CYBER SECURITY COURSES ONLINE
Prepare to Level Up Your Career with Online Cyber Security Program Courses
ABOUT CYBER SECURITY PROGRAM COURSES ONLINE
As the world becomes increasingly digitized, new threats continue to emerge in the form of cyberattacks. Train in less than 8 months to fight them in our series of intensive online cyber security courses.
Over the span of the Cyber Security program, you’ll learn the theories and practices to identify vulnerabilities within organizations’ networks, fortify them against cyberthreats, and combat cyberattacks.
Within companies, cyber security is seldom the mission of one professional—but rather many. Train within the same cyber security technical team framework typical of industry settings. Complete these online cyber security courses with the technical and interpersonal skills to smoothly transition from student to specialist.
CompTIA Network+ or equivalent certification or passage of a readiness test is required to be accepted to the Cyber Security training program. *Woz U team will work with applicants.
What You’ll Learn in Cyber Security Program Courses
The cyber security curriculum modules are designed to instruct you to uncover weaknesses in various types of organizations’ security protocols using network assessment tools and state-of- the-art penetration test tactics. Set access and secure account management controls and develop proper admin hierarchies. Understand the nuances between different kinds of cyberattacks, security breaches, and malware attacks. Automate system administration tasks using proper programming languages. Apply theoretical models to secure web applications.
Find detailed descriptions of each cyber security course below.
CYBER SECURITY ONLINE COURSE LIST
Classes are offered as a total program via our Powered by Woz U Partner Schools.
|Course Name||Course Description—What’s Covered||Course Length|
|Security Foundations||Security Basics: fundamental security concepts; organizational security; threat actors and attributes; security controls business impact analysis; policy, procedures, and frameworks; risk management; and incident response and disaster recovery.||Admission to course|
|System Administration||Intro to System Administration Security: installation and configuration of network components to support organizational security and understanding threats, vulnerabilities, secure protocols, and secure system design.||Approximately 3 to 4 weeks|
|Networking Foundations||Network support and administration technical skills: media topologies; network support; protocols and standards.||Approximately 3 to 4 weeks|
|Network Defense||Hardware and software tools for the defense of network attacks. Tools to assess organizational security posture and vulnerabilities. Penetration and vulnerability testing.||Approximately 3 to 4 weeks|
|Cryptography and Access Management||Cryptography and Access management concepts and practices: cryptography algorithms to ensure safe transmission, storage, and use of sensitive data; implementation of access management controls and account management practices.||Approximately 3 to 4 weeks|
|Logging and Monitoring||Security log analysis on standard logs, specifically Intrusion Detection and Prevention Systems. Forensics analysis and chain of custody.||Approximately 3 to 4 weeks|
|Programming Foundations||Instruction in one of the most widely used high-level programming languages with general-purpose applications.||Approximately 3 to 4 weeks|
|Web Application Security & Project Management||Project Management and Web Application Security theoretical models and specific technical knowledge: methodology and practices for software project protection and Agile software development project management.||Approximately 3 to 4 weeks|
|Threats and Vulnerabilities||Threats and Vulnerabilities Fundamentals: those related to hardware, software, and people, including Social Engineering. Students taught to identify, compare, and contrast various types of attacks and their impacts.||Approximately 3 to 4 weeks|
|Group Project||Collaborative cyber security analysis.||Approximately 6 weeks|
*Course length subject to change without notice. Please consult with a representative on specific schedules.
WHY TAKE THESE CYBER SECURITY TRAINING COURSES?
Help secure the Homeland’s corporate digital infrastructure from bad actors across the world.
VALUE. You’ll get a lot of it from this Cyber Security program.
The online cyber security program and training curriculum offers a relatively quick and affordable way to train for in-demand careers in the technology and SecOps sector.
Receive comprehensive Cyber Security training in less than one year! Compete in the market with a certificate to prove to employers you have what it takes for the job.
Scale your career and learn and earn more in less than a year!
MEET YOUR CYBER SECURITY COURSE INSTRUCTOR
In her most recent position, Karissa worked as a contractor for the U.S. Air Force. In this role, she developed the Operations Document for one of their Security Operations Centers (SOC). She trained the team on their roles in network defense. She also detected active threats and acted as a liaison between the business units to improve the environment’s overall security posture.
In addition, Karissa worked as a contractor to audit cyber security courses and developed an email security program. As in most technology driven careers, she is always looking to expand her cyber security knowledge. She can’t wait to share her passion for cyber security with students.