• 02038757827
  • info@robustittraining.com
  • Facebook:
  • LinkedIn:
  • Youtube:

Beginner Cyber Security Specialist Package

Who is this package for?

Our Beginner Cyber Security Package is for anyone who wants to complete 5 Internationally Recognised Certifications that will help them in their Cyber career! These certifications will help you in your future career, validating your Cyber skills and knowledge. They are due to be completed in order, and are designed to lead onto each other in terms of information.

We have designed this package for students with limited IT experience, so that you can start your journey right at the beginning and work up to the CEH!

This training package is made up of five professional certifications, which are are in high demand by employers. These are as follows:

  • Microsoft Security, Compliance, and Identity Fundamentals (SC-900)

  • Microsoft Azure Fundamentals (AZ-900)

  • CompTIA Network+ (N10-007)

  • CompTIA Security+ (SY0-601)

  • Certified Ethical Hacker (CEH) v11 - (312-50)

Do I need prior experience or knowledge in IT or Cyber Security?

There are no prerequisites for our Beginner Cyber Security Package, as this package will take you from beginner to expert and assumes no prior knowledge.

You do not need to have any background or experience in IT or Cyber Security, or have done any prior courses. Do not worry if you are completely new to this industry, and to using computers and technology at an advanced level.

Although it is helpful if you can use a PC as an end-user to some level.

Job Roles

You can go into many different positions after completing our Beginner Cyber Security Package.

There are Cyber roles in most companies out there, as every company needs someone to protect their data and information!

Just some of the roles that you could go into are : Security Administrator, Cyber Security Analyst, Security Engineer / Analyst, Cyber Threat Intelligence Analyst, IT Auditors, Cyber Security Engineer, Pen tester, DevOps / Software Developer, junior Cyber Security or Ethical Hacker.

See what's included

What's included?

  • Accredited training courses from CompTIA, Microsoft & CEH.
  • Official Exams for Microsoft, CompTIA Network+, CompTIA Security+ and CEH (5 exams)
  • Official Mock Exams
  • Livelab for your practical work
  • Live webinars
  • One to one support (in class or online)
  • Freephone support with certified trainers
  • Expert tutor support
  • Career Support
  • Recruitment support C.V and LinkedIn formatting
  • Unlimited access for 1 year
  • Official Pearson Vue test centre
  • Flexible payment options

Why choose Robust IT?

Robust IT have delivered courses to thousands of students from different backgrounds, and we are continuing to grow and expand and offer more courses and better options for our students!

Robust IT was founded with the mission statement to offer a route into IT for everyone – regardless of background, experience, and financial situation.

Not only are we Microsoft Gold Partners, but we are also partnered with CompTIA, NCSC (National Cyber Security Centre) and are a Pearson Vue testing centre.

You can study with confidence when you enroll with us, as all of our trainers and support staff are UK based and fully certified, with many years’ experience training and providing support at all ability levels.

You can work to your own budget and schedule, and we have training centres in London, Essex, Birmingham, and Manchester, as well as online training that you can access anytime from anywhere. When you pass your exams you will receive Official Industry-Recognised Certifications, giving you the best opportunity to prepare for your future carer!

We also have an in-house Recruitment team, that will help you look for your first role in the industry and help you with your CV, cover letters, LinkedIn, job applications etc.

How do you get started?

Our Cyber Security Training package is designed to deliver the knowledge and qualifications you need to get started on your professional cyber security journey. No previous IT experience is required and we are specialists in providing guidance to individuals as they move from beginner to expert level in a short period.

Not only will you gain industry recognised certifications but our unique recruitment advice service will help you find your first job. This includes CV and LinkedIn formatting, interview techniques, and arranging for job interviews in your local area.

What is the average salary for Cyber Security jobs?

Salary will depend on your position, and where you work. In the Cyber industry your salary can increase fast, and you can make your way up the ladder quicker than in other industries!

A Cyber Security Engineer on average can expect to earn around £55k p.a, whilst a Chief Information Security Officer (CISO) can expect to earn up to £110k p.a. Some Cyber roles are on a self-employed basis, and day rates can range from £500 - £2,000 depending on the company and your experience.

The earning potential is huge, and if you want to be a part of it then our Beginner Cyber Security package will help you get there.

Organisations that have placed their trust in us:

Brand 1 Brand 1 Brand 1 Brand 1 Brand 1 Brand 1
Info This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.

This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.

Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

  • Describe the concepts of security, compliance, and identity (5-10%)

  • Describe the capabilities of Microsoft identity and access management solutions (25-30%)

  • Describe the capabilities of Microsoft security solutions (30-35%)

  • Describe the capabilities of Microsoft compliance solutions (25-30%)
Cert Description This exam measures your ability to describe the following: concepts of security, compliance, and identity; capabilities of Microsoft identity and access management solutions; capabilities of Microsoft security solutions; and capabilities of Microsoft compliance solutions.
Exam Codes Official Microsoft SC-900 Exam
What you will learn

Describe security methodologies
  • describe the Zero-Trust methodology

  • describe the shared responsibility model

  • define defense in depth
Describe security concepts
  • describe common threats

  • describe encryption
Describe Microsoft Security and compliance principles
  • describe Microsoft's privacy principles

  • describe the offerings of the service trust portal

Define identity principles/concepts
  • define identity as the primary security perimeter

  • define authentication

  • define authorization

  • describe what identity providers are

  • describe what Active Directory is

  • describe the concept of Federated services

  • define common Identity Attacks
Describe the basic identity services and identity types of Azure ADs
  • describe what Azure Active Directory is

  • describe Azure AD identities (users, devices, groups, service principals/applications)

  • describe what hybrid identity is

  • describe the different external identity types (Guest Users)
Describe the authentication capabilities of Azure AD
  • describe the different authentication methods

  • describe self-service password reset

  • describe password protection and management capabilities

  • describe Multi-factor Authentication

  • describe Windows Hello for Business
Describe access management capabilities of Azure AD
  • describe what conditional access is

  • describe uses and benefits of conditional access

  • describe the benefits of Azure AD roles
Describe the identity protection & governance capabilities of Azure AD
  • describe what identity governance is

  • describe what entitlement management and access reviews is

  • describe the capabilities of PIM

  • describe Azure AD Identity Protection

Describe basic security capabilities in Azure
  • describe Azure Network Security groups

  • describe Azure DDoS protection

  • describe what Azure Firewall is

  • describe what Azure Bastion is

  • describe what Web Application Firewall is

  • describe ways Azure encrypts data
Describe security management capabilities of Azure
  • describe the Azure Security center

  • describe Azure Secure score

  • describe the benefit and use cases of Azure Defender - previously the cloud workload protection platform (CWPP)

  • describe Cloud security posture management (CSPM)

  • describe security baselines for Azure
Describe security capabilities of Azure Sentinel
  • define the concepts of SIEM, SOAR, XDR

  • describe the role and value of Azure Sentinel to provide integrated threat protection
Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat Protection)
  • describe Microsoft 365 Defender services

  • describe Microsoft Defender for Identity (formerly Azure ATP)

  • describe Microsoft Defender for Office 365 (formerly Office 365 ATP)

  • describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)

  • describe Microsoft Cloud App Security
Describe security management capabilities of Microsoft 365
  • describe the Microsoft 365 Security Center

  • describe how to use Microsoft Secure Score

  • describe security reports and dashboards

  • describe incidents and incident management capabilities
Describe endpoint security with Microsoft Intune
  • describe what Intune is

  • describe endpoint security with Intune

  • describe the endpoint security with the Microsoft Endpoint Manager admin center

Describe the compliance management capabilities in Microsoft
  • describe the compliance center

  • describe compliance manager

  • describe use and benefits of compliance score
Describe information protection and governance capabilities of Microsoft 365
  • describe data classification capabilities

  • describe the value of content and activity explorer

  • describe sensitivity labels

  • describe Retention Polices and Retention Labels

  • describe Records Management

  • describe Data Loss Prevention
Describe insider risk capabilities in Microsoft 365
  • describe Insider risk management solution

  • describe communication compliance

  • describe information barriers

  • describe privileged access management

  • describe customer lockbox
Describe the eDiscovery capabilities of Microsoft 365
  • describe the purpose of eDiscovery

  • describe the capabilities of the content search tool

  • describe the core eDiscovery workflow

  • describe the advanced eDisovery workflow
Describe the audit capabilities in Microsoft 365
  • describe the core audit capabilities of M365

  • describe purpose and value of Advanced Auditing
Describe resource governance capabilities in Azure
  • describe the use of Azure Resource locks

  • describe what Azure Blueprints is

  • define Azure Policy and describe its use cases

  • describe cloud adoption framework
Info Candidates for this exam should have foundational knowledge of cloud services and how those services are provided with Microsoft Azure. The exam is intended for candidates who are just beginning to work with cloud-based solutions and services or are new to Azure.

Azure Fundamentals exam is an opportunity to prove knowledge of cloud concepts, Azure services, Azure workloads, security and privacy in Azure, as well as Azure pricing and support. Candidates should be familiar with the general technology concepts, including concepts of networking, storage, compute, application support, and application development.

