Cyber Security Specialist Course

Break into the high pay, high demand field of information and network security.

QUICK DETAILS

Towson University's Cyber Security Associate course is an entry-level program that will prepare you to sit for four certification exams—CompTIA ITF+, A+, Network+ and Security+—two of which are included in the tuition.

  • Part I: Foundations will help you build the foundation necessary for entry-level positions.
  • Part II: Intermediate will build upon your skills to prepare you for intermediate level cyber security jobs.

Total Hours: 138 (Part I: 72 hours, Part II: 66 hours)

Tuition: $3,999 for both Part I and Part II includes all books, support materials, and one exam voucher for either the Network+ or Security+ exam. Part I tuition: $1,999. Part II tuition: $2,699

Location: 7400 York Road, Towson, MD

Upcoming Dates Schedule Register
February 4–July 16, 2020 Tue/Thur, 6–9 p.m. Register

 

More about This Course

Prerequisites

Part I: None. Certain professional experience may enable you to start in Part II. Talk to one of our career consultants to learn more.

Part II: Part I: Foundations course or a combination of an IT degree and previous course work, or three years of demonstrated work experience. 

Course Overview

TU’s Cyber Security Associate course is an entry level program that bundles two certifications—Network+ and Security+—into a two part, comprehensive program. These certifications are recognized worldwide in all IT-related industries and form the foundation of hiring requirements necessary to pursue a career in information technology.

Part I: Foundations (72 hours)

Part I of will help you the build critical skills and create a solid foundation to prepare you for entry-level positions such as IT hardware technician or helpdesk technician. Part I covers a wide variety of IT subject areas including hardware, software, networking, mobile devices, and security. Within each area, you will learn to identify components, install hardware and software, implement industry best practices, and troubleshoot common problems. 

The cost of CompTIA IT Fundamentals (ITF+) exam is included with Part I. You may elect to take the A+ exam at an additional cost. 

Part II:  Intermediate (66 hours)

In Part II, you will build upon knowledge learned from Part I: Foundations. In it, we have included the materials for you to successfully take the CompTIA Network+ and Security+ exams. In Network + you will develop the knowledge and skills needed to design functional networks; configure, manage and maintain essential network devices; and use switches and routers to create resilient networks. The Security+ section teaches baseline cyber security skills that prepare you for a wider range of employment, including intermediate level cyber security jobs.

Part II includes one exam voucher for either the Network+ or Security+ exams in the tuition. 

About CompTIA IT Fundamentals (ITF+) Certification

The CompTIA ITF+ certification helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT. The exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike.

About CompTIA A+ Certification

The CompTIA A+ certification is the industry standard for establishing a career in IT. The performance-based exams certify foundational IT skills across a variety of devices and operating systems.

About CompTIA Network+ Certification

The CompTIA Network+ certification is a mid-level certification for network technicians. The Network+ exam tests the skills needed to design, configure, manage and troubleshoot any wired and wireless devices. In order to receive the Network+ certification, you must pass one exam.

About CompTIA Security+ Certification

Security is one of the fastest-growing fields in IT. The CompTIA Security+ certification is an international, vendor-neutral certification that demonstrates core competencies required for any cybersecurity role and prepares you for intermediate-level cybersecurity jobs. In order to receive the Security+ certification, you must pass one exam.

Course Outline

IT Fundamentals+

Module 1. Using Computers

  • Common Computing Devices
  • Using a PC
  • Using an OS
  • Managing an OS
  • Troubleshooting and Support

Module 2. Using Apps and Databases

  • Using Data Types and Units
  • Using Apps
  • Programming and App Development
  • Using Databases

Module 3. Using Computer Hardware

  • System Components
  • Using Device Interfaces
  • Using Peripheral Devices
  • Using Storage Devices
  • Using File Systems

Module 4. Using Networks

  • Networking Concepts
  • Connecting to a Network
  • Secure Web Browsing
  • Using Shared Storage
  • Using Mobile Devices

Module 5. Security Concepts

  • Security Concerns
  • Using Best Practices
  • Using Access Control
  • Behavioral Security Concepts

A+ Core 1

Module 1. PC Components

  • Use Appropriate Safety Procedures
  • PC Components
  • Common Connection Interfaces
  • Install Peripheral Devices
  • Troubleshooting Methodology

Module 2. Display and Multimedia Devices

  • Install and Configure Display Devices
  • Troubleshoot Display Devices
  • Install and Configure Multimedia Devices

Module 3. Storage Devices

  • Install System Memory
  • Install and Configure Mass Storage Devices
  • Install and Configure Removable Storage
  • Configure RAID
  • Troubleshoot Storage Devices

Module 4. Internal System Components

  • Install and Upgrade CPUs
  • Configure and Update BIOS/UEFI
  • Install Power Supplies
  • Troubleshoot Internal System Components
  • Configure a Custom PC

Module 5. Network Infrastructure Concepts

  • Wired Networks
  • Network Hardware Devices
  • Wireless Networks
  • Internet Connection Types
  • Network Configuration Concepts
  • Network Services

Module 6. Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connections
  • Install and Configure IoT Devices

Module 7. Client Virtualization and Cloud Computing

  • Configure Client-Side Virtualization
  • Cloud Computing Concepts

Module 8. Laptops

  • Use Laptop Features
  • Install and Configure Laptop Hardware
  • Troubleshoot Common Laptop Issues

Module 9. Mobile Devices

  • Mobile Device Types
  • Connect and Configure Mobile Device Accessories
  • Configure Mobile Device Network Connectivity
  • Support Mobile Apps

