Would you like to get more information or apply?
Click on the button below and we’ll get back to you as soon as possible.
Increased reliance on computer systems, the internet, connected technologies and smart devices has made cybersecurity a critical concern for organizations and individuals alike. Keeping devices, data, and information secure and protected from risks and vulnerabilities is a critical area of activity for all organizations.
This has led to an ever-growing increase in demand for individuals possessing the skills to assess, plan, and implement a cybersecurity defense strategy. The 74-week Cybersecurity Specialist program can give you the training you need to pursue a career in helping keep networked computer systems and their users secure.
Your courses will cover everything you need to know about managing networks and computers, cybersecurity techniques, digital forensics, and more. You'll also get prepared to write exams for valuable industry certifications, including: Computing Technology Industry Association (CompTIA) A+, Net+, Security+, CySA+, PenTest+; and Cisco Certified Network Associate (CCNA).
Upon graduation, you'll be ready to use your cyber security skills working for organzations of all sizes.
I'm very proud to get a teacher that is as kind and available as mine was. He was very supportive of all of us in the classroom and really helped us make our way throughout education.
This course is a broad-based introduction to using a personal computer. It teaches the fundamentals of an operating system and the most popular application software including word processing, spreadsheets, and presentations. You will also learn about the Internet, Web browsers, electronic mail and antivirus software. The course is based on the Windows 7 operating system, Microsoft office 2013 and a variety of popular software programs for the Internet-related and security-related applications
This course is the first of two courses that cover the general installation, maintenance and management of computer hardware and software resources. This first course focuses on the hardware resources that make up a computer system course will align to the CompTIA A+ learning objectives. Students will learn about the operation of microcomputer systems, the various hardware components that makeup a computer system and how to troubleshoot common hardware problems.
This course is the second of two consecutive courses that align to the CompTIA A+ certification requirements. This course focuses on the software installation, configuration and troubleshooting as well as system security. Students will gain an understanding of the various network models, standards and protocols. Students will install configure and troubleshoot operating system software as well as application software packages. Finally, the course will explore security issues involving software installations.
The Network+ course will provide students with an introduction to the theory of networks. Students will learn basic networking concepts relating to the types of networks, general networking components, specialized hardware and software associated with networks, and how to set up and configure networks. Students will also learn about network security, wireless networks, as well as Voice over IP network capabilities.
IT professionals are constantly working with a variety of diagrams from basic flowcharts to floor plans and Network diagrams. This Introduction to Microsoft Visio course is designed for students who are new to Visio and who will be using Microsoft Visio to create basic workflows and perform end-to-end flowcharting and diagrams. Students will learn about the tools and features of Visio and apply the skills to create a variety of diagrams on a scale from the basic organizational charts and flowcharts to the more complex workflow diagrams and network diagrams.
This is the first course covering Windows 10. In addition, skills learned in this course will give students a foundation to build on in Windows Server courses. Topics include installing Windows 10, performing post-installation configuration, implementing Windows in an enterprise environment, configuring networking, storage, data access, implementing applications, configuring updates, monitoring and remote management, configuringsystem recovery, authorization and authentication.
This course will provide the students with skills necessary to deploy, configure and support Windows apps, resources and devices. Students will learn how to support the Windows Store and Cloud Apps, Mobility options and devices using Microsoft Intune. The course will explore the configuration of settings to support data storage and security, remote connections, resources, desktop apps, updates and mobility options with Azure RemoteApp. Finally, students will be able to configure system recovery and file recovery settings and manage system updates.
Installation Storage and Compute with Windows Server 2016 is the first of the Windows Server 2016 courses. This course covers the installation and configuration of Windows Server 2016 and its services. Students will learn to configure disks and volumes, implement server storage, create, manage and maintain server images for deployment and configure virtualization with Hyper-V. The course will also explore the deployment of Windows containers and the implementation of failover clustering and high availability disaster recovery options. Students will learn to implement Network Load Balancing and monitor server installations.
In this course, the student will learn to install, and maintain a Linux system. The student will configure and use graphical user interfaces (GUIs), use Linux commands to manage files and file systems, administer users, groups, permissions and attributes. The student will learn to work with Linux scripts, services, processes and schedule tasks. Students will be able to set up Linux client side networking and printing services as well as File Sharing services. Finally students will enable and administer Linux and Windows integration tools and learn to compile and install software on a Linux system.
In this course, students will learn to use PowerShell scripting to automate the common tasks and administrative jobs that can be applied on the client or server version of Windows. The course starts with an introduction to the PowerShell language and scripting environment and then proceeds to a thorough explanation of creating functional scripts that can be used for performing common tasks that involve working with files, Internet-connected scripts, user interaction, and solving tasks in systems and enterprise management deployments such as working with Active Directory and the file system.
This course explores the fundamental concepts in internetworking. The focus of this course is TCP/IP. Students will explore the DOD and OSI Reference Models and learn to identify TCP/IP Protocol Suite Components and implement IP addressing and Subnet Masks. Students will learn about name resolution and TCP/IP naming services and how to navigate the Cisco IOS Interface and perform basic operations on Cisco Routers and Switches.
