On-Cdi-Cbs-0223 Cybersecurity Specialist Program Outline
On-Cdi-Cbs-0223 Cybersecurity Specialist Program Outline
PROGRAM OUTLINE
20 weeks 400 This course is the second of two consecutive courses that align
PROFESSIONAL & WORKPLACE to the Comptia A+ certification requirements. This course
SKILLS focuses on the software installation, configuration and
CES4 Career and Employment Strategies 20 troubleshooting as well as system security. Students will gain an
1 week 20 understanding of the various network models, standards and
PROGRAM TOTAL 71 weeks 1,420 protocols. Students will install configure and troubleshoot
operating system software as well as application software
packages. Finally the course will explore security issues
Detailed course descriptions follow. Please note that
involving software installations.
course content may be changed or upgraded to meet the
demands of industry; and the courses may not be listed in
the order taught. NWPO: Network+ (80 hours)
The Network+ course will provide students with an
introduction to the theory of networks. Students will learn
Cybersecurity Specialist basic networking concepts relating to the types of networks,
Course Descriptions general networking components, specialized hardware and
software associated with networks, and how to setup and
SSS4: Student Success Strategies (20 hours) configure networks. Students will also learn about network
security, wireless networks as well as Voice over IP network
The purpose of this course is to provide students with the capabilities.
knowledge, skills, and study techniques to help foster effective
learning and a positive educational experience. This course WNDX: Configuring a Windows Client Operating
explores many different theories on learning and studying and System (80 hours)
how these theories can be applied to each student’s individual This is the first course covering Windows Client operating
studying methods in order to develop a method that is both system. In addition, skills learned in this course will give
effective and efficient. Effective study habits and productive
students a foundation to build on in Windows Server courses.
note-taking are key topics in this course, as well as the
Topics include installing Windows Client, performing post-
importance of values and goals. Through active participation in installation configuration, implementing Windows in an
learner-centred activities, students will explore and practice enterprise environment, configuring networking, storage,
strategies for setting personal goals, prioritizing tasks, managing
data access, implementing applications, configuring updates,
time, and managing the stress that arises in school or work
monitoring and remote management, configuring system
situations. This course will also equip students with a sound recovery, authorization and authentication.
understanding of matters related to finance, credit, and debt and
the critical implications they have on our lives. Students taking
this course will complete the Enriched Academy program, which CA-CLODP – Deploy and automate Secure Cloud
provides comprehensive coverage of financial and money Environments (60 hours)
management skills that will allow them to better save, budget, This course focuses on the implementation and support of
and manage their money and financial situations. cloud-based infrastructure services in the context of the broader
IT systems operations in a datacenter environment. Students
CA-ITF4 – IT Fundamentals (60 Hours) will learn about the deployment, migration, optimization and
This course focuses on the essential IT skills and knowledge protection of mission critical applications to the cloud. The
needed to perform tasks commonly performed by end-users and course will explore the challenges of multi-cloud environments
entry-level IT professionals. Students will learn to use the and the techniques to overcome these challenges. The course
features and functions of common operating systems and will begin with the fundamental concepts of cloud architecture
establishing network connectivity. The course will explore and design with an overview of the foundational technologies
common software applications and their purpose, security and and concepts that comprise the cloud. From there students will
web browsing best practices. By the end of this course students explore the deployment and managing of cloud networks with a
will have gained foundational knowledge in IT concepts and focus on the securing of cloud resources. Finally, the course will
terminology, IT infrastructure, applications, and software conclude with cloud optimization and high availability as
development, database fundamentals and security. important factors for security measures and disaster recovery.
Throughout the course, emphasis is placed on the use of
PC14: Managing and Maintaining PCs (A+): Part 1 automation and orchestration, and troubleshooting.
(80 hours)
This course is the first of two courses that cover the general CA-SERPL – Installation and Management of Servers (60
installation, maintenance and management of computer hours)
hardware and software resources. This first course focuses on This course provides the student with the knowledge and skills
the hardware resources that make up a computer system course required to install, configure, manage and maintain server
will align to the Comptia A+ learning objectives. Students will installations. The course will cover the server lifecycle through
learn about the operation of microcomputer systems, the various the following four themes: Server, virtualization and security
hardware components that makeup a computer system and how concepts, managing physical assets, and server hardware and
to troubleshoot common hardware problems. storage configurations; installing, troubleshooting and
maintaining server operating systems; and managing data
PC24: Managing and Maintaining PCs (A+): Part 2 security, service and data availability and decommissioning.