Azure Fundamentals can be used to prepare for other Azure role-based or specialty certifications, but it is not a prerequisite for any of them.

  • Describe cloud concepts (20-25%)

  • Describe core Azure services (15-20%)

  • Describe core solutions and management tools on Azure (10-15%)

  • Describe general security and network security features (10-15%)

  • Describe identity, governance, privacy, and compliance features (20-25%)

  • Describe Azure cost management and Service Level Agreements (10-15%)
Cert Description This exam measures your ability to describe the following concepts: cloud concepts; core Azure services; core solutions and management tools on Azure; general security and network security features; identity, governance, privacy, and compliance features; and Azure cost management and Service Level Agreements.
Exam Codes Official Microsoft AZ-90-0 Exam
What you will learn

Identify the benefits and considerations of using cloud services
  • identify the benefits of cloud computing, such as High Availability, Scalability, Elasticity, Agility, and Disaster Recovery

  • dentify the differences between Capital Expenditure (CapEx) and Operational Expenditure (OpEx)

  • describe the consumption-based model
Describe the differences between categories of cloud services
  • describe the shared responsibility model

  • describe Infrastructure-as-a-Service (IaaS)

  • describe Platform-as-a-Service (PaaS)

  • describe serverless computing

  • describe Software-as-a-Service (SaaS)

  • identify a service type based on a use case

Describe the differences between types of cloud computing
  • define cloud computing

  • describe Public cloud

  • describe Private cloud

  • describe Hybrid cloud

  • compare and contrast the three types of cloud computing

Describe the core Azure architectural components
  • describe the benefits and usage of Regions and Region Pairs

  • describe the benefits and usage of Availability Zones

  • describe the benefits and usage of Resource Groups

  • describe the benefits and usage of Subscriptions

  • describe the benefits and usage of Management Groups

  • describe the benefits and usage of Azure Resource Manager

  • explain Azure resources
Describe core resources available in Azure
  • describe the benefits and usage of Virtual Machines, Azure App Services, Azure Container Instances (ACI), Azure Kubernetes Service (AKS), and Windows Virtual Desktop

  • describe the benefits and usage of Virtual Networks, VPN Gateway, Virtual Network peering, and ExpressRoute

  • describe the benefits and usage of Container (Blob) Storage, Disk Storage, File Storage, and storage tiers

  • describe the benefits and usage of Cosmos DB, Azure SQL Database, Azure Database for MySQL, Azure Database for PostgreSQL, and SQL Managed Instance

  • describe the benefits and usage of Azure Marketplace

Describe core solutions available in Azure
  • describe the benefits and usage of Internet of Things (IoT) Hub, IoT Central, and Azure Sphere

  • describe the benefits and usage of Azure Synapse Analytics, HDInsight, and Azure Databricks

  • describe the benefits and usage of Azure Machine Learning, Cognitive Services and Azure Bot Service

  • describe the benefits and usage of serverless computing solutions that include Azure Functions and Logic Apps

  • describe the benefits and usage of Azure DevOps, GitHub, GitHub Actions, and Azure DevTest Labs
Describe Azure management tools
  • describe the functionality and usage of the Azure Portal, Azure PowerShell, Azure CLI, Cloud Shell, and Azure Mobile App

  • describe the functionality and usage of Azure Advisor

  • describe the functionality and usage of Azure Resource Manager (ARM) templates

  • describe the functionality and usage of Azure Monitor

  • describe the functionality and usage of Azure Service Health

Describe Azure security features
  • describe basic features of Azure Security Center, including policy compliance, security alerts, secure score, and resource hygiene

  • describe the functionality and usage of Key Vault

  • describe the functionality and usage of Azure Sentinel

  • describe the functionality and usage of Azure Dedicated Hosts
Describe Azure network security
  • describe the concept of defense in depth

  • describe the functionality and usage of Network Security Groups (NSG)

  • describe the functionality and usage of Azure Firewall

  • describe the functionality and usage of Azure DDoS protection

Describe core Azure identity services
  • explain the difference between authentication and authorization

  • define Azure Active Directory

  • describe the functionality and usage of Azure Active Directory

  • describe the functionality and usage of Conditional Access, Multi-Factor Authentication (MFA), and Single Sign-On (SSO)
Describe Azure governance features
  • describe the functionality and usage of Role-Based Access Control (RBAC)

  • describe the functionality and usage of resource

  • describe the functionality and usage of tags

  • describe the functionality and usage of Azure Policy

  • describe the functionality and usage of Azure Blueprints

  • describe the Cloud Adoption Framework for Azure
Describe privacy and compliance resources
  • describe the Microsoft core tenets of Security, Privacy, and Compliance

