CompTIA Secure Infrastructure Specialist (CSIS)
Discover how to troubleshoot and secure IT infrastructure effectively by understanding endpoints, networks, and security as interconnected systems to resolve common operational issues.
When a laptop won’t boot, the printer is offline, the network share disappears, and a user can’t authenticate to a critical app, you are not dealing with “just a help desk issue.” You are dealing with the exact kind of everyday operational failure that the CompTIA Secure Infrastructure Specialist (CSIS) path is built to prepare you for. This course is for the person who needs to understand endpoints, networks, and security as one connected system, not three separate silos. That matters because real IT work does not wait for tidy boundaries.
CompTIA® built the CSIS stackable certification as a way to recognize practical progression. For you, that means the path starts where many careers start: with support, troubleshooting, and foundational security awareness. The certification combines the knowledge you need for CompTIA A+, CompTIA Network+, and CompTIA Security+ into one clear professional track. If you are early in your career, this is one of the smartest ways to build credibility fast, because you are not just learning isolated concepts. You are learning how systems behave under pressure and how to keep them reliable.
Why the CompTIA Secure Infrastructure Specialist (CSIS) path matters
The biggest mistake I see new IT professionals make is treating hardware, networking, and security like separate jobs. They are not. A misconfigured endpoint can expose a network. A weak network design can undermine security controls. A good password policy means very little if the workstation image is broken or the wireless segment is unstable. The CompTIA Secure Infrastructure Specialist (CSIS) path teaches you to think across those layers, which is exactly what employers want from someone they can trust with day-to-day infrastructure support.
This certification is designed for IT professionals with 0 to 2 years of experience, which makes it a strong fit if you are entering the field or formalizing skills you already use on the job. It gives structure to the “I’ve been fixing things and figuring it out as I go” phase of your career. That structure matters because employers still want proof. They want to see that you understand troubleshooting methodology, network fundamentals, security principles, and the practical realities of supporting users. CSIS gives you a pathway to earn three respected CompTIA certifications through one stackable journey.
From a career standpoint, this is not a vanity credential. It is a practical foundation for roles like:
- Help desk technician
- IT support specialist
- Desktop support analyst
- Junior network technician
- Technical support associate
- Entry-level cybersecurity support role
In many markets, these roles commonly fall into the roughly $45,000 to $75,000 range depending on geography, industry, and experience. The cert does not magically create experience, but it does make your skills easier to trust and easier to deploy.
What you actually learn in this course
This course is built to help you prepare for the full CSIS certification path by covering the knowledge areas behind A+, Network+, and Security+. That means you are not just memorizing terms. You are learning how to diagnose a failed PC, how to think about switching and routing at a working level, and how to recognize security risks before they become incidents. That combination is what makes the path valuable.
On the A+ side, you work through core hardware, operating systems, mobile devices, virtualization concepts, cloud basics, and troubleshooting. That is the day-to-day language of support. When a workstation is sluggish, the issue may be storage, RAM, malware, bad drivers, or a user profile problem. You need to know how to isolate the cause without wasting time. I care a great deal about that diagnostic discipline because it separates technicians who fix problems from technicians who merely restart things until the issue goes away.
On the Network+ side, you move into IP addressing, network devices, cabling, wireless, ports and protocols, and basic network troubleshooting. This is where many students start to see the infrastructure as a living system. You are not just learning what a router does; you are learning how to interpret symptoms when DHCP fails, DNS breaks, a switch port misbehaves, or a wireless client cannot authenticate.
On the Security+ side, you study threats, vulnerabilities, identity and access control, secure architecture concepts, incident response, and risk management. The point is not to turn you into a full-time security analyst overnight. The point is to make sure you can support systems in a way that reduces exposure and respects modern security expectations.
You should never think of security as the “last layer.” In real environments, it is part of how you build, support, and troubleshoot everything.
How CompTIA Secure Infrastructure Specialist (CSIS) fits the CompTIA career path
The CompTIA Secure Infrastructure Specialist (CSIS) designation is what is called a stackable certification. That means CompTIA recognizes that your achievement spans multiple knowledge areas and awards a credential that reflects the combined value of those exams. I like this approach because it mirrors how IT careers actually develop. You do not become useful in a single leap. You grow into the work by mastering one layer, then another, then another.
CompTIA’s stackable framework generally breaks into three stages: Specialist, Professional, and Expert. CSIS sits in the Specialist category, which is exactly where it should be for early-career professionals. If you have 0 to 2 years of experience, you need something that builds confidence without pretending you are already a senior engineer. This credential does that well. It tells employers you can support infrastructure, understand baseline networking, and apply core security principles.
