0% found this document useful (0 votes)
44 views5 pages

Cybersecurity Career Pathway

Uploaded by

cvtjb2439
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views5 pages

Cybersecurity Career Pathway

Uploaded by

cvtjb2439
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CYBERSECURITY

SPECIALIST
PROGRAM OUTLINE

PROGRAM OVERVIEW ADMISSIONS PREREQUISITES


The increased reliance on computer systems, the internet, All applicants must meet with an admissions representative in
connected technologies and smart devices has made addition to ONE of the following criteria:
cybersecurity a critical concern for organizations and individuals
Standard Admission
alike. Keeping devices, data and information secure and
protected from risks and vulnerabilities is a critical area of  Alberta high school diploma or equivalent verified by
activity for all organizations. This has led to an ever-growing transcript or DAR.
increase in demand for individuals possessing the skills to Mature Admission
assess, plan and implement a cybersecurity defense strategy. Students must meet ALL of the following criteria:
The Cybersecurity Specialist program is designed for students  Be at least 18 years of age prior to admission (19 for out of
wishing to pursue a career in planning, implementing, province); and
administering, supporting and securing networked computer
systems and their users. Network design, installation,
 Successful completion of the CDI College Admissions Test.
 *Manitoba applicants must also have been out of school
maintenance and management as well as implementation, and
for one year in addition to the above
operating computer services are the backbone of the
information technology industry. In addition, this program
explores the tools and techniques for monitoring and evaluating GRADUATION REQUIREMENTS
networks for security risks and vulnerabilities.
 Successful completion of all on-campus courses with a
60% overall average (and each individual course).
PROGRAM OBJECTIVES  Successful completion of the work experience component
The Cybersecurity Specialist program will provide students with (field study).
the skills to plan, implement, administer, maintain and secure a  Successful completion of all assignments and tasks
computer network. The program fosters the development of required in the Career & Employment Strategies course.
sound computer user support skills, network administration skills
and security and vulnerability assessment and remediation skills
required to meet employers' needs in these areas.
CERTIFICATIONS RECEIVED
Cybersecurity Specialist Diploma
The content of this networking program is based on industry
certification requirements determined by Microsoft, CompTIA
and Cisco. If you determine that certification is an additional
INDUSTRY CERTIFICATION
goal to your diploma, our courses will help to prepare you for Industry and vendor certifications have become a benchmark
your exams. Furthermore, your active participation in our used by employers in the hiring process. The Cybersecurity
Learning System will help you to develop confidence in your Specialist program helps students prepare for *certification
abilities as an IT professional. examinations in six areas:
 Computing Technology Industry Association (CompTIA)
A+, Net+, Security+, CySA+, PenTest+
PROGRAM DURATION
 Cisco Certified Network Associate (CCNA)
Total program hours 1,555 hours
Total program length 74 weeks *Completion of the certification examinations are strongly
recommended.

CAREER OPPORTUNITIES SCHEDULE


The campus determines the start date for this program and how
The Cybersecurity Specialist program focuses on preparing
frequently the program is delivered will depend on enrolments.
students to design, implement, manage, maintain and secure
Students enter the program in the introductory phase.
computers and network installations in organizations of all sizes,
from small firms with a single local area network (LAN) to global
On campus courses are normally scheduled Monday to Friday,
corporations with large wide area networks (WANs) and
with students expected to attend all sessions, which are four
wireless capabilities spanning multiple geographical locations.
hours in length. Specific class/lab hours and schedule will be
provided by the campus at the time of enrolment.

The work experience (field study) component is full-time hours


(usually 7.5 hours per day, five days per week); however, these
schedules may vary depending upon the needs and
requirements of the host placement sites. Any hours missed
during the work experience component must be ‘made up’ in
order to meet the attendance requirements.