(80 hours) Students will learn to install and configure server hardware and
© 2023 2 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE
server operating systems. The course will then explore the CA-AZ800 - Administration of Windows Server Hybrid
implementation of server hardening and security controls, Infrastructure (80 hours)
troubleshooting of common server problems and general server
This course will explore the installation and administration of
maintenance and upkeep. Finally, students will gain an
Windows Server on-premises, hybrid, and Infrastructure as a
understanding of key disaster recovery strategies, high
availability options, and backup and restore concepts. Service (IaaS) platform workloads. Students will learn to
integrate Windows Server environments with Azure services
CA-LINX: Linux Administration and Management (80 hours) and manage Windows Server in on-premise and hybrid
This course will provide the students with the knowledge and networks. The course will explore the deployment, packaging,
skills required to configure, manage, operate, and troubleshoot securing, updating, and administration of Windows Server
Linux in on-premises and cloud-based server environments. workloads using on-premises, hybrid, and cloud technologies.
Students will learn to use security best practices, scripting, Students will learn how to implement and manage on-premises
containerization, and automation. and hybrid solutions, such as identity, security, management,
The course aligns its coverage to the CompTIA Linux+ exam compute, networking, storage, monitoring, high availability, and
objectives into blocks based around the following themes: Linux disaster recovery.
concepts; Server administration; Network management and
security; Scripting, automation, and installation of Linux.
CA-AZ801 – Configuring Windows Server Hybrid
Infrastructure - Advanced (60 hours)
PWSO: PowerShell (40 hours)
This course will continue the development of knowledge and
In this course, students will learn to use PowerShell scripting to
skill in the administering and configuring a Windows Hybrid
automate the common tasks and administrative jobs that can be
infrastructure. Students will develop their skill in the five key
applied on the client or server version of Windows. The course
areas of securing Windows on-premises and hybrid
starts with an introduction to the PowerShell language and
infrastructures, implementing and managing Windows Server
scripting environment and then proceeds to a thorough
high availability, implementing disaster recovery, migration of
explanation of creating functional scripts that can be used for
servers and workloads to Azure, and monitor and troubleshoot
performing common tasks that involve working with files,
Windows Server environments.
Internet-connected scripts, user interaction, and solving tasks in
systems and enterprise management deployments such as
SCPO: Security+ (80 hours)
working with Active Directory and the file system.
This course explores the issues related to computer and
CA-PYTDE: Python Development (60 hours) network security and its implications. Students will learn to
recognize security threats and ramifications, and identify
This course introduces the students to the Python programming
sources of security threats and major areas of vulnerability. The
language. Students will continue to integrate Object-Oriented
course will examine ways to detect and neutralize system and
programming concepts will learning the features of the Python
network security threats, implement security protection
programming language. Students will start with the
procedures and practices. Methods of security disaster recovery
implementation of fundamental structures of programming using
will also be explored in this course.
the Python syntax and libraries. Students will then move on to
using functions, files, lists, tuples and dictionaries and
implementing those features into a Python program. Finally the CA-CSRIM – Risk Identification and Mitigation (80 hours)
course will explore Object Oriented programming with Python This course provides the student with an overview of the various
and the GUI programming features that are provided by Python. risks and security vulnerabilities to which IT systems and
infrastructures are commonly exposed to. The course with then
INN8: Introduction to Internetworking (80 hours) explore the tools and techniques used to mitigate those risks.
This course explores the fundamental concepts in Students will explore the risks and exposures facing web servers
internetworking. The focus of this course is TCP/IP. Students and applications, Wi-Fi, Bluetooth, mobile devices and the
will explore the DOD and OSI reference models and learn to general IT infrastructure. The course will then cover topics in
identify TCP/IP protocol suite components and implement IP Penetration testing, system hacking, social and physical
addressing and Subnet masks. Students will learn about name security, malware and sniffers, SQL injections and
resolution and TCP/IP naming services and how to navigate the cryptography, session highjacking, denial of service and other
Cisco IOS interface and perform basic operations on Cisco types of system attacks. The focus of the course will be to
routers and switches. identify the risks and then apply countermeasures and
prevention techniques.
ICNO: Interconnecting Cisco Network Devices (80 hours)
CYESN: Cybersecurity Essentials (60 hours)
This course explores the configuration and administration of
common Cisco network devices. Students will learn about The increased reliance on computer systems, the internet,
layered internetwork communication, protocols and standards connected technologies and smart devices has made
and how to plan and design Internetworked LANs and WANs. cybersecurity a critical concern for organizations and individuals
This course will allow the students to work with the Cisco alike. Keeping devices, data and information secure and
Internetwork Operating System (IOS) in a simulated protected from vulnerabilities is a critical area of activity for all
environment. Students will learn to implement and manage organizations. This course provides the students with an
Cisco routers and switches. introduction to the field of cybersecurity. Students will be
introduced to the four distinct challenges to creating a
cybersecurity defense; securing the infrastructure, securing the
© 2023 3 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE
devices, securing the local network and securing the perimeter. PROGRAM OUTCOMES
The course will explore the fundamental concepts of each
Upon successful completion of the five phases of this
challenge and the types of vulnerabilities associated with each.
