0% found this document useful (0 votes)
15 views7 pages

On-Cdi-Cbs-0223 Cybersecurity Specialist Program Outline

The Cybersecurity Specialist program prepares students for careers in cybersecurity by providing skills in planning, implementing, and managing secure computer networks. The program includes a comprehensive curriculum aligned with industry certifications from CompTIA and Cisco, covering topics such as network security, cloud environments, and risk mitigation. Successful completion leads to a diploma and equips graduates with essential skills for the cybersecurity workforce.

Uploaded by

Nirajan Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

On-Cdi-Cbs-0223 Cybersecurity Specialist Program Outline

The Cybersecurity Specialist program prepares students for careers in cybersecurity by providing skills in planning, implementing, and managing secure computer networks. The program includes a comprehensive curriculum aligned with industry certifications from CompTIA and Cisco, covering topics such as network security, cloud environments, and risk mitigation. Successful completion leads to a diploma and equips graduates with essential skills for the cybersecurity workforce.

Uploaded by

Nirajan Shrestha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Cybersecurity Specialist

PROGRAM OUTLINE

PROGRAM OVERVIEW  Successful completion of all assignments and tasks


The increased reliance on computer systems, the internet, required in the Career & Employment Strategies course.
connected technologies and smart devices has made
cybersecurity a critical concern for organizations and CERTIFICATIONS RECEIVED
individuals alike. Keeping devices, data and information
secure and protected from risks and vulnerabilities is a critical  Cybersecurity Specialist diploma
area of activity for all organizations. This has led to an ever-
growing increase in demand for individuals possessing the
skills to assess, plan and implement a cybersecurity defense INDUSTRY CERTIFICATION
strategy.
Industry and vendor certifications have become a
The Cybersecurity Specialist program is designed for students
benchmark used by employers in the hiring process. The
wishing to pursue a career in planning, implementing,
Cybersecurity Specialist program helps students prepare for
administering, supporting and securing networked computer
certification examinations in six areas:
systems and their users. Network design, installation,
maintenance and management as well as implementation, and  Computing Technology Industry Association (CompTIA)
operating computer services are the backbone of the A+, Network+, Security+, CySA+, PenTest+
information technology industry. In addition, this program  Cisco Certified Network Associate (CCNA)
explores the tools and techniques for monitoring and
evaluating networks for security risks and vulnerabilities. COURSE BREAKDOWN
PROGRAM OBJECTIVES Course # Course Name Hours
The Cybersecurity Specialist program will provide students INTRODUCTORY PHASE
with the skills to plan, implement, administer, maintain and
SSS4 Student Success Strategies 20
secure a computer network. The program fosters the
development of sound computer user support skills, network CA-ITF4 IT Fundamentals 60
administration skills and security and vulnerability assessment 4 weeks 80
and remediation skills required to meet employers' needs in PHASE 1
these areas. PC14 Managing and Maintaining PCs: A+ Part 1 80
PC24 Managing and Maintaining PCs: A+ Part 2 80
The content of this networking program is based on industry NWPO Network+ 80
certification requirements determined by Microsoft, CompTIA 12 weeks 240
and Cisco. If you determine that certification is an additional PHASE 2
goal to your diploma, our courses will help to prepare you for WNDX Configuring a Windows Client Operating 80
your exams. Furthermore, your active participation in our System
Learning System will help you to develop confidence in your CA- Deploy and automate Secure Cloud
abilities as an IT professional. 60
CLODP Environments
CA- Installation and Management of Servers
60
DELIVERY METHOD(S) SERPL
CA-LINX Linux Administration and Management 80
 In-class instruction
PWSO PowerShell 40
 Combined delivery (both in-class and distance)
CA- Python Development 60
PYTDE
PROGRAM DURATION 19 weeks 380
Total program hours 1,420 hours PHASE 3
Total program length: full-time 71 weeks INN8 Introduction to Internetworking 80
ICNO Interconnecting Cisco Network Devices 80
CA- Administration of Windows Server Hybrid
80
ADMISSIONS REQUIREMENTS AZ800 Infrastructure
CA- Configuring Windows Server Hybrid
 Grade 12 or equivalent AZ801 Infrastructure - Advanced
60
15 Weeks 300
OR
PHASE 4
SCPO Security+ 80
 Mature student status (18 years of age and one year out of CA- Risk Identification and Mitigation
80
high school) and Passing score on the entrance CSRIM
examination CYESN Cybersecurity Essentials 60
CSAPL Cybersecurity Analyst CySA+ 60
CA- Penetration Testing
60
GRADUATION REQUIREMENTS PENPL
CA- Advanced Security
 Successful completion of all on-campus courses with a CASP
60
60% overall average (and each individual course).
© 2023 1 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE

