Weeks 1-2
Threats, vulnerabilities, and attack paths
- Create a glossary for common attacks, malware, social engineering, and risk terms.
- Map attacker goals to controls such as MFA, patching, backups, and logging.
CompTIA · Objective mapping
Core cybersecurity knowledge across threats, architecture, operations, governance, and response.
Prep cockpit
Readiness target
Build broad cybersecurity readiness across threats, architecture, operations, governance, and incident response.
Threats, attacks, and vulnerability context
Secure architecture and operational controls
Identity, access, cryptography, and data protection
Governance, risk, compliance, and incident response
Study sequence
Astruvia Academy prep paths combine objective mapping, hands-on practice, scenario review, and readiness evidence.
Weeks 1-2
Weeks 3-5
Weeks 6-8
Weeks 9-10
Practice
Prep should prove skill, not just memorization. These drills turn study topics into observable work products.
Create an identity hardening checklist for Microsoft 365.
Write a phishing reporting and triage workflow.
Map a small organization security baseline with owners and review cadence.
Readiness
Use these checks before scheduling, retesting, or moving from foundations into full exam preparation.
Can connect security terms to operational examples.
Can recommend controls for identity, endpoint, email, network, and data risks.
Scores 80% or better on mixed scenario checks.
Academy connections
The prep surface is wired to the broader Academy ecosystem so each certification can grow into lessons, labs, quizzes, tools, and templates.
Nearby paths
Related certification paths help learners build a progression instead of studying each credential in isolation.
Objective mapping
Hardware, operating systems, troubleshooting, networking basics, mobile devices, and support habits.
CompTIA · Entry
ViewFuture prep track
Networking concepts, infrastructure, operations, security, and troubleshooting scenarios.
CompTIA · Entry
ViewFuture prep track
Security analytics, vulnerability management, detection, response, and reporting workflows.
CompTIA · Intermediate
View