Laserfiche WebLink
ADMINISTRATOR <br />(Track Four) <br />General Course Description <br />Cybersecurity professionals require a well-rounded understanding of the tools, processes, and strategies that can be employed <br />to defend their information systems from constantly evolving threats. CyberSec First Responder 0 (CFR) is a comprehensive <br />course designed to validate the knowledge and skills required to protect these critical information systems before, during, and <br />after an incident. CompTIA CySA+ is the only intermediate high -stakes cybersecurity analyst certification with performance - <br />based questions covering security analytics, intrusion detection and response. CySA+ is the most up-to-date security analyst <br />course that covers advanced persistent threats in a post-2014 cybersecurity environment.The CompTIA PenTest+ certification <br />verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal <br />and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and <br />communicate results. In the IOT course students will learn the general strategies for planning, designing, developing, <br />implementing an IoT device to work in a sensor network. Business soft skills are also taught to ensure a well-rounded individual <br />who will be effective communicating in the workplace. <br />Prerequisites <br />A Basic knowledge of PC desktop operation or equivalency is required. <br />Acquired Skills <br />Students will be able to identify fundamental concepts of computer security. - identify security threats. - harden internal systems <br />and services. - harden internetwork devices and services. - secure network communications. - manage public key infrastructure <br />(PKI). - manage certificates. - enforce organizational security policies. - monitor the security infrastructure. Assess information <br />security risk in computing and networking environment. Analyze the cybersecurity threat landscape. Analyze post attack <br />techniques on computing and network environments, Collect cyber security intelligence. Analyze data collection from security <br />and event logs. Respond to and investigate cybersecurity incident. Threat Management. Security Architecture and tool sets. <br />Vulnerability management. Cyber incident response to test devices in new environments such as the cloud and mobile, in <br />addition to traditional desktops and servers. Students will learn general strategies for planning, designing, developing, <br />implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to <br />work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing various <br />common IoT features, such as analog and digital sensors, a web -based Interface, MQTT messaging, and data encryption. <br />Job Titles (Job Titles related to IT Training stretch Horizontally, they can vastly vary, the list below is a sampling but <br />not limited to) <br />(SOC)15-1200 Computer Occupations <br />IT Security Analyst <br />Vulnerability Analyst <br />Threat Intelligence Analyst <br />Computer Network Administrators <br />Computer Support Users <br />Course Information <br />Cybersecurity Analyst <br />Operations Analyst <br />Cybersecurity Specialist Security <br />Engineer <br />Hours: 288 <br />Approx. 16 weeks <br />Course <br />Hours <br />Cybersec First Responder <br />54 <br />CompTIA Cybersecurity Analyst CySA+ <br />54 <br />