Facebook Pixel
Microsoft Certification Training
Search classes by keyword:
Search classes by category:
Microsoft Certification and Microsoft Training, Cisco Certification and MCSE Certification
CompTIA A+ Net+ Security+ space



CompTIA A+/Network+/Security+ Certification Training

CompTIA A+/Network+/Security+

Course Number: #CED-5
Course Length: 15 days
Number of Exams: 4
Certifications: A+
Network+
Security+

Grants (discounts) are available for multiple students for the same or different courses.

Guaranteed to Run Guaranteed to Run


Upcoming Dates Class Times Class Format Quote
2/17 - 3/3, 2018Guaranteed to Run 8:00 AM - 5:00 PM Instructor-Led Quote
3/10 - 3/24, 2018Guaranteed to Run 8:00 AM - 5:00 PM Instructor-Led Quote
3/31 - 4/14, 2018Guaranteed to Run 8:00 AM - 5:00 PM Instructor-Led Quote
4/21 - 5/4, 2018Guaranteed to Run 8:00 AM - 5:00 PM Instructor-Led Quote
5/12 - 5/26, 2018Guaranteed to Run 8:00 AM - 5:00 PM Instructor-Led Quote

Instructor-Led

  • Roundtrip Airfare & Lodging
    (Atlanta boot camps only)
  • Hands-on instruction by a certified instructor
  • Includes all course materials
  • On-site Testing
  • Lunch & Snacks provided each day
  • Practice Exam
  • Certification Exam

Can't travel or you want to stay with your family or business. No problem! Stay in your own city and save the additional expenses of roundtrip airfare, lodging, transportation, and meals and receive the same great instruction live from our instructors in our Live Instructor-Led Remote Classroom Training.

Remote Classroom Training

Our Remote Classroom Training is a live class with students observing the instructor and listening through your computer speakers. You will see the instructor's computer, slides, notes, etc., just like in the classroom. You will be following along, doing work, labs, and individual assignments.

Like us on Facebook and SAVE $100 on your next course

"The Network+ class was instructed in a professional, informative manner with attention given to all students (including myself) who required further explanation. The Network+ instructor presented himself and CED Solutions in the most impressive way possible. He is very knowledgeable in all subject matter, which I found very helpful. I will not hesitate to gain further certifications from this instructor and this company."

-John Carr, Holly Springs, NC

CompTIA A+ 220-901 covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

CompTIA A+ 220-902 covers the skills required to install and configure PC operating systems, as well as configuring common features (e.g. network connectivity and email) for mobile operating systems Android and Apple iOS.

The CompTIA Network+ (Exam N10-006) certification ensures that the successful candidate has the important knowledge and skills necessary to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure, describe networking technologies, basic design principles, and adhere to wiring standards and use testing tools.

CompTIA Security+ (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ examination. In this course, you'll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.


A+ Certification

IT success stories start with CompTIA A+ certification. It validates understanding of the most common hardware and software technologies in business and certifies the skills necessary to support complex IT infrastructures. CompTIA A+ is a powerful credential that helps IT professionals worldwide ignite their IT career.

CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.

CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.

Overview

Held by over 1? million IT professionals worldwide, CompTIA A+ is the most essential IT certification for establishing an IT career. If you're new to the IT industry, this will help you put your best foot forward. And if you're already an IT professional, the CompTIA A+ certification validates your skills and can boost your career.

A+ is comprehensive and vendor-neutral

A+ certified professionals have mastered the technologies found in today's extensive and varied IT environments, from mobile to traditional devices and operating systems. They can confidently handle the most challenging technology problems more efficiently.

A+ validates foundational skills

A+ establishes best practices in troubleshooting, networking and security across a variety of devices to set the stage for IT careers. The certification also matches professional tech skills with communication skills.

A+ is trusted by employers

As businesses and governments worldwide continue to adopt mobile and cloud technology, they trust A+ certified professionals to keep their devices running and organizations working smoothly.

A+ is globally recognized and accredited

A+ carries ISO/ANSI accreditation status. You can trust that the rigorous development process of the A+ certification objectives and exams follows international standards of quality assurance.

A+ is industry supported

A+ is developed and maintained by leading IT experts. Content for the exams stems from a combination of industry-wide survey feedback and contributions from our team of subject matter experts.

Jobs that use CompTIA A+

  • Technical support specialist
  • Field service technician
  • IT support technician
  • IT support administrator
  • IT support specialist

CompTIA A+ 220-901

CompTIA A+ 220-901 covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware and network connectivity issues.

