Upload
dodung
View
213
Download
0
Embed Size (px)
Citation preview
LeaderQuest
102 Decker Court, Suite 250
Irving, Texas 75062
Phone: (972) 865-4030
Toll Free: (866) 378-0761
Fax: (303) 768-0513
Catalog Number 1, Volume Number 17, Revised 4/3/2018
Effective Date 4/3/2018
APPROVED AND REGULATED BY THE TEXAS WORKFORCE COMMISSION, CAREER SCHOOLS AND COLLEGES, AUSTIN, TEXAS.
“THE INFORMATION CONTAINED IN THIS CATALOG IS TRUE AND CORRECT TO THE BEST OF MY KNOWLEDGE.”
Tim Kalil, Chief Operating Officer
Signature: Tim Kalil 4/3/2018
TABLE OF CONTENTSINTRODUCTION.........................................................................................4ADMINISTRATION STAFF...........................................................................4FACULTY..................................................................................................5PROGRAMS OFFERED................................................................................6TUITION AND FEES....................................................................................8CLASS SCHEDULE.....................................................................................9
FULL TIME STUDENTS:....................................................................................................9PART-TIME STUDENTS:...................................................................................................9
ENTRANCE REQUIREMENTS.....................................................................10ENROLLMENT.........................................................................................10FACILITIES..............................................................................................10PLACEMENT ASSISTANCE........................................................................13ATTENDANCE REQUIREMENTS.................................................................13CERTIFICATION EXAM POLICY..................................................................13GRADING SYSTEM/PROGRESS REPORTS...................................................14RE-ADMISSION POLICY............................................................................14GRADUATION POLICY..............................................................................14RESCHEDULE POLICY..............................................................................14CANCELLATION AND REFUND POLICY.......................................................15CONDUCT POLICY...................................................................................16STUDENT COMPLAINTS...........................................................................17EDUCATIONAL SERVICES.........................................................................17PREVIOUS CREDITS.................................................................................17DISMISSAL.............................................................................................17STUDENT GRIEVANCE PROCEDURE...........................................................17PROGRAMS............................................................................................18
TECHNICAL SUPPORT SPECIALIST (TSS)...........................................................................18COMPUTER USER SUPPORT SPECIALIST (CUSS)................................................................30NETWORK SUPPORT SPECIALIST (NSS)............................................................................50CCNA......................................................................................................................67INFORMATION SECURITY ANALYST (ISA)..........................................................................76CYBERSECURITY SPECIALIST (CYBER).............................................................................90COMPTIA SECURITY +.......................................................................................103IT PROJECT MANAGEMENT PROFESSIONAL - CAPM/PMP...................................................107
MCSA WINDOWS 8 ASSOCIATE (DS)...........................................................................116COMPTIA NETWORK +...........................................................................................126COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)...........................................130CERTIFIED ETHICAL HACKER (CEH).......................................................................133CERTIFIED NETWORK DEFENDER (CND).................................................................139COMPTIA ADVANCED SECURITY PRACTITIONER (CASP).........................................142EC-COUNCIL CERTIFIED ENCRYPTION SPECIALIST (ECES)......................................146EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA).............................................149EC-COUNCIL D ISASTER RECOVERY PROFESSIONAL (EDRP)....................................152ITIL V3 FOUNDATIONS...........................................................................................154CISSP – CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL.................................158
3
INTRODUCTIONLeaderQuest (hereinafter referred to as “The School”) offers job training programs that quickly close skill gaps and help individuals improve technical and management performance; producing rewarding careers and delivering an effective workforce for businesses across size and industry. The School provides world-class technology and equipment for student training. The School is staffed with Instructors who must meet minimum certification standard in their field of specialty. The School is an Authorized Training Partner for Microsoft, EC-Council, and CompTIA. The School is approved by the State of Colorado Department of Education, Division of Private Occupational Schools (DPOS), Texas Veteran’s Commission, and by the Texas Workforce Commission (TWC).The owner of the School is George Cohlmia. LeaderQuest is headquartered in Englewood, CO and as of this writing, offers classes on four campuses: Colorado Springs, Englewood, Jacksonville, and Irving. The School has the following history:
January 2001: School is approved by the Colorado Board of Higher Education Department of Private Educational Schools under the name of Hensmann Training and Education Centers.
February 2001: School opens its doors in Colorado Springs, CO and runs its first class.
March 2001: School opens its second campus in Englewood, Colorado. July 2006: School is sold to new ownership. The acquiring company is
LeaderQuest with one majority shareholder in George Cohlmia. School continues to operate as Hensmann Training and Education Centers through 2006 and into early 2007.
April 2007: School officially changes its name from Hensmann Training and Education Centers to LeaderQuest.
October 2014: School is approved by the Texas Workforce Commission October 2015: Purchased Consultech Inc. in Jacksonville, FL and is approved by
Florida Department of Education. October 2016: Texas approved for GI BILL Benefits
ADMINISTRATION STAFFKey Administrative Staff:
George Cohlmia - CEO & Owner Jerry Kukuchka – Chief Financial Officer Tim Kalil – Chief Operations Officer Bruce Stassen – VP of Business Operations/Controller Jennifer Strobl – Director Training and Development Bob Villareal – Campus Director – Irving Qwincy Houston – Campus Director – Denver Peter Lett – Campus Director – Colorado Springs
4
Robert Estes – Campus Director – Jacksonville Nathan Smith – Technology Manager Meghan Jurado – Certified LeaderQuest Compliance Officer/Lead SCO Mary Walker – Accounting James Gross- IT Instructor Manager
Dallas Staff:
Bob Villareal – Campus Director – Dallas George Clay – Sr Career Training Consultant Orlando Dumas – Career Training Consultant Robert MacIntyre – Career Training Consultant Brandon Smith – Career Training Consultant James Grimes- Lead Instructor Jan Campo – Test Center Administrator Miranda Murphey- Frontline Associate John Scott- PM Frontline Associate
FACULTYKenneth Tanner- Lead Technical Instructor
Kenneth is an engineering professional with many years of extensive hands-on experience in network, telecommunication and systems administration. He has designed, installed, configured, and maintained complex routed LAN and WAN networks that included voice, video and high security compliance.
Axelos Information Technology Infrastructure Library (ITILv3) Foundation Level
Cisco o Certified Network Professional (CCNP) Switch Examo Certified Network Associate (CCNA) Routing & Switchingo Certified Network Associate (CCNA) Securityo Certified Network Associate (CCNA) Voiceo Certified Design Associate (CCDA)
CompTIA Security+ EC Council Certified Ethical Hacker (CEHv9) (ISC)² Certified Information Systems Security Professional – CISSP
James Grimes –Technical Instructor
James has been working in the information technology field since 2002 having worked with a number of marquee companies including Walmart, EDS, BMC, and Dell. James is a US Army veteran and brings a broad base of IT field knowledge into his classroom, and has proven a unique ability to demystify complex technical concepts to students across all skill levels. James possesses a wide array of technology certifications including:
CompTIA A+ CompTIA Network+ CompTIA Security+ ITIL V3 Foundations
5
James Gross – Technical Instructor
Ever since childhood, James has been fascinated by technology. Years later, in high school, James learned how to program in BASIC and how to use the Apple IIe computer for math class. Now, with over 18 years of experience with computers and networks, James has a deep understanding, and fascination in the exceptional things that can be accomplished by IT. James’s journey into the IT arena started in 1996, when he had to learn the CompTIA six-step troubleshooting process to isolate a problem in his deal AMD 386DX-40 computer. After guessing that it was the I/O board and after purchasing the board and installing it, James’s computer sprang to life; and he was hooked on IT!
After an illustrious career in the US Air Force starting in 1991, James retired as a Program Analyst from the 81st Training Wing and joined Level 3 Communication as a Senior Operations Technician. Along the way, James earned a wide array of highly coveted IT certification including:
CompTIA A+ CompTIA Network+ CompTIA Security+ Certificate in Homeland Security - Level I MTA: Windows OS Fundamentals Web Foundations Associate Web Design Specialist MTA: Windows Operating System Fundamentals CompTIA Server+ ITIL Foundations
PROGRAMS OFFERED
Program Title / Certificate
Course Number Course Title
Contact Hours (Hrs)
Program Completion Length*
(Days)Infrastructure and Tech SupportTechnical Support Specialist (TSS)
ITIL-FND ITIL Foundations 4015220-901 A+ Essentials 40
220-902 A+ Practical Application
40
Computer User Support Specialist (CUSS)
220-901 A+ Essentials 40 25
220-902 A+ Practical Applications 40
Net+ Network+ 40Sec+ Security+ 40
6
ITIL-FND ITIL Foundations 40
CCNAICND1 Interconnecting Cisco
Networking Devices 1 4010
ICND2 Interconnecting Cisco Networking Devices 2 40
Network Support Specialist (NSS)
Net+ Network+ 40
20Sec+ Security+ 40
ICND1 Interconnecting Cisco Networking Devices 1 40
ICND2 Interconnecting Cisco Networking Devices 2 40
CompTIA Network + (Net +) N10-007 Comp Network + 40 5
Information Security
Information Security Analyst- ISA
Sec + Security + 40
15CND Certified Network Defender 40
CEH Certified Ethical Hacker 40
Cybersecurity Specialist (CYBER)
Sec+ Security+ 40
15CEH Professional Ethical Hacker 40
CHFI Computer Hacking Forensics Investigator 40
CompTIA Security + SYO-501 Security + 40 5
EC-Council Certified Encryption Specialist
ECES EC-Council Certified Encryption Specialist 24 3
EC-Council Certified Security Analyst
ECSA EC-Council Certified Security Analyst 40 5
EC-Council Disaster Recovery Professional
EDRP EC-Council Disaster Recovery Professional 40 5
CompTIA Advanced Security Practitioner
CASP CompTIA Advanced Security Practitioner 40 5
Certified Digital Forensics Examiner CHFI Certified Digital
Forensics Examiner 40 5
Certified Professional Ethical Hacker
CEH Certified Ethical Hacker 40 5
7
Certified Network Defender CND Certified Network
Defender 40 5
Project and Service ManagementIT Project Management Professional
ITIL ITIL Foundations 4010
CAPM/PMP PMP Exam Preparation 40Certified Information Systems Security Professional
CISSPCertified Information
Systems Security Professional
40 5
ITIL Foundations ITIL ITIL Foundations 40 5*Program Completion Length does not include self-study test prep time based on industry standard of 1 day of self-study test prep for each day of course lecture.
8
TUITION AND FEES
Programs
TuitionSupplies/
EquipmentTotal Tuition
FeeTechnical Support Specialist (TSS) – 120 hours
$7,090 $295 $7,385
Computer User Support Specialist (CUSS) – 200 hours$12,230 $545 $12,775
Cisco Certified Network Associate (CCNA) – 80 hours$5,960 $630 $6,590
Network Support Specialist (NSS) – 160 hours$11,100 $880 $11,980
IT Project Management Professional – 80 hours$5,020 $270 $5,290
Information Security Analyst- (ISA)- 120 Hours$8874 $1,325 $10,085
Cybersecurity Specialist (CYBER) – 120 hours$8,760 $1,325 $10,085
CompTIA Security + (Sec +) – 40 hours$2,570 $125 $2,695
MCSA Windows 8 (DSS) – 80 hours$5,444 $546 $5,990
EC-Council Certified Security Analyst (ECSA) – 40 hours$3,195 $500 $3,695
EC-Council Disaster Recovery Professional (EDRP) – 40 hours$3,045 $650 $3,695
EC Council Certified Encryption Specialist (ECSE) -24 hours$2,045 $500 $2,545
9
Computer Hacking Forensic Investigator (CHFI) – 40 hours$3,095 $600 $3,695
CompTIA Advanced Security Practitioner (CASP)- 40 hours$3, 170 $325 $3,495
Certified Ethical Hacker (CEH) – 40 hours$3,095 $600 $3,695
Certified Network Defender (CND) – 40 hours$3,095 $600 $3,695
CompTIA Network+ (Net+) – 40 hours$2,570 $125 $2,695
Information Systems Security Professional Certification Prep (CISSP) – 40 hours
$3,565 $170 $3,395
ITIL Foundations (ITIL) – 40 hours$1,1950 $45 $1,995
CLASS SCHEDULEAll courses are determined by Vendor standards. Not all programs have been submitted for GI Bill benefits.
FULL TIME STUDENTS:
Monday through Friday 8:00am – 5:00pm with an hour long lunch break
PART-TIME STUDENTS:
Monday through Friday 7:00pm – 11:00pm.
Some Saturdays allowed for make-up 8:00am – 4:30pm with an hour lunch break
When an unexpected closure occurs due to extraordinary conditions such as inclement weather, students will be notified as soon as possible by phone and/or radio, and/or TV who provide closure information as a public service. Classes are not held on the following holidays:
New Year’s Eve Labor Day
10
New Year’s Day Thanksgiving Day & the Friday following
Memorial Day Christmas Eve
Independence Day Christmas Day
ENTRANCE REQUIREMENTSThe school does not discriminate based on race, sex, religion, ethnic origin, or disability.
Prospective students must have a high school diploma or equivalency diploma with the willingness to learn; and a working knowledge of computers would be greatly appreciated. We also screen our students to make sure they will be successful with our program. In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.
ENROLLMENTProspective students may enroll anytime. Late enrollments will be only one week prior to class start time and as late as one day into first class, depending on the program and the student has adequate experience.
FACILITIESThe LeaderQuest main corporate office is located in Denver at 6855 S. Havana St STE 200, Englewood CO 80112. LeaderQuest has a campus in Dallas, TX at 102 Decker Court, Ste 250, Irving, TX 75062. LeaderQuest also operates a second training facility in Colorado Springs at 7222 Commerce Center Dr, Ste 235, Colorado Springs, CO 80919 and a third facility at 8663 Baypine Rd Bldg 4 Suite 104, Jacksonville FL 32207. Hours of operation are from 8 am to 11 pm. All classrooms are furnished with the latest state-of-the-art equipment and furniture. A Resource Center, Study Center and Career Services Center are available to students.
LeaderQuest is a smoke-free environment. For those that smoke, designated smoking areas are located outside our training facilities.
Below is a full accounting of each of the school’s facilities as of April 15, 2016:
Englewood, COAddress 6855 S Havana St, Suite 230,
Englewood, CO 80112Total Square Footage 6,932 Sq. Ft.
Number of Classrooms 3Student Stations in Classroom
#112 Dell Optiplex machines with dual monitors
Student Stations in Classroom #2
16 Dell Optiplex machines with dual monitors
11
Student Stations in Classroom #3
12 Dell Optiplex machines with dual monitors
Lab Environment A separate lab environment integrated into each classroom
Virtual Live Training Room Description
3 workstations dedicated to virtual live training.
Student Self Study and Test Prep Room Description
3 workstations dedicated to self-study or test preparation.
Administrative Area Description 10 Cubicles 8 Enclosed Offices2 Conference Rooms1 Break Area1 Reception Area
Colorado Springs, COAddress 7222 Commerce Center Drive, Suite
235 Colorado Springs, CO 80919Total Square Footage 4,049 Sq. Ft.
Number of Classrooms 2 ClassroomsStudent Stations in Classroom
#112 Dell Optiplex machines with dual monitors
Student Stations in Classroom #2
16 Dell Optiplex machines
Lab Environment A separate lab room shared between both classrooms
Virtual Live Training Room Description
2 workstations dedicated to virtual live training.
Student Self Study and Test Prep Room Description
2 workstations dedicated to self-study or test preparation.
Administrative Area Description 4 Enclosed Offices1 Conference Room1 Break Area1 Reception Area
Jacksonville, FLAddress 8663 Baypine Rd Building 4, Suite 104
Jacksonville, FL 32256Total Square Footage 5,959 Sq. Ft.
Number of Classrooms 3 ClassroomsStudent Stations in
Classroom #116 Dell Optiplex machines with dual monitors
Student Stations in Classroom #2
16 HP Pro 3500 machines with dual monitors
12
Student Stations in Classroom #3
12 Dell Optiplex machines with dual monitors
Pearson Vue Testing Center 3 HP Prodesk 405 workstations dedicated to Testing
Administrative Area Description
3 Enclosed Meeting Offices1 Conference Area1 Break Area1 Reception AreaOpen office space with 8 cubicles1 Enclosed Director’s office.
Irving, TX Address 102 Decker Court, Suite No. 250
Irving, TX 75062Total Square Footage 4,977 Sq. Ft.
