Information Technology
The Non-Credit Computer Education Department delivers basic and advanced technology training so you can learn a new skill or earn an industry-recognized credential to level up to your next job.
Many non-degree IT courses align with Wake Tech’s IT degree programs, which means you can take certain “non-degree” courses and still earn college credits for that course if you enroll in a qualifying degree program.

Course Details & Registration Information for All IT Courses
Course
CompTIA Certified Cybersecurity Analyst CySA+
Name
CCT-3110D2
Available Classes
Intended Audience
Individuals who want to expand their knowledge and skills for employment-readiness or those who want to successfully prepare for the relevant industry certification exam(s).
Description
This bundled, three-series course builds on the competencies validated by the CompTIA Network and Security certification exams – or expands the knowledge of individuals with equivalent work experience. Topics include CompTIA CySA , Linux for cybersecurity, and project management. Upon completion, students will be able to use an analytics-based approach to identify and address vulnerabilities and suggest preventive measures. They will understand compliance and assessment and be able to use best practices to combat cybersecurity threats with continuous security monitoring. Students will practice using Linux for cybersecurity to secure systems and solve problems, and they will understand essential project management concepts, tools, and best practices. Students should also be ready to take the CompTIA CySA certification exam.
Course Objectives
- CompTIA CySA+:
• Leverage intelligence and threat detection techniques
• Analyze and interpret data
• Identify and address vulnerabilities
• Suggest preventative measures
• Effectively respond to and recover from incidents - Linux for Cybersecurity:
• Recognize basic concepts and terms
• Describe best practices to secure Linux systems
• Solve Linux problems using hands-on practice - Project Management:
• Recognize basic terms and concepts
• Review the project life cycle
• Exemplify appropriate communication
• Interpret how to manage resources and interact with stakeholders
• Examine how to maintain project documentation
Outline of Instruction
- CompTIA CySA+:
1. Introduction
2. The Importance of Threat Data and Intelligence
3. Utilizing Threat Intelligence to Support Organizational Security
4. Vulnerability Management Activities
5. Analyzing Assessment Output
6. Threats and Vulnerabilities Associated with Specialized Technology
7. Threats and Vulnerabilities Associated with Operating in the Cloud
8. Implementing Controls to Mitigate Attacks and Software Vulnerabilities
9. Security Solutions for Infrastructure Management
10. Software Assurance Best Practices
11. Hardware Assurance Best Practices
12. Analyzing Data as Part of Security Monitoring Activities
13. Implementing Configuration Changes to Existing Controls to Improve Security
14. The Importance of Proactive Threat Hunting
15. Automation Concepts and Technologies
16. The Incident Response Process
17. Applying the Appropriate Incident Response Procedure
18. Analyzing Potential Indicators of Compromise
19. Utilizing Basic Digital Forensics Techniques
20. The Importance of Data Privacy and Protection
21. Applying Security Concepts in Support of Organizational Risk Mitigation
22. The Importance of Frameworks, Policies, Procedures, and Controls
23. Exam Certification Preparation - Linux for Cybersecurity:
1. Distributions and Key Components
2. Working on the Command Line
3. Getting Help
4. Editing Files
5. When Things Go Wrong
6. Managing Group Accounts
7. Managing User Accounts
8. Develop an Account Security Policy
9. File Permissions
10. Manage Local Storage: Essentials
11. Manage Local Storage: Advanced Features
12. Manage Network Storage
13. Develop a Storage Security Policy
14. Crontab and At
15. Scripting
16. Common Automation Tasks
17. Develop an Automation Security Policy
18. Networking Basics
19. Network Configuration
20. Network Service Configuration: Essential Services
21. Network Service Configuration: Web Services
22. Connecting to Remote Systems
23. Develop a Network Security Policy
24. Process Control
25. System Logging
26. Red Hat-Based Software Management
27. Debian-Based Software Management
28. System Booting
29. Develop a Software Management Security Policy
30. Footprinting
31. Firewalls
32. Intrusion Detection
33. Additional Security Tasks - Project Management:
1. Project Properties and Phases
2. Project Roles, Responsibilities, and Team Structures
3. Project Cost Control
4. Project Schedules
5. Personnel and Physical Resource Management
6. Agile Methodology
7. Project Constraints and Influences
8. Risk Activities and Strategies
9. Communication Methods and Influences
10. Communication Triggers and Target Audiences
11. Change Control
12. Project Management Tools
13. Project Documentation
14. Vendor Documentation
15. Final Preparation
Contact Hours
144
CEU's
14.4
Industry Standard, State, or National Certification
Yes
Certification
CompTIA
Website URL
• CompTIA Cybersecurity Analyst (CySA)+ CS0-002 - https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives
Certification Learning Outcomes/Requirements
- CompTIA Cybersecurity Analyst (CySA)+ CS0-002:
• Leverage intelligence and threat detection techniques
• Analyze and interpret data
• Identify and address vulnerabilities
• Suggest preventative measures
• Effectively respond to and recover from incidents
CE to CU Articulation
No
Prerequisites
Prior to course enrollment, students should have demonstrated knowledge and skills in alignment with the Network Technician program (CompTIA Network+ and CompTIA Security+).
Text and Supplies Needed
The course registration includes all textbooks and labs.
Clinical Site/Special Facilities
Requirements for Successful Completion of this Course
- Attendance 90% or above
- Participation
- Demonstrate an understanding of at least 80% of course material taught.
Accreditation/Special Approval Requirements
Intended Audience
Individuals who want to expand their knowledge and skills for employment-readiness or those who want to successfully prepare for the relevant industry certification exam(s).
Specific Industry or Business Support Needs
Information Security Analyst, Cyber Security Analyst, Software Developers
Wake County Need for Industry Positions
According to Burning Glass Technologies, Wake County has a very high projected growth for this skill in the next two years, showing 35.7%.
Industry or Job Titles Related to training Outcomes for Employment
- Information Security Analyst
- Cyber Security Analyst
- Software Developers
Related Courses
- IT Support Technician - CTS-3255A2
- Network Technician - NET-3100O2
- Cisco Certified Network Associate CCNA 200-301 - NET-3100N2
- Software Developer Using Python - CSC-3110EH2
Course Contact Information
Connect
Wake Tech eNewsWake Tech Podcast
Wake Tech Mobile App