This path is also useful if you are deciding whether to move deeper into networking, systems administration, or cybersecurity. CSIS gives you a broad but solid base. That matters because too many students chase a single cert without understanding the job family behind it. Here, you are building a platform. If you later pursue more advanced study, including a cios certification path or other leadership-focused training, you will be much better prepared because you already understand how operational decisions affect security and service delivery.
For anyone comparing the a+ and n+ certification route with the a+ n+ certification sequence in a broader study plan, CSIS is the thread that connects them to security. That connection is where the real professional value lives.
Exam coverage and how the certification is earned
To earn the CSIS designation, you complete the exams tied to CompTIA A+, CompTIA Network+, and CompTIA Security+. For A+, that means passing two exams: Core 1 and Core 2. Network+ requires one exam, and Security+ requires one exam. Once you have successfully passed the applicable exams, you earn the CSIS badge.
This structure is worth paying attention to because it changes how you should study. A lot of people try to approach these exams like a checklist. That is a mistake. The smarter approach is to treat them as a progression. A+ teaches you how to support endpoints and troubleshoot common user problems. Network+ teaches you how those endpoints communicate. Security+ teaches you how to protect both of them. That sequence makes sense, and if you study in that order, your learning tends to stick better.
CompTIA pricing varies by exam and can change, so you should always verify current pricing directly through CompTIA. What matters more for your planning is that this path requires commitment. You are not buying a shortcut. You are building a serious foundation. If you want a credential that says you understand the practical side of secure infrastructure, this is the work you have to do.
Skills you will carry into the job
I want you to think in terms of job performance, not just exam performance. After this course, you should be more comfortable with the tasks that matter in the real world. That includes answering tickets, supporting users, documenting changes, identifying symptoms, escalating intelligently, and protecting systems without becoming the person who blocks everything just to feel safe.
Here are some of the skills this training is meant to strengthen:
- Troubleshooting hardware and operating system issues systematically
- Understanding IP addressing, subnetting concepts, and common network services
- Identifying security weaknesses in endpoints, passwords, and user behavior
- Working with virtualization and cloud basics at a support level
- Explaining technical issues clearly to non-technical users and managers
- Using a repeatable problem-solving method instead of guessing
Those skills matter because employers do not hire you to recite definitions. They hire you to keep work moving. A technician who can isolate a fault, document the fix, and reduce repeat incidents is valuable. A technician who understands the relationship between devices, networks, and security controls is even more valuable. That is the practical edge of the CSIS path.
Who should take this course
This course is a strong fit if you are early in your IT career and want a clear next step. That includes new help desk professionals, desktop support staff, career changers entering IT, students finishing a technical program, and junior technicians who know the job but want the credential to match the skill. If you already work in support and have been exposed to multiple systems without formal training, CSIS can help you organize what you know and fill the gaps that usually trip people up on exams.
I also recommend this path if you are the kind of learner who wants breadth before specialization. Some people know they want to be a network engineer or a security analyst from day one. Most people do not. Most people need to see where they perform best. CSIS gives you enough exposure to help you decide whether you want to go deeper into infrastructure, endpoint administration, or security operations.
It is not just for students, either. If your current role has turned into “the person everyone asks when something breaks,” this course can make that responsibility more professional and more defensible. You will be better prepared to explain problems, apply standards, and make better decisions under pressure. That is a real career advantage.
Prerequisites and preparation strategy
There are no formal prerequisites for the CSIS path, but let me be blunt: starting with zero structure and expecting to pass all four exams efficiently is not a great strategy. You do not need years of experience, but you do need patience and a willingness to learn across several technical domains. If you have worked with computers, home networking gear, or basic IT support, you already have a useful base.
If you are brand new, I recommend approaching the material in layers:
- Learn hardware, operating systems, and troubleshooting fundamentals first.
- Build your networking vocabulary and understand how devices communicate.
- Study security concepts with an eye toward real-world protection and risk.
- Use practice questions to find weak areas before you schedule exams.
This course is designed to support that kind of progression. The reason that matters is simple: exam success follows understanding. You can memorize port numbers and acronyms, but if you do not understand how systems interact, the questions will feel random. Once you see the logic behind the material, the exams become much more manageable.
How this training helps you on exam day
Good exam prep is not about cramming facts until your brain feels overloaded. It is about building recognition, reducing panic, and knowing how to think when the wording gets tricky. That is especially important for CompTIA exams, which often test scenario-based judgment. You may know the concept, but the exam wants to know whether you can apply it to a realistic support situation.