Number of Classrooms 3 ClassroomsStudent Stations in Classroom
#116 Dell Optiplex machines with dual monitors
Student Stations in Classroom #2
16 Dell Optiplex machines with dual monitors
Student Stations in Classroom #3
18 Dell Optiplex machines with dual monitors w/ a hands on lab environment
Testing Center PearsonVue Testing Center Administrative Area Description 3 Enclosed Offices
1 Conference Room1 Break Area1 Reception Area1 Employee Bullpen Area
13
PLACEMENT ASSISTANCELeaderQuest offers job lead referrals as they are sent to us from employers. However, we make no guarantee, express or imply of future employment. Current law prohibits any school from guaranteeing job placement as an inducement to enroll students.
ATTENDANCE REQUIREMENTSStudents are expected to arrive on time for classes with the proper materials and attitude. An overall attendance rate of at least 80% is required. Instructors take attendance on a daily basis through an attendance log that is submitted to student services by 11:00AM each day and added to the student’s file. On that attendance log, instructors mark whether the student was tardy, absent, or partial. Instructors may request students to withdraw from a course or program if excessive absences of over 70% or tardiness lead to unsatisfactory progress.
Students who fall behind the 80% attendance rate or the 80% lab participation rate will be put on academic probation by student services and if they fall under 70% will automatically be dropped from the program. If students using VA benefits exceeds 70% total absences per period will be terminated from their VA benefits for unsatisfactory attendance. All students will be given one additional training period after they are put on probation to meet requirement or will be terminated at that time.
In order to show that the cause of unsatisfactory attendance has been removed, students must show good attendance (as defined) for one period after being terminated for unsatisfactory attendance. After such time, the student may be recertified for VA education benefits.
14
Students who are unable to continue classes for medical reasons or severe personal problems will be required to take a leave of absence until that are able to return to class. Proper documentation will be required to substantiate a student’s withdrawal. We also offer an audit policy. Students can come and refresh any class on a space availability basis.
CERTIFICATION EXAM POLICYAs part of our commitment to student success, unless otherwise noted, LeaderQuest covers the cost of exams required to achieve certification. Upon completion of study time, one test voucher per completed class will be paid to enable the student to complete their education per the signed study plan set forth in the enrollment paperwork.
Students are eligible to take exams after completing each class in their program. The following policy statements outline conditions and requirements associated with exams:
It is highly recommended that any test-prep, labs, study guides and materials included in the program are completed before testing. It is the Student’s responsibility, and to their advantage, to utilize resources both included in the program and outside of the program to ensure their readiness for exams. For every hour of class time we expect a student to study an additional 2 to 3 hours on their own to be able to pass the vendor certification exams.
Students are required to take all exams at the LeaderQuest testing facility on campus. Testing is mandatory to complete certification. In order to for the student to best utilize the knowledge gained at LeaderQuest, testing is mandatory after a period of assisted study. (Pre-tests, study guide, instructor mentoring.) Students must complete 80% of class before they can request their exam from [email protected] are limited to only one exam per class. In the event a student fails an exam, they will have three options:
1. Exchange one of the other exams included in a program to retake the failed exam
2. Pay out of pocket for an additional exam3. Elect not to retake the exam at all and move onto the other exams in
the program
Once registered for an exam time, LeaderQuest requires a minimum of 48 hours’ notice in advance for reschedule or the exam will expire. Expired exams cannot be recovered and eligibility to take that exam will be lost.
Exams are required to be taken within 6 months from the last day of a completed class at the campus test center in order to complete training. Requests for exams outside of this window are granted at LeaderQuest’s discretion.
GRADING SYSTEM/PROGRESS REPORTSOur grading system is pass/fail as required by vendor certification. Student must be present in 80% of classes and must participate in 80% of course labs or else they will be put on academic probation. If the student falls below the 70% attendance and/or
15
lab completion the student will be evaluated on course content and asked to re-sit the course at a later date if needed. All students will be given one additional training period after they are put on probation to meet requirements or will be terminated at that time.
Students receive certificates of completion at the end of each course if the above requirements are met. All students have the option of refreshing classes for the lifetime of the course while it is being offered at no additional cost. Students may have a Progress report completed by their Instructor at the end of every course upon request.
RE-ADMISSION POLICYThe school may allow a student whose enrollment was terminated for unsatisfactory progress to reenroll after a minimum of one probationary progress evaluation period. Such reenrollment does not circumvent the approved refund policy.
GRADUATION POLICYTo graduate and receive a Certificate of Completion, students must be present in 80% of classes and must participate and successfully complete 80% of course labs.
RESCHEDULE POLICYLeaderQuest is committed to keeping class sizes small in order to facilitate a high quality learning environment for our Students. Many classes are full at 14-18 Students; because of this we have to minimize reschedules as much as possible Taking into account any unforeseen circumstances that may occur, LeaderQuest’s Reschedule Policy allows any student to reschedule their classes within their Program a maximum amount of 2 times total with no penalty or charge. Beyond two reschedules, LeaderQuest Students will be dropped from their program and provided a refund for the remaining classes per the cancellation policy below.
CANCELLATION AND REFUND POLICYA full refund will be made to any student who cancels the enrollment contract within 72 hours (until midnight of the third day excluding Saturdays, Sundays and legal holidays) after the enrollment contract is signed or within the student’s first three scheduled class days (does not apply to Seminars).
1. Refund computations will be based on scheduled course time of class attendance through the last date of attendance. Leaves of absence, suspensions and school holidays will not be counted as part of the scheduled class attendance.
2. The effective date of termination for refund purposes will be the earliest of the following:
16
(a) The last day of attendance, if the student is terminated by the school;(b) The date of receipt of written notice from the student; or(c) Ten school days following the last date of attendance.
3. If tuition and fees are collected in advance of entrance, and if after expiration of the 72 hour cancellation privilege the student does not enter school, not more than $100 in nonrefundable administrative fees shall be retained by the school for the entire residence program or synchronous distance education course.
4. If a student enters a residence or synchronous distance education program and withdraws or is otherwise terminated, the school or college may retain not more than $100 in nonrefundable administrative fees for the entire program. The minimum refund of the remaining tuition and fees will be the pro rata portion of tuition, fees, and other charges that the number of hours remaining in the portion of the course or program for which the student has been charged after the effective date of termination bears to the total number of hours in the portion of the course or program for which the student has been charged, except that a student may not collect a refund if the student has completed 75 percent or more of the total number of hours in the portion of the program for which the student has been charged on the effective date of termination.1
5. Refunds for items of extra expense to the student, such as books, tools, or other supplies should be handled separately from refund of tuition and other academic fees. The student will not be required to purchase instructional supplies, books and tools until such time as these materials are required. Once these materials are purchased, no refund will be made. For full refunds, the school can withhold costs for these types of items from the refund as long as they were necessary for the portion of the program attended and separately stated in the enrollment agreement. Any such items not required for the portion of the program attended must be included in the refund.
6. A student who withdraws for a reason unrelated to the student’s academic status after the 75 percent completion mark and requests a grade at the time of withdrawal shall be given a grade of “incomplete” and permitted to re-enroll in the course or program during the 12-month period following the date the student withdrew without payment of additional tuition for that portion of the course or program.
7. A full refund of all tuition and fees is due and refundable in each of the following cases:
(a) An enrollee is not accepted by the school;(b) If the course of instruction is discontinued by the school and this
prevents the student from completing the course; or
1 More simply, the refund is based on the precise number of course time hours the student has paid for, but not yet used, at the point of termination, up to the 75% completion mark, after which no refund is due. Form PS-1040R provides the precise calculation.
17
(c) If the student's enrollment was procured as a result of any misrepresentation in advertising, promotional materials of the school, or representations by the owner or representatives of the school.
A full or partial refund may also be due in other circumstances of program deficiencies or violations of requirements for career schools and colleges.
8. REFUND POLICY FOR STUDENTS CALLED TO ACTIVE MILITARY SERVICE. A student of the school or college who withdraws from the school or college as a result of the student being called to active duty in a military service of the United States or the Texas National Guard may elect one of the following options for each program in which the student is enrolled:
(a) if tuition and fees are collected in advance of the withdrawal, a pro rata refund of any tuition, fees, or other charges paid by the student for the program and a cancellation of any unpaid tuition, fees, or other charges owed by the student for the portion of the program the student does not complete following withdrawal;
(b) a grade of incomplete with the designation "withdrawn-military" for the courses in the program, other than courses for which the student has previously received a grade on the student's transcript, and the right to re-enroll in the program, or a substantially equivalent program if that program is no longer available, not later than the first anniversary of the date the student is discharged from active military duty without payment of additional tuition, fees, or other charges for the program other than any previously unpaid balance of the original tuition, fees, and charges for books for the program; or
(c) the assignment of an appropriate final grade or credit for the courses in the program, but only if the instructor or instructors of the program determine that the student has:(1) satisfactorily completed at least 90 percent of the required
coursework for the program; and(2) demonstrated sufficient mastery of the program material to
receive credit for completing the program.
9. The payment of refunds will be totally completed such that the refund instrument has been negotiated or credited into the proper account(s), within 60 days after the effective date of termination.
CONDUCT POLICYStudents are expected to act in an adult manner. Possessions of weapons, illegal drugs, and alcohol of any kind are not allowed at any time. The school does not tolerate sexual harassment. Any violation of school policies may result in permanent dismissal from school.
STUDENT COMPLAINTS
18
Student complaints will be brought to the attention of the School in order to be resolved. If the student complaint cannot be resolved between the student and the school, a student may contact the State authorizing body for the school – typically that would be the Division of Private Occupational Schools. In Texas, complaints can be mailed to TWC-Career Schools and Colleges, 101 East 15th Street, Room 226T, Austin, Texas, 78778-0001; faxed to (512) 936-3111; or emailed www.texasworkforce.org/careerschoolstudents. All student complaints must be submitted to the school and Division in writing. There is a two-year limitation on Division action on student complaints.
EDUCATIONAL SERVICESLeaderQuest’s primary educational format is traditional classroom instruction with online content as an adjunct learning resource. When the student’s schedule or personal circumstance prevents them from participating physically, LeaderQuest does provide instructor led online training as an alternate method of training. Each LeaderQuest training facility offers students a break room and a study area for their convenience.
PREVIOUS CREDITSCredit for previous education will be evaluated and when appropriate, credit will be granted and the program shortened accordingly. LeaderQuest does not guarantee the transferability of its credits to any other institution unless there is written agreement with another institution.
DISMISSALAny student may be dismissed for violations of rules and regulations of the school, as set forth in the school’s publications. A student also may be withdrawn from classes if he or she does not prepare sufficiently, neglects assignments, or makes unsatisfactory progress. The director, after consultation with all parties involved, makes the final decision.
STUDENT GRIEVANCE PROCEDUREStudents can bring any grievance to the attention of the school in order for the school to help resolve any issues that may occur. Grievances should be sent via email to the Campus Director at [email protected]. Any grievances unresolved by the school should be sent to:
Texas Workforce CommissionCareer Schools and Colleges101 E. 15th StreetAustin, TX 78778-0001
APPROVED AND REGULATED BY THE TEXAS WORKFORCE COMMISSION, CAREER SCHOOLS AND COLLEGES, AUSTIN, TEXAS.
19
PROGRAMS
TECHNICAL SUPPORT SPECIALIST (TSS)
PROGRAM DESCRIPTIONThis program is designed to quickly help individuals get to work in entry level jobs in the field of IT as Technical Support Specialists. This program develops the skills required to perform the following job functions:
Install, build, maintain, and configure personal computers, laptop computers, and printers
Principles of physical and TCP/IP networks, as well as the operational and professional procedures as an IT technician
Support personal computers, mobile devices, and small networks in a business setting
Troubleshoot hardware and software Install and configure Windows and other Operating Systems Examine server hardware and software, disaster recovery strategies Perform installation, troubleshooting, and management functions in the
Windows Client operating system environment. The program also introduces the principles and core elements of IT service
management (ITSM) based on ITIL framework
After program completion, student will have sat through three highly coveted certification exams:
- ITIL Foundations- CompTIA A+ 901/902
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PROGRAM OUTLINESubject Number Subject Title
Clock HoursLecture/Lab/Ext/Total
ITIL ITIL Foundations 20/20/0/40A+ 901 CompTIA A+ 901 20/20/0/40
20
A+ 902 CompTIA A+ 902 20/20/0/40
The approximate time required to complete this program is three weeks for day students and six weeks for evening students.
CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for 25 days. Classes for evening students will be held on Monday through Friday 7:00 to 11:00pm. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $7,090Supplies/Equipment: $295Total Tuition Fee: $7,385
COST PER SINGLE SUBJECTSubject Number Subject Title Cost
ITIL ITIL Foundations $1,995A+ 901 CompTIA A+ 901 $2,695A+ 902 CompTIA A+ 902 $2,695
CERTIFICATION EXAMS REQUIRED
ITIL Foundations CompTIA A+ 901/902
TARGETED JOB ROLES
Technical Support Specialist Helpdesk Technician Computer Technician IT Support Specialist
SUBJECT DESCRIPTIONS AND SYLLABI
ITIL V3 FOUNDATIONS
PROGRAM DESCRIPTION
21
If you are an IT professional looking to get into IT service management using ITIL best practices, the IT Infrastructure Library (ITIL®) Foundation Certification (2011 Lifecycle Edition) course is the first step in your preparation. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.
Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.
PERFORMANCE OBJECTIVESStudents will learn:
Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service
Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.
TARGETED JOB ROLES IT Professionals with an interest in Service Management
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEES
22
Registration: $0Tuition: $1,952Supplies/Equipment: $43Total Tuition Fee: $1,995
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00 PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
IT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition) 093030SC (Rev 2.0) Print and Digital Courseware
CERTIFICATION EXAM REQUIRED ITL-FND
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINE
23
Lesson 1: Introduction to ITIL
ITIL Basics The Service Lifecycle
Lesson 2: Service Strategy
Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process
Lesson 3: Service Design
Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process
Lesson 4: Service Transition
Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process
Lesson 5: Service Operation
Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process
Lesson 6: Service Operation Functions
The Service Desk Function The Technical Management Function The IT Operations Management Function The Application Management Function
Lesson 7: Continual Service Improvement
Basic Concepts of Continual Service Improvement
24
CSI Principles
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA A+ 901 ESSENTIALS
PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, troubleshoot, upgrade, and perform preventive maintenance on PCs and mobile device hardware.
The CompTIA A+ (Exam 220-901) course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician.
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.
PERFORMANCE OBJECTIVESStudents will learn:
Identify the hardware components of personal computers and mobile digital devices.
Identify networking and security fundamentals. Install, configure, and troubleshoot display devices. Install and configure peripheral components. Manage system components. Manage data storage. Identify the hardware and software requirements for client environment
configurations. Identify network technologies. Install and configure networking capabilities. Support mobile digital devices. Support printers and multifunction devices.
TARGETED JOB ROLES Entry-level IT Professional
25
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,545Supplies/Equipment: $150Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
A+ 901 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
CompTIA A+ (Exam 220-901)
093015SC (Rev 1.1) Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA A+ Exam 901
26
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Hardware Fundamentals
Personal Computer Components Storage Devices Mobile Digital Devices Connection Interfaces
Lesson 2: Networking Fundamentals
Network Types Network Components
Lesson 3: Supporting Display Devices
Install Display Devices Configure Display Devices Troubleshoot Video and Display Devices
Lesson 4: Installing and Configuring Peripheral Components
Install and Configure Input Devices Install and Configure Output Devices Install and Configure Input/Output Devices Install and Configure Expansion Cards
Lesson 5: Managing System Components
Identify Motherboard Components and Features Install and Configure CPUs and Cooling Systems Install Power Supplies Troubleshoot System Components
Lesson 6: Managing Data Storage
Identify RAM Types and Features
27
Troubleshoot RAM Issues Install and Configure Storage Devices Configure the System Firmware Troubleshoot Hard Drives and RAID Arrays
Lesson 7: Customized Client Environments
Types of Common Business Clients Custom Client Environments
Lesson 8: Networking Technologies
TCP/IP Properties and Characteristics TCP/IP Internet Connections Ports and Protocols Networking Tools
Lesson 9: Installing and Configuring Networking Capabilities
Configure Network Perimeters Install and Configure SOHO Networks Troubleshoot Wired and Wireless Networks
Lesson 10: Supporting Mobile Digital Devices
Install and Configure Exterior Laptop Components Install and Configure Interior Laptop Components Other Mobile Devices Mobile Device Accessories and Ports Troubleshoot Mobile Device Hardware
Lesson 11: Supporting Printers and Multifunction Devices
Printer and Multifunction Technologies Install and Configure Printers Maintain Printers Troubleshoot Printers
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
SUBJECT 220-902: A+ PRACTICAL APPLICATIONS
PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) software and operating systems to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential
28
skills and information you will need to install, configure, optimize, troubleshoot, upgrade, secure, and perform preventive maintenance on PC and digital device operating systems.