Course Outline

1.0 Hardware
  • Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
  • Explain the importance of motherboard components, their purpose and properties.
  • Compare and contrast various RAM types and their features.
  • Install and configure PC expansion cards.
  • Install and configure storage devices and use appropriate media.
  • Install various types of CPUs and apply the appropriate cooling methods.
  • Compare and contrast various PC connection interfaces, their characteristics and purpose.
  • Install a power supply based on given specifications.
  • Given a scenario, select the appropriate components for a custom PC configuration to meet customer specifications or needs.
  • Compare and contrast types of display devices and their features.
  • Identify common PC connector types and associated cables.
  • Install and configure common peripheral devices.
  • Install SOHO multifunction device/printers and configure appropriate settings.
  • Compare and contrast differences between the various print technologies and the associated imaging process.
  • Given a scenario, perform appropriate printer maintenance.
2.0 Networking
  • Identify the various types of network cables and connectors.
  • Compare and contrast the characteristics of connectors and cabling.
  • Explain the properties and characteristics of TCP/IP.
  • Explain common TCP and UDP ports, protocols and their purpose.
  • Compare and contrast various WiFi networking standards and encryption types.
  • Given a scenario, install and configure SOHO wireless/ wired router and apply appropriate settings.
  • Compare and contrast Internet connection types, network types and their features.
  • Compare and contrast network architecture devices, their functions and features.
  • Given a scenario, use appropriate networking tools.
3.0 Mobile Devices
  • Install and configure laptop hardware and components.
  • Explain the function of components within the display of a laptop.
  • Given a scenario, use appropriate laptop features.
  • Explain the characteristics of various types of other mobile devices.
  • Compare and contrast accessories and ports of other mobile devices.
4.0 Hardware and Network Troubleshooting
  • Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU and power with appropriate tools.
  • Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
  • Given a scenario, troubleshoot common video, projector and display issues.
  • Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
  • Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.
  • Given a scenario, troubleshoot printers with appropriate tools.

[ back to top ]

CompTIA A+ 220-902

CompTIA A+ 220-902 covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures.

Course Outline

1.0 Windows Operating Systems
  • Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).
  • Given a scenario, install Windows PC operating systems using appropriate methods.
  • Given a scenario, apply appropriate Microsoft command line tools.
  • Given a scenario, use appropriate Microsoft operating system features and tools.
  • Given a scenario, use Windows Control Panel utilities.
  • Given a scenario, install and configure Windows networking on a client/desktop.
  • Perform common preventive maintenance procedures using the appropriate Windows OS tools.
2.0 Other Operating Systems and Technologies
  • Identify common features and functionality of the Mac OS and Linux operating systems.
  • Given a scenario, set up and use client-side virtualization.
  • Identify basic cloud concepts.
  • Summarize the properties and purpose of services provided by networked hosts.
  • Identify basic features of mobile operating systems.
  • Install and configure basic mobile device network connectivity and email.
  • Summarize methods and data related to mobile device synchronization.
3.0 Security
  • Identify common security threats and vulnerabilities.
  • Compare and contrast common prevention methods.
  • Compare and contrast differences of basic Windows OS security settings.
  • Given a scenario, deploy and enforce security best practices to secure a workstation.
  • Compare and contrast various methods for securing mobile devices.
  • Given a scenario, use appropriate data destruction and disposal methods.
  • Given a scenario, secure SOHO wireless and wired networks.
4.0 Software Troubleshooting
  • Given a scenario, troubleshoot PC operating system problems with appropriate tools.
  • Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.
  • Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.
  • Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.
5.0 Operational Procedures
  • Given a scenario, use appropriate safety procedures.
  • Given a scenario with potential environmental impacts, apply the appropriate controls.
  • Summarize the process of addressing prohibited content/activity, and explain privacy, licensing and policy concepts.
  • Demonstrate proper communication techniques and professionalism.
  • Given a scenario, explain the troubleshooting theory.

[ back to top ]

Network+ certification

The CompTIA Network+ certification (Exam N10-006) is an internationally recognized validation of the technical knowledge required of foundation-level IT network practitioners.

This exam will certify that the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network wireless and wired devices, establish basic network design and connectivity, understand and maintain network documentation, identify network limitations and weaknesses, and implement network security, standards, and protocols. The candidate will have a basic understanding of emerging technologies including unified communications, mobile, cloud, and virtualization technologies.

CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives.

Prerequisites

It is recommended for CompTIA Network+ candidates to have the following:

  • CompTIA A+ certification or equivalent knowledge, though CompTIA A+ certification is not required.
  • Have at least 9 to 12 months of work experience in IT networking.

