Intermediate Cybersecurity
Cybersecurity has a very wide range of roles and requires a high degree of
collaborative teamwork. This program will help you summarize the wide range of
functions taken on by IT security staff and the types of cybersecurity threats. This program is also an
opportunity for you to understand the different pathways you can take when
pursuing a career in IT security.
This program aligns learners to take CompTIA a+ Cyber credential exam.
Intermediate Cybersecurity
12 Week Program
136 Instructor hours
Courses
- Microsoft Windows Administration Essentials
- Cybersecurity Controls
- Linux App Server Essentials
- Data Management Essentials
- Enterprise Network Application Essentials
- And more…
Prerequisites
- Cisco CCST – Cybersecurity or equivalent
- PC and internet navigation skills
- Basic Windows and Linux system concepts
- Basic understanding of computer networks
Schedule Options
This program is available across all Learn How You Want To schedule options
Program Objectives
Gain a deeper understanding of cybersecurity with this intermediate-level program. Explore the global impact of cyber threats, the real-world consequences of cyber-attacks on industries, and why cybersecurity is a rapidly growing field. Learners will learn how networks are exploited by attackers and learn defense strategies thtat help mitigate risks in today’s evolving threat landscape.
What You Will Learn
- Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
- Explain the features and characteristics of the Linux Operating System.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Explain how to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Analyze network intrusion data to identify compromised hosts


Where Do I Go From Here?
Career Paths after Intermediate Cybersecurity:
Want to Keep Learning?
Try our Enterprise Cybersecurity Program!


Career Paths
Intro to Cybersecurity
Intermediate Cybersecurity
Credential Exams From

Industry Leaders Hiring Cyber Security Professionals











94% of Learners would recommend DiverseNote Mobility to others!
95% Higher Ed Admissions Rate & 98% Job Placement Rate