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.
PERFORMANCE OBJECTIVESStudents will learn:
Identify the basic components and functions of operating systems. Identify networking and security fundamentals. Identify the operational procedures that should be followed by professional PC
technicians. Install and configure Microsoft Windows. Optimize and maintain Microsoft Windows. Work with other operating systems. Identify network technologies. Configure networking capabilities. Support mobile digital devices. Identify security threats, vulnerabilities, and controls. Implement security controls. Troubleshoot system-wide issues.
TARGETED JOB ROLES Entry-level IT Professional
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,545Supplies/Equipment: $150Total Tuition Fee: $2,695
29
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
A+ 902 CompTIA A+ 902 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
CompTIA A+ (Exam 220-902)
093016SE (Rev 1.1)
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA A+ Exam 902
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Operating System Fundamentals
PC and Mobile Operating Systems
30
PC Operating System Tools and UtilitiesLesson 2: Networking and Security Fundamentals
Common Network Services Cloud Concepts Security Fundamentals
Lesson 3: Safety and Operational Procedures
Basic Maintenance Tools and Techniques Personal and Electrical Safety Environmental Safety and Materials Handling Professionalism and Communication Organizational Policies and Procedures Troubleshooting Theory
Lesson 4: Installing and Configuring Microsoft Windows
Implement Client-Side Virtualization
Install Microsoft Windows Use Microsoft Windows Configure Microsoft Windows Upgrade Microsoft Windows
Lesson 5: Optimizing and Maintaining Microsoft Windows
Optimize Microsoft Windows Back Up and Restore System Data Perform Disk Maintenance Update Software
Lesson 6: Working With Other Operating Systems
The OS X Operating System The Linux Operating System
Lesson 7: Networking Technologies
TCP/IP Internet Connections
Lesson 8: Configuring Networking Capabilities
Configure Basic Windows Networking Configure Windows Proxy and Firewall Settings Using Windows Networking Features
Lesson 9: Supporting Mobile Digital Devices
Mobile Device Accessories and Ports Mobile Device Connectivity Mobile Device Synchronization
31
Lesson 10: Security Threats, Vulnerabilities, and Controls
Common Security Threats and Vulnerabilities General Security Controls Mobile Security Controls Data Destruction and Disposal Methods
Lesson 11: Implementing Security Controls
Secure Operating Systems Secure Workstations Secure SOHO Networks Secure Mobile Devices
Lesson 12: Troubleshooting System-Wide Issues
Troubleshoot PC Operating Systems Troubleshoot Mobile Device Operating Systems and Applications Troubleshoot Common Security Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPUTER USER SUPPORT SPECIALIST (CUSS)
PROGRAM DESCRIPTIONThis program is designed to help individuals get jobs in the technical support and service field as end user support specialists. This program develops the skills required to perform the following job functions:
The program introduces the principles and core elements of IT service management (ITSM) based on ITIL framework
Install, configure, upgrade, and maintain PC workstations, focusing on the Windows Operating System.
Resolve PC, OS, and network connectivity issues and implement security practices.
Manage, maintain, troubleshoot, basic network infrastructure, describe networking technologies, basic design principles, and adhere to wiring standards.
Perform compliance and operational security tasks Anticipate, identify and prevent threats and vulnerabilities Manage application, data and host security Perform access control and identity management functions Understand basic Cryptography concepts Install, configure, upgrade, maintain, and troubleshoot servers. Examine server hardware and software, disaster recovery strategies.
32
Perform installation, troubleshooting, and management functions in the Windows Client operating system environment.
Troubleshoot security system issues, such as Encrypting File Systems (EFS) BitLocker Drive Encryption, and file permissions.
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test
PROGRAM OUTLINE
Subject Number Subject TitleClock Hours
Lecture/Lab/Ext/Total
ITIL ITIL Foundations 20/20/40220-901 A+ Essentials 20/20/0/40220-902 A+ Practical Applications 20/20/0/40Net+ Network+ 20/20/0/40Sec+ Security+ 20/20/0/40
The approximate time required to complete this program is 25 days for day students and 50 nights for evening students.
CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00PM for 25 days. Classes for evening students will be held Mondays through Fridays from 7:00PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $12,230Supplies/Equipment: $545Total Tuition Fee: $12,775
COST PER SINGLE SUBJECTSubject Number Subject Title Cost
ITIL ITIL Foundations $1,995
33
220-901 A+ Essentials $2,695220-902 A+ Practical Applications $2,695N10-007 Network+ $2,695SY0-501 Security+ $2,695
CERTIFICATION EXAM REQUIRED ITIL Foundations 220-901 for CompTIA A+ Essentials 220-902 for CompTIA A+ Practical Application N10-007 for CompTIA Network+ SY0-501 for CompTIA Security+
TARGETED JOB ROLES End User Support Specialist Service Technician Technical Support Specialist Help Desk Specialist Desktop Support Specialist Security Administrator
SUBJECT DESCRIPTIONS AND SYLLABI
ITIL V3 FOUNDATIONS
PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT Infrastructure Library (ITIL®) Foundation Certification (2011 Lifecycle Edition) course is the first step in your preparation. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.
Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.
PERFORMANCE OBJECTIVESStudents will learn:
34
Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service
Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.
TARGETED JOB ROLES IT Professionals with an interest in Service Management
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $1,952Supplies/Equipment: $43Total Tuition Fee: $1,995
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00 PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
35
REQUIRED TEXTBOOKLogical Operations
IT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition)
093030SC (Rev 2.0) Print and Digital Courseware
CERTIFICATION EXAM REQUIRED ITL-FND
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Introduction to ITIL
ITIL Basics The Service Lifecycle
Lesson 2: Service Strategy
Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process
Lesson 3: Service Design
Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process
36
IT Service Continuity Management The Supplier Management Process
Lesson 4: Service Transition
Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process
Lesson 5: Service Operation
Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process
Lesson 6: Service Operation Functions
The Service Desk Function The Technical Management Function The IT Operations Management Function The Application Management Function
Lesson 7: Continual Service Improvement
Basic Concepts of Continual Service Improvement CSI Principles
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA A+ 901 ESSENTIALS
PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, troubleshoot, upgrade, and perform preventive maintenance on PCs and mobile device hardware.
The CompTIA A+ (Exam 220-901) course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level
37
of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician.
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.
PERFORMANCE OBJECTIVESStudents will learn:
Identify the hardware components of personal computers and mobile digital devices.
Identify networking and security fundamentals. Install, configure, and troubleshoot display devices. Install and configure peripheral components. Manage system components. Manage data storage. Identify the hardware and software requirements for client environment
configurations. Identify network technologies. Install and configure networking capabilities. Support mobile digital devices. Support printers and multifunction devices.
TARGETED JOB ROLES Entry-level IT Professional
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,545
38
Supplies/Equipment: $150Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, a half hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
A+ 901 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
REQUIRED TEXTBOOKLogical Operations
CompTIA A+ (Exam 220-901)
093015SC (Rev 1.1) Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA A+ Exam 901
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hours
39
Lecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Hardware Fundamentals
Personal Computer Components Storage Devices Mobile Digital Devices Connection Interfaces
Lesson 2: Networking Fundamentals
Network Types Network Components
Lesson 3: Supporting Display Devices
Install Display Devices Configure Display Devices Troubleshoot Video and Display Devices
Lesson 4: Installing and Configuring Peripheral Components
Install and Configure Input Devices Install and Configure Output Devices Install and Configure Input/Output Devices Install and Configure Expansion Cards
Lesson 5: Managing System Components
Identify Motherboard Components and Features Install and Configure CPUs and Cooling Systems Install Power Supplies Troubleshoot System Components
Lesson 6: Managing Data Storage
Identify RAM Types and Features Troubleshoot RAM Issues Install and Configure Storage Devices Configure the System Firmware Troubleshoot Hard Drives and RAID Arrays
Lesson 7: Customized Client Environments
Types of Common Business Clients Custom Client Environments
40
Lesson 8: Networking Technologies
TCP/IP Properties and Characteristics TCP/IP Internet Connections Ports and Protocols Networking Tools
Lesson 9: Installing and Configuring Networking Capabilities
Configure Network Perimeters Install and Configure SOHO Networks Troubleshoot Wired and Wireless Networks
Lesson 10: Supporting Mobile Digital Devices
Install and Configure Exterior Laptop Components Install and Configure Interior Laptop Components Other Mobile Devices Mobile Device Accessories and Ports Troubleshoot Mobile Device Hardware
Lesson 11: Supporting Printers and Multifunction Devices
Printer and Multifunction Technologies Install and Configure Printers Maintain Printers Troubleshoot Printers
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA A+ 902 PRACTICAL APPLICATIONS
PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) software and operating systems to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, upgrade, secure, and perform preventive maintenance on PC and digital device operating systems.
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.
41
PERFORMANCE OBJECTIVESStudents will learn:
Identify the basic components and functions of operating systems. Identify networking and security fundamentals. Identify the operational procedures that should be followed by professional PC
technicians. Install and configure Microsoft Windows. Optimize and maintain Microsoft Windows. Work with other operating systems. Identify network technologies. Configure networking capabilities. Support mobile digital devices. Identify security threats, vulnerabilities, and controls. Implement security controls. Troubleshoot system-wide issues.
TARGETED JOB ROLES Entry-level IT Professional
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,545Supplies/Equipment: $150Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
42
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
A+ 902 CompTIA A+ 902 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
CompTIA A+ (Exam 220-902)
093016SE (Rev 1.1)
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA A+ Exam 902
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Operating System Fundamentals
PC and Mobile Operating Systems PC Operating System Tools and Utilities
Lesson 2: Networking and Security Fundamentals
Common Network Services Cloud Concepts Security Fundamentals
Lesson 3: Safety and Operational Procedures
43
Basic Maintenance Tools and Techniques Personal and Electrical Safety Environmental Safety and Materials Handling Professionalism and Communication Organizational Policies and Procedures Troubleshooting Theory
Lesson 4: Installing and Configuring Microsoft Windows
Implement Client-Side Virtualization
Install Microsoft Windows Use Microsoft Windows Configure Microsoft Windows Upgrade Microsoft Windows
Lesson 5: Optimizing and Maintaining Microsoft Windows
Optimize Microsoft Windows Back Up and Restore System Data Perform Disk Maintenance Update Software
Lesson 6: Working With Other Operating Systems
The OS X Operating System The Linux Operating System
Lesson 7: Networking Technologies
TCP/IP Internet Connections
Lesson 8: Configuring Networking Capabilities
Configure Basic Windows Networking Configure Windows Proxy and Firewall Settings Using Windows Networking Features
Lesson 9: Supporting Mobile Digital Devices
Mobile Device Accessories and Ports Mobile Device Connectivity Mobile Device Synchronization
Lesson 10: Security Threats, Vulnerabilities, and Controls
Common Security Threats and Vulnerabilities General Security Controls Mobile Security Controls Data Destruction and Disposal Methods
Lesson 11: Implementing Security Controls
44
Secure Operating Systems Secure Workstations Secure SOHO Networks Secure Mobile Devices
Lesson 12: Troubleshooting System-Wide Issues
Troubleshoot PC Operating Systems Troubleshoot Mobile Device Operating Systems and Applications Troubleshoot Common Security Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA NETWORK +
PROGRAM DESCRIPTIONThe CompTIA® Network+® course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. If you are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification.
Also, if your job duties include network troubleshooting, installation, or maintenance, or if you are preparing for any type of network-related career, it provides the background knowledge and skills you will require to be successful.
PERFORMANCE OBJECTIVESStudents will learn:
Identify basic network theory concepts and major network communications methods.
Describe bounded network media. Identify unbounded network media. Identify the major types of network implementations. Identify TCP/IP addressing and data delivery methods. Implement routing technologies. Identify the major services deployed on TCP/IP networks. Identify the infrastructure of a WAN implementation. Identify the components used in cloud computing and virtualization. Describe basic concepts related to network security. Prevent security breaches. Respond to security incidents. Identify the components of a remote network implementation. Identify the tools, methods, and techniques used in managing a network.
45
Describe troubleshooting of issues on a network.
TARGETED JOB ROLES Entry-level IT Professional
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Professional Helpdesk or Computer Support Experience CompTIA A+ Certification is helpful but not required
TUITION AND FEESRegistration: $0Tuition: $2,570Supplies/Equipment: $125Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
N10-007 CompTIA Network + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
46
CompTIA Network +
093029 Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Network + N10-007
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Network Theory
Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods
Lesson 2: Bounded Network Media
Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control
Lesson 3: Unbounded Network Media
Wireless Networking Wireless Network Devices and Components Install a Wireless Network
Lesson 4: Network Implementations
Physical Network Topologies Logical Network Topologies
47
Ethernet Networks Network Devices VLANs
Lesson 5: TCP/IP Addressing and Data Delivery
The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques
Lesson 6: Routing
Enable Static Routing Implement Dynamic IP Routing
Lesson 7: TCP/IP Services
Assign IP Addresses Domain Naming Services TCP/IP Commands Common TCP/IP Protocols
Lesson 8: WAN Infrastructure
WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies
Lesson 9: Cloud and Virtualization Technologies
Virtualization SAN Implementations Cloud Computing
Lesson 10: Network Security Basics
Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods
Lesson 11: Preventing Security Breaches
Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention
48
Educate UsersLesson 12: Responding to Security Incidents
Incident Management and Response Basic Forensic Concepts
Lesson 13: Remote Networking
Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols
Lesson 14: Network Management
Network Monitoring Configuration Management Documentation Network Performance Optimization
Lesson 15: Troubleshooting Network Issues
Network Troubleshooting Models Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Troubleshoot Security Configuration Issues Troubleshoot Security Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA SECURITY +
PROGRAM DESCRIPTIONCompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills,
49
and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
PERFORMANCE OBJECTIVESStudents will learn:
Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.
TARGETED JOB ROLES IT Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended
TUITION AND FEES
Registration: $0Tuition: $2,570Supplies/Equipment: $125Total Tuition Fee: $2,695
50
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.
REQUIRED TEXTBOOKLogical Operations
093027 (Rev 1.2) 2017
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Security +
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Identifying Security Fundamentals
Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts
51
Identify Basic Cryptography Concepts Lesson 2: Analyzing Risk
Analyze Organizational Risk Analyze the Business Impact of Risk
Lesson 3: Identifying Security Threats
Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats
Lesson 4: Conducting Security Assessments
Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing
Lesson 5: Implementing Host and Software Security
Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle
Lesson 6: Implementing Network Security
Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic
Lesson 7: Managing Identity and Access
Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts
Lesson 8: Implementing Cryptography
Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates
52
Lesson 9: Implementing Operational Security
Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls
Lesson 10: Addressing Security Incidents
Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents
Lesson 11: Ensuring Business Continuity
Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
NETWORK SUPPORT SPECIALIST (NSS)
PROGRAM DESCRIPTIONNetwork Support Specialist is a certification program for entry-level network engineers that helps maximize investment in foundational networking knowledge and increase the value of an employer's network. Network Support Specialist is for Network Specialists, Network Administrators, and Network Support Engineers with 1-3 years of experience. The CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test
CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00PM for 20 days. Classes for evening students will be held on Mondays through Fridays from
53
7:00PM to 11:00PM. Night classes run for approximately eight weeks. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM OUTLINE
Subject Number Subject TitleClock Hours
Lecture/Lab/Ext/Total
Net+ CompTIA Network+ 20/20/0/40Sec+ CompTIA Security+ 20/20/0/40ICND1 Interconnecting Cisco
Networking Devices Part 1 20/20/0/40
ICND2 Interconnecting Cisco Networking Devices Part 2 20/20/0/40
The approximate time required to complete this program is four weeks for day students and eight weeks for evening students.
TUITION AND FEES
Registration: $0Tuition: $11,100Supplies/Equipment: $880Total Tuition Fee: $11,980
COST PER SINGLE SUBJECTSubject Number Subject Title Cost
Network+ CompTIA Network+ $2,695Security+ CompTIA Security+ $2,695ICND1 V3.0 Interconnecting Cisco
Networking Devices Part 1 $3,295
ICND2 V3.0 Interconnecting Cisco Networking Devices Part 2 $3,295
CERTIFICATION EXAMS REQUIRED CompTIA Network+ CompTIA Security+ CCENT (ICND1) CCNA Routing & Switching (ICND2)
TARGETED JOB ROLES Network Support Technician
54
Network Support Specialist Network Administrators Network Support Engineer
SUBJECT DESCRIPTIONS
COMPTIA NETWORK +
PROGRAM DESCRIPTIONThe CompTIA® Network+® course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. If you are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification.
