CompTIA A+, Network+ & Security+ Course

Break into the high pay, high demand field of information and network security.

Register for this course by October 24 and take 20% off tuition. Certain limitations apply.*



Towson University's CompTIA A+, Network+ and Security+ Course is an entry-level program that will prepare you to sit for four certification exams — CompTIA A+ (Core 1 and Core 2), Network+ and Security+ — all of which are included in the tuition and built into the course schedule.

Total Hours: 162

  • A+: 66 hrs (48 course hours; 12 review hours)
  • Net+: 66 hrs (48 course hours; 12 review hours)
  • Sec+: 48 hrs (30 course hours; 12 review hours)


  • CompTIA A+, Network+ & Security+ Course–$4,799 includes all books, support materials, and exams
  • A+ section only: $2,499
  • Net+ section only: $2,199
  • Sec+ section only: $2,199

Register for this course at least 30 days in advance of the start date and receive a 5% discount on the price. Note: WIOA, G.I. Bill® and other tuition assistance programs are not eligible for this discount.

Location: This course will be taught live, online.

To be WIOA approved, students must register for each certification class individually. The bundled program (all three courses purchased together) is not WIOA approved.

Course Upcoming Dates Register
Bundled program (all three included) October 25, 2021–May 21, 2022
Monday/Wednesday, 6–9 p.m.
CompTIA A+ October 25, 2021–January 17, 2022
Monday/Wednesday, 6–9 p.m.
CompTIA Network+ January 19–March 30, 2022
Monday/Wednesday, 6–9 p.m.
CompTIA Security+ April 4–May 21, 2022
Monday/Wednesday, 6–9 p.m.


We create opportunities for Greater Baltimore’s Workforce. 

Learn More

Have questions? We have answers.

Request Information

More about this Course

TU’s CompTIA A+, Network+ and Security+ Course is an entry level program that bundles three certifications—CompTIA A+, Network+ and Security+—into a comprehensive program. These certifications are recognized worldwide in all IT-related industries and form the foundation of hiring requirements necessary to pursue a career in information technology.

  • Each course section includes 12 hours of dedicated, in-class time to review exam content with instructors at the close of each section.
  • Exams are integrated into the course schedule and students are expected to take the exams at the close of each section.
  • Exams are administered in Towson following the end of each section.

About CompTIA A+ Certification

The CompTIA A+ certification is the industry standard for establishing a career in IT. The performance-based exams certify foundational IT skills across a variety of devices and operating systems.

About CompTIA Network+ Certification

The CompTIA Network+ certification is a mid-level certification for network technicians. The Network+ exam tests the skills needed to design, configure, manage and troubleshoot any wired and wireless devices. In order to receive the Network+ certification, you must pass one exam.

About CompTIA Security+ Certification

Security is one of the fastest-growing fields in IT. The CompTIA Security+ certification is an international, vendor-neutral certification that demonstrates core competencies required for any cybersecurity role and prepares you for intermediate-level cybersecurity jobs. In order to receive the Security+ certification, you must pass one exam.

A+ Core 1

Module 1. PC Components

  • Use Appropriate Safety Procedures
  • PC Components
  • Common Connection Interfaces
  • Install Peripheral Devices
  • Troubleshooting Methodology

Module 2. Display and Multimedia Devices

  • Install and Configure Display Devices
  • Troubleshoot Display Devices
  • Install and Configure Multimedia Devices

Module 3. Storage Devices

  • Install System Memory
  • Install and Configure Mass Storage Devices
  • Install and Configure Removable Storage
  • Configure RAID
  • Troubleshoot Storage Devices

Module 4. Internal System Components

  • Install and Upgrade CPUs
  • Configure and Update BIOS/UEFI
  • Install Power Supplies
  • Troubleshoot Internal System Components
  • Configure a Custom PC

Module 5. Network Infrastructure Concepts

  • Wired Networks
  • Network Hardware Devices
  • Wireless Networks
  • Internet Connection Types
  • Network Configuration Concepts
  • Network Services

Module 6. Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connections
  • Install and Configure IoT Devices

Module 7. Client Virtualization and Cloud Computing

  • Configure Client-Side Virtualization
  • Cloud Computing Concepts

Module 8. Laptops

  • Use Laptop Features
  • Install and Configure Laptop Hardware
  • Troubleshoot Common Laptop Issues

Module 9. Mobile Devices

  • Mobile Device Types
  • Connect and Configure Mobile Device Accessories
  • Configure Mobile Device Network Connectivity
  • Support Mobile Apps

Module 10. Print Devices

  • Maintain Laser Printers
  • Maintain Inkjet Printers
  • Maintain Impact, Thermal, and 3D Printers
  • Install and Configure Printers
  • Troubleshoot Print Device Issues
  • Install and Configure Imaging Devices

A+ Core 2

Module 1. Supporting Operating Systems

  • Identify Common Operating Systems
  • Use Windows Features and Tools
  • Manage Files in Windows
  • Manage Disks in Windows
  • Manage Devices in Windows

Module 2. Operating Systems

  • Configure and Use Linux
  • Configure and Use macOS
  • Install and Upgrade Operating Systems
  • Maintain OSs

Module 3. Microsoft Windows

  • Install and Manage Windows Applications
  • Manage Windows Performance
  • Troubleshoot Windows

Module 4. Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connections

Module 5. Managing Users, Workstations, and Shared Resources

  • Manage Users
  • Configure Shared Resources
  • Configure Active Directory Accounts and Policies

