Cybersecurity has a very wide range of roles and requires a high degree of collaborative teamwork. This program will help you summarize the wide range of
functions taken on by IT security staff and the types of cybersecurity threats. This program is also an opportunity for you to understand the different pathways you can take when pursuing a career in IT security.

This program aligns learners to take CompTIA a+ Cyber credential exam.

Intermediate Cybersecurity

Flexible Scheduling Options

  • 136 Instructor hours

Courses

  • Microsoft Windows Administration Essentials
  • Cybersecurity Controls
  • Linux App Server Essentials
  • Data Management Essentials
  • Enterprise Network Application Essentials
  • And more…

Prerequisites

  • Cisco CCST – Cybersecurity or equivalent
  • PC and internet navigation skills
  • Basic Windows and Linux system concepts
  • Basic understanding of computer networks

Program Objectives

Gain a deeper understanding of cybersecurity with this intermediate-level program. Explore the global impact of cyber threats, the real-world consequences of cyber-attacks on industries, and why cybersecurity is a rapidly growing field. Learners will learn how networks are exploited by attackers and learn defense strategies thtat help mitigate risks in today’s evolving threat landscape.

What You Will Learn

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Explain how to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Analyze network intrusion data to identify compromised hosts

Industry Leaders Hiring Cyber Security Professionals

98% of Learners would recommend higherLRN to others!