Also, if your job duties include network troubleshooting, installation, or maintenance, or if you are preparing for any type of network-related career, it provides the background knowledge and skills you will require to be successful.
PERFORMANCE OBJECTIVESStudents will learn:
Identify basic network theory concepts and major network communications methods.
Describe bounded network media. Identify unbounded network media. Identify the major types of network implementations. Identify TCP/IP addressing and data delivery methods. Implement routing technologies. Identify the major services deployed on TCP/IP networks. Identify the infrastructure of a WAN implementation. Identify the components used in cloud computing and virtualization. Describe basic concepts related to network security. Prevent security breaches. Respond to security incidents. Identify the components of a remote network implementation. Identify the tools, methods, and techniques used in managing a network. Describe troubleshooting of issues on a network.
TARGETED JOB ROLES Entry-level IT Professional
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age
55
Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Professional Helpdesk or Computer Support Experience CompTIA A+ Certification is helpful but not required
TUITION AND FEESRegistration: $0Tuition: $2,570Supplies/Equipment: $125Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
N10-007 CompTIA Network + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
CompTIA Network +
093029 Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Network + N10-007
INSTRUCTIONAL METHODS
56
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Network Theory
Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods
Lesson 2: Bounded Network Media
Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control
Lesson 3: Unbounded Network Media
Wireless Networking Wireless Network Devices and Components Install a Wireless Network
Lesson 4: Network Implementations
Physical Network Topologies Logical Network Topologies Ethernet Networks Network Devices VLANs
Lesson 5: TCP/IP Addressing and Data Delivery
The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques
57
Lesson 6: Routing
Enable Static Routing Implement Dynamic IP Routing
Lesson 7: TCP/IP Services
Assign IP Addresses Domain Naming Services TCP/IP Commands Common TCP/IP Protocols
Lesson 8: WAN Infrastructure
WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies
Lesson 9: Cloud and Virtualization Technologies
Virtualization SAN Implementations Cloud Computing
Lesson 10: Network Security Basics
Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods
Lesson 11: Preventing Security Breaches
Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention Educate Users
Lesson 12: Responding to Security Incidents
Incident Management and Response Basic Forensic Concepts
Lesson 13: Remote Networking
Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols
58
Lesson 14: Network Management
Network Monitoring Configuration Management Documentation Network Performance Optimization
Lesson 15: Troubleshooting Network Issues
Network Troubleshooting Models Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Troubleshoot Security Configuration Issues Troubleshoot Security Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA SECURITY +
PROGRAM DESCRIPTIONCompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
PERFORMANCE OBJECTIVESStudents will learn:
Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks.
59
Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.
TARGETED JOB ROLES IT Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended
TUITION AND FEES
Registration: $0Tuition: $2,384Supplies/Equipment: $125Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
SY0-501 CompTIA Security + 40
60
The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.
REQUIRED TEXTBOOKLogical Operations
093027 (Rev 1.2) 2017
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Security +
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Identifying Security Fundamentals
Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts
Lesson 2: Analyzing Risk
Analyze Organizational Risk Analyze the Business Impact of Risk
Lesson 3: Identifying Security Threats
Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats
61
Identify Wireless Threats Identify Physical Threats
Lesson 4: Conducting Security Assessments
Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing
Lesson 5: Implementing Host and Software Security
Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle
Lesson 6: Implementing Network Security
Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic
Lesson 7: Managing Identity and Access
Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts
Lesson 8: Implementing Cryptography
Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates
Lesson 9: Implementing Operational Security
Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls
Lesson 10: Addressing Security Incidents
Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents
62
Lesson 11: Ensuring Business Continuity
Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
ICND 1: INTERCONNECTING CISCO DEVICES
PROGRAM DESCRIPTION The ICND 1 (CCENT) certification validates the skills required for entry-level network support positions, the starting point for many successful careers in networking. CCENT certified professionals have the knowledge and skill to install, operate, and troubleshoot a small enterprise branch network, including basic network security.
It opens doors to a career in networking. Having your CCENT means you have what it takes to manage a small, enterprise branch network. A CCENT is your first step toward CCNA certification and will help you stand out from the crowd in entry-level positions
PERFORMANCE OBJECTIVESStudents will learn:
Learn the basics of networking. Learn the basics of Cisco devices and commands. Set up an IPv4 network. Set up an IPv6 network. Learn infrastructure services. Learn LAN switching basics. Learn about routing basics. Learn about NAT basics. Maintain the network infrastructure. Enhance network security. Troubleshoot networks.
TARGETED JOB ROLES Systems Administrators Networking Specialists
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate)
63
In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,980Supplies/Equipment: $315Total Tuition Fee: $3,295
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
100-105 Interconnecting Cisco Network Devices 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical OperationsCCENT093042SC (Rev 1.0)Print and Digital Courseware
CERTIFICATION EXAM REQUIRED 100-105 ICND 1 Exam
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
64
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Basics of Networking
Network Concepts The TCP/IP Model The OSI Model
Lesson 2: Basics of Cisco Devices and Commands
Cisco Devices Infrastructure Components in Cisco Network Cisco Architecture Types Cabling Types Cisco IOS Commands
Lesson 3: Setting Up an IPv4 Network
Basics of IPv4 Addressing VLSM Troubleshooting Methodologies Troubleshoot IPv4 Addressing and Subnetting Issues
Lesson 4: Setting Up an IPv6 Network
Basics of IPv6 Addressing Troubleshoot IPv6 Addressing Issues
Lesson 5: Infrastructure Services
Configure DNS Configure DHCP Configure NTP
Lesson 6: LAN Switching Basics
Configure Switches Configure VLANs Interswitch Connectivity Layer 2 Protocols
Lesson 7: Routing Basics
65
Routing Concepts Configure Routing Interfaces Inter-VLAN Routing Configure IPv4 and IPv6 Static Routing
Lesson 8: NAT Basics
IPv4 Numbered and Named Access Lists Configure NAT
Lesson 9: Maintaining the Network Infrastructure
Monitor Network Devices Configure Network Devices Manage Network Devices Device Maintenance
Lesson 10: Enhancing Network Security
Configure Ports Secure Network Devices
Lesson 11: Troubleshooting Network
Troubleshoot Infrastructure Services Troubleshoot Common Network Issues Troubleshoot Switching Issues Troubleshoot Routing Issues Troubleshoot Port Security Issues Troubleshoot Inter-VLAN Routing Issues Troubleshoot Basic Device Hardening Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
ICND 2: INTERCONNECTING CISCO DEVICES PART 2
PROGRAM DESCRIPTION In this course, you will learn how to install, configure, operate, and troubleshoot a small enterprise network.
Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability and the related controller types and tools that are available to support software defined network architectures.
66
PERFORMANCE OBJECTIVESStudents will learn:
Manage VLANs on Cisco switches. Manage STP. Manage EtherChannels. Describe the mechanisms used to mitigate network threats. Configure infrastructure services. Describe QoS concepts and techniques to manage congestion. Perform infrastructure maintenance. Manage devices using AAA with the TACACS+ and RADIUS protocols. Describe the basics of network programmability. Describe the features of WAN technologies. Manage routing protocols.
TARGETED JOB ROLES Systems Administrators Networking Specialists
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills ICND 1 Course
TUITION AND FEESRegistration: $0Tuition: $3,980Supplies/Equipment: $315Total Tuition Fee: $3,295
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
67
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
200-105 Interconnecting Cisco Network Devices Part 2 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
ICND 2
093043SC (Rev 1.0)
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED 200-105 ICND 2 Exam
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Managing VLANs on Cisco Switches
Configure VLANs on Cisco Switches Configure Connectivity Between Cisco Switches Troubleshoot VLANs Troubleshoot Interswitch Connectivity
Lesson 2: Managing STP
Basics of STP Configure STP Troubleshoot STP
68
Lesson 3: Managing EtherChannel
Basics of Switch Stacks and VSS Configure EtherChannel Troubleshoot EtherChannel
Lesson 4: Mitigating Threats to the Access Layer
Configure Access and Trunk Interfaces Configure IEEE 802.1x Port-Based Authentication Configure DHCP Snooping
Lesson 5: Configuring Infrastructure Services
Configure HSRP Overview of Cloud Services Configure Traffic Filtering Using Access Lists Troubleshooting ACLs Configure VRRP Describing QoS Concepts Describe the QoS Concepts Describe the Congestion Management and Avoidance Techniques
Lesson 7: Infrastructure Maintenance
Configure SNMP Troubleshoot Network Connectivity Issues Using ICMP Echo-based SLA Troubleshoot Problems Using Local SPAN Troubleshoot Basic Layer 3 End-to-End Connectivity Issues
Lesson 8: Managing Devices Using AAA
Manage a Device Using AAA with TACACS+ Manage a Device Using AAA with RADIUS
Lesson 9: Network Programmability
Network Programmability BasicsLesson 10: WAN Technologies
WAN Topology Basics WAN Access Connectivity Basics Configure PPP on WAN Interfaces Using Local Authentication Configure MLPPP on WAN Interfaces Using Local Authentication Configure PPPoE Client-Side Interfaces Configure GRE Tunnel Connectivity Describe Single-Homed Branch Connectivity
Lesson 11: Routing Technologies
Routing Protocols Configure Inter-VLAN Routing Configure OSFPFv2 Routing for IPv4
69
Configure OSFPFv3 Routing for IPv6 Configure EIGRPv4 Configure EIGRPv6 Troubleshoot Routing Protocols
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CCNA
PROGRAM DESCRIPTIONCisco Certified Network Associate (CCNA) Routing and Switching is a certification program for entry-level network engineers that helps maximize investment in foundational networking knowledge and increase the value of an employer's network. CCNA Routing and Switching is for Network Specialists, Network Administrators, and Network Support Engineers with 0-3 years of experience. The CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test
PROGRAM OUTLINE
Subject Number Subject TitleClock Hours
Lecture/Lab/Ext/Total
ICND1 Interconnecting Cisco Networking Devices Part 1 20/20/0/40
ICND2 Interconnecting Cisco Networking Devices Part 2 20/20/0/40
The approximate time required to complete this program is two weeks for day students and four weeks for evening students.
CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00PM for ten days. Classes for evening students will be held on Mondays through Fridays from
70
7:00PM to 11:00PM. Night classes run for approximately four weeks. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $5,960Supplies/Equipment: $630Total Tuition Fee: $6,590
COST PER SINGLE SUBJECTSubject Number Subject Title Cost
ICND1 Interconnecting Cisco Networking Devices Part 1 $3,295
ICND2 Interconnecting Cisco Networking Devices Part 2 $3,295
CERTIFICATION EXAMS REQUIRED CCENT (ICND1) CCNA Routing & Switching (ICND2)
TARGETED JOB ROLES Network Specialist Network Administrators Network Support Engineer
SUBJECT DESCRIPTIONS
ICND 1: INTERCONNECTING CISCO DEVICES
PROGRAM DESCRIPTION The ICND 1 (CCENT) certification validates the skills required for entry-level network support positions, the starting point for many successful careers in networking. CCENT certified professionals have the knowledge and skill to install, operate, and troubleshoot a small enterprise branch network, including basic network security.
It opens doors to a career in networking. Having your CCENT means you have what it takes to manage a small, enterprise branch network. A CCENT is your first step toward CCNA certification and will help you stand out from the crowd in entry-level positions
PERFORMANCE OBJECTIVES
71
Students will learn: Learn the basics of networking. Learn the basics of Cisco devices and commands. Set up an IPv4 network. Set up an IPv6 network. Learn infrastructure services. Learn LAN switching basics. Learn about routing basics. Learn about NAT basics. Maintain the network infrastructure. Enhance network security. Troubleshoot networks.
TARGETED JOB ROLES Systems Administrators Networking Specialists
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,980Supplies/Equipment: $315Total Tuition Fee: $3,295
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURS
72
Seminar Number Seminar Title Contact Hours100-105 Interconnecting Cisco Network
Devices 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
CCENT
093042SC (Rev 1.0)
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED 100-105 ICND 1 Exam
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Basics of Networking
Network Concepts The TCP/IP Model The OSI Model
Lesson 2: Basics of Cisco Devices and Commands
Cisco Devices Infrastructure Components in Cisco Network Cisco Architecture Types Cabling Types Cisco IOS Commands
73
Lesson 3: Setting Up an IPv4 Network
Basics of IPv4 Addressing VLSM Troubleshooting Methodologies Troubleshoot IPv4 Addressing and Subnetting Issues
Lesson 4: Setting Up an IPv6 Network
Basics of IPv6 Addressing Troubleshoot IPv6 Addressing Issues
Lesson 5: Infrastructure Services
Configure DNS Configure DHCP Configure NTP
Lesson 6: LAN Switching Basics
Configure Switches Configure VLANs Interswitch Connectivity Layer 2 Protocols
Lesson 7: Routing Basics
Routing Concepts Configure Routing Interfaces Inter-VLAN Routing Configure IPv4 and IPv6 Static Routing
Lesson 8: NAT Basics
IPv4 Numbered and Named Access Lists Configure NAT
Lesson 9: Maintaining the Network Infrastructure
Monitor Network Devices Configure Network Devices Manage Network Devices Device Maintenance
Lesson 10: Enhancing Network Security
Configure Ports Secure Network Devices
Lesson 11: Troubleshooting Network
Troubleshoot Infrastructure Services Troubleshoot Common Network Issues Troubleshoot Switching Issues
74
Troubleshoot Routing Issues Troubleshoot Port Security Issues Troubleshoot Inter-VLAN Routing Issues Troubleshoot Basic Device Hardening Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
ICND 2: INTERCONNECTING CISCO DEVICES PART 2
PROGRAM DESCRIPTION In this course, you will learn how to install, configure, operate, and troubleshoot a small enterprise network.
Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability and the related controller types and tools that are available to support software defined network architectures.
PERFORMANCE OBJECTIVESStudents will learn:
Manage VLANs on Cisco switches. Manage STP. Manage EtherChannels. Describe the mechanisms used to mitigate network threats. Configure infrastructure services. Describe QoS concepts and techniques to manage congestion. Perform infrastructure maintenance. Manage devices using AAA with the TACACS+ and RADIUS protocols. Describe the basics of network programmability. Describe the features of WAN technologies. Manage routing protocols.
TARGETED JOB ROLES Systems Administrators Networking Specialists
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate)
75
In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills ICND 1 Course
TUITION AND FEESRegistration: $0Tuition: $2,980Supplies/Equipment: $315Total Tuition Fee: $3,295
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
200-105 Interconnecting Cisco Network Devices Part 2 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
ICND 2
093043SC (Rev 1.0)
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED 200-105 ICND 2 Exam
INSTRUCTIONAL METHODS
Lecture
76
Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Managing VLANs on Cisco Switches
Configure VLANs on Cisco Switches Configure Connectivity Between Cisco Switches Troubleshoot VLANs Troubleshoot Interswitch Connectivity
Lesson 2: Managing STP
Basics of STP Configure STP Troubleshoot STP
Lesson 3: Managing EtherChannel
Basics of Switch Stacks and VSS Configure EtherChannel Troubleshoot EtherChannel
Lesson 4: Mitigating Threats to the Access Layer
Configure Access and Trunk Interfaces Configure IEEE 802.1x Port-Based Authentication Configure DHCP Snooping
Lesson 5: Configuring Infrastructure Services
Configure HSRP Overview of Cloud Services Configure Traffic Filtering Using Access Lists Troubleshooting ACLs Configure VRRP Describing QoS Concepts Describe the QoS Concepts Describe the Congestion Management and Avoidance Techniques
Lesson 7: Infrastructure Maintenance
Configure SNMP
77
Troubleshoot Network Connectivity Issues Using ICMP Echo-based SLA Troubleshoot Problems Using Local SPAN Troubleshoot Basic Layer 3 End-to-End Connectivity Issues
Lesson 8: Managing Devices Using AAA
Manage a Device Using AAA with TACACS+ Manage a Device Using AAA with RADIUS
Lesson 9: Network Programmability
Network Programmability BasicsLesson 10: WAN Technologies
WAN Topology Basics WAN Access Connectivity Basics Configure PPP on WAN Interfaces Using Local Authentication Configure MLPPP on WAN Interfaces Using Local Authentication Configure PPPoE Client-Side Interfaces Configure GRE Tunnel Connectivity Describe Single-Homed Branch Connectivity
Lesson 11: Routing Technologies
Routing Protocols Configure Inter-VLAN Routing Configure OSFPFv2 Routing for IPv4 Configure OSFPFv3 Routing for IPv6 Configure EIGRPv4 Configure EIGRPv6 Troubleshoot Routing Protocols
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
INFORMATION SECURITY ANALYST (ISA)
PROGRAM DESCRIPTIONBattles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life.