© 2020 1 AB-CDI-CBS-1220
CYBERSECURITY
SPECIALIST
PROGRAM OUTLINE

PROGRAM FACTS Course Descriptions


The on-campus courses are facilitated by an instructor four SSS4: Student Success Strategies (20 hours)
hours per day, typically Monday to Friday. The learning centre
The purpose of this course is to provide students with the
(lab) is accessible outside of regular hours to work on
knowledge, skills and study techniques to help foster effective
assignments and private study.
learning and a positive educational experience. This course
explores two components of learning styles, Multiple
The work experience must be completed after the technical
Intelligence-based theory and Personality Spectrum – MBTI
training phase of the program. The exact hours of the
based theory, and how learning styles and personality types
practicum (hours per day, days of the week) may vary
affect learning. The course will cover the importance of values,
depending on the placement host, so students need to be
their relationship to goals and goal setting. Strategies for setting
flexible in their schedule and have transportation to and from
personal goals, prioritizing tasks, managing time and the stress
the work experience location.
that results from study or work situations will be explored and
practiced through active participation in learner centered
COURSE BREAKDOWN activities. Effective study habits, techniques for preparing for
tests and productive note taking strategies are key topics of this
Course # Course Name Hours course that will provide the students with the necessary skills
and attitudes to be successful in school. Having a sound
INTRODUCTORY PHASE
understanding of financial, money, credit and debt matters and
SSS4 Student Success Strategies 20
their implication on our lives is critical knowledge to have.
ITC4 Introduction to Computers 40 Students taking this course will benefit from completing the
PHASE 1 Enriched Academy© program which provides comprehensive
PC14 Managing and Maintaining PCs: A+ Part 1 80 coverage of financial and money management skills that will
PC24 Managing and Maintaining PCs: A+ Part 2 80 allow them to better save, budget and manage their money and
NWPO Network+ 80 financial situation.
VIS4 Visio 20
PHASE 2 ITC4 - Introduction to Computers (40 Hours)
WNDX Configuring a Windows Client Operating 80 This course is a broad-based introduction to using a personal
System computer. It teaches the fundamentals of an operating system
CWDO Configuring Windows Devices 80 and the most popular application software including word
W740 Installation, Storage, and Compute with processing, spreadsheets, and presentations. You will also
80
Windows Server 2016 learn about the Internet, Web browsers, electronic mail and
LXA4 Linux Fundamentals 60 antivirus software. The course is based on the Windows 10
PWSO PowerShell 40 operating system, Microsoft Office 2016 and a variety of popular
PHASE 3 software programs for the Internet-related and security-related
INN8 Introduction to Internetworking 80 applications.
ICNO Interconnecting Cisco Network Devices 80
W741 Networking with Windows Server 2016 80 PC14: Managing and Maintaining PCs (A+): Part 1
W742 Identity with Windows Server 2016 80 (80 hours)
PHASE 4 This course is the first of two courses that cover the general
SCPO Security+ 80
installation, maintenance and management of computer
AB-W744 Securing Windows Server 2016
hardware and software resources. This first course focuses on
80
the hardware resources that make up a computer system course
CYESN Cybersecurity Essentials 60
will align to the CompTIA A+ learning objectives. Students will
CSAPL Cybersecurity Analyst CySA+ 60 learn about the operation of microcomputer systems, the various
PTSPL PenTest+ 40 hardware components that makeup a computer system and how
DGTFN Digital Forensics 60 to troubleshoot common hardware problems.
PROFESSIONAL & WORKPLACE
SKILLS PC24: Managing and Maintaining PCs (A+): Part 2
CES4 Career and Employment Strategies 20 (80 hours)
CYSPRC Practicum (5 weeks) 175 This course is the second of two consecutive courses that align
PROGRAM TOTAL 74 weeks 1,555 to the CompTIA A+ certification requirements. This course
focuses on the software installation, configuration and
Detailed course descriptions follow. Please note that course troubleshooting as well as system security. Students will gain an
content may be changed or upgraded to meet the demands understanding of the various network models, standards and
of industry; and the courses may not be listed in the order protocols. Students will install configure and troubleshoot
taught. operating system software as well as application software
packages. Finally, the course will explore security issues
involving software installations.