Course Outline

1.0 Network architecture
  • 1.1 Explain the functions and applications of various network devices
  • 1.2 Compare and contrast the use of networking services and applications
  • 1.3 Install and configure the following networking services/applications
  • 1.4 Explain the characteristics and benefits of various WAN technologies
  • 1.5 Install and properly terminate various cable types and connectors using appropriate tools
  • 1.6 Differentiate between common network topologies
  • 1.7 Differentiate between network infrastructure implementations
  • 1.8 Given a scenario, implement and configure the appropriate addressing schema
  • 1.9 Explain the basics of routing concepts and protocols
  • 1.10 Identify the basics elements of unified communication technologies
  • 1.11 Compare and contrast technologies that support cloud and virtualization
  • 1.12 Given a set of requirements, implement a basic network
2.0 Network operations
  • 2.1 Given a scenario, use appropriate monitoring tools
  • 2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools
  • 2.3 Given a scenario, use appropriate resources to support configuration management
  • 2.4 Explain the importance of implementing network segmentation
  • 2.5 Given a scenario, install and apply patches and updates
  • 2.6 Given a scenario, configure a switch using proper features
  • 2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices
3.0 Network security
  • 3.1 Compare and contrast risk related concepts
  • 3.2 Compare and contrast common network vulnerabilities and threats
  • 3.3 Given a scenario, implement network hardening techniques
  • 3.4 Compare and contrast physical security controls
  • 3.5 Given a scenario, install and configure a basic firewall
  • 3.6 Explain the purpose of various network access control models
  • 3.7 Summarize basic forensic concepts
4.0 Troubleshooting
  • 4.1 Given a scenario, implement the following network troubleshooting methodology
  • 4.2 Given a scenario, analyze and interpret the output of troubleshooting tools
  • 4.3 Given a scenario, troubleshoot and resolve common wireless issues
  • 4.4 Given a scenario, troubleshoot and resolve common copper cable issues
  • 4.5 Given a scenario, troubleshoot and resolve common fiber cable issues
  • 4.6 Given a scenario, troubleshoot and resolve common network issues
  • 4.7 Given a scenario, troubleshoot and resolve common security issues
  • 4.8 Given a scenario, troubleshoot and resolve common WAN issues
5.0 Industry standards, practices, and network theory
  • 5.1 Analyze a scenario and determine the corresponding OSI layer
  • 5.2 Explain the basics of network theory and concepts
  • 5.3 Given a scenario, deploy the appropriate wireless standard
  • 5.4 Given a scenario, deploy the appropriate wired connectivity standard
  • 5.5 Given a scenario, implement the appropriate policies or procedures
  • 5.6 Summarize safety practices
  • 5.7 Given a scenario, install and configure equipment in the appropriate location using best practices
  • 5.8 Explain the basics of change management procedures
  • 5.9 Compare and contrast the following ports and protocols
  • 5.10 Given a scenario, configure and apply the appropriate ports and protocols

[ back to top ]

Security+ certification

CompTIA Security+ (Exam SY0-501) is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it's essential to have effective security practices in place. That's where CompTIA Security+ comes in. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you're ready for the job.

Security+ is government approved

CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. Once you obtain your Security+ you automatically have the CE designation required in the DoD Directive 8570.01 manual and going forward must comply with the CE program requirement of completing 50 CEUs in three years to maintain the credential. Security+ is also compliant with government regulations under Federal Information Security Management Act (FISMA).

Security+ is globally recognized

CompTIA Security+ is a globally recognized credential with certified professionals working in over 147 countries throughout the world.

Security+ provides substantial earnings potential

According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers earn over $86,000 per year.

Target Student

The CompTIA Security+ certification is aimed at an IT security professional who has:

  • A minimum of two years' experience in IT administration with a focus on security
  • Day-to-day technical information security experience
  • Broad knowledge of security concerns and implementation, including the topics in the domain list

