Industry-recognized credential(s): EC Council
These certifications establish that you have the core knowledge needed for cybersecurity roles and validates your ability to incorporate best practices using hands-on troubleshooting with practical problem-solving skills.
Complete in: 6 month or less
Workforce Development offers financial assistance for many workforce training programs through the Propel program and other resources. Email [email protected] for more information.
Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
Monitor and secure hybrid environments, including cloud, mobile, and Internet of Things (IoT).
Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance.
Identify, analyze, and respond to security events and incidents.
Introduction
Today's Security Professional
Cybersecurity Threat Landscape
Malicious Code
Social Engineering and Password Attacks
Security Assessment and Testing
Application Security
Cryptography and the PKI
Identity and Access Management
Resilience and Physical Security
Cloud and Virtualization Security
Endpoint Security
Network Security
Wireless and Mobile Security
Monitoring and Incident Response
Digital Forensics
Security Governance and Compliance
Risk Management and Privacy
Certification Exam Preparation
81
1
CompTIA / CompTIA Security+
No
Prior to registering for this course, students should have foundational knowledge IT concepts and networking.
None
None
80% attendance"Actively participate in class, including discussions and independent and group activities.
","Complete assigned labs and projects."
N/A
Individuals seeking to pursue entry-level cybersecurity roles, those seeking career advancement, or individuals preparing for the CompTIA Security+ certification exam.
Help Desk Analyst, Security Specialist, Network Security Analyst, Security Analyst , Security Administrator, Security Engineer, Cybersecurity Technician, Cybersecurity Analyst
There is a critical need and growing demand for cybersecurity skills and practitioners.
Help Desk Analyst
Security Specialist
Network Security Analyst
Security Analyst
Security Administrator
Security Engineer
Cybersecurity Technician
Cybersecurity Analyst
To be notified when this course becomes available, please use
Wake Tech's Notify Me service.
Understand basic cybersecurity concepts and terminology.
Explore key areas of cybersecurity, including digital forensics, programming, web exploits, and cryptography.
Gain hands-on experience using essential cybersecurity tools and techniques.
Learn how to conduct basic cybersecurity attacks and defense strategies.
Introduction
The Shell
Forensics
Programming in python
Web Exploits
Cryptography
The Network
Infiltrating in a database
Levels of Code
A little about C language
Binary Exploitation
Assembly
60
1
None
No
Prior to registering for this course, students should have digital literacy, including basic computer skills.
None
None
80% attendance"Actively participate in class, including discussions and independent and group activities.
","Complete assigned labs and projects."
N/A
Individuals seeking to pursue entry-level cybersecurity roles or those seeking career advancement.
IT Technicians, Cybersecurity Analyst, Information Security Analyst, Network Security Analyst
There is a critical need and growing demand for cybersecurity skills and practitioners.
Network Security Analyst
Information Security Analyst
Cybersecurity Analyst
IT Technicians
To be notified when this course becomes available, please use
Wake Tech's Notify Me service.
Know essential cybersecurity concepts and terminology.
Identify and describe common cyber threats, vulnerabilities, and attack methods.
Apply access management principles, including authentication, authorization, and multifactor authentication (MFA).
Configure and implement encryption methods to protect data in transit, at rest, and in use.
Set up secure networks, including firewalls, VPNs, and wireless security measures.
Demonstrate the ability to secure and harden operating systems, including Windows, macOS, and Linux.
Identify and manage endpoint security using tools for malware detection and system log analysis.
Conduct vulnerability assessments and apply risk management strategies to mitigate threats.
Develop skills to monitor and respond to cybersecurity incidents using industry-standard tools.
Prepare for the Cisco CCST Cybersecurity exam.
Introduction to Cybersecurity
Networking Basics
Networking Devices and Initial Configuration
Endpoint Security
Network Defense
Cyber Threat Management
Cisco Certified Support Technician (CCST) Cybersecurity Certification Exam Preparation
120
1
Cisco / Cisco Certified Support Technician (CCST) Cybersecurity
No
Prior to registering for this course, students should have digital literacy, including basic computer skills. Additionally, students should have experience that aligns with the Cybersecurity Essentials.
