Train for Cyber Defense + Incident Response — With a Clear, Structured Path

A structured, live pathway through Security+, PenTest+, and CySA+ prep—built for real cybersecurity skills.

No random videos. No patchwork plan.
Just a clear, supported program that helps you build security foundations, testing skills, and incident response readiness.

Live, online training (synchronous)

180 total clock hours (bundled pathway)

Security+ + PenTest+ + CySA+ included

Mentoring by appointment + after-hours support

Recorded sessions for 24/7 review

In 30 minutes, we’ll confirm fit, map your next step, and pick the best cohort—no pressure.

Career + Certifications

Cyber Defense + Incident Response Skills. One Career-Ready Pathway.

If you want into cybersecurity, guessing is expensive.
This bundled program gives you a structured path built around three CompTIA certification tracks: Security+, PenTest+, and CySA+.

You’ll build security fundamentals, learn ethical hacking to uncover weaknesses, and develop the skills to detect, analyze, and respond to real threats—so you’re not just “learning cyber,” you’re training for the work.

Career Outcomes

CompTIA Security+

Build a strong foundation in security concepts—threat identification, risk management, secure network design, and compliance—while preparing for the Security+ exam.

CompTIA PenTest+ certification badge for cybersecurity training course focused on penetration testing, vulnerability assessment, and network security.

CompTIA PenTest+

Learn ethical hacking and penetration testing methods to uncover and help mitigate system vulnerabilities—prep built for the PenTest+ certification exam.

CompTIA CySA+ certification badge representing cybersecurity analyst training course focused on threat detection, risk management, and incident response.

CompTIA CySA+

Develop advanced skills in threat management, incident response, and security data analysis—the core of modern security operations—while preparing for the CySA+ exam.

Program Overview + Skills

What’s Included in This Program

A complete, structured pathway from security fundamentals to cyber defense and incident response across three CompTIA certification preps.

This bundled program is designed to take you from “interested in cybersecurity” to confident in the core workflows used in real security teams. You’ll train across CompTIA Security+, CompTIA PenTest+, and CompTIA CySA+, so your skills stack in the right order instead of feeling random.

You’ll start by building a solid foundation with Security+ (threat awareness, risk basics, secure practices), then learn how weaknesses are discovered and validated with PenTest+ (ethical hacking and vulnerability assessment methods). You’ll finish with CySA+ to develop threat detection, security monitoring, and incident response skills used in modern security operations.

You’ll have access to practice labs, quizzes, and exam prep resources, plus certification exam vouchers with one retake (where applicable). Support is built in—including recorded sessions for review, mentoring by appointment, after-hours support, and a mandatory onboarding session so you’re set up and ready before Day 1.

Skills You’ll Build

Program Curriculum

CompTIA Security+

What You’ll Learn — CompTIA Security+ (Curriculum • 60 Hours)

Aligned to CompTIA Security+ (SY0-701). Build job-ready skills in threat identification, risk management, secure network defense, IAM, incident response, and foundational forensics—so you can protect systems and respond to real attacks with confidence.

Module 1 — Social Engineering & Human-Based Attacks (4 hrs)

Recognize and prevent phishing, pretexting, tailgating, and impersonation—plus practical ways to reduce human-driven risk.

Module 2 — Indicators of Compromise: Application & Network Attacks (4 hrs)

Identify malware behavior, privilege escalation signals, and common attack vectors (including DoS) used to compromise systems.

Module 3 — Vulnerabilities, Security Assessments & Penetration Testing (4 hrs)

Understand vulnerabilities, misconfigurations, patching, scanning basics, and how assessment findings connect to pen testing.

Module 4 — Enterprise Security & Secure Development (4 hrs)

Secure enterprise environments with hardening strategies, secure development concepts, and security-in-the-lifecycle thinking.

Module 5 — Authentication, Authorization & Access Control (4 hrs)

Apply MFA, SSO, RBAC/ABAC concepts, and access control models to enforce the right access—no more, no less.

Module 6 — Cybersecurity Resilience & Redundancy Planning (4 hrs)

Plan for uptime using backups, high availability, fault tolerance, and disaster recovery fundamentals.

Module 7 — Physical Security, Cryptography & PKI (4 hrs)

Cover physical safeguards plus encryption, hashing, and PKI essentials used to protect data and identities.

