CYBER SECURITY
CYB100: Cybersecurity I: Intro to IT and Cybersecurity
Course Summary
Course Summary: The Cybersecurity I: Intro to IT and Cybersecurity course is designed to provide the foundational building blocks professionals need to enter the field of information security or cybersecurity. Participants will become familiar with basic information technology concepts and also understand potential vulnerabilities, threats and mitigation tactics to protect data and systems. The focus on Confidentiality, Integrity, and Availability (CIA) Triad along with access control are covered in detail. All participants will be provided with career and workforce development support to help facilitate placement into the field.
Target Audience
Is KP’s CYB100 course right for you?
You should consider the following in making that determination…
- • Are you interested in entering a career in technology with a focus on information security to take advantage of the growing demand for cybersecurity professionals?
- • Are you a recent high school graduate, received your GED or career switcher?
- • Are you a working professional interested in additional education but need a program that emphasizes work/life balance?
- • Are you interested in cybersecurity and have a basic understanding of computer systems (i.e., you know the difference between an operating system vs. a software application)?
- • Would you like to blend your interest in providing customer service and technology?
- • Would you like to learn the foundations of information security so you better understand security concepts, principles, and terms?
- • Would you like to earn an industry recognized certification?
If your professional goals are reflected within these questions and you answered affirmatively to many of them, the Cybersecurity I: Intro to IT & Cybersecurity is a great resource to move you forward. This course is designed to educate you about technology and cybersecurity and also prepare you for a career as a Service Desk Analyst, Help Desk Tech, Technical Support Specialist, Associate Network Engineer, Data Support Technician, Desktop Support Administrator, or Jr. Security Analyst by providing you with workforce development workshops and preparing you to attain CompTia A+ an industry recognized certification:
Our online and hybrid delivery model allows users to proceed at their own pace while balancing the addition of this course to their existing work-life commitments. Our instructors are industry experts with substantial years of professional experience in the field and the classroom.
Course Content
Course Competencies
Competency List |
---|
1.1: Identify and clearly explain the issue, question, or problem under critical consideration.
1.2: Locate and access sufficient information to investigate the issue or problem. 1.3 Evaluate the information in a logical and organized manner to determine its value and relevance to the problem. 1.4 Consider and analyze information in context to the issue or problem. 1.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. |
Competency List |
---|
2.1 Define and appropriately use basic cybersecurity concepts and terminology.
2.2 Examine architectural methodologies and components used in the design and development of information systems. 2.3 Support policy decisions with the application of specific cybersecurity technologies and standards. |
Competency List |
---|
3.1 Evaluate national cybersecurity policy.
3.2 Evaluate international cybersecurity policy. 3.3 Evaluate enterprise cybersecurity policy. 3.4 Align an organization's security posture to applicable laws, statutes, and regulatory documents. |
Competency List |
---|
4.1 Report on current developments in cybersecurity management and policy.
4.2 Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them. 4.3 Design a cybersecurity defense framework composed of technologies and policies. |
Competency List |
---|
5.1 Business Continuity Planning and Implementation: Develop, implement, and maintain a business continuity plan, ensuring alignment with organizational goals and objectives.
5.2 Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective. Risk Assessment: Assess policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks and to manage mitigation strategies that achieve the security needed. 5.4 Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle. |
Competency List |
---|
6.1 Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
6.2 Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. 6.3 Provide sufficient, correctly cited support that substantiates the writer's ideas. 6.4 Tailor communications to the audience. 6.5 Use sentence structure appropriate to the task, message and audience. 6.6 Follow conventions of Standard Written English. 6.7 Create neat and professional looking documents appropriate for the project or presentation. 6.8 Create clear oral messages. |
Competency List |
---|
7.1 Lead and/or participate in a diverse group to accomplish projects and assignments.
7.2 Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team. 7.3 Contribute to team projects, assignments, or organizational goals as an engaged member of a team. 7.4 Demonstrate diversity and inclusiveness in a team setting. |
Competency List |
---|
8.1 Prepare a plan to achieve a professional goal.
8.2 Communicate qualifications for a chosen profession. 8.3 Network with people employed in a target profession. |
Additional Details
Timeline for Course
This course is designed to be completed within 12 weeks but can be completed in as little as 6 weeks for students that aggressively progress through each learning module. Much of the work is online and asynchronous allowing participants to engage with course content at times most convenient for your schedule. This program structure is deliberately designed to assist participants maintain their work-life balance while adding the time requirement of this course commitment to their plate
Why take a course from KP?
KP has provided academic, social and professional development services to youth and adults since 2008. The firm’s mission is to to help all participants in our programs achieve their full potential—fully integrated into their community, engaged in a career of their choosing and living an independent life that fulfills their personal goals and desires.
Why this specific course?
The CYB100 course is designed to provide a solid foundation in the field of project and program management for career changers and young professionals. The course will prepare you to take CompTia A+ certification, a nationally recognized credential desired by many employers and provide you with career counseling to maximize your success as you launch your project management career.
What You Will Receive?
Participants in this course will gain a solid understanding of the field of cybersecurity and information assurance, a certificate of completion and receive CompTia A+ certification (must successfully pass certification test).
Target Career Occupations
The CompTia A+ certification will prepare you for the following positions and others like them:
- • Service Desk Analyst
- • Help Desk Technician
- • Technical Support Specialist
- • Associate Network Engineer
- • Data Support Technician
- • Desktop Support Administrator
- • Jr. Security Analyst