Information Technology

The Non-Credit Computer Education Department delivers basic and advanced technology training so you can learn a new skill or earn an industry-recognized credential to level up to your next job. 

Many non-degree IT courses align with Wake Tech’s IT degree programs, which means you can take certain “non-degree” courses and still earn college credits for that course if you enroll in a qualifying degree program.

View IT Courses for Certification

Course Details & Registration Information for All IT Courses

Course
CompTIA Certified Cybersecurity Analyst CySA+
Name
CCT-3110D2
Available Classes
    Section Location Begin Date End Date Instructor Price Seats Available/Total Seats
266221 Face-to-Face Online Instruction 09/13/2022 03/14/2023 S. Edwards $572.00 21/24
Description Course Outline Requirements Intended Audience More Details
Intended Audience
Individuals who want to expand their knowledge and skills for employment-readiness or those who want to successfully prepare for the relevant industry certification exam(s).
Description
This bundled, three-series course builds on the competencies validated by the CompTIA Network and Security certification exams – or expands the knowledge of individuals with equivalent work experience. Topics include CompTIA CySA , Linux for cybersecurity, and project management. Upon completion, students will be able to use an analytics-based approach to identify and address vulnerabilities and suggest preventive measures. They will understand compliance and assessment and be able to use best practices to combat cybersecurity threats with continuous security monitoring. Students will practice using Linux for cybersecurity to secure systems and solve problems, and they will understand essential project management concepts, tools, and best practices. Students should also be ready to take the CompTIA CySA certification exam.
Course Objectives
  1. CompTIA CySA+:
    • Leverage intelligence and threat detection techniques
    • Analyze and interpret data
    • Identify and address vulnerabilities
    • Suggest preventative measures
    • Effectively respond to and recover from incidents
  2. Linux for Cybersecurity:
    • Recognize basic concepts and terms
    • Describe best practices to secure Linux systems
    • Solve Linux problems using hands-on practice
  3. Project Management:
    • Recognize basic terms and concepts
    • Review the project life cycle
    • Exemplify appropriate communication
    • Interpret how to manage resources and interact with stakeholders
    • Examine how to maintain project documentation
Outline of Instruction
  1. CompTIA CySA+:
    1. Introduction
    2. The Importance of Threat Data and Intelligence
    3. Utilizing Threat Intelligence to Support Organizational Security
    4. Vulnerability Management Activities
    5. Analyzing Assessment Output
    6. Threats and Vulnerabilities Associated with Specialized Technology
    7. Threats and Vulnerabilities Associated with Operating in the Cloud
    8. Implementing Controls to Mitigate Attacks and Software Vulnerabilities
    9. Security Solutions for Infrastructure Management
    10. Software Assurance Best Practices
    11. Hardware Assurance Best Practices
    12. Analyzing Data as Part of Security Monitoring Activities
    13. Implementing Configuration Changes to Existing Controls to Improve Security
    14. The Importance of Proactive Threat Hunting
    15. Automation Concepts and Technologies
    16. The Incident Response Process
    17. Applying the Appropriate Incident Response Procedure
    18. Analyzing Potential Indicators of Compromise
    19. Utilizing Basic Digital Forensics Techniques
    20. The Importance of Data Privacy and Protection
    21. Applying Security Concepts in Support of Organizational Risk Mitigation
    22. The Importance of Frameworks, Policies, Procedures, and Controls
    23. Exam Certification Preparation
  2. Linux for Cybersecurity:
    1. Distributions and Key Components
    2. Working on the Command Line
    3. Getting Help
    4. Editing Files
    5. When Things Go Wrong
    6. Managing Group Accounts
    7. Managing User Accounts
    8. Develop an Account Security Policy
    9. File Permissions
    10. Manage Local Storage: Essentials
    11. Manage Local Storage: Advanced Features
    12. Manage Network Storage
    13. Develop a Storage Security Policy
    14. Crontab and At
    15. Scripting
    16. Common Automation Tasks
    17. Develop an Automation Security Policy
    18. Networking Basics
    19. Network Configuration
    20. Network Service Configuration: Essential Services
    21. Network Service Configuration: Web Services
    22. Connecting to Remote Systems
    23. Develop a Network Security Policy
    24. Process Control
    25. System Logging
    26. Red Hat-Based Software Management
    27. Debian-Based Software Management
    28. System Booting
    29. Develop a Software Management Security Policy
    30. Footprinting
    31. Firewalls
    32. Intrusion Detection
    33. Additional Security Tasks
  3. Project Management:
    1. Project Properties and Phases
    2. Project Roles, Responsibilities, and Team Structures
    3. Project Cost Control
    4. Project Schedules
    5. Personnel and Physical Resource Management
    6. Agile Methodology
    7. Project Constraints and Influences
    8. Risk Activities and Strategies
    9. Communication Methods and Influences
    10. Communication Triggers and Target Audiences
    11. Change Control
    12. Project Management Tools
    13. Project Documentation
    14. Vendor Documentation
    15. Final Preparation
Contact Hours
144
CEU's
14.4
Industry Standard, State, or National Certification
Yes
Certification
CompTIA
Website URL
• CompTIA Cybersecurity Analyst (CySA)+ CS0-002 - https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives
Certification Learning Outcomes/Requirements
  1. CompTIA Cybersecurity Analyst (CySA)+ CS0-002:
    • Leverage intelligence and threat detection techniques
    • Analyze and interpret data
    • Identify and address vulnerabilities
    • Suggest preventative measures
    • Effectively respond to and recover from incidents
CE to CU Articulation
No
Prerequisites
Prior to course enrollment, students should have demonstrated knowledge and skills in alignment with the Network Technician program (CompTIA Network+ and CompTIA Security+).
Text and Supplies Needed
The course registration includes all textbooks and labs.
Clinical Site/Special Facilities
Requirements for Successful Completion of this Course
  1. Attendance 90% or above
  2. Participation
  3. Demonstrate an understanding of at least 80% of course material taught.
Accreditation/Special Approval Requirements
Intended Audience
Individuals who want to expand their knowledge and skills for employment-readiness or those who want to successfully prepare for the relevant industry certification exam(s).
Specific Industry or Business Support Needs
Information Security Analyst, Cyber Security Analyst, Software Developers
Wake County Need for Industry Positions
According to Burning Glass Technologies, Wake County has a very high projected growth for this skill in the next two years, showing 35.7%.
Industry or Job Titles Related to training Outcomes for Employment
  • Information Security Analyst
  • Cyber Security Analyst
  • Software Developers
Related Courses
  • IT Support Technician - CTS-3255A2
  • Network Technician - NET-3100O2
  • Cisco Certified Network Associate CCNA 200-301 - NET-3100N2
  • Software Developer Using Python - CSC-3110EH2
Course Contact Information
Kobie Joyner
919-866-7213