© 2020 2 AB-CDI-CBS-1220
CYBERSECURITY
SPECIALIST
PROGRAM OUTLINE

NWPO: Network+ (80 hours) LX1O: Linux Fundamentals (60 hours)


The Network+ course will provide students with an introduction In this course, the student will learn to install, and maintain a
to the theory of networks. Students will learn basic networking Linux system. The student will configure and use graphical user
concepts relating to the types of networks, general networking interfaces (GUIs), use Linux commands to manage files and file
components, specialized hardware and software associated systems, administer users, groups, permissions and attributes.
with networks, and how to setup and configure networks. The student will learn to work with Linux scripts, services,
Students will also learn about network security, wireless processes and schedule tasks. Students will be able to set up
networks as well as Voice over IP network capabilities. Linux client side networking and printing services as well as File
Sharing services. Finally, students will enable and administer
VSOO: Visio (20 hours) Linux and Windows integration tools and learn to compile and
IT professionals are constantly working with a variety of install software on a Linux system.
diagrams from basic flowcharts, to floor plans and Network
diagrams. This Introduction to Microsoft Visio course is PWSO: PowerShell (40 hours)
designed for students who are new to Visio and who will be In this course, students will learn to use PowerShell scripting to
using Microsoft Visio to create basic workflows and perform end- automate the common tasks and administrative jobs that can be
to-end flowcharting and diagrams. Students will learn about the applied on the client or server version of Windows. The course
tools and features of Visio and apply the skills to create a variety starts with an introduction to the PowerShell language and
of diagrams on a scale from the basic organizational charts and scripting environment and then proceeds to a thorough
flowcharts to the more complex workflow diagrams and network explanation of creating functional scripts that can be used for
diagrams. performing common tasks that involve working with files,
Internet-connected scripts, user interaction, and solving tasks in
WNDX: Configuring a Windows Client Operating System systems and enterprise management deployments such as
(80 hours) working with Active Directory and the file system.
This is the first course covering Windows 10. In addition, skills
learned in this course will give students a foundation to build on INN8: Introduction to Internetworking (80 hours)
in Windows Server courses. Topics include installing Windows This course explores the fundamental concepts in
10, performing post-installation configuration, implementing internetworking. The focus of this course is TCP/IP. Students
Windows in an enterprise environment, configuring networking, will explore the DOD and OSI reference models and learn to
storage, data access, implementing applications, configuring identify TCP/IP protocol suite components and implement IP
updates, monitoring and remote management, configuring addressing and Subnet masks. Students will learn about name
system recovery, authorization and authentication. resolution and TCP/IP naming services and how to navigate the
Cisco IOS interface and perform basic operations on Cisco
CWDO – Configuring Windows Devices (80 Hours) routers and switches.
This course will provide the students with skills necessary to ICNO: Interconnecting Cisco Network Devices (80 hours)
deploy, configure and support Windows apps, resources and
This course explores the configuration and administration of
devices. Students will learn how to support the Windows Store common Cisco network devices. Students will learn about
and Cloud Apps, Mobility options and devices using Microsoft layered internetwork communication, protocols and standards
Intune. The course will explore the configuration of settings to and how to plan and design Internetworked LANs and WANs.
support data storage and security, remote connections, This course will allow the students to work with the Cisco
resources, desktop apps, updates and mobility options with Internetwork Operating System (IOS) in a simulated
Azure RemoteApp. Finally, students will be able to configure environment. Students will learn to implement and manage
system recovery and file recovery settings and manage system Cisco routers and switches.
updates.
W741 – Networking with Windows Server 2016 (80 hours)
W740 – Installation Storage and Compute with Windows Networking with Windows Server 2016 is the second of the
Server 2016 (80 hours) Windows Server 2016 courses. This course covers the
Installation Storage and Compute with Windows Server 2016 is implementation and configuration of networking services under
the first of the Windows Server 2016 courses. This course Windows server 2016. The course will cover the implementation
covers the installation and configuration of Windows Server of IPv4 and IPv6 addressing as well as the installation of the
2016 and its services. Students will learn to configure disks and various networking services and servers such as DNS, DHCP
volumes, implement server storage, create, manage and
and IPAM. Students will learn to implement Virtual Private
maintain server images for deployment and configure
Networks and DirectAccess solutions as well as the
virtualization with Hyper-V. The course will also explore the
deployment of Windows containers and the implementation of implementation of Network Policy Server (NPS) and
failover clustering and high availability disaster recovery options. authentication. The course will explore the implementation of
Students will learn to implement Network Load Balancing and Distributed File System and Branch Office solutions.
monitor server installations.