20 weeks 400 This course is the second of two consecutive courses that align
PROFESSIONAL & WORKPLACE to the Comptia A+ certification requirements. This course
SKILLS focuses on the software installation, configuration and
CES4 Career and Employment Strategies 20 troubleshooting as well as system security. Students will gain an
1 week 20 understanding of the various network models, standards and
PROGRAM TOTAL 71 weeks 1,420 protocols. Students will install configure and troubleshoot
operating system software as well as application software
packages. Finally the course will explore security issues
Detailed course descriptions follow. Please note that
involving software installations.
course content may be changed or upgraded to meet the
demands of industry; and the courses may not be listed in
the order taught. NWPO: Network+ (80 hours)
The Network+ course will provide students with an
introduction to the theory of networks. Students will learn
Cybersecurity Specialist basic networking concepts relating to the types of networks,
Course Descriptions general networking components, specialized hardware and
software associated with networks, and how to setup and
SSS4: Student Success Strategies (20 hours) configure networks. Students will also learn about network
security, wireless networks as well as Voice over IP network
The purpose of this course is to provide students with the capabilities.
knowledge, skills, and study techniques to help foster effective
learning and a positive educational experience. This course WNDX: Configuring a Windows Client Operating
explores many different theories on learning and studying and System (80 hours)
how these theories can be applied to each student’s individual This is the first course covering Windows Client operating
studying methods in order to develop a method that is both system. In addition, skills learned in this course will give
effective and efficient. Effective study habits and productive
students a foundation to build on in Windows Server courses.
note-taking are key topics in this course, as well as the
Topics include installing Windows Client, performing post-
importance of values and goals. Through active participation in installation configuration, implementing Windows in an
learner-centred activities, students will explore and practice enterprise environment, configuring networking, storage,
strategies for setting personal goals, prioritizing tasks, managing
data access, implementing applications, configuring updates,
time, and managing the stress that arises in school or work
monitoring and remote management, configuring system
situations. This course will also equip students with a sound recovery, authorization and authentication.
understanding of matters related to finance, credit, and debt and
the critical implications they have on our lives. Students taking
this course will complete the Enriched Academy program, which CA-CLODP – Deploy and automate Secure Cloud
provides comprehensive coverage of financial and money Environments (60 hours)
management skills that will allow them to better save, budget, This course focuses on the implementation and support of
and manage their money and financial situations. cloud-based infrastructure services in the context of the broader
IT systems operations in a datacenter environment. Students
CA-ITF4 – IT Fundamentals (60 Hours) will learn about the deployment, migration, optimization and
This course focuses on the essential IT skills and knowledge protection of mission critical applications to the cloud. The
needed to perform tasks commonly performed by end-users and course will explore the challenges of multi-cloud environments
entry-level IT professionals. Students will learn to use the and the techniques to overcome these challenges. The course
features and functions of common operating systems and will begin with the fundamental concepts of cloud architecture
establishing network connectivity. The course will explore and design with an overview of the foundational technologies
common software applications and their purpose, security and and concepts that comprise the cloud. From there students will
web browsing best practices. By the end of this course students explore the deployment and managing of cloud networks with a
will have gained foundational knowledge in IT concepts and focus on the securing of cloud resources. Finally, the course will
terminology, IT infrastructure, applications, and software conclude with cloud optimization and high availability as
development, database fundamentals and security. important factors for security measures and disaster recovery.
Throughout the course, emphasis is placed on the use of
PC14: Managing and Maintaining PCs (A+): Part 1 automation and orchestration, and troubleshooting.
(80 hours)
This course is the first of two courses that cover the general CA-SERPL – Installation and Management of Servers (60
installation, maintenance and management of computer hours)
hardware and software resources. This first course focuses on This course provides the student with the knowledge and skills
the hardware resources that make up a computer system course required to install, configure, manage and maintain server
will align to the Comptia A+ learning objectives. Students will installations. The course will cover the server lifecycle through
learn about the operation of microcomputer systems, the various the following four themes: Server, virtualization and security
hardware components that makeup a computer system and how concepts, managing physical assets, and server hardware and
to troubleshoot common hardware problems. storage configurations; installing, troubleshooting and
maintaining server operating systems; and managing data
PC24: Managing and Maintaining PCs (A+): Part 2 security, service and data availability and decommissioning.
(80 hours) Students will learn to install and configure server hardware and

