, local storage, network storage, Fibre Channel, iSCSI hardware
Understand RAID redundancy
  • RAID 0, RAID 1, RAID 5, RAID 10 and combinations, hardware and software RAID
Understand disk types
  • Solid State Drive (SSD) and Hard Disk Drive (HDD) types and comparisons, ATA basic disk, dynamic disk, mount points, file systems, mounting a virtual hard disk, distributed file systems

Identify major server hardware components
  • Memory, disk, processor, network, 32-bit and 64-bit architecture, removable drives, graphic cards, cooling, power usage, ports
Understand performance monitoring
  • Methodology, procedures, effect of network, CPU, memory and disk, creating a baseline, Performance Monitor, Resource Monitor, Task Manager, performance counters, Data Collector Sets
Understand logs and alerts, Event Viewer
  • Purpose of performance logs and alerts

Identify steps in the startup process
  • BIOS, UEFI, TPM, bootsector, bootloader, MBR, boot.ini, POST, Safe Mode
Understand business continuity
  • Backup and restore, disaster recovery planning, clustering, AD restore, folder redirection, data redundancy, uniterruptible power supply (UPS)
Understand updates
  • Software, driver, operating systems, applications, Windows Update, Windows Server Update Service (WSUS)
Understand troubleshooting methodology
  • Processes, procedures, best practices; systematic vs. specific approach, Performance Monitor, Event Viewer, Resource Monitor, Information Technology Infrastructure Library, central logging, event filtering, default logs
Info This entry level training course is designed to help you gain a solid understanding of what you’ll need to take the second step towards a career in the I.T. industry. Enabling communication with the server administrators, without having to do their role. For example understanding their language.

Whilst the number of exam questions may change once in a while, it is approximately 30 – 50 questions. You are given 50 minutes to do the exam. The questions are in the format of multiple choice and the passing score is 70% . The main objectives of the exam is distributed in the following categories:

  • Understanding server installation (10–15%)

  • Understanding server roles (25–30%)

  • Understanding active directory (20–25%)

  • Understanding storage (10–15%)

  • Understanding server performance management (10–15%)

  • Understanding server maintenance (15–20%)
Cert Description MTA certifications are a great place to start if you would like to get into the technology field. MTA certifications address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility. Note: MTA exams do not qualify for MCP certification, nor are they a prerequisite for MCSA or MCSD certification.

This exam validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies and devices, and network ports.
Exam Codes Official Microsoft 98-367 Exam

Candidates must complete the 98-367 to earn certification.
What you will learn
Understand security layers (25-30%)
Understand core security principles
  • Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
  • Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
  • Browser security settings; secure websites
Understand wireless security
  • Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

Understand operating system security (35-40%)
Understand user authentication
  • Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
  • File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
  • Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
  • Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption
  • Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Understand malware
  • Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks

Understand network security (20-25%)
Understand dedicated firewalls
  • Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
  • Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
  • Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

Understand security software (15-20%)
Understand client protection
  • Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
  • Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
  • Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)

Info CompTIA Network+ N10-007 has been updated and reorganised to address the current networking technologies with expanded coverage of several domains by adding:

  • Critical security concepts helping networking professionals work with security practitioners

  • Key cloud computing best practices and typical service models

  • Coverage of newer hardware and virtualisation techniques

  • Concepts to give individuals the combination of skills to keep the network resilient
Cert Description The CompTIA Network+ certification is a worldwide recognised qualification that validates the skills of networking professionals. The qualification recognises a technician's ability to describe the features and functions of network components and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.

This certification will verify that the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be able to configure, maintain, and troubleshoot network devices using appropriate network tools and understand the features and purpose of network technologies. Candidates will be able to make basic solution recommendations, analyse network traffic, and be familiar with common protocols and media types.

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.
Exam Codes CompTIA A+ N10-007

Candidates must complete the N10-007 to earn certification.
What you will learn
  • Networking Concepts:
    Explain the purpose of a variety of networking concepts and implement them appropriately
  • Infrastructure:
    Comprehend the financial aspects of engaging a cloud provider, as well as the business aspects of managing vendor relations in cloud adoptions.
  • Network Operations:
    Use best practices to manage the network, determine policies & ensure business continuity
  • Network Security:
    Summarize physical security & common attacks while securing the wired and wireless network
  • Network Troubleshooting & Tools:
    Explain the network troubleshooting methodology & appropriate tools to support connectivity & performances
Info CompTIA Security+ is the first security certification I.T. professionals should earn. It establishes the core knowledge required of any Cyber Security role and provides a springboard to intermediate level Cyber Security jobs. Security+ incorporates best practices and hands-on trouble shooting to ensure security professionals have practical security problem solving skills. Cyber Security professionals with Security+ know how to address security incidents, not just identify them.

Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them

  • Understand the principles of organisational security and the elements of effective security policies

  • Know the technologies and uses of cryptographic standards and products

  • Install and configure network and host-based security technologies

  • Describe how wireless and remote access security is enforced

  • Describe the standards and products used to enforce security on web and communications technologies

  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery

  • Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them
Cert Description The CompTIA Security+™ certification is designed for learners whose job responsibilities include securing network services, devices, and traffic. Our self-paced online course content will prepare you for the CompTIA Security+ examination, the SY0-601.

CompTIA’s Security+ syllabus covers the most important principles for securing a network and managing risks in a working enterprise environment. This course will build your knowledge and professional experience with computer hardware, operating systems, and networks – undertaking this training program will allow you to acquire the specific skills required to implement basic security services on any type of computer network.

This course has been built for Information Technology (IT) professionals who have networking and administrative skills in Windows-based TCP/IP networks and familiarity with operating systems such as NetWare, OS X, UNIX/Linux, and OS/2. These IT professionals will be looking to further their career in IT by acquiring a foundational knowledge of security topics and earn an official qualification as they do so.

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
Exam Codes CompTIA SY0-601

Candidates must complete SY0-601 to earn certification.
What is leanrt
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to
  • install and configure systems to secure applications

  • networks and devices

  • perform threat analysis and respond with appropriate mitigation techniques

  • participate in risk mitigation activities

  • operate with an awareness of applicable policies

  • laws and regulations
The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Cert Description A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, "To beat a hacker, you need to think like a hacker".
Exam Codes 312-50 (ECC EXAM), 312-50 (VUE)

Candidates must complete the 312-50 to earn certification.
What is leanrt
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

Request a call back

If you are interested in this beginner cyber security package get in touch with us today. One of our friendly and expert course advisors will be in touch.

Our training is trusted and accredited
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1