Computer Technology Programs ►Computer Security Technician (CompTIA Security+ and Network+) Certificate Program with Externship
Program includes National Certification & an Externship Opportunity
- Course Duration: 6 Months
- Type: Certificate
- Languages: English
- Certifications : Included
- Course Contact Hours : 375
- Externship : Included
Computer Security Technician (CompTIA Security+ and Network+)
The Computer Security Technician CompTIA Security+ and Network+ program is designed to prepare students to function as computer professionals in multiple technical, business, and healthcare settings. Sec+ technicians serve many technical support and IT operation roles with job titles such Systems Administrator, Security Administrator, Junior IT/Auditor, Penetration Tester, and Security Consultant as well as Network Field Technician, Help Desk Technician, and Network Support Specialist.
Computer Security Technician (CompTIA Security+ and Network+) Program
The Computer Security Technician CompTIA Security+ and Network+ Program program is to prepare students to support the IT infrastructure through installing and configuring systems to secure applications, networks, and devices as well as perform threat analysis and respond with appropriate mitigation techniques. It also prepares students to students learn to manage, maintain, troubleshoot, install, operate, and configure basic network infrastructure as well as describe networking technologies, understand basic design principles, adhere to wiring standards, and use testing tools.
Program Objectives
At the conclusion of this program, students will be able to:
- Designing,implementing,configuring,managing,and maintaining networks and network devices
- Troubleshooting network problems
- Identifying strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend against them
- Applying the principles of organizational security and the elements of effective security policies
- Applying the technologies and uses of cryptographic standards and products
- Installing and configuring network- and host-based security technologies
- Enforcing wireless and remote access security
- Applying the standards and products used to enforce security on web and communications technologies
- Implementing strategies for ensuring business continuity,fault tolerance,and disaster recovery
- Identifying application and coding vulnerabilities and the development and deployment methods designed to mitigate them
- Communicating effectively and professionally
TOPOLOGIES, THE OSI MODEL, AND ETHERNET
- Explain devices, applications, protocols, and services at their appropriate OSI layers
- Explain the concepts and characteristics of routing and switching
- Compare and contrast the characteristics of network topologies, types, and technologies
- Deploy the appropriate cabling solution
HUBS, BRIDGES, AND SWITCHES
- Explain the concepts and characteristics of routing and switching
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
- Explain common mitigation techniques and their purposes
INFRASTRUCTURE AND DESIGN, POLICIES AND BEST PRACTICES
- Explain the concepts and characteristics of routing and switching
- Compare and contrast the characteristics of network topologies, types, and technologies
- Identify policies and best practices
INTERNET PROTOCOL AND IP ADDRESSING
- Explain the purposes and uses of ports and protocols
- Configure the appropriate IP addressing components
- Explain the concepts and characteristics of routing and switching
DHCP AND APIPA
- Explain the purposes and uses of ports and protocols
- Given a scenario, configure the appropriate IP addressing components
- Explain the functions of network services
ROUTING
- Explain the concepts and characteristics of routing and switching
- Configure the appropriate IP addressing components
- Determine the appropriate placement of networking devices on a network and install/configure them
TCP AND UDP
- Explain the purposes and uses of ports and protocols
- Explain common scanning, monitoring, and patching processes and summarize their expected outputs
NAME RESOLUTION
- Explain the purposes and uses of ports and protocols
- Explain the functions of network services
MONITORING, SCANNING, AND NETWORK TROUBLESHOOTING
- Explain the purposes and uses of ports and protocols
- Explain common scanning, monitoring, and patching processes and summarize their expected outputs
- Implement network device hardening
- Explain the network troubleshooting methodology
- Troubleshoot common wired connectivity and performance issues
- Troubleshoot common network service issues
APPLICATIONS AND SERVICES, VIRTUALIZATION, SAN, AND CLOUD SERVICES
- Explain the purposes and uses of ports and protocols
- Explain the concepts and characteristics of routing and switching
- Explain the functions of network services
- Determine the appropriate placement of networking devices on a network and install/configure them
- Explain the purposes and use cases for advanced networking devices
- Troubleshoot common wired connectivity and performance issues
- Troubleshoot common network service issues
- Summarize cloud concepts and their purposes
- Explain the purposes of virtualization and network storage technologies
NETWORK SECURITY DESIGN AND APPLIANCES
- Implement network device hardening
- Explain common mitigation techniques and their purposes
- Troubleshoot common wired connectivity and performance Issues
- Explain the purposes and use cases for advanced networking devices
- Summarize common network attacks
- Troubleshoot common network service issues
AUTHENTICATION, ENDPOINT SECURITY, AND NETWORK SITE MANAGEMENT
- Explain the purposes and uses of ports and protocols
- Explain the purposes and use cases for advanced networking devices
- Explain authentication and access controls
- Summarize common networking attacks
- Explain common mitigation techniques and their purposes
- Deploy the appropriate cabling solution
- Use appropriate documentation and diagrams to manage the network
- Compare and contrast business continuity and disaster recovery concepts
- Summarize the purposes of physical security devices
INSTALLING CABLED NETWORKS
- Given a scenario, deploy the appropriate cabling solution
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
- Troubleshoot common wired connectivity and performance issues
INSTALLING WIRELESS NETWORKS
- Compare and contrast the characteristics of network topologies, types, and technologies
- Given a scenario, implement the appropriate wireless technologies and configurations
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
- Explain the purposes and use cases for advanced networking devices
- Given a scenario, secure a basic wireless network
- Summarize common networking attacks
- Troubleshoot common wireless connectivity and performance issues
INSTALLING WAN LINKS
- Explain the concepts and characteristics of routing and switching