This is where the connection between A+, Network+, and Security+ becomes important. If you train each domain in isolation, you may answer individual questions correctly and still miss the bigger pattern. But if you understand how endpoints, networks, and security controls work together, you can usually eliminate distractors faster. That saves time and reduces second-guessing.
Students who do well tend to do three things consistently:
- They study in focused sessions instead of marathon cramming
- They review why answers are wrong, not just why the correct answer is right
- They practice translating symptoms into likely causes
That mindset is what this path rewards. It is also why this training is more valuable than a superficial checklist course. You need usable understanding, not just test trivia.
Career value after CSIS
Once you complete the CompTIA Secure Infrastructure Specialist (CSIS) path, you have something employers understand immediately: you can support technology and you understand the security implications of that support. That combination is highly employable, especially in small and mid-sized organizations where people wear multiple hats. In those environments, the person who can troubleshoot a workstation, understand network symptoms, and recognize security red flags is often the person who gets promoted.
This credential can support your move into more specialized work later. You might decide to focus on networking, endpoint administration, systems support, or cybersecurity operations. You might also decide to continue into leadership-oriented study, including paths some people loosely refer to as cios certification preparation when they begin moving toward IT management and strategic oversight. Whatever direction you choose, CSIS gives you a more credible base than jumping straight into an advanced topic without foundation.
If you are serious about a long-term IT career, the practical value here is not just employability. It is confidence. You stop feeling like you are guessing your way through infrastructure problems. You start understanding them. That shift changes how you work, how others perceive you, and how quickly you can grow.
CompTIA® is a registered trademark of CompTIA. A+™, Network+™, Security+™, and CompTIA Secure Infrastructure Specialist (CSIS) are trademarks of CompTIA. This content is for educational purposes.
Module 1 – Devices, Setups, and Installs
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Appropriate Safety Procedures
- 1.3 PC Components
- 1.4 Guidlines for PC Disassembly
- 1.5 Motherboards
- 1.6 CPU Sockets
- 1.7 PCI Bus
- 1.8 Storage Bus (SATA and IDE)
- 1.9 Discussing PC Components
- 1.10 Common Connection Interfaces
- 1.11 Wired and Wireless Connection Standards
- 1.12 Install Peripheral Devices
- 1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 – Displays and Multimedia Devices
- 2.1 Displays and Multimedia
- 2.2 Display Device Connections and Cables
- 2.3 Discussing Display Device Installation and Configuration
- 2.4 Troubleshoot Display Devices
- 2.5 Guidelines for Troubleshooting Display Devices
- 2.6 Discussing Display Device Troubleshooting
- 2.7 Install and Configure Multimedia Devices
- 2.8 Discussing Multimedia Device Installation and Configuration
Module 3 – Supporting Multiple Drive Types
- 3.1 Supporting Multiple Drive Types and Memory
- 3.2 Memory Types
- 3.3 RAM Types
- 3.4 Memory Modules
- 3.5 DIMM and SO-DIMM Technologies
- 3.6 Parity and ECC RAM
- 3.7 Memory Compatibility Issues
- 3.8 Discussing System Memory Installation
- 3.9 Install and Configure Mass Storage Devices
- 3.10 Storage Adapters and Cables
- 3.11 Solid State Drives
- 3.12 Guidlines for Installing Mass Storage Devices
- 3.13 Discussing Mass Storage Device Installation and Configuration
- 3.14 Install and Configure Removable Storage
- 3.15 Discussing Removable Storage Device Istallation and Configuration
- 3.16 Configure RAID
- 3.17 RAID Configuration Options
- 3.18 Discussing RAID Configuration
- 3.19 Troubleshoot Storage Devices
- 3.20 Boot Failures
- 3.21 Discussing Storage Device Troubleshooting
