Intermediate Cybersecurity

Cybersecurity has a very wide range of roles and requires a high degree of
collaborative teamwork. This program will help you summarize the wide range of
functions taken on by IT security staff and the types of cybersecurity threats. This program is also an
opportunity for you to understand the different pathways you can take when
pursuing a career in IT security.

This program aligns learners to take CompTIA a+ Cyber credential exam.

Intermediate Cybersecurity

12 Week Program

136 Instructor hours

Courses

  • Microsoft Windows Administration Essentials
  • Cybersecurity Controls
  • Linux App Server Essentials
  • Data Management Essentials
  • Enterprise Network Application Essentials
  • And more…

Prerequisites

  • Cisco CCST – Cybersecurity or equivalent
  • PC and internet navigation skills
  • Basic Windows and Linux system concepts
  • Basic understanding of computer networks

Schedule Options

This program is available across all Learn How You Want To schedule options

Program Objectives

Gain a deeper understanding of cybersecurity with this intermediate-level program. Explore the global impact of cyber threats, the real-world consequences of cyber-attacks on industries, and why cybersecurity is a rapidly growing field. Learners will learn how networks are exploited by attackers and learn defense strategies thtat help mitigate risks in today’s evolving threat landscape.

What You Will Learn

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Explain how to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Analyze network intrusion data to identify compromised hosts
image of an IT professional

Where Do I Go From Here?

Career Paths after Intermediate Cybersecurity:

Want to Keep Learning?

Try our Enterprise Cybersecurity Program!

Industry Leaders Hiring Cyber Security Professionals

image of cyber security experts

94% of Learners would recommend DiverseNote Mobility to others!

95% Higher Ed Admissions Rate & 98% Job Placement Rate