This program is designed to help individuals get jobs as information security auditors, site administrators, computer forensics investigators.
78
This program will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems; emphasizing perimeter defenses, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. It also presents a detailed methodological approach to cyber network defense from three approaches: 1) Preventive 2) Reactive 3) Retrospective.
After program completion, student will have sat through three highly coveted information security certification exams:
- CompTIA Security+ - EC-Council Certified Network Defender (CND)- EC-Council Certified Ethical Hacker (CEH)
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PROGRAM OUTLINESubject Number Subject Title
Clock HoursLecture/Lab/Ext/Total
Sec+ Security+ 20/20/0/40CND Network Defender 20/20/0/40CEH Professional Ethical Hacker 20/20/0/40
The approximate time required to complete this program is three weeks for day students and six weeks for evening students.
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $8,760
79
Supplies/Equipment: $1,325Total Tuition Fee: $10,085
COST PER SINGLE SUBJECTSubject Number Subject Title Cost
Sec+ CompTIA Security+ $2,695CND Network Defender $3,695CEH Certified Ethical Hacker $3,695
CERTIFICATION EXAMS REQUIRED
CompTIA Security+ EC-Council Certified Network Defender (CND) Certified Ethical Hacker (CEH)
TARGETED JOB ROLES
Network Administrator Network Engineer Information Security Specialist Information Security Auditor Site Security Administrator
SUBJECT DESCRIPTIONS
COMPTIA SECURITY +
PROGRAM DESCRIPTIONCompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
80
PERFORMANCE OBJECTIVESStudents will learn:
Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.
TARGETED JOB ROLES IT Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended
TUITION AND FEES
Registration: $0Tuition: $2,384Supplies/Equipment: $125Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For
81
evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
093027 (Rev 1.2) 2017
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Security +
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Identifying Security Fundamentals
Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts
Lesson 2: Analyzing Risk
Analyze Organizational Risk Analyze the Business Impact of Risk
82
Lesson 3: Identifying Security Threats
Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats
Lesson 4: Conducting Security Assessments
Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing
Lesson 5: Implementing Host and Software Security
Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle
Lesson 6: Implementing Network Security
Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic
Lesson 7: Managing Identity and Access
Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts
Lesson 8: Implementing Cryptography
Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates
Lesson 9: Implementing Operational Security
Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes
83
Implement Physical Controls Lesson 10: Addressing Security Incidents
Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents
Lesson 11: Ensuring Business Continuity
Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CERTIFIED NETWORK DEFENDER (CND)
PROGRAM DESCRIPTIONThe Certified Network Defender (CND) cyber security training program was developed as a result of extensive market research and surveys to give students a detailed understanding and the hands-on ability to act in real-life situations involving network defense.
This course instructs entry and junior level network security administrators on Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. Hands-on labs, based on major network security tools and techniques, give network administrators real world experience on current network security technologies and operations.
The included study kit provides over 10 GB of network security best practices, assessments, and protection tools. The kit also contains templates for various network policies and several white papers for additional learning.
This cyber security training is skills-based and lab intensive. It based on a job-task analysis and the cyber security education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system and network administrators.
The CND cyber security certification will verify that students have the technical depth required to actively design, monitor, and defend a secure network for an organization.
PERFORMANCE OBJECTIVESStudents will learn:
84
Various network security controls, protocols, and devices How to determine appropriate location for IDS/IPS sensors, tuning IDS for false
positives and false negatives, and configurations to harden security through IDPS technologies
How to implement secure VPNs for their organization How to identify various threats to wireless networks and learn how to mitigate
them How to monitor and conduct signature analysis to detect various types of
attacks and policy violation activities How to perform risk assessment, vulnerability assessment/scanning through
various scanning tools and generate detailed reports on it How to identify the critical data, choose appropriate back up method, media
and technique to perform successful backup of organization data on regular basis
How to provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident
How to troubleshoot their network for various network problems How to identify various threats on organization network How to design and implement various security policies for their organizations The importance of physical security and able to determine and implement
various physical security controls for their organizations How to harden security of various hosts individually in the organization’s
network How to choose appropriate firewall solutions, topology, and configurations to
harden security through firewall
TARGETED JOB ROLES Entry Level Network Administrators Entry Level Network Security Administrators Junior Network Security Engineers Junior Network Defense Technicians Security Analysts Security Operators
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Computer security knowledge and skills
85
TUITION AND FEESRegistration: $0Tuition: $3,095Supplies/Equipment: $600Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM HOURSSeminar Number Seminar Title Contact HoursCND Certified Network Defender 40
The approximate time required to complete this program is five days for day students and 10 nights for night students.
REQUIRED TEXTBOOKCertified Network Defender Volume 1EC-Council Official CoursewareIncludes: 3 Books (Courseware and Lab Manual) & Tools (Downloadable Online and Instruction provided in the Courseware)
CERTIFICATION EXAM REQUIRED EC-Council Certified Network Defender – CND 312-38
INSTRUCTIONAL METHODS Lecture Overhead slides Lab Exercises
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
OUTLINEDay 1
Computer Network Defense Fundamentals Network Security Threats, Vulnerabilities, and Attacks Network Security Controls, Protocols, and Perimeter Appliances Secure Firewall Configuration, Deployment and Management
86
Day 2
Secure IDS Configuration and Management Secure VPN Configuration and Management Designing a Secure Network Network Traffic Signatures and Analysis
Day 3
Monitoring and Securing Network Traffic Network Vulnerability Scanning Monitoring and Securing Network Traffic Network Vulnerability Scanning
Day 4
Host/System Security Physical Security Designing and Implementation of Network Security Policies
Day 5
Network Incident Response and Management Network Backup and Disaster Recovery Wireless Network Defense
GRADING Grading will be assigned as follows:
-Attendance: 50%
-Lab Assignments: 50%
CERTIFIED ETHICAL HACKER (CEH)
PROGRAM DESCRIPTION This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When you leave this intensive 5 day class, you will have hands on understanding and experience in Ethical Hacking.
PERFORMANCE OBJECTIVES Students will learn: Background of technology and technological operations
87
Risk and system analysis Systems securities and vulnerabilities Regulations and ethics
TARGETED JOB ROLES Site Administrators Security Auditors Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge
TUITION AND FEESRegistration: $0Tuition: $3,095Supplies/Equipment: $600Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
312-50 CEH Certified Ethical Hacker 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOK
88
EC-Council Digital Courseware
CEHv9 e-Courseware
CERTIFICATION EXAM REQUIRED 312-50 CEH Exam
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Introduction to Ethical Hacking
Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Concepts Hacking and Scopes Information Security Controls Physical Security Information Management Vulnerability Assessment Penetration Testing Security Laws and Standards
Lesson 2: Footprinting and Reconnaissance
Footprinting Concepts Footprinting Methodology Footprinting Using Advanced Google Hacking Techniques Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing
Lesson 3: Scanning Networks
Overview of Network Scanning CEH Scanning Methodology
89
Lesson 4: Enumeration
Enumeration Concepts Enumerations Countermeasures Enumeration Penetration Testing
Lesson 5: System Hacking
System Hacking: Goals CEH Hacking: Methodology CEH System Hacking Steps Escalating Privileges Executing Applications Spyware Defending Against Keyloggers Hiding Files Detecting Rootkits NTFS Data Stream Steganography/Steganlysis Covering Tracks
Lesson 6: Malware Threats
Trojan Concepts Types of Trojans Virus and Worm Concepts Ransomware Malware Reverse Engineering Malware Detection Countermeasures Penetration Testing
Lesson 7: Sniffing
Sniffing Concepts MAC/DHCP Attacks IDRP Spoofing ARP/DNS Poisoning Sniffing Tools Detection Techniques Counter Measures
Lesson 8: Social Engineering
Social Engineering Concepts Social Engineering Techniques Identity Theft Social Engineering Countermeasures
Lesson 9: Denial of Service
DoS/DDoS Concepts
90
DoS/DDoS Attack Techniques Botnets DoS/DDos Attack Tools Counter Measures DoS/DDos Protection Tools
Lesson 10: Session Hijacking
Session Hijacking Concepts Application Level Hijacking Network Level Hijacking Hijacking Tools Countermeasures
Lesson 11: Hacking Web Servers
Webserver Concepts Webserver Attakcs Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools
Lesson 12: Hacking Web Applications
Web App Concepts Web App Threats Web App Hacking Methodology Attack Web Servers Analyze Web Apps Authorization Attack Schemes Perform Injection Attacks Attack Data Connectivity
Lesson 13: SQL Injection
SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter Measures Snort Rule Detection to SQL Injection Attacks Detection Tools
Lesson 14: Hacking Wireless Networks
Wireless Statistics Wireless Concepts Wireless Encryption Breaking Encryption Defending Against WPA Cracking Wireless Threats
91
Wireless Hacking Methodology WEP/WPA Cracking Tools Counter Measures Security Tools
Lesson 15: Hacking Mobile Platforms
Mobile Platform Attack Vectors Hacking Android/IOS Hacking Windows/BlackBerry Mobile Device Management Mobile Security Guidelines and Tools
Lesson 16: Evading IDS, Firewalls and Honeypots
IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Systems IDS/Firewall Evading Tools Detecting Honeypots Counter Measures
Lesson 17: Cloud Computing
Introduction to Cloud Computing Cloud Computing Threats/Attacks Cloud Security Cloud Penetration Testing
Lesson 18: Cryptography
Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CYBERSECURITY SPECIALIST (CYBER)
PROGRAM DESCRIPTIONBattles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life.
92
This program is designed to help individuals get jobs as information security auditors, site administrators, computer forensics investigators.
This program will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems; emphasizing perimeter defenses, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. It also presents a detailed methodological approach to computer forensics and evidence analysis, covering major forensic investigation scenarios that provide hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the LeaderQuest Basic Skills Test.
PROGRAM OUTLINESubject Number Subject Title
Clock HoursLecture/Lab/Ext/Total
Sec+ Security+ 20/20/0/40CEH Certified Ethical Hacker 20/20/0/40
CHFI Computer Hacking Forensics Investigator 20/20/0/40
The approximate time required to complete this program is three weeks for day students and six weeks for evening students.
CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00PM for 15 days. Classes for evening students will be held on Mondays through Fridays from 7:00PM to 11:00PM. Night classes run for approximately eight weeks. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $8,760Supplies/Equipment: $1,325Total Tuition Fee: $10,085
93
COST PER SINGLE SUBJECTSubject Number Subject Title CostSec+ CompTIA Security+ $2,695CEH Certified Ethical Hacker $3,695CHFI Computer Hacking Forensics Investigator $3,695
CERTIFICATION EXAM REQUIRED CompTIA Security+ EC-Council Certified Ethical Hacker (CEH) EC-Council Computer Hacking Forensic Investigator (CFHI)
TARGETED JOB ROLES Information Security Specialist Information Security Auditor Site Security Administrator Computer forensics Investigator
SUBJECT DESCRIPTIONS AND SYLLABI
COMPTIA SECURITY +
PROGRAM DESCRIPTIONCompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
PERFORMANCE OBJECTIVESStudents will learn:
Identify the fundamental concepts of computer security. Identify security threats and vulnerabilities. Manage data, application, and host security. Implement network security. Identify and implement access control and account management security
measures.
94
Manage certificates. Identify and implement compliance and operational security measures. Manage risk. Troubleshoot and manage security incidents. Plan for business continuity and disaster recovery.
TARGETED JOB ROLES IT Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required Fundamental understanding of computer and networking concepts Six to nine months of helpdesk experience recommended
TUITION AND FEESRegistration: $0Tuition: $2,570Supplies/Equipment: $125Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
95
REQUIRED TEXTBOOKLogical Operations
093027 (Rev 1.2) 2017
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Security +
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Security Fundamentals
The Information Security Cycle Information Security Controls Authentication Methods Cryptography Fundamentals Security Policy Fundamentals
Lesson 2: Identifying Security Threats and Vulnerabilities
Social Engineering Malware Software-Based Threats Network-Based Threats Wireless Threats and Vulnerabilities Physical Threats and Vulnerabilities
Lesson 3: Managing Data, Application, and Host Security
Manage Data Security Manage Application Security Manage Device and Host Security
96
Manage Mobile SecurityLesson 4: Implementing Network Security
Configure Security Parameters on Network Devices and Technologies Network Design Elements and Components Implement Networking Protocols and Services Apply Secure Network Administration Principles Secure Wireless Traffic
Lesson 5: Implementing Access Control, Authentication, and Account Management
Access Control and Authentication Services Implement Account Management Security Controls
Lesson 6: Managing Certificates
Install a CA Hierarchy Enroll Certificates Secure Network Traffic by Using Certificates Renew Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates
Lesson 7: Implementing Compliance and Operational Security
Physical Security Legal Compliance Security Awareness and Training Integrate Systems and Data with Third Parties
Lesson 8: Risk Management
Risk Analysis Implement Vulnerability Assessment Tools and Techniques Scan for Vulnerabilities Mitigation and Deterrent Techniques
Lesson 9: Troubleshooting and Managing Security Incidents
Respond to Security Incidents Recover from a Security Incident
Lesson 10: Business Continuity and Disaster Recovery Planning
Business Continuity Plan for Disaster Recovery Execute DRPs and Procedures
GRADINGGrading will be assigned as follows:
97
Attendance: 50% Participation: 50%
CERTIFIED ETHICAL HACKER (CEH)
PROGRAM DESCRIPTION This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When you leave this intensive 5-day class, you will have hands on understanding and experience in Ethical Hacking.
PERFORMANCE OBJECTIVES Students will learn: Background of technology and technological operations Risk and system analysis Systems securities and vulnerabilities Regulations and ethics
TARGETED JOB ROLES Site Administrators Security Auditors Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge
TUITION AND FEES
98
Registration: $0Tuition: $3,095Supplies/Equipment: $600Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
312-50 CEH Certified Ethical Hacker 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKEC-Council Digital Courseware
CEHv9 e-Courseware
CERTIFICATION EXAM REQUIRED 312-50 CEH Exam
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Introduction to Ethical Hacking
99
Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Concepts Hacking and Scopes Information Security Controls Physical Security Information Management Vulnerability Assessment Penetration Testing Security Laws and Standards
Lesson 2: Footprinting and Reconnaissance
Footprinting Concepts Footprinting Methodology Footprinting Using Advanced Google Hacking Techniques Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing
Lesson 3: Scanning Networks
Overview of Network Scanning CEH Scanning Methodology
Lesson 4: Enumeration
Enumeration Concepts Enumerations Countermeasures Enumeration Penetration Testing
Lesson 5: System Hacking
System Hacking: Goals CEH Hacking: Methodology CEH System Hacking Steps Escalating Privileges Executing Applications Spyware Defending Against Keyloggers Hiding Files Detecting Rootkits NTFS Data Stream Steganography/Steganlysis Covering Tracks
Lesson 6: Malware Threats
Trojan Concepts Types of Trojans Virus and Worm Concepts Ransomware
100
Malware Reverse Engineering Malware Detection Countermeasures Penetration Testing
Lesson 7: Sniffing
Sniffing Concepts MAC/DHCP Attacks IDRP Spoofing ARP/DNS Poisoning Sniffing Tools Detection Techniques Counter Measures
Lesson 8: Social Engineering
Social Engineering Concepts Social Engineering Techniques Identity Theft Social Engineering Countermeasures
Lesson 9: Denial of Service
DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DoS/DDos Attack Tools Counter Measures DoS/DDos Protection Tools
Lesson 10: Session Hijacking
Session Hijacking Concepts Application Level Hijacking Network Level Hijacking Hijacking Tools Countermeasures
Lesson 11: Hacking Web Servers
Webserver Concepts Webserver Attakcs Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools
Lesson 12: Hacking Web Applications
Web App Concepts Web App Threats Web App Hacking Methodology
101
Attack Web Servers Analyze Web Apps Authorization Attack Schemes Perform Injection Attacks Attack Data Connectivity
Lesson 13: SQL Injection
SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter Measures Snort Rule Detection to SQL Injection Attacks Detection Tools
Lesson 14: Hacking Wireless Networks
Wireless Statistics Wireless Concepts Wireless Encryption Breaking Encryption Defending Against WPA Cracking Wireless Threats Wireless Hacking Methodology WEP/WPA Cracking Tools Counter Measures Security Tools
Lesson 15: Hacking Mobile Platforms
Mobile Platform Attack Vectors Hacking Android/IOS Hacking Windows/BlackBerry Mobile Device Management Mobile Security Guidelines and Tools
Lesson 16: Evading IDS, Firewalls and Honeypots
IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Systems IDS/Firewall Evading Tools Detecting Honeypots Counter Measures
Lesson 17: Cloud Computing
Introduction to Cloud Computing Cloud Computing Threats/Attacks Cloud Security Cloud Penetration Testing
Lesson 18: Cryptography
102
Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)
PROGRAM DESCRIPTION The Computer Hacking Forensic Investigator program presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation.