Module 4 – Accounting for CPUs and Internal Components
- 4.1 Install Upgrade CPUs
- 4.2 Multiprocessing and Multicore Processors
- 4.3 Discussing CPU Upgrades
- 4.4 Configure and Update BIOS UEFI
- 4.5 Discussing BOIS-UEFI Configuration and Updates
- 4.6 Install Power Supplies
- 4.7 Discussing Power Supply Installation
- 4.8 Troubleshoot Internal System Components
- 4.9 POST and Boot Problems
- 4.10 Boot Troubleshooting and Log Entries
- 4.11 Motherboard Component Problems
- 4.12 Discussing System Component Troubleshooting
Module 5 – All About Network Theories
- 5.1 Wired Networks
- 5.2 Common Ethernet Network Implementations
- 5.3 Taps and Mirrors
- 5.4 Discussing Wired Networks
- 5.5 Network Hardware Devices
- 5.6 Switches
- 5.7 Power Over Ethernet
- 5.8 Discussing Network Hardware Devices
- 5.9 Wireless Networks
- 5.10 Access Points and Wireless Network Modes
- 5.11 Discussing Wireless Networks
- 5.12 Internet Connection Types
- 5.13 Wireless Internet Service Providers WISP
- 5.14 Discussing Internet Connection Types
- 5.15 Network Configuration Concepts
- 5.16 The TCIP-IP Protocol Suite
- 5.17 Internet Protocol and IP Addressing
- 5.18 Public and Private IP Addresses
- 5.19 IPv6
- 5.20 Discussing Network Configuration Concepts
- 5.21 Network Services
- 5.22 DNS
- 5.23 Dynamic and Static IP Configurations
- 5.24 DNS Records MX and A
- 5.25 Web Servers and HTTP-HTTPS
- 5.26 Discussing Network Services
Module 6 – Network Operations and Diagnostics
- 6.1 Configuring and Troubleshooting Networks
- 6.2 Network Connections in Windows
- 6.3 Install and Configure SOHO Networks
- 6.4 Configure SOHO Network Security
- 6.5 Firewalls
- 6.6 Port Fowarding and Port Triggering
- 6.7 Windows Firewall
- 6.8 Network Security and Embedded Appliances
- 6.9 Configure Remote Access
- 6.10 Discussing Remote Access Configuration
- 6.11 Troubleshoot Network Connections
- 6.12 IP Configuration Issues
- 6.13 Routing Issues
- 6.14 Discussing Network Connection Troubleshooting
Module 7 – Cloud and Virtualization Computing
- 7.1 Configure Client-Side Virtulaization
- 7.2 Hypervisors
- 7.3 Processor Support and Resource Requirements
- 7.4 Virtual Networks
- 7.5 Client-Side Virtualization
- 7.6 Cloud Computing Concepts
- 7.7 Internal and External Shared Resources
- 7.8 Cloud Service Options
- 7.9 Virtual Desktops
- 7.10 Software-Defined Networking (SDN)
- 7.11 Discussing Cloud Computing Concepts
Module 8 – Laptop Features and Troubleshooting
- 8.1 Use Laptop Features
- 8.2 Expansion Options
- 8.3 Discussing Laptop Features
- 8.4 Install and Configure Laptop Hardware
- 8.5 Discussing Laptop Hardware Installation and Configuration
- 8.6 Troubleshoot Common Laptop Issues
- 8.7 Discussing Troubleshooting Common laptop Issues
Module 9 – Syncing and Setup of Mobile Devices
- 9.1 Syncing and Setup of Mobile Devices
- 9.2 Connect and Configure Mobile Devices
- 9.3 Configure Mobile Device Network Connectivity
- 9.4 Mobile VPN Configuration
- 9.5 Email Configuration Options
- 9.6 Discussing Mobile Device Network Connectivity Configuration
- 9.7 Support Mobile Apps
- 9.8 Discussing Mobile App Support
Module 10 – All Things Printing
- 10.1 All Things Printing
- 10.2 Discussing Laser Printer Maintenance
- 10.3 Maintain Inkjet Printers
- 10.4 Discussing Inkjet Printer Maintenance
- 10.5 Maintain Impact, Thermal, and 3D Printers
- 10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
- 10.7 Install and Configure Printers
- 10.8 Discussing Printer Installation and Configuration
- 10.9 Troubleshoot Print Device Issues
- 10.10 Install and Configure Imaging Devices
- 10.11 Discussing Device Installation and Configuration
Module 11 – Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Module 1 – Operating System Management
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Identify Common Operating Systems
- 1.3 Microsoft Windows
- 1.4 Work and Education Features
- 1.5 Windows System Limits
- 1.6 Apple Operating Systems
- 1.7 Linux Disk and File Management
- 1.8 Discussing OS Types
- 1.9 Use Windows Features and Tools
- 1.10 Administrative Tools
- 1.11 Manage Files in Windows
