CYBER SECURITY COURSES ONLINE

Prepare to Level Up Your Career with Online Cyber Security Program Courses

ABOUT CYBER SECURITY PROGRAM COURSES ONLINE

As the world becomes increasingly digitized, new threats continue to emerge in the form of cyberattacks. Train in less than 8 months to fight them in our series of intensive online cyber security courses.

Over the span of the Cyber Security program, you’ll learn the theories and practices to identify vulnerabilities within organizations’ networks, fortify them against cyberthreats, and combat cyberattacks.

Within companies, cyber security is seldom the mission of one professional—but rather many. Train within the same cyber security technical team framework typical of industry settings. Complete these online cyber security courses with the technical and interpersonal skills to smoothly transition from student to specialist.

Prerequisite:

CompTIA Network+ or equivalent certification or passage of a readiness test is required to be accepted to the Cyber Security training program. *Woz U team will work with applicants.

What You’ll Learn in Cyber Security Program Courses

The cyber security curriculum modules are designed to instruct you to uncover weaknesses in various types of organizations’ security protocols using network assessment tools and state-of- the-art penetration test tactics. Set access and secure account management controls and develop proper admin hierarchies. Understand the nuances between different kinds of cyberattacks, security breaches, and malware attacks. Automate system administration tasks using proper programming languages. Apply theoretical models to secure web applications.

Find detailed descriptions of each cyber security course below.

cyber security macbook

CYBER SECURITY ONLINE COURSE LIST

Classes are offered as a total program via our Powered by Woz U Partner Schools.

Course Name Course Description—What’s Covered Course Length
Security Foundations Security Basics: fundamental security concepts; organizational security; threat actors and attributes; security controls business impact analysis; policy, procedures, and frameworks; risk management; and incident response and disaster recovery. Admission to course
System Administration Intro to System Administration Security: installation and configuration of network components to support organizational security and understanding threats, vulnerabilities, secure protocols, and secure system design. Approximately 3 to 4 weeks
Networking Foundations Network support and administration technical skills: media topologies; network support; protocols and standards. Approximately 3 to 4 weeks
Network Defense Hardware and software tools for the defense of network attacks. Tools to assess organizational security posture and vulnerabilities. Penetration and vulnerability testing. Approximately 3 to 4 weeks
Cryptography and Access Management Cryptography and Access management concepts and practices: cryptography algorithms to ensure safe transmission, storage, and use of sensitive data; implementation of access management controls and account management practices. Approximately 3 to 4 weeks
Logging and Monitoring Security log analysis on standard logs, specifically Intrusion Detection and Prevention Systems. Forensics analysis and chain of custody. Approximately 3 to 4 weeks
Programming Foundations Instruction in one of the most widely used high-level programming languages with general-purpose applications. Approximately 3 to 4 weeks
Web Application Security & Project Management Project Management and Web Application Security theoretical models and specific technical knowledge: methodology and practices for software project protection and Agile software development project management. Approximately 3 to 4 weeks
Threats and Vulnerabilities Threats and Vulnerabilities Fundamentals: those related to hardware, software, and people, including Social Engineering. Students taught to identify, compare, and contrast various types of attacks and their impacts. Approximately 3 to 4 weeks
Group Project Collaborative cyber security analysis. Approximately 6 weeks

*Course length subject to change without notice. Please consult with a representative on specific schedules.

WHY TAKE THESE CYBER SECURITY TRAINING COURSES?

Help secure the Homeland’s corporate digital infrastructure from bad actors across the world.

VALUE. You’ll get a lot of it from this Cyber Security program.

The online cyber security program and training curriculum offers a relatively quick and affordable way to train for in-demand careers in the technology and SecOps sector.

Receive comprehensive Cyber Security training in less than one year! Compete in the market with a certificate to prove to employers you have what it takes for the job.

Scale your career and learn and earn more in less than a year!

Compared to the national average of 5 percent for all occupations, job growth for information security analysts, as the Bureau of Labor Statistics calls them, is set to be 32 percent through 2028.[1] That’s 4X faster!

There are currently an estimated 300,000 unfilled Cyber Security jobs in the U.S. alone.

Cyber Security is a top priority for everyone from the Federal Government to private companies. It’s so critical, a bill called the New Collar Jobs Act has been introduced to encourage more individuals to choose this career path. Check out what the U.S. Defense Department says about the need for cyber security specialists:

We live in a wired world. Companies and countries rely on cyberspace for everything from financial transactions to the movement of military forces. … Today our reliance on the confidentiality, availability, and integrity of data stands in stark contrast to the inadequacy of our cybersecurity.” [2]

Training to become a cyber security specialist means preparing to play an integral role in protecting the Homeland and companies’ data and digital infrastructure.

  • Our advanced online learning experience platform (LXP) allows you to log into cyber security classes anytime and from anywhere in the world. Learn when it’s convenient for you, whether that’s during your lunch break from work, in the evenings, or on the go via a dedicated mobile app.

In this age of online job boards, an impressive resume is essential to landing that first interview. Show hiring managers you’re equipped for the job before you even meet them by adding a Cyber Security training certificate of completion to your resume.

MEET YOUR CYBER SECURITY COURSE INSTRUCTOR

Karissa Krause

Karissa Krause cyber security instructor

In her most recent position, Karissa worked as a contractor for the U.S. Air Force. In this role, she developed the Operations Document for one of their Security Operations Centers (SOC). She trained the team on their roles in network defense. She also detected active threats and acted as a liaison between the business units to improve the environment’s overall security posture.

In addition, Karissa worked as a contractor to audit cyber security courses and developed an email security program. As in most technology driven careers, she is always looking to expand her cyber security knowledge. She can’t wait to share her passion for cyber security with students.

Ready to Launch Your Cyber Security Career?

1 https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-6
2 https://archive.defense.gov/home/features/2015/0415_cyber-strategy/final_2015_dod_cyber_strategy_for_web.pdf

Ready to Launch Your Cyber Security Career?