• Facebook
  • LinkedIn
  • Mail
  • Twitter
(817) 858-9670
  • 0Shopping Cart
ComputerMinds
  • Training Programs
    • Cybersecurity Specialist Program
    • Cybersecurity Administrator Program
    • Project Management Program
    • Logistics & Supply Chain Management Program
    • Network Administrator Program
    • Database & Business Analyst Program
    • Course Catalog
    • Corporate Training
  • IT / Business Skills Training
    • IT / Business Skills Training
    • CompTIA Training
      • CompTIA Advanced Security Practitioner (CASP)
      • CompTIA Certification and Training
      • CompTIA Security+
      • CompTIA A+
      • CompTIA Linux+
      • CompTIA Network+
    • Microsoft Training
      • Microsoft Certified Learning Partner
    • Management Training
      • ITIL Certification
      • Project Management Training
      • Agile Scrum Master Training
      • ITIL Foundations Training
      • Lean Six Sigma Green Belt Training
      • CompTIA Project+ Training
  • Career Services
  • Veterans
    • Veterans
    • Veteran Rapid Retraining Assistance Program (VRRAP)
    • Veterans Readiness and Employment (VR&E)
    • Post 9/11 GI Bill® FAQ
  • Funding Options
    • Funding Options
    • Workforce Innovation and Opportunity Act (WIOA)
    • WIOA – Youth
    • Course Catalog
    • Trade Adjustment Assistance
    • The Women’s Center
    • Veterans Readiness and Employment
    • Department of Assistive and Rehabilitation Services
  • About
    • About
    • Blog
    • Contact Us
    • Directions To Training Center
    • Partners
      • EC-Council Cyber Programs
    • IT Services
      • IT Services
      • IT Auditing
      • Equipment and Data Destruction
    • Testing
      • IT Certification Testing
    • Resources
      • Process to File a Student Complaint
  • Search
  • Menu Menu
Sale!
cyber-security-specialist-program

Cybersecurity Specialist Program

$2,599.99 $1,999.99

Learn to monitor, detect, investigate, analyze and respond to Cybersecurity events thus protecting systems from cybersecurity risks, threats, and vulnerabilities. Graduates will know how to respond to cybersecurity anomalies and execute preventive measures.  Graduates may find entry level employment as Cybersecurity analyst, IT Security Specialist at Security Operations Centers (SOC).

Category: Cybersecurity
  • Description
  • Reviews (0)

Description

Program Description – Graduates of this program will be able to monitor, detect, investigate, analyze and respond to Cybersecurity events thus protecting systems from cybersecurity risks, threats, and vulnerabilities. Graduates will know how to respond to cybersecurity anomalies and execute preventive measures.  Graduates may find entry level employment as Cybersecurity analyst, IT Security Specialist at Security Operations Centers (SOC).

Admission Requirements

  1. High school diploma or GED certification. Interview with an approved school admissions counselor
  2. Submit documentation of Certiport Microsoft MTA Networking Test (70% or higher) or
  3. Submit evidence of 6 months work experience in Information Technology Field – submit a resume with references.

Subject Description

CMS 2101 – Security Fundamentals: Students will learn gain a baseline knowledge in the world of IT security. This course takes the student from basic concepts right into real-world implementations, cementing new knowledge by giving the opportunity to immediately see it in action and practice. The students will learn security basics like the three “A’s” of security (authentication, authorization, and accounting), and learn how the Windows operating system secures files, websites, users, mail servers.

CMC IT101- IT Service Management: Students will learn foundational knowledge of IT service management, and how the IT Infrastructure Library (ITIL®) can help establish a framework for an organization to successfully deliver IT services to customers efficiently and effectively. Students will explore the basics of IT service management and delve into how people are vitally important to the ITIL® framework.

CMC CBT5 – IT Governance: The students will learn how COBIT 5 framework enables information and related technology to be governed and managed in a holistic manner for the whole enterprise, taking in the full end-to-end business and functional areas of responsibility, considering the IT-related interests of internal and external stakeholders.

CIS C250- Cybersecurity Fundamentals: This course teaches the students cyber security challenges faced by organizations with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Students will learn about how teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting organizations by detecting and responding to cybersecurity threats.

CIS C255- Cybersecurity Operations: This course prepares students to begin a career within a Security Operations Center (SOC), working with Cybersecurity Analysts at the associate level. This course provides the knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a SOC

Reviews

There are no reviews yet.

Be the first to review “Cybersecurity Specialist Program”

You must be logged in to post a review.

Our Contact Information

ComputerMinds.Com, Inc.
112 South Ector Dr.
Euless, TX 76040

Ph: (817) 858-9670
Fax: (817) 358-1242
Email: webform@computerminds.com

Business Hours

Our support Hotline is available 24 Hours a day: (555) 343 456 7891

  • Monday-Friday: 9am to 5pm
  • Saturday: 10am to 2pm
  • Sunday: Closed

“Intellectual growth should commence at birth and cease only at death.” 

― Albert Einstein

“We rise by lifting others.” 

― Robert Ingersoll

We Value Your Privacy!

  • Cookie Policy
  • Privacy Statement

 

© Copyright – ComputerMinds.Com 2000-2021 | All Rights Reserved

 

Scroll to top
0
We use cookies to optimize our website and our service.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}