- 1.12 System Hierarchies
- 1.13 File Attributes
- 1.14 Discussing Windows Features and Tools
- 1.15 Manage Disks in Windows
- 1.16 Discussing File Management in Windows
- 1.17 The Windows Disk Management Console
- 1.18 Discussing Windows Disk Management
- 1.19 Manage Devices in Windows
- 1.20 Device Manager
- 1.21 Discussing Windows Device Manager
Module 2 – Configuring and installing the OS
- 2.1 Configuring and Installing the OS
- 2.2 Installation Boot Methods
- 2.3 Disk Formatting and Partitioning
- 2.4 Networking Considerations
- 2.5 Post Installation Tasks
- 2.6 OS Installation Types
- 2.7 Unattended Installations
- 2.8 Maintain OSs
- 2.9 OS Updates
- 2.10 Anti-Malware Updates
- 2.11 Scheduled Backups
- 2.12 Task Schedulers part 1
- 2.13 Task Schedulers part 2
- 2.14 Install Windows 10 Demonstration
- 2.15 Discussing OS Maintenance
Module 3 – Tools to Troubleshoot and Maintain the OS
- 3.1 Install and Manage Windows Applications
- 3.2 Windows OS Tools
- 3.3 Application and Print Services
- 3.4 Task Manager
- 3.5 Manage Windows Performance
- 3.6 Windows Performance Management Tools
- 3.7 Troubleshoot Windows
- 3.8 Event Viewer
- 3.9 The System Configuration Utility
- 3.10 Troubleshooting Tips Boot Process
- 3.11 Troubleshooting Tips for Windows System Issues
- 3.12 Blue Screens and Spontaneous Shutdowns
- 3.13 Troubleshooting Tips for File and Memory Corruption
- 3.14 Safe Boot
- 3.15 System Repair Disc
- 3.16 System Restore
- 3.17 Guidelines for Troubleshooting Windows Issues
Module 4 – Network Management Tools
- 4.1 Network Management Tools
- 4.2 Network Connectivity
- 4.3 IP Addressing and Connection Types
- 4.4 Proxy Settings
- 4.5 Windows Client Configuration
- 4.6 Location Services
- 4.7 Firewalls
- 4.8 Network Troubleshooting
- 4.9 Remote Desktop Tools
- 4.10 Desktop Management and Remote Monitoring Tools
- 4.11 Disscussion Topics
Module 5 – Sharing Resources and Wrights Management
- 5.1 Sharing Resources and Wrights Management
- 5.2 User Group Accounts
- 5.3 Local Secutity Policy
- 5.4 SSO and Credential Manager
- 5.5 Workgroups and Homegroups
- 5.6 Network and Sharing Center
- 5.7 Network Share Configuration
- 5.8 NTSF File and Folder Permissions
- 5.9 Configure Active Directory Accounts and Policies
- 5.10 Domain Membership and Group Policy Objects
- 5.11 Basic AD Functions
- 5.12 Account Locks and Password Resets
Module 6 – Threats and Security Measures
- 6.1 Threats and Security Measures
- 6.2 Logical Security Concepts
- 6.3 Encryption
- 6.4 PKI and Certificates
- 6.5 Execution Control
- 6.6 NAC
- 6.7 Discussing Logical Decurity Concepts
- 6.8 Threats and Vulnerablilities
- 6.9 Types of Password Attacks
- 6.10 Discussing Threats and Vulnerabilities
- 6.11 Physical Security Controls
- 6.12 Discussing Physical Security Measures
Module 7 – Policies to Protect Data
- 7.1 Policies to Protect Data
- 7.2 Implement Security Best Practices
- 7.3 Guidlines for Implementing Security Best Practices
- 7.4 Discussing Security Best Practices Implementation
- 7.5 Implement Data Protection Policies
- 7.6 ACLs and Directory Permissions
- 7.7 Full Disk Encryption
- 7.8 Guildlines for Implementing Data Protection Policies
- 7.9 Discussing Data Protection Policies
- 7.10 Protect Data During Incident Response
- 7.11 Discussing Data Protection During Incident Response
Module 8 – Prevent Malware and Security Threats
- 8.1 Prevent Malware and Security Threats
- 8.2 Detect, Remove, and Prevent Malware
- 8.3 Trojan Horses and Spyware
- 8.4 Sources of Malware Infection
- 8.5 Best Practices for Malware Removal
- 8.6 Discussing Detecting, Removing, and Preventing Malware Infections
- 8.7 Troubleshoot Common Workstation Security Issues
- 8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 – Supporting and Troubleshooting Mobile Devices
- 9.1 Supporting and Troubleshooting Mobile Devices
- 9.2 Secure Mobile Devices
- 9.3 IOT Internet of Things
- 9.4 Discussing Mobile Device Security
- 9.5 Troubleshoot Mobile Device Issues
- 9.6 Mobile Device Security Troubleshooting
- 9.7 Discussing Troubleshooting Mobile Devices
Module 10 – Implementing Operational Procedures