Module 10. Print Devices

  • Maintain Laser Printers
  • Maintain Inkjet Printers
  • Maintain Impact, Thermal, and 3D Printers
  • Install and Configure Printers
  • Troubleshoot Print Device Issues
  • Install and Configure Imaging Devices

A+ Core 2

Module 1. Supporting Operating Systems

  • Identify Common Operating Systems
  • Use Windows Features and Tools
  • Manage Files in Windows
  • Manage Disks in Windows
  • Manage Devices in Windows

Module 2. Operating Systems

  • Configure and Use Linux
  • Configure and Use macOS
  • Install and Upgrade Operating Systems
  • Maintain OSs

Module 3. Microsoft Windows

  • Install and Manage Windows Applications
  • Manage Windows Performance
  • Troubleshoot Windows

Module 4. Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connections

Module 5. Managing Users, Workstations, and Shared Resources

  • Manage Users
  • Configure Shared Resources
  • Configure Active Directory Accounts and Policies

Module 6. Security Concepts

  • Logical Security Concepts
  • Threats and Vulnerabilities
  • Physical Security Measures

Module 7. Securing Workstations and Data

  • Implement Security Best Practices
  • Implement Data Protection Policies
  • Protect Data During Incident Response

Module 8. Workstation Security Issues

  • Detect, Remove, and Prevent Malware
  • Troubleshoot Common Workstation Security Issues

Module 9. Mobile Devices

  • Secure Mobile Devices
  • Troubleshoot Mobile Device Issues

Module 10. Implementing Operational Procedures

  • Use Appropriate Safety Procedures
  • Environmental Impacts and Controls
  • Create and Maintain Documentation
  • Use Basic Change Management Best Practices
  • Implement Disaster Prevention and Recovery Methods
  • Basic Scripting Concepts
  • Professionalism and Communication

Network +

Module 1. Network Basics

  • Network concepts
  • Network architectures
  • The OSI model

Module 2. Wired Computer to Computer Connections

  • Wired network connections
  • Network interface cards and modems

Module 3. Network-to-Network Connections

  • Network-to-network connection components
  • LAN wiring
  • LAN wiring tests

Module 4. Wired Internetworking Devices

  • Basic internetworking devices
  • Specialized internetworking devices

Module 5. Wired Communication Standards

  • The TCP/IP protocol suite
  • TCP/IP
  • DHCP servers

Module 6. Wireless Networking

  • Wireless network devices
  • Wireless networking standards
  • Wireless configuration

Module 7. Security Threats and Mitigation

  • Security threats
  • Threat mitigation

Module 8. Security Practices

  • Operating systems
  • Devices

Module 9. Network Access Control

  • Authentication
  • Public key cryptography
  • Remote access
  • Wireless security

Module 10. Monitoring

  • Monitoring resources
  • Event viewer

Module 11. Troubleshooting

  • Troubleshooting basics
  • Troubleshooting the network
  • Troubleshooting scenarios

Security +

Module 1. Risk, Infrastructure, and Connectivity

  • Risk Assessment
  • Developing Policies, Standards, and Guidelines
  • Risks Associated with Cloud Computing
  • Understanding Control Types
  • Incident Management
  • Infrastructure and Connectivity
  • Mastering TCP/IP
  • Distinguishing Between Security Topologies
  • IPv4 vs. IPv6
  • Understanding Remote Access

Module 2. Network Security

  • Protecting Networks
  • Monitoring and Diagnosing Networks
  • Intrusion Detection Systems
  • Protocol Analyzers
  • Securing Workstations
  • Threats and Vulnerabilities
  • Software Exploitation
  • Surviving Malicious Code
  • Calculating Attack Strategies
  • Recognizing Common Attacks

Module 3. Access Control and Protecting the User

  • Access Control Basics
  • Identity Management
  • Remote Access Connectivity
  • Authentication Services
  • Educating and Protecting the User Security Awareness Training
  • Classifying Information
  • Complying with Privacy and Security Regulations
  • Social Engineering
  • Types of Social Attacks

Module 4. Application, Cryptography, and Host Security

  • Operating Systems and Application Security
  • Hardening the Operating System
  • Working with Data Repositories
  • Host Security
  • Mobile Devices
  • Cryptography Basics
  • Cryptography Algorithms
  • Cryptographic Systems
  • Cryptography Implementations
  • Public Key Infrastructure Page 6 of 6
  • Preparing for Cryptographic Attacks
  • Key Life Cycle

Module 5. Physical Security and Network Vulnerabilities

  • Physical and Hardware-Based Security
  • Implementing Access Control’
  • Maintaining Environmental and Power Controls
  • Fire Suppression
  • Security and Vulnerability in the Network
  • Security Threats
  • Secure Network Administration Principals
  • Mitigation and Deterrent Techniques
  • Wireless Networking Security
  • Understanding Mobile Devices
  • Wireless Vulnerabilities

Module 6. Data Recovery and Administration

  • Disaster Recovery and Incident Response
  • Understanding Business Continuity
  • Impact Analysis
  • Reinforcing Vendor Support
  • Security-Related Policies and Procedures
  • Security Administration
  • Administrator’s Troubleshooting Guide
  • Access Control Issues
  • Auditing
  • Authentication Schemes
  • Back-Up Management
  • File Sharing Basics
  • Preventing Common Malicious Events

Download Course Outline (PDF)

Technology Requirements

Hardware Requirements

  • This course can be taken on either a PC or Mac.

Software Requirements

  • PC: Windows 8 or later.
  • Mac: OS X Yosemite 10.10 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Download the Flash Player.
  • Adobe Acrobat Reader. Download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.   

Other

  • Email capabilities and access to a personal email account.
About the Instructor

Gil Agyapong