© 2023 2 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE

server operating systems. The course will then explore the CA-AZ800 - Administration of Windows Server Hybrid
implementation of server hardening and security controls, Infrastructure (80 hours)
troubleshooting of common server problems and general server
This course will explore the installation and administration of
maintenance and upkeep. Finally, students will gain an
Windows Server on-premises, hybrid, and Infrastructure as a
understanding of key disaster recovery strategies, high
availability options, and backup and restore concepts. Service (IaaS) platform workloads. Students will learn to
integrate Windows Server environments with Azure services
CA-LINX: Linux Administration and Management (80 hours) and manage Windows Server in on-premise and hybrid
This course will provide the students with the knowledge and networks. The course will explore the deployment, packaging,
skills required to configure, manage, operate, and troubleshoot securing, updating, and administration of Windows Server
Linux in on-premises and cloud-based server environments. workloads using on-premises, hybrid, and cloud technologies.
Students will learn to use security best practices, scripting, Students will learn how to implement and manage on-premises
containerization, and automation. and hybrid solutions, such as identity, security, management,
The course aligns its coverage to the CompTIA Linux+ exam compute, networking, storage, monitoring, high availability, and
objectives into blocks based around the following themes: Linux disaster recovery.
concepts; Server administration; Network management and
security; Scripting, automation, and installation of Linux.
CA-AZ801 – Configuring Windows Server Hybrid
Infrastructure - Advanced (60 hours)
PWSO: PowerShell (40 hours)
This course will continue the development of knowledge and
In this course, students will learn to use PowerShell scripting to
skill in the administering and configuring a Windows Hybrid
automate the common tasks and administrative jobs that can be
infrastructure. Students will develop their skill in the five key
applied on the client or server version of Windows. The course
areas of securing Windows on-premises and hybrid
starts with an introduction to the PowerShell language and
infrastructures, implementing and managing Windows Server
scripting environment and then proceeds to a thorough
high availability, implementing disaster recovery, migration of
explanation of creating functional scripts that can be used for
servers and workloads to Azure, and monitor and troubleshoot
performing common tasks that involve working with files,
Windows Server environments.
Internet-connected scripts, user interaction, and solving tasks in
systems and enterprise management deployments such as
SCPO: Security+ (80 hours)
working with Active Directory and the file system.
This course explores the issues related to computer and
CA-PYTDE: Python Development (60 hours) network security and its implications. Students will learn to
recognize security threats and ramifications, and identify
This course introduces the students to the Python programming
sources of security threats and major areas of vulnerability. The
language. Students will continue to integrate Object-Oriented
course will examine ways to detect and neutralize system and
programming concepts will learning the features of the Python
network security threats, implement security protection
programming language. Students will start with the
procedures and practices. Methods of security disaster recovery
implementation of fundamental structures of programming using
will also be explored in this course.
the Python syntax and libraries. Students will then move on to
using functions, files, lists, tuples and dictionaries and
implementing those features into a Python program. Finally the CA-CSRIM – Risk Identification and Mitigation (80 hours)
course will explore Object Oriented programming with Python This course provides the student with an overview of the various
and the GUI programming features that are provided by Python. risks and security vulnerabilities to which IT systems and
infrastructures are commonly exposed to. The course with then
INN8: Introduction to Internetworking (80 hours) explore the tools and techniques used to mitigate those risks.
This course explores the fundamental concepts in Students will explore the risks and exposures facing web servers
internetworking. The focus of this course is TCP/IP. Students and applications, Wi-Fi, Bluetooth, mobile devices and the
will explore the DOD and OSI reference models and learn to general IT infrastructure. The course will then cover topics in
identify TCP/IP protocol suite components and implement IP Penetration testing, system hacking, social and physical
addressing and Subnet masks. Students will learn about name security, malware and sniffers, SQL injections and
resolution and TCP/IP naming services and how to navigate the cryptography, session highjacking, denial of service and other
Cisco IOS interface and perform basic operations on Cisco types of system attacks. The focus of the course will be to
routers and switches. identify the risks and then apply countermeasures and
prevention techniques.
ICNO: Interconnecting Cisco Network Devices (80 hours)
CYESN: Cybersecurity Essentials (60 hours)
This course explores the configuration and administration of
common Cisco network devices. Students will learn about The increased reliance on computer systems, the internet,
layered internetwork communication, protocols and standards connected technologies and smart devices has made
and how to plan and design Internetworked LANs and WANs. cybersecurity a critical concern for organizations and individuals
This course will allow the students to work with the Cisco alike. Keeping devices, data and information secure and
Internetwork Operating System (IOS) in a simulated protected from vulnerabilities is a critical area of activity for all
environment. Students will learn to implement and manage organizations. This course provides the students with an
Cisco routers and switches. introduction to the field of cybersecurity. Students will be
introduced to the four distinct challenges to creating a
cybersecurity defense; securing the infrastructure, securing the