© 2020 3 AB-CDI-CBS-1220
CYBERSECURITY
SPECIALIST
PROGRAM OUTLINE

W742 – Identity with Windows Server 2016 (80 hours) evaluate an organizations security, collect security intelligence
Identity with Windows Server 2016 is the third of the Windows and handle incidents as they occur. The course is designed to
Server 2016 courses that covers the administering and foster a comprehensive approach to security. This course aligns
configuring of Active Directory infrastructure under Windows to the objectives of the CompTIA Cybersecurity Analyst
Server 2016. The course will cover the installation and Certification exam (CS0-001).
configuration of domain controllers followed by the creation and
management of active directory users, computers, groups and PTSPL – Pentest+ (40 hours)
organizational units. Students will learn to configure Service This course explores the concepts of Penetration testing. The
Authentication and account policies, group policies and objects ever-increasing need of organizations to protect themselves
and settings. Students will also explore the installation and from security breaches and risks require them to invest heavily
configuration of Active Directory Certificate services and Active in understanding their vulnerabilities and design measures to
Directory Federation services. counteract them. In order to protect themselves, organizations
turn to the conducting of penetration testing. In this course,
SCPO: Security+ (80 hours) students will learn the concepts and methodologies related to
This course explores the issues related to computer and pen testing. Students will develop their pen testing skills
network security and its implications. Students will learn to enabling them to identify information system vulnerabilities and
recognize security threats and ramifications, and identify design effective remediation for them. This course aligns to the
sources of security threats and major areas of vulnerability. The objectives of the CompTIA PenTest+ exam (PT0-001).
course will examine ways to detect and neutralize system and
network security threats, implement security protection
procedures and practices. Methods of security disaster recovery DGTFN: Digital Forensics (60 hours)
will also be explored in this course. In our world of hyper connected technologies, we rely more and
more on computers to do work. Unfortunately, computers can
AB-W744 – Securing Windows Server 2016 (80 hours) also be used to commit crimes such as company policy
violations, embezzlement, harassment, stealing of proprietary
This course provides students with the skills and knowledge
information, leaks of information to name a few. Fortunately,
needed to secure a Windows Server 2016 implementation. The these actions are typically recorded on the same computers on
course will explore the configuration of disk and file encryption, which they are committed. The need for individuals with the
the implementation of malware protection, Windows Firewall
knowledge and skill to properly investigate these wrongdoings
and security baselines. The course will cover the securing of
is growing. This course introduces students to the field of digital
network traffic, the implementation of Privilege Access forensics. Students will explore the tools, processes and
Management and administration as well advanced audit policies techniques used to recover and gather data, files and
and services. After installing and configuring Microsoft
information stored on computer systems and then perform the
Advanced Threat Analytics, students will learn to work with the
appropriate analysis and validation. The course will cover how
Operations Management Suite to determine threat detection to process digital crime and incident scenes, work with the
solutions. Students will also learn to secure an Application different operating systems, and use typical file and data
Development Server workload and implement a secure files
recovery tools to gather information from the different devices in
services infrastructure with dynamic access control.
use today.
CYESN: Cybersecurity Essentials (60 hours) CES4: Career and Employment Strategies (20 hours)
The increased reliance on computer systems, the internet,
This course builds on the skills learned in the Student Success
connected technologies and smart devices has made Strategies course. It provides information on how to use the
cybersecurity a critical concern for organizations and individuals communication skills learned in order to make a successful
alike. Keeping devices, data and information secure and
presentation to a prospective employer. Students also learn
protected from vulnerabilities is a critical area of activity for all
how to uncover the hidden job market and identify employment
organizations. This course provides the students with an opportunities. Self-assessment during this course allows
introduction to the field of cybersecurity. Students will be students to identify their personal skills that are transferable to
introduced to the four distinct challenges to creating a
the workplace and to describe these skills to a prospective
cybersecurity defense; securing the infrastructure, securing the
employer. Students are videotaped during a mock interview and
devices, securing the local network and securing the perimeter. participate in the analysis of their performance in the “interview”.
The course will explore the fundamental concepts of each
challenge and the types of vulnerabilities associated with each. CYSPRC210: Practicum (175 hours / 5 weeks)
Students will learn how to identify the risks and vulnerabilities in
each area and describe counteractions to mitigate the risks. This program includes a practicum component which consists of
175 hours of work at a job site. The practicum work experience
is a mandatory diploma requirement and the business
CSAPL – Cybersecurity Analyst CySA+ (60 hours) organization does not pay for the services of the student during
This course will explore the role and responsibilities of the the practicum.
cybersecurity specialist in monitoring, detecting and responding
to security incidents in information systems and networks. The
course will introduce the tools and tactics used to manage
cybersecurity risks, identify various types of common threats,

