Program Overview

This ‘Intermediate AI and Cyber Security’ training program is designed for learners who have foundational knowledge of artificial intelligence and cyber security. The course builds on basic concepts and introduces advanced methodologies, practical applications, and critical thinking skills needed to work with AI and cyber security technologies.

Flexible Scheduling Options

  • 136 Instructor hours

Hours Per Unit

  • Microsoft Windows Administration Essentials
  • Cybersecurity Controls
  • Linux App Server Essentials
  • Data Management Essentials
  • Enterprise Network Application Essentials
  • And more…

Prerequisites

  • Cisco CCST – Cybersecurity or equivalent
  • PC and internet navigation skills
  • Basic Windows and Linux system concepts
  • Basic understanding of computer networks

Program Objectives

Gain a deeper understanding of cybersecurity with this intermediate-level program. Explore the global impact of cyber threats, the real-world consequences of cyber-attacks on industries, and why cybersecurity is a rapidly growing field. Learners will learn how networks are exploited by attackers and learn defense strategies thtat help mitigate risks in today’s evolving threat landscape.

What You Will Learn

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Explain how to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Analyze network intrusion data to identify compromised hosts

Program Overview Video

View Full Program Syllabus