© 2023 3 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE

devices, securing the local network and securing the perimeter. PROGRAM OUTCOMES
The course will explore the fundamental concepts of each
Upon successful completion of the five phases of this
challenge and the types of vulnerabilities associated with each.
program, you will be able to:
Students will learn how to identify the risks and vulnerabilities in
each area and describe counteractions to mitigate the risks.  Use a variety of computer software and other
technological tools appropriate to perform
essential business tasks
CSAPL – Cybersecurity Analyst CySA+ (80 hours)
 Use fundamental system commands appropriate to
This course will explore the role and responsibilities of the
operating systems
cybersecurity specialist in monitoring, detecting and responding
to security incidents in information systems and networks. The  Apply a structured process to problem solving.
course will introduce the tools and tactics used to manage  Collect, analyze and organize relevant information from
cybersecurity risks, identify various types of common threats, a variety of sources
evaluate an organizations security, collect security intelligence  Install, configure and upgrade physical and logical
and handle incidents as they occur. The course is designed to elements on the network
foster a comprehensive approach to security. This course aligns  Interpret, produce and present work-related
to the objectives of the CompTIA Cybersecurity Analyst documents and information effectively and
Certification exam (CS0-002). accurately
 Use and administer a network client environment
CA-PENPL – Penetration Testing (60 hours)  Plan a network installation or upgrade
This course explores the concepts of Penetration testing. The  Monitor, optimize and maintain a network
ever-increasing need of organizations to protect themselves  Interact and communicate in various work
from security breaches and risks require them to invest heavily situations
in understanding their vulnerabilities and design measures to  Establish and apply security measures to various
counteract them. In order to protect themselves, organizations physical and logical network elements
turn to the conducting of penetration testing. In this course,  Troubleshoot problems related to local and wide
students will learn the concepts and methodologies related to area networks
pen testing. Students will develop their pen testing skills  Manage the use of time and other resources to
enabling them to identify information system vulnerabilities and attain personal and/or project-related goals
design effective remediation for them. This course aligns to the
 Design the technical elements of a network
objectives of the Comptia PenTest+ exam (PT0-002).
infrastructure
 Implement a server virtualization solution.
CA-CASP: Advanced Security (60 hours)  Assess, plan and implement a cybersecurity
This course expands on the fundamental security concepts by defense strategy.
teaching students the knowledge and skills in advanced  Monitor, detect and respond to security
security. Student will learn the concepts of risk management, vulnerabilities in information systems.
enterprise security architecture, enterprise security operations,  Plan and perform penetration-testing procedures.
technical integration of enterprise security, research,
development and collaboration. The course begins with an Please Note:
overview of governance and risk compliance where students will
learn about the role and life cycle of risk management and risk a) The courses listed above may not be presented in the order that they
management methods. Students will explore network appear on this outline.
infrastructure protection, software integration and testing and