© 2020 4 AB-CDI-CBS-1220
CYBERSECURITY
SPECIALIST
PROGRAM OUTLINE

PROGRAM OUTCOMES e) A portion of a program may be delivered through the use of


on-line and/or computer assisted learning courses or a
Upon successful completion of the five phases of this
blended use of learning modalities including computer
program, you will be able to:
assisted, instructor moderated and/or on-line delivery.
 Use a variety of computer software and other technological f) In order to facilitate the ongoing development and updating
tools appropriate to perform essential business tasks of programs, the College may implement amendments or
 Use fundamental system commands appropriate to modifications to programs in order to accommodate these
operating systems revisions at any time. Examples of possible amendments
 Apply a structured process to problem solving. include modification of content, curricular updates, changes
 Collect, analyze and organize relevant information from a in course titles, changes in course materials, textbooks,
variety of sources class schedules, distribution of course time or content
 Install, configure and upgrade physical and logical elements across the program, sequencing of course delivery,
on the network instructor or course substitution, changes in the technology,
 Interpret, produce and present work-related documents and software or equipment used. Changes are effective when
information effectively and accurately made.
g) The practicum is mandatory. Students will be evaluated on
 Use and administer a network client environment practicum performance and are required to receive a
 Plan a network installation or upgrade passing grade to successfully complete the program.
 Monitor, optimize and maintain a network Additional conditions may apply to some practicum
 Interact and communicate in various work situations placements e.g. obtaining a required grade point average
 Establish and apply security measures to various physical prior to practicum, immunizations, criminal record checks,
and logical network elements and additional conditions may apply for international
 Troubleshoot problems related to local and wide area students including obtaining a work permit (C-30).
networks h) As practicum placement generally takes place towards the
end of a student's program, students are advised that the
 Manage the use of time and other resources to attain
location of a practicum may vary depending on the
personal and/or project-related goals
circumstances at the time the student is to go into his/her
 Design the technical elements of a network infrastructure practicum. Students are also advised that to facilitate
 Implement a server virtualization solution. practicum placement, practicums and clinical experiences
 Assess, plan and implement a cybersecurity defense may take place outside the area in which the College is
strategy. located, outside of local municipalities, and/or in other
 Monitor, detect and respond to security vulnerabilities in health regions. In unusual circumstances, a practicum may
information systems. be delayed due to unforeseen circumstances e.g. hospital
 Plan and perform penetration-testing procedures. based practicum delayed due to flu outbreak, etc. Students
are required to demonstrate a high level of professional
Please Note: responsibility in maintaining successful practicums.
i) The transferability of College program credits to another
a) The courses listed above may not be presented in the order institution is determined exclusively by each receiving
that they appear on this outline. institution.
b) Unless otherwise indicated by the College in the program j) Instructional Hours:1380 /Practicum Hours: 175
outline, the non-practicum course delivery portion of the
program is based on a (4) four-hour student day. The 4-
hour day is made up of a combination of instructor led or
instructor managed classes and/or open lab. Open lab time
is not supervised by your instructor, however, during this
time student are expected to undertake course related self-
Student Name
directed study and project work.
c) The course materials, e-books and resources for students
are accessible through the college’s Learning Management Student Signature
System(LMS). Students are required to bring their own web
enabled device (laptop or tablet) in order to access the
course materials and resources. Students are responsible
for ensuring that their devices are in proper working order Date
and that they are fully charged before the start of each
school day.
d) Certification vouchers may be purchased outside of the
College, provided they have been opted out at time of
contract signing. The absence of industry certifications may
result in a candidate being denied a work experience site
and/or limit employability.

© 2020 5 AB-CDI-CBS-1220

You might also like