The goal of this program is to prepare students to work in the Information Technology field in a variety of positions working with Desktops, Servers, Networks, and more. Courses include preparation for industry standard certification in Microsoft 365 Certified Enterprise Administrator Expert, Microsoft Certified Azure Solutions Architect Expert, Certified Ethical Hacker (CEH), Cisco Certified Networking Professional (CCNP), Certified Associate in Project Management (CAPM), Project Management Professional (PMP), Certified Information Security Manager (CISM), and Information Technology Infrastructure Library (ITIL) Foundation.
Competency Goals
- Design and implement Microsoft 365 services
- Manage user identity and roles; access and authentication
- Plan Office 365 workloads and applications
- Implement modern device services, Microsoft 365 security, and threat management
- Manage Microsoft 365 governance and compliance
- Implement and monitor an Azure infrastructure; management and security solutions; solutions for apps; and data platforms
- Design monitoring, identity and security, data storage, business community, and infrastructure
- Understand how perimeter defenses work, and how intruders escalate privileges
- Secure various systems against intrusion
- Understanding Intrusion Detection, Policy Creation, Social Engineering, DDos Attacks, Buffer Overflows, and Virus Creation
- Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implement network redundancy using protocols (incl. Hot Standby Routing Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP))
- Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Define and develop a project management plan and plan components
- Plan a project schedule, project costs; Plan for quality, resources, procurements, and risk
- Initiate and execute a project
- Monitor project work, scope, risks, stakeholder engagement, and communications
- Control project changes, scope, schedule, costs, quality, resources, and procurements
- Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations
- Identify and manage information security risks to achieve business objectives
- Create a program to implement the information security strategy
- Implement an information security program
- Oversee and direct information security activities to execute the information security program
- Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents
- Understand service management as a practice; and the ITIL service lifecycle
- Understand generic concepts and definitions of the ITIL service lifecycle; key principles and models; selected processes, functions, and roles; technology and architecture; competence and training
This program is 720 total contact hours over a 24-30 week period. Classes are offered in the daytime Monday through Thursday from 9:30am until 2:30pm; or in the evening from 5:30pm until 10:30pm. In order to complete the Cybersecurity Certified Manager program, students must complete all seven of the courses listed below:
Required Courses |
|
||||||
---|---|---|---|---|---|---|---|
Networking and Security VII |
|
||||||
Networking and Security VIII |
|
||||||
Networking and Security IX |
|
||||||
Networking and Security X |
|
||||||
Networking and Security XI |
|
||||||
Networking and Security XII |
|
||||||
Total |
|
Sample Job Titles:
Server Administrator, Systems Administrator, Network Administrator, Systems Engineer, Network Operation Technician, Network Support Specialist, Network Support Technician, Network Technician, Computer Support Specialist, Helpdesk Support, Desktop Support, or other similar jobs.
Learning Methodology: Blended
Credential Awarded: Certificate of Completion
Length of Program: 720 Clock Hours (7.5 Months)
Lecture/Lab Hours: 288/432
Maximum Student/Teacher Ratio: 25:1
Withdrawal Fee: $100.00
Prerequisites: Either 1 year relevant work experience, 1 year postsecondary education at an accredited institution in a related field, or 1 industry certification in a related field
Recommended: Previous experience in IT, networking, server administration recommended
Tuition for Program: $18,700.00
Course Materials Fee (nonrefundable): $3,000.00
Tuition and Fees Breakdown by Course:
Course Name | Tuition | Course Materials |
---|---|---|
Networking and Security VII | $3,116.67 | $500.00 |
Networking and Security VIII | $3,116.67 | $500.00 |
Networking and Security IX | $3,116.67 | $500.00 |
Networking and Security X | $3,116.67 | $500.00 |
Networking and Security XI | $3,116.67 | $500.00 |
Networking and Security XII | $3,116.67 | $500.00 |
TOTAL | $19,300.00 | $3,000.00 |
Included in Course Materials Fee (nonrefundable)
Course Name | Digital Course Content | Virtual Labs | Practice Tests | eBooks |
---|---|---|---|---|
Networking and Security VII | $150.00 | $200.00 | $100.00 | $25.00 |
Networking and Security VIII | $150.00 | $225.00 | $100.00 | $25.00 |
Networking and Security IX | $150.00 | $225.00 | $100.00 | $25.00 |
Networking and Security X | $150.00 | $225.00 | $100.00 | $25.00 |
Networking and Security XI | $150.00 | $225.00 | $100.00 | $25.00 |
Networking and Security XII | $150.00 | $225.00 | $100.00 | $25.00 |