b) Required textbooks and supplies may be purchased outside of the
emerging technologies for secure configuration and system
College, provided those purchases are preapproved to ensure they
hardening. After exploring the concepts of cryptography, public are the correct textbooks and supplies and are available for the
key infrastructure and vulnerability management, the course will required portions of the program.
conclude with a review of technical controls and incident
responses. c) Except for VCAD and Practical Nursing programs, or unless otherwise
indicated by the College in the program outline, the non-practicum
course delivery portion of the program is based on a (4) four-hour
CES4: Career and Employment Strategies (20 hours) student day. The 4-hour day is made up of a combination of
This course builds on the skills learned in the Student Success instructor led or instructor managed classes and/or open lab. Open
Strategies course or its equivalent. It provides information on lab time is not supervised by your instructor, however, during this
how to use the communication skills learned in order to make a time student are expected to undertake course related self-directed
successful presentation to a prospective employer. Students study and project work.
also learn how to uncover the hidden job market and identify d) A portion of a program may be delivered through the use of on-line
employment opportunities. Self-assessment during this course and/or computer assisted learning courses or a blended use of
allows students to identify their personal skills that are learning modalities including computer assisted, instructor
transferable to the work place and to describe these skills to a moderated and/or on-line delivery.
prospective employer. Students may be videotaped during a e) In order to facilitate the ongoing development and updating of
mock interview and will participate in the analysis of their programs, the College may implement amendments or
performance in the “interview”. modifications to programs in order to accommodate these revisions
at any time. Examples of possible amendments include
modification of content, curricular updates, changes in course titles,
© 2023 4 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE

changes in course materials, textbooks, class schedules,


distribution of course time or content across the program,
OCCUPATIONAL PROFILE
sequencing of course delivery, instructor or course substitution, This occupational profile associates with this program is best
changes in the technology, software or equipment used. Changes described by a combination of two related profiles, Network
are effective when made. system engineers (also described as ‘computer network
technicians’) as per the NOC 2018 and Computer and
Information Systems Security / Information Assurance
Student Name specialist (CIP 2011) establish, operate, maintain, and
co-ordinate the use of local and wide area networks (LANs and
WANs), mainframe networks, hardware, software, and related
Student Signature computer equipment; supervisors of computer network
technicians are included in this group.
In addition, the cybersecurity component of this
Date instructional program prepares individuals to assess the
security needs of computer and network systems,
recommend safeguard solutions, and manage the
implementation and maintenance of security devices,
systems, and procedures.

National Occupational Classification


The 2021 National Occupational Classification code for this
occupation is 22220 – Computer network and web technicians
; they set up and maintain internet and intranet web sites and
web-server hardware and software, and monitor and optimize
network connectivity and performance. They are employed in
information technology units throughout the private and public
sectors.