- 10.1 Implementing Operational Procedures
- 10.2 Environmental Impacts and Controls
- 10.3 Discussing Environmental Impact and Controls
- 10.4 Create and Maintain Documentation
- 10.5 Discussing Documentation Creation and Maintenance
- 10.6 Use Basic Change Management Best Practices
- 10.7 Discussing Change Management Best Practices
- 10.8 Implement Disaster Prevention and Recovery Methods
- 10.9 Discussing Implement Disaster Prevention and Recovery Methods
- 10.10 Basic Scripting Concepts
- 10.11 Discussing Scripting
- 10.12 Professionalism and Communication
- 10.13 Discussing Professionalism and Communication Skills
Module 11 – Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Module 1 – Introduction to Security
- 1.1 Introduction to Security
Module 2 – Malware and Social Engineering Attacks
- 2.1 Malware and Social Engineering Attacks
Module 3 – Basic Cryptography
- 3.1 Basic Cryptography
Module 4 – Advanced Cryptography and PKI
- 4.1 Advanced Cryptography and PKI
Module 5 – Networking and Server Attacks
- 5.1 Networking and Server Attacks
Module 6 – Network Security Devices, Designs and Technology
- 6.1 Network Security Devices, Designs and Technology
Module 7 – Administering a Secure Network
- 7.1 Administering a Secure Network
Module 8 – Wireless Network Security
- 8.1 Wireless Network Security
Module 9 – Client and Application Security
- 9.1 Client and Application Security
Module 10 – Mobile and Embedded Device Security
- 10.1 Mobile and Embedded Device Security
Module 11 – Authentication and Account Management
- 11.1 Authentication and Account Management
Module 12 – Access Management
- 12.1 Access Management
Module 13 – Vulnerability Assessment and Data Security
- 13.1 Vulnerability Assessment and Data Security
Module 14 – Business Continuity
- 14.1 Business Continuity
Module 15 – Risk Mitigation
- 15.1 Risk Mitigation
Module 16 – Security Plus Summary and Review
- 16.1 – Security Plus Summary and Review
Module 17 – Hands-On Training
- 17.1 Hands-On Scanning Part 1
- 17.2 Hands-On Scanning Part 2
- 17.3 Hands-On Advanced Scanning
- 17.4 Hands-On MetaSploit
- 17.5 Hands-On BurpSuite
- 17.6 Hands-On Exploitation Tools Part 1
- 17.7 Hands-On Exploitation Tools Part 2
- 17.8 Hands-On Invisibility Tools
- 17.9 Hands-On Connect to Tor
Module 0 – Course introduction
- 0.1 Instructor Intro
- 0.2 Course Overview
Module 1 – Networking Fundamentals
- 1.1 Intro to Networking
- 1.1.1 Activity: Creating a Network
- 1.2 Common Terminology
- 1.2.1 Activity: Examining Ports and Sockets
- 1.3 OSI Model
- 1.4 DoD Model
- 1.4.1 Activity: Examining Network Layers
- 1.5 TCP, UDP, IP
- 1.5.1 Activity: Examining TCP
- 1.5.2 Activity: Examining UDP
- 1.5.3 Activity: Examining IP
- 1.6 ICMP, IGMP, ARP
- 1.6.1 Activity: Examining ICMP
- 1.6.2 Activity: Examining ARP
- 1.6.3 Activity: Examining IGMP
- 1.7 Network Topologies
- 1.8 Network Types
- 1.9 Part 1: Network Characteristics
- 1.9 Part 2: Network Characteristics
- 1.10 Module 1 outro
Module 2 – Cables and Connectors
- 2.1 Ethernet Standards
- 2.2 Copper Cable Types
- 2.3 Fiber Optic Cable Types
- 2.4 Connector Types
- 2.4.1 Activity: Selecting the Right Cable
- 2.5 Media Converters and Transceivers
- 2.6 Cable Management
- 2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
- 3.1 IPv4 Basics
- 3.2 IP Packet and Interface Types
- 3.2.1 Activity: Configuring Client IP Settings
- 3.3 Binary Numbering System
- 3.4 Classful and Classless Addressing
- 3.5 Understanding CIDR Notation
- 3.6 IPv4 Subnetting Method
- 3.7 Verifying with Binary
- 3.8 Finding Subnet IDs
- 3.8.1 Activity: Subnetting a Class C Network
- 3.9 The Delta in Action
- 3.9.1 Activity: Subnetting With the Delta
- 3.10 Subnetting Based on Hosts
- 3.11 Subnetting in Other Octets
- 3.12 Supernetting
- 3.12.1 Activity: Supernetting
- 3.13 IPv6
- 3.14 IPv4 – IPv6 Transition Mechanisms
- 3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
- 4.1 Remote Control Protocols
- 4.2 File Sharing Protocols
- 4.3 Web Protcols
- 4.4 Email Protocols
- 4.5 Database Protocols
- 4.6 Voice Protocols
- 4.7 Security Protocols
