Skip to main content


CYB100: Cybersecurity I: Intro to IT and Cybersecurity

Course Summary

Course Summary: The Cybersecurity I: Intro to IT and Cybersecurity course is designed to provide the foundational building blocks professionals need to enter the field of information security or cybersecurity. Participants will become familiar with basic information technology concepts and also understand potential vulnerabilities, threats and mitigation tactics to protect data and systems. The focus on Confidentiality, Integrity, and Availability (CIA) Triad along with access control are covered in detail. All participants will be provided with career and workforce development support to help facilitate placement into the field.

Target Audience


Delivery Methods

Hybrid | Online | Onsite

Certification Our Flyer
CompTia A+ dwnldico


Course Content
Course Competencies
Additional Details

Is KP’s CYB100 course right for you?

You should consider the following in making that determination…

  • • Are you interested in entering a career in technology with a focus on information security to take advantage of the growing demand for cybersecurity professionals?
  • • Are you a recent high school graduate, received your GED or career switcher?
  • • Are you a working professional interested in additional education but need a program that emphasizes work/life balance?
  • • Are you interested in cybersecurity and have a basic understanding of computer systems (i.e., you know the difference between an operating system vs. a software application)?
  • • Would you like to blend your interest in providing customer service and technology?
  • • Would you like to learn the foundations of information security so you better understand security concepts, principles, and terms?
  • • Would you like to earn an industry recognized certification?

If your professional goals are reflected within these questions and you answered affirmatively to many of them, the Cybersecurity I: Intro to IT & Cybersecurity is a great resource to move you forward. This course is designed to educate you about technology and cybersecurity and also prepare you for a career as a Service Desk Analyst, Help Desk Tech, Technical Support Specialist, Associate Network Engineer, Data Support Technician, Desktop Support Administrator, or Jr. Security Analyst by providing you with workforce development workshops and preparing you to attain CompTia A+ an industry recognized certification:

Our online and hybrid delivery model allows users to proceed at their own pace while balancing the addition of this course to their existing work-life commitments. Our instructors are industry experts with substantial years of professional experience in the field and the classroom.

Course Content

The program begins with an introduction to the basic concepts of information technology which may be a review for students with previous exposure to these concepts. The focus is on reviewing operating systems, software applications and computer networking prior to discussing the security concepts. Strong proficiency and a clear understanding of these concepts is a prerequisite to entering into information security modules that follow
The Need for Security: Understanding the vulnerabilities, threats and attack vectors that are at the cornerstone of most cyberbreaches is the focus of this unit of training. The concepts of Confidentiality, Integrity, and Availability (CIA) Triad is introduced as the baseline for all information security considerations. Authentication, authorization and access control are included during this module.Participants will explore case studies to gain familiarity with diverse malicious attacks and reverse engineer vulnerabilities while determining approaches for mitigating and / or managing potential risks. Legal, Ethical and professional issues in information security are reviewed for global context of cybersecurity
Planning for Information Security: Once participants gain a solid understanding of IT and computer networks along side the key concepts of information assurance they are well prepared to began planning for helping individuals and organizations manage cybersecurity risks. A review of Intrusion detection and prevention systems along withother security tools, encryption and software troubleshooting is incorporated into this learning module. An analgous review is conducted on the malware tools and approaches that hackers use to breach systems is explored.
Security Operational Procedures: Participants will learn about the elements of an effective enterprise cybersecurity plan that must include physical security, personnel and asset management. This module focuses on the establishing policies and procedures that strengthen the organization’s security profile and how cyberthreats are constantly evolving. Continuous review and revision of corporate policies for email use, privacy protection and technology use are required.
Career & Workforce Development: The distinguishing factor that separates KP’s courses from other organizations is our focus on helping the participants in our program prepare for a career in industry. The program is structured to provide an opportunity for you to focus on the following skills: Presentation Skills, Leadership Skills, Customer Service, Interviewing Techniques, Dressing for Success, Business Etiquette and Career Planning.

Course Competencies

Competency List
1.1: Identify and clearly explain the issue, question, or problem under critical consideration.
1.2: Locate and access sufficient information to investigate the issue or problem.
1.3 Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
1.4 Consider and analyze information in context to the issue or problem.
1.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
Competency List
2.1 Define and appropriately use basic cybersecurity concepts and terminology.
2.2 Examine architectural methodologies and components used in the design and development of information systems.
2.3 Support policy decisions with the application of specific cybersecurity technologies and standards.
Competency List
3.1 Evaluate national cybersecurity policy.
3.2 Evaluate international cybersecurity policy.
3.3 Evaluate enterprise cybersecurity policy.
3.4 Align an organization's security posture to applicable laws, statutes, and regulatory documents.
Competency List
4.1 Report on current developments in cybersecurity management and policy.
4.2 Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them.
4.3 Design a cybersecurity defense framework composed of technologies and policies.
Competency List
5.1 Business Continuity Planning and Implementation: Develop, implement, and maintain a business continuity plan, ensuring alignment with organizational goals and objectives.
5.2 Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.
Risk Assessment: Assess policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks and to manage mitigation strategies that achieve the security needed.
5.4 Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.
Competency List
6.1 Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
6.2 Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
6.3 Provide sufficient, correctly cited support that substantiates the writer's ideas.
6.4 Tailor communications to the audience.
6.5 Use sentence structure appropriate to the task, message and audience.
6.6 Follow conventions of Standard Written English.
6.7 Create neat and professional looking documents appropriate for the project or presentation.
6.8 Create clear oral messages.
Competency List
7.1 Lead and/or participate in a diverse group to accomplish projects and assignments.
7.2 Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.
7.3 Contribute to team projects, assignments, or organizational goals as an engaged member of a team.
7.4 Demonstrate diversity and inclusiveness in a team setting.
Competency List
8.1 Prepare a plan to achieve a professional goal.
8.2 Communicate qualifications for a chosen profession.
8.3 Network with people employed in a target profession.

Additional Details

Timeline for Course

This course is designed to be completed within 12 weeks but can be completed in as little as 6 weeks for students that aggressively progress through each learning module. Much of the work is online and asynchronous allowing participants to engage with course content at times most convenient for your schedule. This program structure is deliberately designed to assist participants maintain their work-life balance while adding the time requirement of this course commitment to their plate

Why take a course from KP?

KP has provided academic, social and professional development services to youth and adults since 2008. The firm’s mission is to to help all participants in our programs achieve their full potential—fully integrated into their community, engaged in a career of their choosing and living an independent life that fulfills their personal goals and desires.

Why this specific course?

The CYB100 course is designed to provide a solid foundation in the field of project and program management for career changers and young professionals. The course will prepare you to take CompTia A+ certification, a nationally recognized credential desired by many employers and provide you with career counseling to maximize your success as you launch your project management career.

What You Will Receive?

Participants in this course will gain a solid understanding of the field of cybersecurity and information assurance, a certificate of completion and receive CompTia A+ certification (must successfully pass certification test).

Target Career Occupations

The CompTia A+ certification will prepare you for the following positions and others like them:

  • • Service Desk Analyst
  • • Help Desk Technician
  • • Technical Support Specialist
  • • Associate Network Engineer
  • • Data Support Technician
  • • Desktop Support Administrator
  • • Jr. Security Analyst