Module 6. Security Concepts

  • Logical Security Concepts
  • Threats and Vulnerabilities
  • Physical Security Measures

Module 7. Securing Workstations and Data

  • Implement Security Best Practices
  • Implement Data Protection Policies
  • Protect Data During Incident Response

Module 8. Workstation Security Issues

  • Detect, Remove, and Prevent Malware
  • Troubleshoot Common Workstation Security Issues

Module 9. Mobile Devices

  • Secure Mobile Devices
  • Troubleshoot Mobile Device Issues

Module 10. Implementing Operational Procedures

  • Use Appropriate Safety Procedures
  • Environmental Impacts and Controls
  • Create and Maintain Documentation
  • Use Basic Change Management Best Practices
  • Implement Disaster Prevention and Recovery Methods
  • Basic Scripting Concepts
  • Professionalism and Communication

Network +

Module 1. Network Basics

  • Network concepts
  • Network architectures
  • The OSI model

Module 2. Wired Computer to Computer Connections

  • Wired network connections
  • Network interface cards and modems

Module 3. Network-to-Network Connections

  • Network-to-network connection components
  • LAN wiring
  • LAN wiring tests

Module 4. Wired Internetworking Devices

  • Basic internetworking devices
  • Specialized internetworking devices

Module 5. Wired Communication Standards

  • The TCP/IP protocol suite
  • TCP/IP
  • DHCP servers

Module 6. Wireless Networking

  • Wireless network devices
  • Wireless networking standards
  • Wireless configuration

Module 7. Security Threats and Mitigation

  • Security threats
  • Threat mitigation

Module 8. Security Practices

  • Operating systems
  • Devices

Module 9. Network Access Control

  • Authentication
  • Public key cryptography
  • Remote access
  • Wireless security

Module 10. Monitoring

  • Monitoring resources
  • Event viewer

Module 11. Troubleshooting

  • Troubleshooting basics
  • Troubleshooting the network
  • Troubleshooting scenarios

Security +

Module 1. Risk, Infrastructure, and Connectivity

  • Risk Assessment
  • Developing Policies, Standards, and Guidelines
  • Risks Associated with Cloud Computing
  • Understanding Control Types
  • Incident Management
  • Infrastructure and Connectivity
  • Mastering TCP/IP
  • Distinguishing Between Security Topologies
  • IPv4 vs. IPv6
  • Understanding Remote Access

Module 2. Network Security

  • Protecting Networks
  • Monitoring and Diagnosing Networks
  • Intrusion Detection Systems
  • Protocol Analyzers
  • Securing Workstations
  • Threats and Vulnerabilities
  • Software Exploitation
  • Surviving Malicious Code
  • Calculating Attack Strategies
  • Recognizing Common Attacks

Module 3. Access Control and Protecting the User

  • Access Control Basics
  • Identity Management
  • Remote Access Connectivity
  • Authentication Services
  • Educating and Protecting the User Security Awareness Training
  • Classifying Information
  • Complying with Privacy and Security Regulations
  • Social Engineering
  • Types of Social Attacks

Module 4. Application, Cryptography, and Host Security

  • Operating Systems and Application Security
  • Hardening the Operating System
  • Working with Data Repositories
  • Host Security
  • Mobile Devices
  • Cryptography Basics
  • Cryptography Algorithms
  • Cryptographic Systems
  • Cryptography Implementations
  • Public Key Infrastructure Page 6 of 6
  • Preparing for Cryptographic Attacks
  • Key Life Cycle

Module 5. Physical Security and Network Vulnerabilities

  • Physical and Hardware-Based Security
  • Implementing Access Control’
  • Maintaining Environmental and Power Controls
  • Fire Suppression
  • Security and Vulnerability in the Network
  • Security Threats
  • Secure Network Administration Principals
  • Mitigation and Deterrent Techniques
  • Wireless Networking Security
  • Understanding Mobile Devices
  • Wireless Vulnerabilities

Module 6. Data Recovery and Administration

  • Disaster Recovery and Incident Response
  • Understanding Business Continuity
  • Impact Analysis
  • Reinforcing Vendor Support
  • Security-Related Policies and Procedures
  • Security Administration
  • Administrator’s Troubleshooting Guide
  • Access Control Issues
  • Auditing
  • Authentication Schemes
  • Back-Up Management
  • File Sharing Basics
  • Preventing Common Malicious Events

Download Course Outline (PDF)

Upon completion of each course section, exams will be administered in Towson. Students are expected to take the exams at the close of each section.

Gil Agyapong is finishing his doctoral studies in information assurance and currently holds an MS in information systems from Johns Hopkins University. His experience ranges from practitioner to manager with certifications in MCSE, MCD, VM, A+, Network+ and ITIL.

Jeff Hanson is a Cisco certified instructor who teaches in Frederick County Public Schools. He has been an instructor at Towson University since 2016 and has helped to design the curriculum that is used in the course. Mr. Hanson is working on his doctorate degree in information technology. 

Hardware Requirements

  • This course can be taken on either a PC or Mac.
  • Webcams are strongly recommended.

Software Requirements

  • PC: Windows XP or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word (not included in enrollment).
  • Windows Media Player.
  • Adobe Flash Player. Download the Flash Player.
  • Adobe Acrobat Reader. Download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.


  • Email capabilities and access to a personal email account.
Computing Technology Industry Association (CompTIA)

Towson University is an CompTIA Authorized Academy and Authorized Partner.

CompTIA, CompTIA A+, CompTIA Network+, and CompTIA Security+, are registered trademarks of the Computing Technology Industry Association (CompTIA).