- 4.8 Management Protocols
- 4.9 Module 4 Outro
Module 5 – Network Services
- 5.1 DHCP
- 5.1.1 Activity: Configuring DHCP
- 5.1.2 Activity: Configuring a DHCP Relay Agent
- 5.2 DNS
- 5.2.1 Activity: Configuring DNS – Part 1
- 5.2.2 Activity: Configuring DNS – Part 2
- 5.3 NTP
- 5.4 Corporate and Datacenter Network Architecture
- 5.5 Cloud Concepts and Connectivity Options
- 5.6 Module 5 Outro
Module 6 – Networking Devices
- 6.1 Introductory Concepts
- 6.2 Repeaters and Hubs
- 6.2.1 Activity: Connecting Devices with a Hub
- 6.3 Bridges and Switches
- 6.3.1 Activity: Connecting Devices with a Switch
- 6.4 Routers and Multilayer Switches
- 6.5 Security Devices
- 6.6 Modems
- 6.7 Module 6 Outro
Module 7 – Networked Devices
- 7.1 IP Devices
- 7.2 IoT
- 7.2.1 Activity – Programming IoT Devices
- 7.3 ICS/SCADA
- 7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
- 8.1 Routing Basics
- 8.1.1 Activity: Configuring Static Routes
- 8.2 Packet Delivery on the Same Network
- 8.3 IP Routing Across a Single Router
- 8.4 IP Routing Across Multiple Hops
- 8.4.1 Activity: Static Routes – CHALLENGE
- 8.5 Route Selection
- 8.6 RIP
- 8.6.1 Activity: Configuring RIP – CHALLENGE
- 8.7 OSPF
- 8.8 EIGRP
- 8.9 BGP
- 8.10 NAT/PAT
- 8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
- 9.1 Ethernet Basics
- 9.2 Switching Overview
- 9.2.1 Activity: Examining a MAC Table
- 9.3 VLANs
- 9.3.1 Activity: Creating VLANs
- 9.4 VLAN Trunking
- 9.4.1 Activity: Configuring VLAN Trunking
- 9.5 VLAN Routing
- 9.5.1 Activity: Configuring VLAN Routing
- 9.6 Contention Management
- 9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
- 10.1 Wireless Overview
- 10.2 Radio Basics
- 10.3 Modulation
- 10.4 Wi-Fi Standards
- 10.5 Antennas
- 10.6 Wi-Fi Service Sets
- 10.7 Wi-Fi Security
- 10.8 Cellular
Module 11 Network Performance
- 11.1 Monitoring Performance
- 11.2 Common Metrics
- 11.2.1 Activity: Examining Interface Statistics
- 11.3 SNMP
- 11.4 Netflow
- 11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
- 12.1 HA and DR Concepts
- 12.2 High Availability Mechanisms
- 12.3 Disaster Recovery Mechanisms
- 12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
- 13.1 Plans and Procedures
- 13.2 Security Policies
- 13.3 Loss Prevention
- 13.4 Common Agreements
- 13.5 Common Documentation
- 13.6 Structured Cabling – MDF and IDF
- 13.7 Horizontal and Vertical Cabling
- 13.7.1 Activity – Implementing Cable Management
- 13.8 Labeling
- 13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
- 14.1 Common Security Concepts
- 14.2 Common Attack Types
- 14.3 Spoofing-based Attacks
- 14.4 Hijacking and MITM
- 14.5 Social Engineering
- 14.6 Network Segmentation
- 14.7 Private VLANs
- 14.8 Single Organization Authentication
- 14.9 Extending Authentication
- 14.10 Authorization
- 14.11 Network Device Hardening
- 14.12 Wireless Security
- 14.13 Remote Access Security
- 14.14 IoT Security
- 14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
- 15.1 Troubleshooting Methodology
- 15.2 Physical Connectivity Issues
- 15.3 Hardware Testing Tools
- 15.3.1 Activity – Testing an Ethernet Cable
- 15.3.2 Activity – Crimping on an RJ-45 Connector
- 15.3.3 Activity – Punching Down Twisted Pair
- 15.3.4 Activity – Using a Telephone Toner
- 15.4 Understanding Electricity
- 15.4.1 Activity – Checking Cable Continuity
- 15.4.2 Activity – Testing DC Voltage
- 15.4.3 Activity – Testing AC Voltage
- 15.5 Twisted Pair Pinout Problems
- 15.6 Twisted Pair Termination Problems
- 15.7 Repairing Damaged Twisted Pair Cable
- 15.8 Fiber Optic Connectivity Issues
- 15.8.1 Activity – Testing a Fiber Optic Cable
- 15.9 Common Port Problems
- 15.9.1 Working with Ports and Their Devices
- 15.10 Common Software Testing Tools
- 15.10.1 Activity – Scanning for Open Ports
- 15.11 Common Command Line Utilities
- 15.12 Troubleshooting Basic IP Networking Issues
- 15.13 Common Switching Issues
- 15.14 Switching Test Tools and Techniques
- 15.15 Common IP Routing Issues
- 15.16 Wi-Fi Access Point Issues
- 15.17 Wirelss Interference
- 15.17.1 Activity – Using a Spectrum Analyzer
- 15.18 Wireless Antenna Issues