Example titles:
 Internet web site technician
 LAN (local area network) administrator
 LAN (local area network) technician
 Web technician
 Computer network technician
 Data centre operator
 Network administrator
 Network support technician
 Supervisor, computer network technicians
 System administrator

Classification of Instructional Programs (CIP)


The 2016 Classification of Instructional Programs lists the
program 11.1003 Computer and Information Systems Security
/ Information Assurance program as described :

This instructional program class comprises any program


that prepares individuals to assess the security needs of
computer and network systems, recommend safeguard
solutions, and manage the implementation and
maintenance of security devices, systems, and
procedures. These programs include courses in
computer architecture, programming, and systems
analysis; networking; telecommunications; cryptography;
security system design; applicable laws and regulations;
risk assessment and policy analysis; contingency
planning; user access issues; investigation techniques;
and troubleshooting.
This description is complementary to the NOC 22220 as
it accurately describes the specialization in cybersecurity
that is obtained above and beyond the common
Computer Technician core.
© 2023 5 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE

People in this occupation:


Computer network technicians / Computer and Information  Set up and maintain internet and intranet web sites and
systems security specialists perform some or all of the web server hardware and software, and monitor network
following duties: connectivity and performance.
 Maintain, troubleshoot, and administer the use of local  Are employed in information technology (IT) units
area networks (LANs), wide area networks (WANs), throughout the private and public sectors.
mainframe networks, computer work stations, connections  Should have a good understanding of computer hardware
to the internet and peripheral equipment. and software.
 Evaluate and install computer hardware, networking  Should be flexible, creative, and skilled at problem solving.
software, operating system software, and software  Should also have good interpersonal skills in order to
applications. communicate technical problems and work effectively with
 Operate master consoles to monitor the performance of both IT personnel, such as programmers and other
computer systems and networks and to co-ordinate operators, and non-IT personnel.
access and use of computer networks.
 Provide problem-solving services to network users. Computer network technicians usually work a regular 40-hour
 Install, maintain, troubleshoot, and upgrade web-server week; however, they may be required to be on call for rotating
hardware and software. evening or weekend work if computer support over-extended
 Implement network traffic and security monitoring hours is required. Overtime or work outside regular office
software, and optimize server performance. hours may be necessary when unexpected technical problems
 Perform routine network start-up and close-down and arise or when large-scale maintenance requires shutdown of
maintain control records. the system.
 Perform data backups and disaster recovery operations.
 Conduct tests and perform security and quality controls. Computer network technicians typically work in offices and
 Control and monitor e-mail use, web navigation, and server rooms. Workers employed by companies that provide
installed software. contract services can spend much of their day travelling to
 Perform shell scripting or other basic scripting tasks. clients’ offices.
 Assess the security needs of computer and network
Because these workers spend long hours using computers,
systems they must be careful to use ergonomic work practices to avoid
 Make recommendations for safeguard solutions for eye strain, back discomfort, and joint stress from keyboarding
information systems and mouse work.
 Manage the implementation and maintenance of
security devices, systems, and procedures. Recent graduates typically find work in computer and network
 May supervise other workers in this group. operating or user support (i.e. help desk, client support, etc.).
With additional education and experience, computer network
technicians can progress to supervisory positions or move into
other fields such as computer programming, interactive media
development, web development, or systems analysis.

Example titles include network architect, network systems


engineer, senior analyst, team lead, or manager.

INSIGHTS FROM INDUSTRY


The growing use of information technologies will drive the need
for more workers in this profession, as employers across a
wide variety of industries implement complex computer and
web systems. This broad employment base helps to diversify
the employment opportunities for these workers.

Expanding networks, such as those for wireless and


broadband internet, are increasing the demand for associated
technical occupations. Opportunities for computer network
technicians should continue to increase as businesses
increasingly need help to manage, upgrade, and customize
complex computer systems. The growing use of social
networking and virtualization is expected to create additional
opportunities in this field.

Growth in the demand for computer security specialists is


expected to increase as businesses and government invest in
network security to protect vital computer systems and data
from attack. With the development of electronic commerce,
more establishments are using the internet to conduct
© 2023 6 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE

business online, creating an ongoing need for information


technology professionals.

Because technology in this field changes rapidly, recent


graduates and those who regularly upgrade their skills should
have an advantage in finding employment. In addition,
workers in this field who have one or more vendor certifications
stand a much better chance of finding employment.

There will be an increased demand for individuals with


experience with wireless or converged voice technologies. As
these technologies become mainstream, most organizations
will need someone who can correctly implement, monitor, and
service them.

© 2023 7 ON-CDI-CBS-0223
Replaces all previous versions

You might also like