What To Expect
This course builds upon foundational hardware and software skills.Prerequisite knowledge of hardware and basic utilization of Windows and Linux Operating Systems is required. This course examines and exposes students to techniques and tools to protect organizations digital assets. The course studies mobile devices, cloud computing, network monitoring, digital forensics and scripting. The goal of this course is to prepare the student for an entry level career in cybersecurity or system administration.
Course objectives
Upon completion of this course, the student will be able to:
• Analyze traffic using Wireshark
• Demonstrate use of Group Policy Objects
• Create Linux Scripts
• Demonstrate use of PowerShell
• Active Directory password resets
• Demonstrate use of Intrusion Detection Systems
• Illustrate use of Mobile Device Management Tools
• Demonstrate ability to use vulnerability assessment tools
COURSE FORMAT
This course is offered in a virtual, synchronous platform with Teachable serving as the learning management system. Class sessions are held twice a week at night, which each session lasting a duration of three (3) hours. Lab sessions are held twice a week at night, which each session lasting a duration of two (2) hours. Regular attendance is required, and students are expected to be present in the learning environment by the scheduled starting time of the class. Additional course requirements and grading standards are communicated by the course instructor.