- 15.18.1 Activity – Configuring a Wi-Fi Router
- 15.19 WAP Placement Strategies
- 15.20 Infrastructure Service Issues (DHCP)
- 15.21 Infrastructure Service Issues (DNS)
- 15.22 Infrastructure Service Issues (NTP)
- 15.23 Fireall / ACL Issues
- 15.24 VPN Issues
- 15.25 Additional Network Security Troubleshooting and Tips
- 15.26 Advanced Networking Issues
- 15.27 Troubleshooting Server Services (with Module 15 Outro)
- CompTIA Network+ N10-008 Course Outro
This course is included in all of our team and individual training plans. Choose the option that works best for you.
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.
Frequently Asked Questions.
What skills does the CompTIA Secure Infrastructure Specialist (CSIS) certification validate?
The CSIS certification validates a professional’s ability to manage and secure complex IT infrastructure environments. It focuses on understanding endpoints, networks, and security as interconnected components, rather than isolated silos.
Certified individuals will demonstrate skills in troubleshooting operational issues, implementing security best practices, and maintaining system integrity across various platforms. This encompasses knowledge of network security protocols, endpoint management, and incident response strategies, making them valuable for roles that require comprehensive infrastructure oversight.
Is the CSIS course suitable for those new to cybersecurity and network management?
The CSIS course is designed for IT professionals with some foundational knowledge of networking, security, or systems administration. It is not typically aimed at complete beginners but rather those looking to deepen their understanding of integrated infrastructure management.
If you have experience with basic network concepts, operating systems, or security principles, this course will enhance your ability to troubleshoot and secure complex environments. It prepares you to handle real-world operational failures, making it ideal for those seeking to advance into specialized security roles.
How does the CSIS certification differ from other CompTIA security certifications?
The CSIS certification emphasizes a holistic approach to infrastructure security, focusing on the interconnectedness of endpoints, networks, and security measures. Unlike certifications that target specific areas, such as cybersecurity or network administration, CSIS integrates these disciplines into a unified skill set.
This certification is tailored for professionals responsible for operational security and infrastructure troubleshooting, providing practical knowledge to resolve issues like network failures or authentication problems swiftly. It bridges the gap between security theory and real-world operational management.
What are the prerequisites or recommended experience before taking the CSIS course?
While there are no strict prerequisites, it is recommended that students have some experience with networking concepts, basic security practices, and systems administration. Familiarity with operating systems like Windows or Linux and understanding of network protocols will help in grasping course material more effectively.
Having hands-on experience with troubleshooting endpoints, network devices, or security tools will enable you to maximize the benefits of the course. This background supports a smoother learning curve and better prepares you for the practical scenarios covered in the curriculum.
Will completing the CSIS course help me prepare for the certification exam?
Yes, the CSIS course is specifically designed to prepare students for the CompTIA Secure Infrastructure Specialist certification exam. It covers key topics, practical skills, and troubleshooting techniques that align with the exam objectives.
Throughout the course, you’ll engage with real-world scenarios and hands-on labs that reinforce your understanding of infrastructure security and operational troubleshooting. Successful completion of the course will give you a solid foundation to pass the exam and demonstrate your expertise in managing secure IT infrastructure environments.