- Compare and contrast the characteristics of network topologies, types, and technologies
- Implement the appropriate wireless technologies and configurations
- Determine the appropriate placement of networking devices on a network and install/configure them
- Compare and contrast WAN technologies
CONFIGURING REMOTE ACCESS
- Explain the purposes and uses of ports and protocols
- Explain the purposes and use cases for advanced networking devices
- Compare and contrast WAN technologies
INDICATORS OF COMPROMISE
- Analyze indicators of compromise and determine the type of malware
- Compare and contrast types of attacks
- Explain threat actor types and attributes
- Troubleshoot common security issues
CRITICAL SECURITY CONTROLS AND SECURITY POSTURE ASSESSMENT TOOLS
- Explain penetration testing concepts
- Explain vulnerability scanning concepts
- use appropriate software tools to assess the security posture of an organization
- Explain use cases and purpose for frameworks, best practices, and secure configuration guides
- Explain risk management processes and concepts
- Compare and contrast various types of controls
- Use appropriate software tools to assess the security posture of an organization
INCIDENT RESPONSE
- Follow incident response procedure
CRYPTOGRAPHY
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
PUBLIC KEY INFRASTRUCTURE
- Explain the impact associated with types of vulnerabilities
- Install and configure network components, both hardware- and software-based, to support organizational security
- Explain cryptography algorithms and their basic characteristics
- Implement public key infrastructure
IDENTIFICATION AND AUTHENTICATION
- Compare and contrast types of attacks
- Given a scenario, use appropriate software tools to assess the security posture of an organization
- Troubleshoot common security issues
- Compare and contrast identity and access management concepts
- Install and configure identity and access services
- Implement identity and access management controls
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
IDENTITY AND ACCESS SERVICES AND ACCOUNT MANAGEMENT
- Implement secure protocols
- Compare and contrast identity and access management concepts
- Install and configure identity and access services
- Explain the impact associated with types of vulnerabilities
- Differentiate common account management practices
SECURE NETWORK DESIGN
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Install and configure network components, both hardware- and software-based, to support organizational security
- Implement secure network architecture concepts
FIREWALLS, LOAD BALANCERS, IDS, AND SIEM
- Analyze and interpret output from security technologies
SECURE WIRELESS ACCESS AND PHYSICAL SECURITY CONTROLS
- Install and configure network components, both hardware- and software-based, to support organizational security
- Troubleshoot common security issues
- Analyze and interpret output from security technologies
- Implement secure network architecture concepts
- Compare and contrast types of attacks
- Install and configure wireless security settings
- Explain the importance of physical security controls
SECURE PROTOCOLS, SERVICES, AND REMOTE ACCESS
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Install and configure network components, both hardware- and software-based, to support organizational security
- Implement secure protocols
- Implement secure network architecture concepts
SECURE SYSTEMS DESIGN
- Explain the impact associated with types of vulnerabilities
- Troubleshoot common security issues
- Analyze and interpret output from security technologies
- Given a scenario, implement secure systems design
- Explain the security implications of embedded systems
SECURE MOBILE DEVICE SERVICES, VIRTUALIZATION, AND CLOUD SERVICES
- Given a scenario, deploy mobile devices securely
- Explain the impact associated with types of vulnerabilities
- Summarize cloud and virtualization concepts
FORENSICS
- Summarize basic concepts of forensics
DISATER RECOVERY, RESILIENCY, AND RISK MANAGEMENT
- Explain the impact associated with types of vulnerabilities
- Use appropriate software tools to assess the security posture of an organization
- Explain how resiliency and automation strategies reduce risk
- Explain disaster recovery and continuity of operation concepts
- Troubleshoot common security issues
- Summarize business impact analysis concepts
- Explain risk management processes and concepts
SECURE APPLICATION DEVELOPMENT AND ORGANIZATIONAL SECURITY
- Compare and contrast types of attacks
- Explain the impact associated with types of vulnerabilities
- Explain the importance of secure staging deployment concepts
- Summarize secure application development and deployment concepts
- Given a scenario, use appropriate software tools to assess the security posture of an organization
- Explain the importance of policies, plans, and procedures related to organizational security
- Carry out data security and privacy practices
Note: This program can be completed in 6 months. However, students will have online access to this program for a 24-month period.
Education and National Certifications
- Students should have or be pursuing a high school diploma or GED.
- There are several National Certification exams that are available to students who successfully complete this program:
- CompTIA Security+ Certification (Exam SY0-501)
- CompTIA Network+ Certification (Exam N10-007).
National Certification
Upon successful completion of this Tyler Junior College program, students would be eligible to sit for the CompTIA Security+ Certification (Exam SY0-501) and CompTIA Network+ Certification (Exam N10-007)exams.Students who complete this program are encouraged to complete the externship option with their program. Students who complete this program can and do sit for the national certification exam and are qualified, eligible and prepared to do so. Clemson University works with each student to complete the exam application and register the student to take their national certification exam.
Externship / Hands on Training / Practicum
Although not a requirement, once students complete the program, they have the ability to participate in an externship and/or hands on practicum so as to practice the skills necessary to perform the job requirements of a professional in this field. Students will be assisted with completing a resume and/or other requirements necessary to work in this field. All students who complete this program are eligible to participate in an externship and will be placed with a participating organization near their location. Tyler Junior College works with national organizations and has the ability to place students in externship opportunities nationwide.
Note: No refunds can be issued after the start date published in your Financial Award document.