If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
CHFI is a certification that gives a complete overview of the process that a forensic investigator must follow when investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident.
PERFORMANCE OBJECTIVESStudents will learn:
The computer forensic investigation process and the various legal issues involved
Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
103
Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
How to set up a computer forensics lab and the tools involved in the lab Various file systems and how to boot a disk Gathering volatile and nonvolatile information from Windows Data acquisition and duplication rules, validation methods and tools required How to recover deleted files and deleted partitions in Windows, Mac OS X, and
Linux The process involved in forensic investigation using AccessData FTK and
EnCase Steganography and its techniques, Steganalysis, and image file forensics Password Cracking Concepts, tools, types of password attacks and how to
investigate password protected files Different types of log capturing, log management, time synchronization, and
log capturing tools How to investigate logs, network traffic, wireless attacks, and web attacks How to track e-mails and investigate e-mail crimes Mobile forensics and mobile forensics software and hardware tools How to write investigative reports
TARGETED JOB ROLES Junior Computer Forensics Investigator Incident Response Technician Junior Computer Security Analyst
ADMISSION REQUIREMENTS Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Certified Ethical Hacker (CEH) certification or equivalent experience
TUITION AND FEESRegistration: $0Tuition: $3,295Supplies/Equipment: $400Total Tuition Fee: $3,695
104
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
CHFI Computer Hacking Forensic Investigator 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.
REQUIRED TEXTBOOKEC-Council Digital Courseware
CHFI v9 e-Courseware
CERTIFICATION EXAM REQUIRED CHFI
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson: 1
Computer Forensics in Today’s World Computer Forensics Investigation Process Understanding Hard Discs and File Systems
105
Lesson: 2
Operating Systems Forensics Defeating Anti-Forensic Techniques Data Acquisition and Duplication
Lesson: 3
Network Forensics Investigating Web Attacks Database Forensics
Lesson: 4
Cloud Forensics Malware Forensics Investigating Email Crimes
Lesson: 5
Mobile Forensics Investigative Reports
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA SECURITY +
PROGRAM DESCRIPTIONCompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
106
PERFORMANCE OBJECTIVESStudents will learn:
Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.
TARGETED JOB ROLES IT Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended
TUITION AND FEES
Registration: $0Tuition: $2,570Supplies/Equipment: $125Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For
107
evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
093027 (Rev 1.2) 2017
Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Security +
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Identifying Security Fundamentals
Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts
Lesson 2: Analyzing Risk
Analyze Organizational Risk Analyze the Business Impact of Risk
108
Lesson 3: Identifying Security Threats
Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats
Lesson 4: Conducting Security Assessments
Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing
Lesson 5: Implementing Host and Software Security
Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle
Lesson 6: Implementing Network Security
Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic
Lesson 7: Managing Identity and Access
Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts
Lesson 8: Implementing Cryptography
Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates
Lesson 9: Implementing Operational Security
Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes
109
Implement Physical Controls Lesson 10: Addressing Security Incidents
Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents
Lesson 11: Ensuring Business Continuity
Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
IT PROJECT MANAGEMENT PROFESSIONAL - CAPM/PMP
PROGRAM DESCRIPTIONThis program is based on the Project Management Professional (PMP) and Service Management (ITIL) credentials. The PMP is one of the most important industry-recognized certification for IT project managers. Globally recognized and demanded, the PMP demonstrates that students have the experience, education and competency to lead and direct projects. This recognition is seen through increased marketability to employers and higher salary; according to the PMI Project Management Salary Survey–Seventh Edition, this certification positively impacts project manager salaries.
Our PMP program has a strong IT orientation and covers a number of foundational IT management skills in addition to the core project management skills. The program introduces the principles and core elements of project management and IT service management (ITSM) based on ITIL framework, then moves into advanced project management principles including topics that prepare the student for the PMP certification exam.
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test
PROGRAM OUTLINE
110
Subject Number Subject Title
Clock HoursLecture/Lab/Ext/Total
ITIL ITIL Foundations 24/16/0/40CAPM/PMP PMP Exam Preparation 40/0/0/40
The approximate time required to complete this program is ten days for day students and twenty days for evening students.
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $5,020Supplies/Equipment: $270Total Tuition Fee: $5,290
COST PER SINGLE SUBJECTSubject Number
Subject Title Cost
ITIL ITIL Foundations $1,995CAPM/PMP PMP Exam Preparation $3,295
CERTIFICATION EXAMS REQUIRED ITIL Foundations CAPM/PMP
TARGETED JOB ROLES Project Manager Business Analyst Service Delivery Manager Incident Manager Engagement Manager Client Service Manager Technical Support Manager Software Engineering Manager QA Analyst
111
SUBJECT DESCRIPTIONS
ITIL V3 FOUNDATIONS
PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT Infrastructure Library (ITIL®) Foundation Certification (2011 Lifecycle Edition) course is the first step in your preparation. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.
Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.
PERFORMANCE OBJECTIVESStudents will learn:
Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service
Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.
TARGETED JOB ROLES IT Professionals with an interest in Service Management
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy
112
Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $1,952Supplies/Equipment: $43Total Tuition Fee: $1,995
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical OperationsIT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition) 093030SC (Rev 2.0) Print and Digital Courseware
CERTIFICATION EXAM REQUIRED ITL-FND
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
113
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Introduction to ITIL
ITIL Basics The Service Lifecycle
Lesson 2: Service Strategy
Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process
Lesson 3: Service Design
Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process
Lesson 4: Service Transition
Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process
Lesson 5: Service Operation
Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process
Lesson 6: Service Operation Functions
The Service Desk Function The Technical Management Function
114
The IT Operations Management Function The Application Management Function
Lesson 7: Continual Service Improvement
Basic Concepts of Continual Service Improvement CSI Principles
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CAPM/PMP: PMP EXAM PREPARATION
PROGRAM DESCRIPTION You can find PMPs leading projects in nearly every country and, unlike other certifications that focus on a particular geography or domain, the PMP® is truly global. As a PMP, you can work in virtually any industry, with any methodology and in any location. The PMP signifies that you speak and understand the global language of project management and connects you to a community of professionals, organizations and experts worldwide.
This course provides an intensive review of the subject matter tested on the Project Management Institute’s Project Management Professional (PMP) examination. This course will provide a summary review of the nine knowledge areas and five process groups covered in A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Participants will improve their test-taking skills by completing sample examinations totaling 200 questions and by discussing the rationale behind both correct and incorrect answers. The program is specifically designed to maximize the probability that you will succeed in passing the PMP examination the first time. Each student will receive a student manual including review materials, key definitions and formulas, sample examination questions and answers.
PERFORMANCE OBJECTIVESStudents will learn:
Initiating Domains. Planning Domains. Executing Domains. Monitoring Domains. Closing Domains.
TARGETED JOB ROLES Project Managers
ADMISSION REQUIREMENTS
115
Individuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $2,070Supplies/Equipment: $225Total Tuition Fee: $3,295
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
PMP-EP Project Management Professional 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKProject Management Institute
PMBOK 5th Edition
CERTIFICATION EXAM REQUIRED Project Management Professional
INSTRUCTIONAL METHODS
Lecture
116
Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1:
Module 1: Project Management Fundamentals
Key Project Management Definitions Role of the Project Manager Knowledge Areas and Process Groups Project Lifecycle Models Project Processes Organizational Influences on Project Management Project Maturity ModelsModule 2: Project Initiation
Project Selection Process Project Charter Elements Exercise 1: Prepare Project Charter and Milestone Schedule Stakeholder Identification Exercise 2: Identify StakeholdersModule 3: Planning the Project
Project Requirements Class Exercise: Define Case Study Requirements Scope Definition & Management Work Breakdown Structure Exercise 3: Prepare WBS Schedule Development Define Activities Sequence Activities Estimate Durations Develop Schedule Exercise 4: Prepare Project Schedule using Critical Path MethodLesson 2:
Module 3: Planning the Project (continued)
Cost Estimating and Budgeting
117
Project Risk Management Risk Identification Risk Analysis Risk Response Planning Exercise 5: Prepare Risk Management Plan Project Communications Managing Expectations Stakeholder Communications Assigning Responsibilities using a RACI Chart Exercise 6: Prepare RACI Chart & Communications PlanModule 4: Executing, Monitoring and Controlling the Project
Integrated Change Control Exercise 7: Decide on Change Order Resolution Risk Monitoring and Control Exercise 8: Manage Risk EventModule 5: Project Close-out
Project Closing and Acceptance Project Archives and Lessons LearnedCourse Wrap-up
Review of Key Learning's & How to Apply to ProjectsLesson 3:
Module 6: Introduction and PMP® Program Overview
Applying for and Taking the Exam Strategies: General and Question-by-Question
Module 7: Project Management Framework
Project Life Cycles and Stakeholder Management The Triple Constraint and Organizational Issues
Module 8: Project Scope Management
Initiating the Project: Project Plans Work Breakdown Structures
Lesson 4:
Module 9: Project Time Management
Project Schedules and Logic Diagramming Critical Path Analysis and Performance Measurement
Module 10: Project Human Resource Management
Project Manager Responsibilities Power & Conflict Management
118
Module 11: Project Quality Management
Project Management and Quality management Statistical Process Control
Module 12: Project Cost Management
Estimating versus Pricing Financial Analysis
Lesson 5:
Module 13: Project Procurement Management
Procurement Planning Business Issues, Selection, and Evaluation
Module 14: Project Risk Management
Expected Values Decision Trees and Cause and Effect
Module 15: Project Communication Management
Tools and Techniques Reporting and Lessons Learned
Module 16: Professional Responsibility
Professional Responsibility Ethics
GRADINGGrading will be assigned as follows:
Attendance: 75% Participation: 25%
MCSA W INDOWS 8 ASSOCIATE (DS)
PROGRAM DESCRIPTIONThis program provides hands-on experience with Windows 8. It provides guidance on installing, upgrading, and licensing for Windows 8. Students will learn how to manage storage and how to optimize file-system performance. Additionally, they will learn how to manage available disk space by using quotas. Students will work with Windows tools and services to determine the source of performance and reliability issues, and to troubleshoot these issues. The program also describes how to configure networking to include IPv4, IPv6, how connect to wireless networks, and use the networking features included in Windows 8 to troubleshoot networking issues. Students will also learn preventive measures and tools that work together to protect their computers from security threats. The program then covers the features related to file and folder
119
management, which include setting permissions, file/folder compression, and configuring shared folders. Students will also learn about installing and managing printers. Additionally, the program provides an overview of the SkyDrive functionality, and describes the procedures to install and configure applications, including Windows Store apps. The program also examines the fundamentals of working with virtual machines in the Client Hyper-V environment in Windows 8.
Throughout the program, students will use Windows PowerShell 3.0, and its graphical user interface (GUI) to configure and manage the system. Students will also use the scripting editor to create and examine PowerShell scripts used to manage the system.
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test
PROGRAM OUTLINE
Subject Number Subject TitleClock Hours
Lecture/Lab/Ext/Total
20687 Configuring Windows 8 20/20/0/4020688 Maintaining and Managing
Windows 8 20/20/0/40
The approximate time required to complete this program is ten days for day students and twenty nights for evening students.
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
TUITION AND FEESRegistration: $0Tuition: $5,044Supplies/Equipment: $546Total Tuition Fee: $5,990
COST PER SINGLE SUBJECTSubject Number Subject Title Cost
120
20687 Configuring Windows 8 $2,99520688 Maintaining and Managing
Windows 8 $2,995
CERTIFICATION EXAMS REQUIRED 70-687 Configuring Windows 8 70-688 Maintaining and Managing Windows 8
TARGETED JOB ROLES System Support Specialist Systems Engineer Windows 8 Specialist Windows Help Desk Technician Technical Support Representative
SUBJECT DESCRIPTIONS
20687A: CONFIGURING WINDOWS 8
PROGRAM DESCRIPTION Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course is designed for experienced IT professionals who have knowledge and experience administering Windows PCs and devices in a domain environment with managed access to the Internet. You will learn the skills you need to administer Windows 8.1 in a Windows Server domain environment and also provide secure, managed access to users from their non-domain joined Windows devices. You will learn how to install and customize Windows 8.1 operating systems and apps, integrate and control access to domains and cloud services, and migrate and synchronize settings across multiple devices. In addition, you will learn how to implement mobile security and customize configurations using Windows management tools including Group Policy and Windows PowerShell cmdlets. You will also learn how to configure user settings and profiles, local and remote network connectivity, Client Hyper-V, virtual apps, and Internet Explorer 11. Finally, you will learn how to optimize security and provide controlled access from Windows 8.1 PCs and devices to specified resources through Workplace Join services and Work Folders. This course is also designed to prepare certification candidates for Exam 70-687, Configuring Windows 8.1. As part of the learning experience, you will perform hands-on exercises in a virtual lab environment.
PERFORMANCE OBJECTIVESStudents will learn:
Describe solutions and features related to managing Windows 8.1 in an enterprise network environment.
121
Determine requirements and perform the tasks for installing and deploying Windows 8.1.
Manage profiles and user state between Windows devices. Determine the most appropriate management tools to configure Windows 8.1
settings. Configure disks, partitions, volumes, and device drivers in a Windows 8.1
system. Configure network connectivity. Configure resource connectivity for both domain-joined and non-domain joined
PCs and devices. Implement Windows 8.1 technologies to secure network connections. Configure file, folder, and printer access. Implement tools and technologies that can help secure Windows 8.1 PCs and
devices. Configure and control desktop apps, Windows Store apps, and virtual apps. Optimize and maintain Windows 8.1 PCs and devices. Configure mobile computer settings and to enable remote access. Determine how to recover Windows 8.1 from various failures. Describe and configure Client Hyper-V.
TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Techinicans
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+/Net+/Sec+ certifications
TUITION AND FEESRegistration: $0Tuition: $2,722Supplies/Equipment: $273Total Tuition Fee: $2,995
CLASS SCHEDULE
122
Day students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
20687 Configuring Windows 8.1 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOK70-687 Windows 8.1 Configuration
Official Microsoft Academic Courseware and Labs
CERTIFICATION EXAM REQUIRED 70-687
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Installing and Deploying Windows 8
Introducing Windows 8 Preparing to Install Windows 8 Installing Windows 8 Lab A: Installing Windows 8 Automating the Installation of Windows 8 Lab B: Performing an Unattended Installation of Windows 8
123
Activating Windows 8 Lesson 2: Upgrading and Migrating to Windows 8
Upgrading to Windows 8 Migrating to Windows 8 Migrating User Data and Settings Lab: Migrating to Windows 8
Lesson 3: Managing Disks and Device Drivers
Managing Disks, Partitions, and Volumes Maintaining Disks, Partitions, and Volumes Working with Virtual Hard Disks Lab A: Managing Disks Installing and Configuring Device Drivers Lab B: Configuring Device Drivers
Lesson 4: Configuring and Troubleshooting Network Connections
Configuring IPv4 Network Connectivity Configuring IPv6 Network Connectivity Implementing Automatic IP Address Allocation Lab A: Configuring Network Connection Implementing Name Resolution Troubleshooting Network Connectivity Lab B: Troubleshooting Network Connectivity
Lesson 5: Implementing Wireless Network Connections
Overview of Wireless Networks Implementing a Wireless Network Lab: Planning the Implementation of Wireless Network Connections
Lesson 6: Implementing Network Security
Overview of Threats to Network Security Implementing Windows Firewall Lab A: Configuring Inbound and Outbound Firewall Rules Securing Network Traffic Lab B: Configuring IPSec Rules Configuring Windows Defender Lab C: Configuring Host-Based Virus and Malware Protection
Lesson 7: Configuring File Access and Printers on Windows 8 Clients
Managing File Access Managing Shared Folders Configuring File Compression Lab A: Configuring File Access Managing Printers Lab B: Configuring Printers Overview of SkyDrive
Lesson 8: Securing Windows 8 Desktops
124
Authentication and Authorization in Windows 8 Implementing GPOs Lab A: Implementing Local Group Policy Objects (GPOs) Securing Data with EFS and BitLocker Lab B: Securing Data Configuring User Account Control Lab C: Configuring Testing User Account Control (UAC)
Lesson 9: Configuring Applications
Install and Configure Applications Managing Apps from the Windows Store Configuring Internet Explorer Settings Lab A: Configuring Internet Explorer Security Configuring Application Restrictions in the Enterprise Lab B: Configuring AppLocker
Lesson 10: Optimizing and Maintaining Windows 8 Client Computers
Optimizing the Performance of Windows 8 Lab A: Optimizing Windows 8 Performance Managing the Reliability of Windows 8 Managing Windows 8 Updates Lab B: Maintaining Windows Updates
Lesson 11: Configuring Mobile Computing and Remote Access
Configuring Mobile Computers and Device Settings Lab A: Configuring a Power Plan Configuring VPN Access Lab B: Implementing a Virtual Private Network Connection Configuring Remote Desktop and Remote Assistance Lab C: Implementing Remote Desktop Overview of DirectAccess
Lesson 12: Implementing Hyper-V
Overview of Hyper-V Creating Virtual Machines Managing Virtual Hard Disks Managing Snapshots Lab: Implementing Hyper-V
Lesson 13: Troubleshooting and Recovering Windows 8
Backing Up and Restoring Files in Windows 8 Recovery Options in Windows 8 Lab: Recovering Windows 8
GRADINGGrading will be assigned as follows:
Attendance: 50%
125
Participation: 50%
20688A: MAINTAINING AND MANAGING WINDOWS 8
PROGRAM DESCRIPTION Gain the knowledge and skills you need to support the Windows 8.1 operating system and solve technical troubleshooting problems in a Windows 8.1 and Windows Server 2012 R2 networking environment. This course is designed for IT professionals who have experience with Windows devices and who work as Windows Enterprise Desktop Support Technicians (EDSTs) in Tier 2 support environments. Through this instructor lead, five day Microsoft Official Course, with extensive hands-on labs you will learn how key components of the Windows Operating system work in order to aid in troubleshooting system problems. How to identify and resolve issues with networking, Windows Store apps, security, group policy, Internet Explorer, remote access, and support of mobile devices.This course uses new versions of Desktop Optimization Package (MDOP), Application Compatibility Toolkit (ACT), Windows Performance Toolkit (WPT), Microsoft Message Analyzer, and is the first course that uses the popular Sysinternals tools, and other tools. This course also helps candidates prepare for Exam 70-688, MCSA: Supporting Windows 8.1.
PERFORMANCE OBJECTIVESStudents will learn:
Describe the processes involved in planning and using a troubleshooting methodology for Windows 8.1.
Troubleshoot startup issues and operating system services on a Windows 8.1 system.
Resolve issues related to hardware devices and device drivers. Troubleshoot computers remotely. troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to user settings. Troubleshoot remote connectivity issues. Resolve issues related to accessing resources from computers that are domain-
joined. Resolve issues related to accessing resources from computers that are not
domain-joined. Troubleshoot issues related to application installation and operation. Maintain Windows 8.1 following deployment. Design and implement extranet connectivity for Windows 8. Recover a computer running Windows 8.1.
TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Technicians
ADMISSION REQUIREMENTS
126
Individuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+/Net+/Sec+ certifications
TUITION AND FEESRegistration: $0Tuition: $2,722Supplies/Equipment: $273Total Tuition Fee: $2,995
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
20688 Supporting Windows 8.1 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOK
70-688 Windows 8.1 Supporting
Official Microsoft Academic Courseware and Labs
CERTIFICATION EXAM REQUIRED 70-688
INSTRUCTIONAL METHODS
127
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Planning and Implementing Management of Windows 8
Local and Remote Management of Windows 8 Using Windows PowerShell for Management Using Group Policy for Management Additional Tools for Managing Windows 8
Lesson 2: Designing and Implementing an Installation Strategy
Determining a Deployment Strategy for Windows 8 Planning a Migration Strategy to Windows 8 Planning and Implementing Additional Windows 8 Deployment Methods Planning for Operating System Virtualization
Lesson 3: Planning and Implementing Authentication for Windows 8
Overview of User Authentication Overview of Domain-Based Security
Lesson 4: Planning and Implementing IP Addressing and Intranet Connectivity
Designing IPv4 Addressing Designing IPv6 Addressing Overview of Wired Network Connectivity Designing Wireless Network Connectivity Securing Network Connectivity with Windows Firewall
Lesson 5: Implementing an Application Strategy for Windows 8
Designing Application Deployment Planning an Application Compatibility Strategy Managing Windows 8 Apps
Lesson 6: Planning and Implementing a Solution for User Settings
Managing User Profiles Overview of UE-V Deploying and Using UE-V
128
Lesson 7: Configuring Cloud Services
Overview of Cloud Services Overview of Office 365
Lesson 8: Implementing Windows Intune
Introduction to Windows Intune Deploying Windows Intune Clients Basic Windows Intune Administration
Lesson 9: Managing Computers by Using Windows Intune
Working with Policies and Updates Deploying Software with Windows Intune
Lesson 10: Planning and Implementing Access to File and Print Resources
Managing Local Storage Planning Access to File Shares Planning File Caching Planning, Installing and Configuring Printing
Lesson 11: Planning and Implementing Encryption for Windows 8
Planning EFS Planning and Implementing BitLocker
Lesson 12: Designing and Implementing Endpoint Security for Windows 8
Planning an Update Strategy Implementing Virus and Malware Protection Implementing AppLocker
Lesson 13: Designing and Implementing Extranet Connectivity
Configuring Virtual Private Networks for Windows 8 Planning Direct Access for Windows 8 Managing Mobile Devices
Lesson 14: Planning and Implementing a Recovery Solution
Overview of the Windows 8 Boot Process Repairing Stability Issues in Windows 8 Planning User Data Recovery for Windows 8
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPTIA NETWORK +
129
PROGRAM DESCRIPTIONThe CompTIA® Network+® course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. If you are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification.
Also, if your job duties include network troubleshooting, installation, or maintenance, or if you are preparing for any type of network-related career, it provides the background knowledge and skills you will require to be successful.
PERFORMANCE OBJECTIVESStudents will learn:
Identify basic network theory concepts and major network communications methods.
Describe bounded network media. Identify unbounded network media. Identify the major types of network implementations. Identify TCP/IP addressing and data delivery methods. Implement routing technologies. Identify the major services deployed on TCP/IP networks. Identify the infrastructure of a WAN implementation. Identify the components used in cloud computing and virtualization. Describe basic concepts related to network security. Prevent security breaches. Respond to security incidents. Identify the components of a remote network implementation. Identify the tools, methods, and techniques used in managing a network. Describe troubleshooting of issues on a network.
TARGETED JOB ROLES Entry-level IT Professional
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Professional Helpdesk or Computer Support Experience
130
CompTIA A+ Certification is helpful but not required
TUITION AND FEESRegistration: $0Tuition: $2,570Supplies/Equipment: $125Total Tuition Fee: $2,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
N10-007 CompTIA Network + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
CompTIA Network +
093029 Print and Digital Courseware
CERTIFICATION EXAM REQUIRED CompTIA Network + N10-007
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
131
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Network Theory
Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods
Lesson 2: Bounded Network Media
Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control
Lesson 3: Unbounded Network Media
Wireless Networking Wireless Network Devices and Components Install a Wireless Network
Lesson 4: Network Implementations
Physical Network Topologies Logical Network Topologies Ethernet Networks Network Devices VLANs
Lesson 5: TCP/IP Addressing and Data Delivery
The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques
Lesson 6: Routing
Enable Static Routing Implement Dynamic IP Routing
Lesson 7: TCP/IP Services
Assign IP Addresses Domain Naming Services
132
TCP/IP Commands Common TCP/IP Protocols
Lesson 8: WAN Infrastructure
WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies
Lesson 9: Cloud and Virtualization Technologies
Virtualization SAN Implementations Cloud Computing
Lesson 10: Network Security Basics
Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods
Lesson 11: Preventing Security Breaches
Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention Educate Users
Lesson 12: Responding to Security Incidents
Incident Management and Response Basic Forensic Concepts
Lesson 13: Remote Networking
Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols
Lesson 14: Network Management
Network Monitoring Configuration Management Documentation Network Performance Optimization
Lesson 15: Troubleshooting Network Issues
Network Troubleshooting Models
133
Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Troubleshoot Security Configuration Issues Troubleshoot Security Issues
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)
PROGRAM DESCRIPTION The Computer Hacking Forensic Investigator program presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation.
If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
CHFI is a certification that gives a complete overview of the process that a forensic investigator must follow when investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident.
PERFORMANCE OBJECTIVESStudents will learn:
The computer forensic investigation process and the various legal issues involved
Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
134
How to set up a computer forensics lab and the tools involved in the lab Various file systems and how to boot a disk Gathering volatile and nonvolatile information from Windows Data acquisition and duplication rules, validation methods and tools required How to recover deleted files and deleted partitions in Windows, Mac OS X, and
Linux The process involved in forensic investigation using AccessData FTK and
EnCase Steganography and its techniques, Steganalysis, and image file forensics Password Cracking Concepts, tools, types of password attacks and how to
investigate password protected files Different types of log capturing, log management, time synchronization, and
log capturing tools How to investigate logs, network traffic, wireless attacks, and web attacks How to track e-mails and investigate e-mail crimes Mobile forensics and mobile forensics software and hardware tools How to write investigative reports
TARGETED JOB ROLES Junior Computer Forensics Investigator Incident Response Technician Junior Computer Security Analyst
ADMISSION REQUIREMENTS Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Certified Ethical Hacker (CEH) certification or equivalent experience
TUITION AND FEESRegistration: $0Tuition: $3,295Supplies/Equipment: $400Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM
135
to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
CHFI Computer Hacking Forensic Investigator 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.
REQUIRED TEXTBOOKEC-Council Digital Courseware
CHFI v9 e-Courseware
CERTIFICATION EXAM REQUIRED CHFI
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson: 1
Computer Forensics in Today’s World Computer Forensics Investigation Process Understanding Hard Discs and File Systems
Lesson: 2
Operating Systems Forensics Defeating Anti-Forensic Techniques Data Acquisition and Duplication
136
Lesson: 3
Network Forensics Investigating Web Attacks Database Forensics
Lesson: 4
Cloud Forensics Malware Forensics Investigating Email Crimes
Lesson: 5
Mobile Forensics Investigative Reports
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CERTIFIED ETHICAL HACKER (CEH)
PROGRAM DESCRIPTION This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When you leave this intensive 5 day class, you will have hands on understanding and experience in Ethical Hacking.
PERFORMANCE OBJECTIVES Students will learn: Background of technology and technological operations Risk and system analysis Systems securities and vulnerabilities Regulations and ethics
TARGETED JOB ROLES Site Administrators Security Auditors
137
Security Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge
TUITION AND FEESRegistration: $0Tuition: $3,095Supplies/Equipment: $600Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
312-50 CEH Certified Ethical Hacker 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKEC-Council Digital Courseware
CEHv9 e-Courseware
CERTIFICATION EXAM REQUIRED 312-50 CEH Exam
138
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Introduction to Ethical Hacking
Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Concepts Hacking and Scopes Information Security Controls Physical Security Information Management Vulnerability Assessment Penetration Testing Security Laws and Standards
Lesson 2: Footprinting and Reconnaissance
Footprinting Concepts Footprinting Methodology Footprinting Using Advanced Google Hacking Techniques Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing
Lesson 3: Scanning Networks
Overview of Network Scanning CEH Scanning Methodology
Lesson 4: Enumeration
Enumeration Concepts Enumerations Countermeasures Enumeration Penetration Testing
Lesson 5: System Hacking
139
System Hacking: Goals CEH Hacking: Methodology CEH System Hacking Steps Escalating Privileges Executing Applications Spyware Defending Against Keyloggers Hiding Files Detecting Rootkits NTFS Data Stream Steganography/Steganlysis Covering Tracks
Lesson 6: Malware Threats
Trojan Concepts Types of Trojans Virus and Worm Concepts Ransomware Malware Reverse Engineering Malware Detection Countermeasures Penetration Testing
Lesson 7: Sniffing
Sniffing Concepts MAC/DHCP Attacks IDRP Spoofing ARP/DNS Poisoning Sniffing Tools Detection Techniques Counter Measures
Lesson 8: Social Engineering
Social Engineering Concepts Social Engineering Techniques Identity Theft Social Engineering Countermeasures
Lesson 9: Denial of Service
DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DoS/DDos Attack Tools Counter Measures DoS/DDos Protection Tools
Lesson 10: Session Hijacking
140
Session Hijacking Concepts Application Level Hijacking Network Level Hijacking Hijacking Tools Countermeasures
Lesson 11: Hacking Web Servers
Webserver Concepts Webserver Attakcs Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools
Lesson 12: Hacking Web Applications
Web App Concepts Web App Threats Web App Hacking Methodology Attack Web Servers Analyze Web Apps Authorization Attack Schemes Perform Injection Attacks Attack Data Connectivity
Lesson 13: SQL Injection
SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter Measures Snort Rule Detection to SQL Injection Attacks Detection Tools
Lesson 14: Hacking Wireless Networks
Wireless Statistics Wireless Concepts Wireless Encryption Breaking Encryption Defending Against WPA Cracking Wireless Threats Wireless Hacking Methodology WEP/WPA Cracking Tools Counter Measures Security Tools
Lesson 15: Hacking Mobile Platforms
Mobile Platform Attack Vectors Hacking Android/IOS
141
Hacking Windows/BlackBerry Mobile Device Management Mobile Security Guidelines and Tools
Lesson 16: Evading IDS, Firewalls and Honeypots
IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Systems IDS/Firewall Evading Tools Detecting Honeypots Counter Measures
Lesson 17: Cloud Computing
Introduction to Cloud Computing Cloud Computing Threats/Attacks Cloud Security Cloud Penetration Testing
Lesson 18: Cryptography
Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CERTIFIED NETWORK DEFENDER (CND)
PROGRAM DESCRIPTIONThe Certified Network Defender (CND) cyber security training program was developed as a result of extensive market research and surveys to give students a detailed understanding and the hands-on ability to act in real-life situations involving network defense.
This course instructs entry and junior level network security administrators on Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. Hands-on labs, based on major network security tools and techniques, give network administrators real world experience on current network security technologies and operations.
142
The included study kit provides over 10 GB of network security best practices, assessments, and protection tools. The kit also contains templates for various network policies and several white papers for additional learning.
This cyber security training is skills-based and lab intensive. It based on a job-task analysis and the cyber security education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system and network administrators.
The CND cyber security certification will verify that students have the technical depth required to actively design, monitor, and defend a secure network for an organization.
PERFORMANCE OBJECTIVESStudents will learn:
Various network security controls, protocols, and devices How to determine appropriate location for IDS/IPS sensors, tuning IDS for false
positives and false negatives, and configurations to harden security through IDPS technologies
How to implement secure VPNs for their organization How to identify various threats to wireless networks and learn how to mitigate
them How to monitor and conduct signature analysis to detect various types of
attacks and policy violation activities How to perform risk assessment, vulnerability assessment/scanning through
various scanning tools and generate detailed reports on it How to identify the critical data, choose appropriate back up method, media
and technique to perform successful backup of organization data on regular basis
How to provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident
How to troubleshoot their network for various network problems How to identify various threats on organization network How to design and implement various security policies for their organizations The importance of physical security and able to determine and implement
various physical security controls for their organizations How to harden security of various hosts individually in the organization’s
network How to choose appropriate firewall solutions, topology, and configurations to
harden security through firewall
TARGETED JOB ROLES Entry Level Network Administrators Entry Level Network Security Administrators Junior Network Security Engineers Junior Network Defense Technicians Security Analysts Security Operators
143
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Computer security knowledge and skills
TUITION AND FEESRegistration: $0Tuition: $3,095Supplies/Equipment: $600Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM HOURSSeminar Number Seminar Title Contact HoursCND Certified Network Defender 40
The approximate time required to complete this program is five days for day students and 10 nights for night students.