None
None
80% attendance"Actively participate in class, including discussions and independent and group activities.
","Complete assigned labs and projects."
N/A
Individuals seeking to pursue entry-level cybersecurity roles or those seeking career advancement.
Helpdesk Support, Cybersecurity Technician, Junior Cybersecurity Analyst
There is a critical need and growing demand for cybersecurity skills and practitioners.
Junior Cybersecurity Analyst
Cybersecurity Technician
Helpdesk Support
Details | Section | Date(s) | Location | Price | Seats | 311547 | 06/17/25 - 11/04/25 | MS Teams Virtual Learning Platform | 203.00 | 22 | Register |
---|
If you would like to be notified when additional sections become available, please use Wake Tech's Notify Me service.
Detect and analyze indicators of malicious activity
Understand threat hunting and threat intelligence concepts
Use appropriate tools and methods to manage, prioritize, and respond to attacks and vulnerabilities
Perform incident response processes
Understand reporting and communication concepts related to vulnerability management and incident response activities
Introduction
Today's Cybersecurity Analyst
System and Network Architecture
Malicious Activity
Threat Intelligence
Reconnaissance and Intelligence Gathering
Designing a Vulnerability Management Program
Analyzing Vulnerability Scans
Responding to Vulnerabilities
Building an Incident Response Program
Incident Detection and Analysis
Containment, Eradication, and Recovery
Reporting and Communication
Performing Forensic Analysis and Techniques for Incident Response
Certification Exam Preparation
96
1
CompTIA / CompTIA CySA+
No
Prior to course enrollment, students should have demonstrated knowledge and skills in alignment with the CompTIA Network+ and CompTIA Security+ credentials.
The course registration includes all textbooks and labs.
None
80% attendance"Actively participate in class, including discussions and independent and group activities.
","Complete assigned labs and projects."
N/A
Individuals who want to expand their knowledge and skills for employment-readiness or those who want to successfully prepare for the relevant industry certification exam(s).
Cybersecurity Analyst, Information Security Analyst, Network Security Analyst
There is a critical need and growing demand for cybersecurity skills and practitioners.
Cybersecurity Analyst
Information Security Analyst
Network Security Analyst
To be notified when this course becomes available, please use
Wake Tech's Notify Me service.
Demonstrate proficiency in planning and scoping penetration testing assessments.
Perform information gathering and vulnerability scanning using industry tools.
Exploit wired and wireless networks to identify security vulnerabilities.
Assess and exploit application-based vulnerabilities to improve security.
Compile detailed penetration testing reports with findings and mitigation strategies.
Course Introduction
Introduction to Ethical Hacking and Penetration Testing
Planning and Scoping a Penetration Testing Assessment
Information Gathering and Vulnerability Scanning
Social Engineering Attacks
Exploiting Wired and Wireless Networks
Exploiting Application-Based Vulnerabilities
Cloud, Mobile, and IoT Security
Performing Post-Exploitation Techniques
Reporting and Communication
Tools and Code Analysis
Final Capstone Activity
Final Exam
70
1
None
No
Prior to course enrollment, students should have completed the Junior Cybersecurity Analyst Career Path or possess equivalent entry-level cybersecurity knowledge, along with basic programming knowledge.
None
None
80% attendance"Actively participate in class, including discussions and independent and group activities.","Complete assigned labs and projects."
N/A
Individuals who want to expand their knowledge and skills to evidence relevant competencies.
Cybersecurity Analysts, Penetration Testers, Information Security Engineers
According to Lightcast, there is a growing demand for professionals with expertise in penetration testing, cybersecurity, and ethical hacking to proactively identify and mitigate cyber threats across various sectors.
Information Security Engineers
Penetration Testers
Cybersecurity Analysts
To be notified when this course becomes available, please use
Wake Tech's Notify Me service.