Module 8 — Secure Protocols & Network Defense (4 hrs)

Use secure protocols (HTTPS/SSH/TLS/IPsec) and defense concepts like firewalls, VLANs, and IDS/IPS to reduce exposure.

Module 9 — Wireless, Mobile & Cloud Security (4 hrs)

Secure modern environments across wireless, mobile endpoints, and cloud models by applying practical controls and best practices.

Module 10 — Identity & Access Management (IAM) Systems (4 hrs)

Explore directory services and cloud identity concepts to implement least privilege and secure administration practices.

Module 11 — Incident Response & Mitigation Strategies (4 hrs)

Work through the incident response lifecycle: detect, contain, eradicate, recover—plus mitigation and coordination basics.

Module 12 — Digital Forensics & Evidence Handling (4 hrs)

Learn chain of custody, evidence preservation, and log/artifact analysis basics for clean, defensible incident handling.

Module 13 — Security Policies, Frameworks & Risk Management (4 hrs)

Build security governance: policies, risk assessments, and practical alignment with frameworks like NIST and ISO.

Module 14 — Privacy, Compliance & Data Protection (4 hrs)

Understand privacy and compliance fundamentals, data classification, encryption, and DLP concepts for protecting sensitive info.

Module 15 — Final Review, Practice Exam & Study Resources (4 hrs)

Targeted review, practice questions, exam strategies, and a readiness checkpoint—so you walk into the exam confident.

CompTIA PenTest+

What You’ll Learn — CompTIA PenTest+ (Curriculum • 60 Hours)

Aligned to CompTIA PenTest+ (PT0-002). Learn the penetration testing workflow end-to-end—scoping, recon, vulnerability scanning, testing techniques, and professional reporting—so you can identify weaknesses before attackers do.

Module 1 — Introduction to Penetration Testing (4 hrs)

Understand the penetration testing lifecycle, ethics, legal considerations, and how professional engagements are structured.

Module 2 — Setting Up a Penetration Testing Lab (4 hrs)

Build a safe practice lab using virtualization—set up attacker/target systems and essential tools for hands-on learning.

Module 3 — Planning & Scoping (4 hrs)

Define scope, rules of engagement, targets, timelines, and compliance boundaries so testing stays controlled and useful.

Module 4 — Information Gathering (4 hrs)

Perform reconnaissance (active + passive) to map hosts, services, and exposure points using structured methods.

Module 5 — Performing Vulnerability Scanning (4 hrs)

Run scans, interpret results, validate findings, reduce false positives, and prioritize what actually matters.

Module 6 — Exploitation Methods & Tools (4 hrs)

Learn exploitation concepts and common methods used to validate risk—plus the thinking behind post-exploitation steps.

Module 7 — Network Attacks & Attack Vectors (4 hrs)

Explore network-layer attack concepts (MITM, spoofing, DoS) and how insecure services and configs create openings.

Module 8 — Wireless & Specialized Systems Attack Vectors (4 hrs)

Cover wireless attack concepts and risks across IoT/specialized environments where small gaps become big incidents.

Module 9 — Application-Based Attack Vectors & Attacks (4 hrs)

Understand web/app testing concepts like injection and XSS—how weaknesses are discovered, validated, and documented.

Module 10 — Host Attack Vectors & Cloud Technologies Attacks (4 hrs)

Learn endpoint and cloud attack concepts, including misconfigurations and access weaknesses that expose sensitive data.

Module 11 — Social Engineering & Physical Attacks (4 hrs)

Understand how human and physical tactics are assessed ethically—plus controls organizations use to reduce those risks.

Module 12 — Reporting & Communication (4 hrs)
CompTIA CySA+

What You’ll Learn — CompTIA CySA+ (Curriculum • 60 Hours)

Aligned to CompTIA CySA+ (CS0-002). Develop practical skills in threat detection, security monitoring, vulnerability management, and incident response—the day-to-day workflow used in modern security operations (SOC).

Module 1 — Enterprise Threats & Vulnerabilities (4 hrs)

Identify and prioritize enterprise threats (including insider and supply chain risks) using structured analysis approaches.

Module 2 — Utilizing Threat Data & Intelligence (4 hrs)

Apply threat intelligence concepts to strengthen detection decisions—sources, context, and operational use.

Module 3 — Vulnerability Management (4 hrs)

Run the full lifecycle: discovery, prioritization, remediation tracking, and verification—so fixes reduce real risk.