REQUIRED TEXTBOOKCertified Network Defender Volume 1EC-Council Official CoursewareIncludes: 3 Books (Courseware and Lab Manual) & Tools (Downloadable Online and Instruction provided in the Courseware)
CERTIFICATION EXAM REQUIRED EC-Council Certified Network Defender – CND 312-38
144
INSTRUCTIONAL METHODS Lecture Overhead slides Lab Exercises
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
OUTLINEDay 1
Computer Network Defense Fundamentals Network Security Threats, Vulnerabilities, and Attacks Network Security Controls, Protocols, and Perimeter Appliances Secure Firewall Configuration, Deployment and Management
Day 2
Secure IDS Configuration and Management Secure VPN Configuration and Management Designing a Secure Network Network Traffic Signatures and Analysis
Day 3
Monitoring and Securing Network Traffic Network Vulnerability Scanning Monitoring and Securing Network Traffic Network Vulnerability Scanning
Day 4
Host/System Security Physical Security Designing and Implementation of Network Security Policies
Day 5
Network Incident Response and Management Network Backup and Disaster Recovery Wireless Network Defense
GRADING Grading will be assigned as follows:
-Attendance: 50%
-Lab Assignments: 50%
145
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP)
PROGRAM DESCRIPTIONThis 5-day program is designed for people looking to start or enhance their careers as information security experts. You will build knowledge and skills in enterprise security, risk management and incident response, research and analysis, integration of computing, communications and business disciplines, as well as technical integration of enterprise components. Through this program, you will be expected to develop your knowledge of general security concepts, and the specific tools and procedures used to guard against intrusion, hacking, and cybercrimes. The program course material will center around these subject matter areas as they relate to the CASP certification exam objectives.
PERFORMANCE OBJECTIVESIn this course, you will analyze and apply advanced security concepts, principles, and implementations that contribute to enterprise-level security. Students will learn:
Manage risk in the enterprise. Integrate computing, communications, and business disciplines in the
enterprise. Use research and analysis to secure the enterprise. Integrate advanced authentication and authorization techniques. Implement cryptographic techniques. Implement security controls for hosts. Implement security controls for storage. Analyze network security concepts, components, and architectures, and
implement controls. Implement security controls for applications. Integrate hosts, storage, networks, and applications in a secure enterprise
architecture. Conduct vulnerability assessments. Conduct incident and emergency responses.
TARGETED JOB ROLES
Network Security Engineer Information Security Specialist Information Security Auditor Security Analyst Security Architect Site Security Administrator
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate)
146
In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge
TUITION AND FEESRegistration: $0Tuition: $3,170Supplies/Equipment: $325Total Tuition Fee: $3,495
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM HOURSSeminar Number Seminar Title Contact Hours
CASP CompTIA Advanced Security Practitioner 40
The approximate time required to complete this program is five days for day students and 10 nights for night students.
REQUIRED TEXTBOOKCompTIA Advanced Security Practitioner (CASP) (Exam CAS-002) Number 093023SECC (Rev 1.1)Publisher: Logical Operations, Inc.
CERTIFICATION EXAM REQUIRED
CompTIA Advanced Security Practitioner CAS-002
INSTRUCTIONAL METHODS
147
Lecture Overhead slides Cloud-based Lab exercises and labs
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINE
Day 1:
Lesson 1: Managing Risk
Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management
Lesson 2: Integrating Computing, Communications, and Business Disciplines
Facilitate Collaboration Across Business Units Secure Communications and Collaboration Solutions Implement Security Activities Throughout the Technology Life Cycle
Day 2:
Lesson 3: Using Research and Analysis to Secure the Enterprise
Determine Industry Trends and Effects on the Enterprise Analyze Scenarios to Secure the Enterprise
Lesson 4: Integrating Advanced Authentication and Authorization Techniques
Implement Authentication and Authorization Technologies Implement Advanced Identity Management
Lesson 5: Implementing Cryptographic Techniques
Describe Cryptographic Concepts Choose Cryptographic Techniques Choose Cryptographic Implementations
148
Day 3:
Lesson 6: Implementing Security Controls for Hosts
Select Host Hardware and Software Harden Hosts Virtualize Servers and Desktops Implement Cloud Augmented Security Services Protect Boot Loaders
Lesson 7: Implementing Security Controls for Enterprise Storage
Identify Storage Types and Protocols Implement Secure Storage Controls
Lesson 8: Analyzing and Implementing Network Security
Analyze Network Security Components and Devices Analyze Network-Enabled Devices Analyze Advanced Network Design Configure Controls for Network Security
Day 4:
Lesson 9: Implementing Security Controls for Applications
Identify General Application Vulnerabilities Identify Web Application Vulnerabilities Implement Application Security Controls
Lesson 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
Implement Security Standards in the Enterprise Select Technical Deployment Models Secure the Design of the Enterprise Infrastructure Secure Enterprise Application Integration Enablers
Day 5:
Lesson 11: Conducting Vulnerability Assessments
Select Vulnerability Assessment Methods Select Vulnerability Assessment Tools
149
Lesson 12: Responding to and Recovering from Incidents
Design Systems to Facilitate Incident Response Conduct Incident and Emergency Responses
GRADINGGrading will be assigned as follows:
Student Attendance: 50% Student Participation in Lab Exercises: 50%
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALIST (ECES)
PROGRAM DESCRIPTION Secure organizations employ multiple levels of encryption – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption – server/desktop, network link encryption, web server encryption, tape backup encryption and many more.
Some of the most recent attacks that have had serious consequences share one thing in common – they all had either little or no effective encryption. This resulted in thousands of users being affected and hundreds of millions in losses. It resulted in serious decline of brand value and public embarrassment. And these were not technically naïve companies by any means. To name a few – SONY PS3, RSA, iPhone, LinkedIn.
The ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others. Other topic areas include the basics of information theory as it applies to cryptography; an introduction to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others; asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA; significant concepts such as diffusion, confusion, and Kerkcho’s principle.
PERFORMANCE OBJECTIVESStudents will learn:
The basics of information theory as it applies to cryptography. An introduction to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD
256 and others.
150
Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
Significant concepts such as diffusion, confusion, and Kerkcho’s principle. Types of encryption standards and their differences. How to select the best standard for your organization. How to enhance your pen-testing knowledge in encryption. Correct and incorrect deployment of encryption technologies. Common mistakes made in implementing encryption technologies. Best practices when implementing encryption technologies.
TARGETED JOB ROLES
Entry Level Penetration Testers Junior Computer Forensic Specialists Anyone involved in basic information security operations
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge No prior knowledge of cryptography is assumed, and no mathematical skills
beyond basic algebra are required.
TUITION AND FEESRegistration: $0Tuition: $2,045Supplies/Equipment: $500Total Tuition Fee: $2,545
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening
151
students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM HOURSSeminar Number Seminar Title Contact Hours
ECES EC-Council Certified Encryption Specialist 24
The approximate time required to complete this program is three days for day students and six nights for evening students.
REQUIRED TEXTBOOKCertified Encryption Specialist Vol. 1EC-Council Official Courseware
CERTIFICATION EXAM REQUIRED EC-Council Certified Encryption Specialist 212-81
INSTRUCTIONAL METHODS
Lecture Overhead slides
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINEDay 1:
Introduction and History of Cryptography Symmetric Cryptography & Hashes
Day 2:
Number Theory and Asymmetric Cryptography Applications of Cryptography
Day 3:
Cryptanalysis
GRADINGGrading will be assigned as follows:
Attendance: 50%
152
Participation: 50%
EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)
SEMINAR DESCRIPTIONECSA is one of the best cyber security certifications and is like no other! It is a globally accepted cyber security course and certification covering the testing of modern infrastructures, operating systems and application environments. Students also learn penetration testing documentation and reporting.
This 5-day cyber security training is highly interactive, comprehensive, standards-based, and methodology intensive with real-world labs. Emphasis is placed on the practical competency of the student.
This is all achieved through the iLabs cyber range which allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.
Our web portal enables students to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available! With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient.
Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing students to launch a complete Live range open for any form of hacking or testing.
PERFORMANCE OBJECTIVESThis course is intensively hands-on and a tremendous amount of emphasis is placed on practical competency.
The student must conduct a detailed penetration test through the EC-Council Cyber Range iLabs environment and submit a written report via EC-Council’s ASPEN system.
The design of the course is such that the instructor in the class will actually take you through the core concepts of conducting a penetration test and guide you through the report writing process for this organization.
The course is comprised of 2 sets of lab challenges. Both are on the EC- Council ilabs Cyber Range. The first set covers practice labs for each module. The other is a Challenge Scenario which mimics an actual penetration test in an imaginary financial service company. As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSAV9 Exam.
TARGETED JOB ROLES Penetration Tester
153
Network Administrator Firewall Administrator Security Tester Risk Assessment Professionals
ADMISSION REQUIREMENTSIndividuals applying for this seminar are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge
TUITION AND FEESRegistration: $0Tuition: $3,195Supplies/Equipment: $500Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM HOURSSeminar Number Seminar Title Contact Hours
ECSA EC-Council Certified Security Analyst 40The approximate time required to complete this program is five days for day students and ten nights for evening students.
REQUIRED TEXTBOOKCertified Security Analyst Volume 9EC-Council Official Courseware
154
CERTIFICATION EXAM REQUIRED EC-Council Certified Security Analyst (ECSA)
INSTRUCTIONAL METHODS Instructor Guided Lab exercises (Primary) Lecture (Secondary)
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINEDay 1: 8 Hours Lecture
Security Analysis and Penetration Testing Methodologies TCP/IP Packet Analysis Pre-penetration Testing Steps
Day 2: 3 Hours Lecture, 5 Hours Lab Work
Information Gathering Methodology Vulnerability Analysis External Network Penetration Testing Methodology Internal Network Penetration Testing Methodology
Day 3: 3 Hours Lecture, 5 Hours Lab Work
Firewall Penetration Testing Methodology IDS Penetration Testing Methodology Web Application Penetration Testing Methodology
Day 4: 3 Hours Lecture, 5 Hours Lab Work
SQL Penetration Testing Methodology Database Penetration Testing Methodology Wireless Network Penetration Testing Methodology
Day 5: 3 Hours Lecture, 5 Hours Lab Work
Mobile Devices Penetration Testing Methodology Cloud Penetration Testing Methodology Report Writing and Post Test Actions
GRADINGGrading will be assigned as follows:
Attendance: 50% Lab Assignments: 50%
155
In addition, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSAV9 Exam.
EC-COUNCIL D ISASTER RECOVERY PROFESSIONAL (EDRP)
PROGRAM DESCRIPTIONA disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized, and the organization will be able to either maintain or quickly resume mission-critical functions. Typically, disaster recovery planning involves an analysis of business processes and continuity needs; it may also include a significant focus on disaster prevention.
The EDRP program teaches you the methods in identifying vulnerabilities and how to implement appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, and an understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster.
This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.
PERFORMANCE OBJECTIVESStudents will learn:
The ability to plan, organize, and direct the testing of disaster response, recovery support, and business recovery procedures.
TARGETED JOB ROLES Junior Network Server Administrators Firewall Administrators Junior Security Testers Junior System Administrators Risk Assessment Professionals
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate)
156
In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge
TUITION AND FEESRegistration: $0Tuition: $3,045Supplies/Equipment: $650Total Tuition Fee: $3,695
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
PROGRAM HOURSSeminar Number Seminar Title Contact Hours
EDRP EC-Council Disaster Recovery Professional 40
The approximate time required to complete this program is five days for day students and 10 evenings for evening students.
REQUIRED TEXTBOOKDisaster Recovery Professional - Volume 1EC-Council Official CoursewareInclude: 3 Books (Courseware and Lab Manual) and 1 Tools CD
CERTIFICATION EXAM REQUIRED EC-Council Disaster Recovery Professional 312-76
INSTRUCTIONAL METHODS Lecture Hands-on Labs Overhead slides
157
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINEDay 1:
Introduction to Disaster Recovery and Business Continuity Nature and Causes of Disasters Emergency Management Laws and Acts
Day 2:
Business Continuity Management Disaster Recovery Planning Process Risk Management Facility Protection
Day 3:
Data Recovery System Recovery Backup and Recovery Centralized and Decentralized System Recovery
Day 4:
Windows Data Recovery Tools Linux, Mac and Novell Netware Data Recovery Tools Incident Response
Day 5:
Role of Public Services in Disaster Organizations Providing Services during Disasters Organizations Providing Disaster Recovery Solutions Case Studies
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
ITIL V3 FOUNDATIONS
PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT Infrastructure Library (ITIL®) Foundation Certification (2011 Lifecycle Edition) course is the first step in your preparation. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service
158
management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.
Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation exam, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.
PERFORMANCE OBJECTIVESStudents will learn:
Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service
Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.
TARGETED JOB ROLES IT Professionals with an interest in Service Management
ADMISSION REQUIREMENTSIndividuals applying for this program are required to:
Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills
TUITION AND FEESRegistration: $0Tuition: $1,952Supplies/Equipment: $43Total Tuition Fee: $1,995
159
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURS
Seminar Number Seminar Title Contact HoursITL-FND ITIL v3 Foundations 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKLogical Operations
IT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition)
093030SC (Rev 2.0) Print and Digital Courseware
CERTIFICATION EXAM REQUIRED ITL-FND
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
160
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Introduction to ITIL
ITIL Basics The Service Lifecycle
Lesson 2: Service Strategy
Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process
Lesson 3: Service Design
Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process
Lesson 4: Service Transition
Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process
Lesson 5: Service Operation
Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process
Lesson 6: Service Operation Functions
The Service Desk Function The Technical Management Function
161
The IT Operations Management Function The Application Management Function
Lesson 7: Continual Service Improvement
Basic Concepts of Continual Service Improvement CSI Principles
GRADINGGrading will be assigned as follows:
Attendance: 50% Participation: 50%
CISSP – CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
PROGRAM DESCRIPTION Welcome to Certified Information Systems Security Professional (CISSP)®: Fourth Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.
CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because the sponsoring organization, the International Information Systems Security Certification Consortium, Inc. (ISC)2 ®, regularly updates the test by using subject matter experts (SMEs) to make sure the material and the questions are relevant in today’s security environment. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.
PERFORMANCE OBJECTIVESStudents will learn:
Analyze components of the Security and Risk Management domain. Analyze components of the Asset Security domain. Analyze components of the Security Engineering domain. Analyze components of the Communications and Network Security domain. Analyze components of the Identity and Access Management domain. Analyze components of the Security Assessment and Testing domain. Analyze components of the Security Operations domain. Analyze components of the Software Development Security domain.
162
TARGETED JOB ROLES Security Auditors or Specialists Risk Management Professionals Network Admistrators Network Engineers
ADMISSION REQUIREMENTS Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,
achieve a passing score on the Wonderlic Basic Skills Test.
PREREQUISITES Network +/Security + Certification or Equivalent Experience CyberSecurity Experience Highly Recommended Five Years Direct Work Experience Required for Certification
TUITION AND FEESRegistration: $0Tuition: $3,225Supplies/Equipment: $170Total Tuition Fee: $3,395
CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 7:00 PM to 11:00PM. For day students, an hour lunch break will be taken every day from 11:30AM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.
SEMINAR HOURSSeminar Number Seminar Title Contact Hours
CISSP Certified Information Security Systems Professional 40
The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.
REQUIRED TEXTBOOKCertified Information Systems Security Professional (CISSP): Fourth Edition
093024SC (Rev 1.0) Print and Digital Courseware
163
CERTIFICATION EXAM REQUIRED CISSP Exam (ISC2)
INSTRUCTIONAL METHODS
Lecture Overhead slides Labs
Lab Time 20 hoursLecture Time 20 hours
MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1
PROGRAM OUTLINELesson 1: Security and Risk Management
Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training
Lesson 2: Asset Security
Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling
Lesson 3: Security Engineering
Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
164
Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities
Lesson 4: Communications and Network Security
Network Protocol Security Network Components Security Communication Channel Security Network Attack Mitigation
Lesson 5: Identity and Access Management
Physical and Logical Access Control Identification, Authentication, and Authorization Identity as a Service Authorization Mechanisms Access Control Attack Mitigation
Lesson 6: Security Assessment and Testing
System Security Control Testing Software Security Control Testing Security Process Data Collection Audits
Lesson 7: Security Operations
Security Operations Concepts Physical Security Personnel Security Logging and Monitoring Preventative Measures Resource Provisioning and Protection Patch and Vulnerability Management Change Management Incident Response Investigations Disaster Recovery Planning Disaster Recovery Strategies Disaster Recovery Implementation
Lesson 8: Software Development Security
Security Principles in the System Lifecycle Security Principles in the Software Development Lifecycle Database Security in Software Development Security Controls in the Development Environment Software Security Effectiveness Assessment
165