Course Content

1.0 Threats, Attacks and Vulnerabilities
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
  • Viruses
  • Crypto-malware
  • Ransomware
  • Worm
  • Trojan
  • Rootkit
  • Keylogger
  • Adware
  • Spyware
  • Bots
  • RAT
  • Logic bomb
  • Backdoor
1.2 Compare and contrast types of attacks
  • Social engineering
  • Application/service attacks
  • Wireless attacks
  • Cryptographic attacks
1.3 Explain threat actor types and attributes.
  • Types of actors
  • Attributes of actors
  • Use of open-source intelligence
  • 1.4 Explain penetration testing concepts.
  • Active reconnaissance
  • Passive reconnaissance
  • Pivot
  • Initial exploitation
  • Persistence
  • Escalation of privilege
  • Black box
  • White box
  • Gray box
  • Penetration testing vs. vulnerability scanning
1.5 Explain vulnerability scanning concepts.
  • Passively test security controls
  • Identify vulnerability
  • Identify lack of security controls
  • Identify common misconfigurations
  • Intrusive vs. non-intrusive
  • Credentialed vs. non-credentialed
  • False positive
1.6 Explain the impact associated with types of vulnerabilities.
  • Race conditions
  • Vulnerabilities
  • Improper input handling
  • Improper error handling
  • Misconfiguration/weak configuration
  • Default configuration
  • Resource exhaustion
  • Untrained users
  • Improperly configured accounts
  • Vulnerable business processes
  • Weak cipher suites and implementations
  • Memory/buffer vulnerability
  • System sprawl/undocumented assets
  • Architecture/design weaknesses
  • New threats/zero day
  • Improper certificate and key management
2.0 Technologies and Tools
2.1 Install and configure network components, both hardware- and software-based, to support organizational security.
  • Firewall
  • VPN concentrator
  • NIPS/NIDS
  • Router
  • Switch
  • Proxy
  • Load balancer
  • Access point
  • SIEM
  • DLP
  • NAC
  • Mail gateway
  • Bridge
  • SSL/TLS accelerators
  • SSL decryptors
  • Media gateway
  • Hardware security module
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
  • Protocol analyzer
  • Network scanners
  • Wireless scanners/cracker
  • Password cracker
  • Vulnerability scanner
  • Configuration compliance scanner
  • Exploitation frameworks
  • Data sanitization tools
  • Steganography tools
  • Honeypot
  • Backup utilities
  • Banner grabbing
  • Passive vs. active
  • Command line tools
2.3 Given a scenario, troubleshoot common security issues.
  • Unencrypted credentials/clear text
  • Logs and events anomalies
  • Permission issues
  • Access violations
  • Certificate issues
  • Data exfiltration
  • Misconfigured devices
  • Weak security configurations
  • Personnel issues
  • Unauthorized software
  • Baseline deviation
  • License compliance violation (availability/integrity)
  • Asset management
  • Authentication issues
2.4 Given a scenario, analyze and interpret output from security technologies.
  • HIDS/HIPS
  • Antivirus
  • File integrity check
  • Host-based firewall
  • Application whitelisting
  • Removable media control
  • Advanced malware tools
  • Patch management tools
  • UTM
  • DLP
  • Data execution prevention
  • Web application firewall
2.5 Given a scenario, deploy mobile devices securely.
  • Connection methods
  • Mobile device management concepts
  • Enforcement and monitoring
  • Deployment models
2.6 Given a scenario, implement secure protocols.
  • Protocols
  • Use cases
3.0 Architecture and Design
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • Industry-standard frameworks and reference architectures
  • Benchmarks/secure configuration guides
  • Defense-in-depth/layered security
3.2 Given a scenario, implement secure network architecture concepts.
  • Zones/topologies
  • Segregation/segmentation/isolation
  • Tunneling/VPN
  • Security device/technology placement
  • SDN
3.3 Given a scenario, implement secure systems design.
  • Hardware/firmware security
  • Operating systems
  • Peripherals
3.4 Explain the importance of secure staging deployment concepts.
  • Sandboxing
  • Environment
  • Secure baseline
  • Integrity measurement
3.5 Explain the security implications of embedded systems.
  • SCADA/ICS
  • Smart devices/IoT
  • HVAC
  • SoC
  • RTOS
  • Printers/MFDs
  • Camera systems
  • Special purpose
3.6 Summarize secure application development and deployment concepts.
  • Development life-cycle models
  • Secure DevOps
  • Version control and change management
  • Provisioning and deprovisioning
  • Secure coding techniques
  • Code quality and testing
  • Compiled vs. runtime code
3.7 Summarize cloud and virtualization concepts.
  • Hypervisor
  • VM sprawl avoidance
  • VM escape protection
  • Cloud storage
  • Cloud deployment models
  • On-premise vs. hosted vs. cloud
  • VDI/VDE
  • Cloud access security broker