This course explores the configuration and administration of common Cisco Network devices. Students will learn about layered internetwork communication, protocols and standards and how to plan and design internetworked LANs and WANs. This course will allow the students to work with the Cisco Internetwork Operating System (IOS) in a simulated environment. Students will learn to implement and manage Cisco routers and switches.
Networking with Windows Server 2016 is the second of the Windows Server 2016 courses. This course covers the implementation and configuration of networking services under Windows server 2016. The course will cover the implementation of IPv4 and IPv6 addressing as well as the installation of the various networking services and servers such as DNS, DHCP and IPAM. Students will learn to implement Virtual Private Networks and DirectAccess solutions as well as the implementation of Network Policy Server (NPS) and authentication. The course will explore the implementation of Distributed File System and Branch Office solutions.
Identity with Windows Server 2016 is the third of the Windows Server 2016 courses that covers the administering and configuring of Active Directory infrastructure under Windows Server 2016. The course will cover the installation and configuration of domain controllers followed by the creation and management of active directory users, computers, groups and organizational units. Students will learn to configure Service Authentication and account policies, group policies and objects and settings. Students will also explore the installation and configuration of Active Directory Certificate services and Active Directory Federation services.
This course explores implications of and issues related to computer and network security. Students will learn to recognize security threats and ramifications, identify sources of security threats and major areas of vulnerability. The course will examine ways to detect and neutralize system and network security threats and implement security protection procedures and practices. Methods of security disaster recovery will also be explored in this course.
This course provides students with the skills and knowledge needed to secure a Windows Server 2016 implementation. The course will explore the configuration of disk and file encryption, the implementation of malware protection, Windows Firewall and security baselines. The course will cover the securing of network traffic, the implementation of Privilege Access Management and administration as well advanced audit policies and services. After installing and configuring Microsoft Advanced Threat Analytics, students will learn to work with the Operations Management Suite to determine threat detection solutions. Students will also learn to secure an Application Development Server workload and implement a secure files services infrastructure with dynamic access control.
The increased reliance on computer systems, the internet, connected technologies and smart devices has made cybersecurity a critical concern for organizations and individuals alike. Keeping devices, data and information secure and protected from vulnerabilities is a critical area of activity for all organizations. This course provides the students with an introduction to the field of cybersecurity. Students will be introduced to the four distinct challenges to creating a cybersecurity defense; securing the infrastructure, securing the devices, securing the local network and securing the perimeter. The course will explore the fundamental concepts of each challenge and the types of vulnerabilities associated with each. Students will learn how to identify the risks and vulnerabilities in each area and describe counteractions to mitigate the risks.
This course will explore the role and responsibilities of the cybersecurity specialist in monitoring, detecting and responding to security incidents in information systems and networks. The course will introduce the tools and tactics used to manage cybersecurity risks, identify various types of common threats, evaluate an organizations security, collect security intelligence and handle incidents as they occur. The course is designed to foster a comprehensive approach to security. This course aligns to the objectives of the CompTIA Cybersecurity Analyst Certification exam (CS0-001).
This course explores the concepts of Penetration testing. The ever-increasing need of organizations to protect themselves from security breaches and risks require them to invest heavily in understanding their vulnerabilities and design measures to counteract them. In order to protect themselves, organizations turn to the conducting of penetration testing. In this course, students will learn the concepts and methodologies related to pen testing. Students will develop their pen testing skills enabling them to identify information system vulnerabilities and design effective remediation for them. This course aligns to the objectives of the CompTIA PenTest+ exam (PT0-001).
In our world of hyper connected technologies, we rely more and more on computers to do work. Unfortunately, computers can also be used to commit crimes such as company policy violations, embezzlement, harassment, stealing of proprietary information, leaks of information to name a few. Fortunately, these actions are typically recorded on the same computers on which they are committed. The need for individuals with the knowledge and skill to properly investigate these wrongdoings is growing. This course introduces students to the field of digital forensics. Students will explore the tools, processes and techniques used to recover and gather data, files and information stored on computer systems and then perform the appropriate analysis and validation. The course will cover how to process digital crime and incident scenes, work with the different operating systems, and use typical file and data recovery tools to gather information from the different devices in use today.
This course looks at the planning, preparation, execution, and follow-up stages of an interview: how people find jobs; employer expectations; presenting an enthusiastic attitude; focusing on the right job; transferable skills; the job interview; effective resume preparation; cover and thank you letters; effective telemarketing; tapping the hidden job market; handling objections; job search management; self-confidence and self-esteem building; mock interviews (video-taped); and individual counselling and coaching.
This program includes a practicum component which consists of 175 hours of work at a job site. The practicum work experience is a mandatory diploma requirement and the business organization does not pay for the services of the student during the practicum.
Click on the button below and we’ll get back to you as soon as possible.