program, you will be able to:
Students will learn how to identify the risks and vulnerabilities in
each area and describe counteractions to mitigate the risks. Use a variety of computer software and other
technological tools appropriate to perform
essential business tasks
CSAPL – Cybersecurity Analyst CySA+ (80 hours)
Use fundamental system commands appropriate to
This course will explore the role and responsibilities of the
operating systems
cybersecurity specialist in monitoring, detecting and responding
to security incidents in information systems and networks. The Apply a structured process to problem solving.
course will introduce the tools and tactics used to manage Collect, analyze and organize relevant information from
cybersecurity risks, identify various types of common threats, a variety of sources
evaluate an organizations security, collect security intelligence Install, configure and upgrade physical and logical
and handle incidents as they occur. The course is designed to elements on the network
foster a comprehensive approach to security. This course aligns Interpret, produce and present work-related
to the objectives of the CompTIA Cybersecurity Analyst documents and information effectively and
Certification exam (CS0-002). accurately
Use and administer a network client environment
CA-PENPL – Penetration Testing (60 hours) Plan a network installation or upgrade
This course explores the concepts of Penetration testing. The Monitor, optimize and maintain a network
ever-increasing need of organizations to protect themselves Interact and communicate in various work
from security breaches and risks require them to invest heavily situations
in understanding their vulnerabilities and design measures to Establish and apply security measures to various
counteract them. In order to protect themselves, organizations physical and logical network elements
turn to the conducting of penetration testing. In this course, Troubleshoot problems related to local and wide
students will learn the concepts and methodologies related to area networks
pen testing. Students will develop their pen testing skills Manage the use of time and other resources to
enabling them to identify information system vulnerabilities and attain personal and/or project-related goals
design effective remediation for them. This course aligns to the
Design the technical elements of a network
objectives of the Comptia PenTest+ exam (PT0-002).
infrastructure
Implement a server virtualization solution.
CA-CASP: Advanced Security (60 hours) Assess, plan and implement a cybersecurity
This course expands on the fundamental security concepts by defense strategy.
teaching students the knowledge and skills in advanced Monitor, detect and respond to security
security. Student will learn the concepts of risk management, vulnerabilities in information systems.
enterprise security architecture, enterprise security operations, Plan and perform penetration-testing procedures.
technical integration of enterprise security, research,
development and collaboration. The course begins with an Please Note:
overview of governance and risk compliance where students will
learn about the role and life cycle of risk management and risk a) The courses listed above may not be presented in the order that they
management methods. Students will explore network appear on this outline.
infrastructure protection, software integration and testing and
b) Required textbooks and supplies may be purchased outside of the
emerging technologies for secure configuration and system
College, provided those purchases are preapproved to ensure they
hardening. After exploring the concepts of cryptography, public are the correct textbooks and supplies and are available for the
key infrastructure and vulnerability management, the course will required portions of the program.
conclude with a review of technical controls and incident
responses. c) Except for VCAD and Practical Nursing programs, or unless otherwise
indicated by the College in the program outline, the non-practicum
course delivery portion of the program is based on a (4) four-hour
CES4: Career and Employment Strategies (20 hours) student day. The 4-hour day is made up of a combination of
This course builds on the skills learned in the Student Success instructor led or instructor managed classes and/or open lab. Open
Strategies course or its equivalent. It provides information on lab time is not supervised by your instructor, however, during this
how to use the communication skills learned in order to make a time student are expected to undertake course related self-directed
successful presentation to a prospective employer. Students study and project work.
also learn how to uncover the hidden job market and identify d) A portion of a program may be delivered through the use of on-line
employment opportunities. Self-assessment during this course and/or computer assisted learning courses or a blended use of
allows students to identify their personal skills that are learning modalities including computer assisted, instructor
transferable to the work place and to describe these skills to a moderated and/or on-line delivery.
prospective employer. Students may be videotaped during a e) In order to facilitate the ongoing development and updating of
mock interview and will participate in the analysis of their programs, the College may implement amendments or
performance in the “interview”. modifications to programs in order to accommodate these revisions
at any time. Examples of possible amendments include
modification of content, curricular updates, changes in course titles,
© 2023 4 ON-CDI-CBS-0223
Replaces all previous versions
Cybersecurity Specialist
PROGRAM OUTLINE
Example titles:
Internet web site technician
LAN (local area network) administrator
LAN (local area network) technician
Web technician
Computer network technician
Data centre operator
Network administrator
Network support technician
Supervisor, computer network technicians
System administrator
© 2023 7 ON-CDI-CBS-0223
Replaces all previous versions