  • Security as a Service
3.8 Explain how resiliency and automation strategies reduce risk.
  • Automation/scripting
  • Templates
  • Master image
  • Non-persistence
  • Elasticity
  • Scalability
  • Distributive allocation
  • Redundancy
  • Fault tolerance
  • High availability
3.9 Explain the importance of physical security controls.
  • Lighting
  • Signs
  • Fencing/gate/cage
  • Security guards
  • Alarms
  • Safe
  • Secure cabinets/enclosures
  • Protected distribution/Protected cabling
  • Airgap
  • Mantrap
  • Faraday cage
  • Lock types
  • Biometrics
  • Barricades/bollards
  • Tokens/cards
  • Environmental controls
  • Cable locks
  • Screen filters
  • Cameras
  • Motion detection
  • Logs
  • Infrared detection
  • Key management
4.0 Identity and Access Management
4.1 Compare and contrast identity and access management concepts
  • Identification, authentication, authorization and accounting (AAA)
  • Multifactor authentication
  • Federation
  • Single sign-on
  • Transitive trust
4.2 Given a scenario, install and configure identity and access services.
  • LDAP
  • Kerberos
  • TACACS+
  • CHAP
  • PAP
  • MSCHAP
  • RADIUS
  • SAML
  • OpenID Connect
  • OAUTH
  • Shibboleth
  • Secure token
  • NTLM
4.3 Given a scenario, implement identity and access management controls.
  • Access control models
  • Physical access control
  • Biometric factors
  • Tokens
  • Certificate-based authentication
  • File system security
  • Database security
4.4 Given a scenario, differentiate common account management practices.
  • Account types
  • General Concepts
  • Account policy enforcement
5.0 Risk Management
5.1 Explain the importance of policies, plans and procedures related to organizational security.
  • Standard operating procedure
  • Agreement types
  • Personnel management
  • General security policies
5.2 Summarize business impact analysis concepts.
  • RTO/RPO
  • MTBF
  • MTTR
  • Mission-essential functions
  • Identification of critical systems
  • Single point of failure
  • Impact
  • Privacy impact assessment
  • Privacy threshold assessment
5.3 Explain risk management processes and concepts.
  • Threat assessment
  • Risk assessment
  • Change management
5.4 Given a scenario, follow incident response procedures.
  • Incident response plan
  • Incident response process
5.5 Summarize basic concepts of forensics.
  • Order of volatility
  • Chain of custody
  • Legal hold
  • Data acquisition
  • Preservation
  • Recovery
  • Strategic intelligence/counterintelligence gathering
  • Track man-hours
5.6 Explain disaster recovery and continuity of operation concepts.
  • Recovery sites
  • Order of restoration
  • Backup concepts
  • Geographic considerations
  • Continuity of operation planning
5.7 Compare and contrast various types of controls.
  • Deterrent
  • Preventive
  • Detective
  • Corrective
  • Compensating
  • Technical
  • Administrative
  • Physical
5.8 Given a scenario, carry out data security and privacy practices.
  • Data destruction and media sanitization
  • Data sensitivity labeling and handling
  • Data roles
  • Data retention
  • Legal and compliance
6.0 Cryptography and PKI
6.1 Compare and contrast basic concepts of cryptography.
  • Symmetric algorithms
  • Modes of operation
  • Asymmetric algorithms
  • Hashing
  • Salt, IV, nonce
  • Elliptic curve
  • Weak/deprecated algorithms
  • Key exchange
  • Digital signatures
  • Diffusion
  • Confusion
  • Collision
  • Steganography
  • Obfuscation
  • Stream vs. block
  • Key strength
  • Session keys
  • Ephemeral key
  • Secret algorithm
  • Data-in-transit
  • Data-at-rest
  • Data-in-use
  • Random/pseudo-random number generation
  • Key stretching
  • Implementation vs. algorithm selection
  • Perfect forward secrecy
  • Security through obscurity
  • Common use cases
6.2 Explain cryptography algorithms and their basic characteristics.
  • Symmetric algorithms
  • Cipher modes
  • Asymmetric algorithms
  • Hashing algorithms
  • Key stretching algorithms
  • Obfuscation
6.3 Given a scenario, install and configure wireless security settings.
  • Cryptographic protocols
  • Authentication protocols
  • Methods
6.4 Given a scenario, implement public key infrastructure.
  • Components
  • Concepts
  • Types of certificates
  • Certificate formats

[ back to top ]


CED Solutions is your best choice for CompTIA A+ Net+ Security+, CompTIA A+ Net+ Security+ training, CompTIA A+ Net+ Security+ certification, CompTIA A+ Net+ Security+ boot camp, CompTIA A+ Net+ Security+ certification training, CompTIA A+ Net+ Security+ certification course, CompTIA A+ Net+ Security+ course, CompTIA A+ Net+ Security+ class.



CompTIA A+ Net+ Security+ space
Search classes by keyword:
Search classes by category:


Copyright © 2018 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.