Enroll in our Cybersecurity Certification Program to gain vital skills and certifications for a successful career. Dive into Principles of Information Technology, covering introduction and computer work, followed by Network Security Fundamentals and Operational Cybersecurity. Obtain mid-pathway certifications in iC3 Computing Fundamentals, Living Online, and Key Applications, as well as CompTIA IT Fundamentals (ITF+). Cap off your training with industry certifications including CompTIA Security+, MTA Security, and CCNA CyberOps, boosting your expertise and marketability in cybersecurity.
Cybersecurity
1A: Introduction
- Are you ready to develop your understanding of computers from the inside out? In this course, you will discover hardware and software options for a computer, how computers work together to create networks, and how the internet works. You will explore the major types of software categories you will need to know in most professional spaces including word processing, spreadsheets, and database information. You will also develop skills like programming and app building before putting everything together in a final project where you’ll build an e-book. Let’s get started!
1B: Working with Computers
-
Now that you know the basic workings of a computer, it’s time to put the computer to work! In this course, you will explore some of the basics of graphic design, web development languages, and coding. You will also learn about team building, communication and presentation software, and becoming a digital citizen, giving perspective on how to collaborate with others as you transition from school to the workplace. Lastly, you will uncover potential cyber threats and how to protect your own devices through features and behavior change before putting everything together in a culminating project: designing a website in Weebly. Let’s get to work!
1A: Introduction
-
Have you seen news headlines about cyber data breaches or hacks? With so many businesses working hard to ensure that their data and their customers’ information stay safe and secure, it’s no wonder that careers in cybersecurity are in high demand. Learn what information security is, hackers, viruses, spyware, network systems, identifying potential vulnerabilities, protecting against attacks, and creating a disaster and response plan if breaches do occur. Could you be the security specialist that stops the next cyberattack?
1B: Forensics and Permissions
-
As the world becomes increasingly more interconnected by technology, computer and mobile-based crimes are becoming more prevalent. Explore cyber forensics, encryption, cryptography and cryptology, user and password management to mitigate large data breaches, and other threats, vulnerabilities, and security issues. Discover what it takes to enter this high-demand career field. As a cybersecurity specialist, you’ll never get bored with trying to keep individuals and organizations safe!
-
1A: Introduction
-
Even when we use the strongest bricks, Firewalls can be breached and other security measures can be exploited by malicious cyberattackers. In this course, you will assume your role as Chief Information Security Officer (CICO) responsible for a data network’s design, maintenance, and end-user training. You will explore essentials of keeping networks safe and secure through the use of cryptology, keys, and certificates before moving into the important practice of risk assessment. In the end, your attention will shift to mitigating and managing identified risks and working with key stakeholders to improve the organization’s security posture and disaster response. Are you ready to help businesses protect personal information and outsmart cyber attackers? Grab your white hat, BYOD, and let’s get started!
1B: Security and Planning in the Workplace
-
More and more, companies are under attack by malicious cyber attackers compromising the security of sensitive employee, customer, and societal data. In this course, you will dive into data security in the workplace and will learn ways to mitigate cyber threats that lurk in dark corners. You will step into the familiar shoes of CISO, this time at a startup company, making decisions about access and authentication protocols, security planning, and expanding the business in a safe way. Lastly, you will explore real-world security breaches, how they were solved, and step-by-step instructions to set up robust security policies. Let’s continue forging your cybersecurity stronghold against cyber attackers and keep sensitive data secure.
-
- iC3 - Computing Fundamentals
- iC3 - Living Online
- iC3 - Key Applications
- CompTIA IT Fundamentals (ITF+)
- CIW Site Development Associate
- CIW Web Design Specialist
- ICT Web Design Essentials
- NOCTI - Computer Programmer (Job Ready Assessment)