  • describe the purpose of the Microsoft Privacy Statement, Product Terms site, and Data Protection Addendum (DPA)

  • describe the purpose of the Trust Center

  • describe the purpose of the Azure compliance documentation

  • describe the purpose of Azure Sovereign Regions (Azure Government cloud services and Azure China cloud services)

Describe methods for planning and managing costs
  • identify factors that can affect costs (resource types, services, locations, ingress and egress traffic)

  • identify factors that can reduce costs (reserved instances, reserved capacity, hybrid use benefit, spot pricing)

  • describe the functionality and usage of the Pricing calculator and the Total Cost of Ownership (TCO) calculator

  • describe the functionality and usage of Azure Cost Management
Describe Azure Service Level Agreements (SLAs) and service lifecycles
  • describe the purpose of an Azure Service Level Agreement (SLA)

  • identify actions that can impact an SLA (i.e. Availability Zones)

  • describe the service lifecycle in Azure (Public Preview and General Availability)
Info CompTIA Network+ N10-007 has been updated and reorganised to address the current networking technologies with expanded coverage of several domains by adding:

  • Critical security concepts helping networking professionals work with security practitioners

  • Key cloud computing best practices and typical service models

  • Coverage of newer hardware and virtualisation techniques

  • Concepts to give individuals the combination of skills to keep the network resilient
Cert Description The CompTIA Network+ certification is a worldwide recognised qualification that validates the skills of networking professionals. The qualification recognises a technician's ability to describe the features and functions of network components and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.

This certification will verify that the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be able to configure, maintain, and troubleshoot network devices using appropriate network tools and understand the features and purpose of network technologies. Candidates will be able to make basic solution recommendations, analyse network traffic, and be familiar with common protocols and media types.

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.
Exam Codes CompTIA A+ N10-007

Candidates must complete the N10-007 to earn certification.
What you will learn
  • Networking Concepts:
    Explain the purpose of a variety of networking concepts and implement them appropriately
  • Infrastructure:
    Comprehend the financial aspects of engaging a cloud provider, as well as the business aspects of managing vendor relations in cloud adoptions.
  • Network Operations:
    Use best practices to manage the network, determine policies & ensure business continuity
  • Network Security:
    Summarize physical security & common attacks while securing the wired and wireless network
  • Network Troubleshooting & Tools:
    Explain the network troubleshooting methodology & appropriate tools to support connectivity & performances
Info CompTIA Security+ is the first security certification I.T. professionals should earn. It establishes the core knowledge required of any Cyber Security role and provides a springboard to intermediate level Cyber Security jobs. Security+ incorporates best practices and hands-on trouble shooting to ensure security professionals have practical security problem solving skills. Cyber Security professionals with Security+ know how to address security incidents, not just identify them.

Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them

  • Understand the principles of organisational security and the elements of effective security policies

  • Know the technologies and uses of cryptographic standards and products

  • Install and configure network and host-based security technologies

  • Describe how wireless and remote access security is enforced

  • Describe the standards and products used to enforce security on web and communications technologies

  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery

  • Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them
Cert Description The CompTIA Security+™ certification is designed for learners whose job responsibilities include securing network services, devices, and traffic. Our self-paced online course content will prepare you for the CompTIA Security+ examination, the SY0-601.

CompTIA’s Security+ syllabus covers the most important principles for securing a network and managing risks in a working enterprise environment. This course will build your knowledge and professional experience with computer hardware, operating systems, and networks – undertaking this training program will allow you to acquire the specific skills required to implement basic security services on any type of computer network.

This course has been built for Information Technology (IT) professionals who have networking and administrative skills in Windows-based TCP/IP networks and familiarity with operating systems such as NetWare, OS X, UNIX/Linux, and OS/2. These IT professionals will be looking to further their career in IT by acquiring a foundational knowledge of security topics and earn an official qualification as they do so.

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
Exam Codes CompTIA SY0-601

Candidates must complete SY0-601 to earn certification.
What is leanrt
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to
  • install and configure systems to secure applications

  • networks and devices

  • perform threat analysis and respond with appropriate mitigation techniques

  • participate in risk mitigation activities

  • operate with an awareness of applicable policies

  • laws and regulations
The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Cert Description A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, "To beat a hacker, you need to think like a hacker".
Exam Codes 312-50 (ECC EXAM), 312-50 (VUE)

Candidates must complete the 312-50 to earn certification.
What is leanrt
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

Request a call back

If you are interested in this beginner cyber security package get in touch with us today. One of our friendly and expert course advisors will be in touch.

Organisations that have placed their trust in us
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1