Module 4 — Cloud Computing & Assessment Tools (4 hrs)

Assess cloud environments for risks and misconfigurations using practical benchmarks and assessment tooling concepts.

Module 5 — Infrastructure Controls (Part 1) (4 hrs)

Understand essential controls: segmentation concepts, endpoint protection, logging fundamentals, and visibility best practices.

Module 6 — Infrastructure Controls (Part 2) (4 hrs)

Go deeper with SIEM, IDS/IPS concepts, deception approaches, and modern strategies like Zero Trust.

Module 7 — Software & Hardware Assurance Best Practices (4 hrs)

Reduce attack surface with secure coding/testing concepts and device integrity protections (Secure Boot/TPM concepts).

Module 8 — Security Monitoring Through Data Analysis (4 hrs)

Analyze logs and alerts, baseline normal behavior, and detect anomalies—core skills used daily in SOC environments.

Module 9 — Security Operations (4 hrs)

Learn the workflow: alert triage, ticket escalation, playbooks, tuning concepts, shift handoffs, and operational discipline.

Module 10 — Incident Response Planning & Procedures (Part 1) (4 hrs)

Build response foundations: policies, roles, communication plans, and runbooks for consistent execution.

Module 11 — Incident Response Planning & Procedures (Part 2) (4 hrs)

Create detailed workflows for scenarios like phishing, ransomware, DDoS, and insider threats—classification included.

Module 12 — Responding to a Cyber Incident (Part 1) (4 hrs)

Practice response actions: containment and recovery steps, evidence preservation concepts, and stakeholder communication basics.

Module 13 — Responding to a Cyber Incident (Part 2) (4 hrs)

Advance response with root cause thinking, post-incident reviews, and clear after-action documentation.

Module 14 — Risk Mitigation (4 hrs)

Apply practical mitigation planning to reduce likelihood and impact—structured, measurable, and aligned to business needs.

Module 15 — Data Protection & Privacy (4 hrs)

Protect sensitive data with classification, encryption, and DLP concepts—plus privacy and regulatory awareness basics.

LIVE, INSTRUCTOR‑LED TRAINING • BUILT‑IN SUPPORT • INDUSTRY‑ALIGNED

Training Format

Classes are delivered live, instructor‑led online with real‑time lectures, demonstrations, guided practice, and interactive participation. All live sessions are recorded for 24/7 access, and a mandatory onboarding session ensures you’re fully set up before Day 1.

Student Support

IT students get practice labs, quizzes, exams, and vouchers (where applicable), plus individual mentoring by appointment, after‑hours support, and career coaching for résumé support, interview prep, and job search strategies.

Why Access Computer Training

Licensed by the Florida Department of Education, Commission for Independent Education (CIE #5237) and a CompTIA Authorized Partner using official curriculum aligned to certification objectives; ACT is also a certified woman‑owned small business focused on workforce‑relevant training and student support.

Fit Check + FAQ

Is This Program a Good Fit?

If you want a clear, beginner-friendly path into cybersecurity—without wasting months piecing things together—this program gives you structure: Security+ first, then PenTest+, then CySA+.

, Network+, and Security+.

FAQ

What certifications are included?

This bundled program includes three CompTIA certification prep tracks: Security+, PenTest+, and CySA+. You’ll follow a clear sequence—foundation → testing → defense & response—so your skills build in the right order.

How is the program delivered?

Training is live, instructor-led, and online (synchronous). You attend scheduled sessions in real time, ask questions as you go, and get guided instruction instead of trying to piece everything together alone.

What support is included?

You’ll have access to practice resources (labs, quizzes, and exam prep tools), plus individual mentoring by appointment and after-hours support—so when you get stuck, you have help to keep moving.

Are classes recorded?

Yes. Sessions are recorded and available for 24/7 review. You can rewatch difficult topics, reinforce what you learned, and catch up quickly if you miss a session.

What do I need before starting?

Before Day 1, you’ll complete a mandatory onboarding session to make sure your setup and access are ready. You’ll need a Windows PC, reliable internet, and ideally dual monitors (or a second device) for smooth participation during live training.

NOT SURE WHICH TRAINING PATH IS RIGHT FOR YOU?

Book a Free 30-Minute Career Strategy Call

In a free 30-minute call, we’ll learn about your goals, experience, and career direction—then help you choose the program, certifications, and next steps that make the most sense for you.