Website Logo
Call Get Info Login

Cybersecurity

Distance Learning Course Summary
Home » Computer Technology » Cybersecurity - NEW!
Get $300 off regular price tuition!
Price : WAS $1049.00
NOW: $749.00

Down Payment :
$20.00
Monthly Payment :
$40.50

Cybersecurity - NEW!

Stratford's Cybersecurity Course is designed to take you from digital citizen to security professional. We don't just teach you how to use tools; we teach you how to think like a defender.



The average North American household now powers 21 connected devices. From smart TVs to fitness trackers, our lives are more online than ever and so are our vulnerabilities. As our digital footprint grows, so does the demand for experts who can protect it.

Our comprehensive distance learning Cybersecurity training is designed to take you from a foundational understanding to upper-level proficiency, equipping you with fundamental technical and analytical skills to help defend the modern world.

Curriculum at a Glance
Our curriculum dives deep into organizational security, covering both Windows and Linux permissions, physical security controls, and data encryption. Whether you want to protect your personal assets or launch a professional career, this course can provide the blueprint.

  • The Threat Landscape - Viruses, Ransomware, VPNs, and Incident Response.
  • Information Assurance - Authentication (MFA/Biometrics), IoT security, and System Hardening.
  • Network & Software - Packet Analysis, Cryptography (PKI), and Penetration Testing.
  • Risk & Professionalism - Cloud Security, Disaster Recovery, and Career Planning.

  ✓ Course type : Self-guided with instructor support
  ✓ Total Number of Modules: 4
  ✓ Total Number of Lessons: 12

» View our full Cybersecurity Course Curriculum

Career Outlook
There has never been a better time to become a cybersecurity professional. With a 29% projected growth rate, information security is one of the fastest-growing career paths in North America. *

As companies across every sector, from finance to healthcare, race to secure their data, they are looking for trained experts like you. Stratford's course can give you a the boost you need to step into this high-growth market with confidence.

Why Choose Stratford?

» Convenient
Our guided, self-paced instructional courses allow you to study when YOU have time. Everything you need to complete the course is provided with our all-inclusive tuition. And if you do need help, Stratford instructors and student service professionals are only a call or email away. Learn more about how studying with Stratford works.

» Affordable
All you need to get started is a low, down payment and you can make interest-free monthly payments as you go.

» Worthwhile
We have been in business for more than 32 years and more than one million students worldwide have enrolled with us!
Now is better time than ever to get the education you desire at a price you can afford. Why wait? Get started toward your brighter future today!
Stratford's Cybersecurity course has 4 Modules and a total of 12 lessons.
This course is self-guided with ongoing support from instructors as requested. Once you successfully pass exams in one module, the next module will be made available to you.


Introduction to Cybersecurity
Module 1 - Lesson 1
Defining Cybersecurity
A Brief History of the Practice
Core Principles of Cybersecurity
Threats in the Digital Realm: Blackhats
Understanding and Preventing Viruses
Personal and Professional Device Security
Data Breach and Ransomware Examples

Module 1 - Lesson 2
Developing Strong Passwords & Preventing Theft
Strong Password Strategies and Examples
Social Engineering and Other Cyber Attacks
Establishing Network Defenses: Private and Professional Wireless
Introduction to VPNs: Configuring and Navigating Firewalls
Practicing Safe Browsing Habits
Tools for Ad Blocking and Anti-Trafficking

Module 1 - Lesson 3
Security Considerations for Social Media & Privacy Controls
Vulnerabilities in Online Shopping & Secure Payment Methods
Protecting Personal Information
Fundamentals of Data Encryption: At Rest and In Transit
Data Backup: Methods, Considerations, and Cloud Security
Detecting, Monitoring, and Countering a Cyberattack
Restoring Systems and Coordinating an Incident Response

Information Assurance & System Security
Module 2 - Lesson 1
Cybersecurity and Information Assurance
Understanding Attackers: Motives and Issues
Introduction to Attack Defenses
Skill Sets and Certifications for Professionals
Elements of the CIA Triad
Security Domains, Vulnerabilities, and Threats
Phishing and Insider Threats
Security Strategies and Best Practices

Module 2 - Lesson 2
Fundamentals of User Authentication: Passwords, Multi-factor, and Biometrics
Understanding Access Levels and Authorization
Operating System Permissions: Windows Folder Sharing & Linux User Management
Physical Security and Environmental Controls
Protecting Data Signals and Asset Management
Restricting Access During System Boot

Module 2 - Lesson 3
OS Components, System Hardening, and Baselines
Significance of Event Logging
Vulnerability Scanners and Patch Management
Windows Defender and Mobile Device Security
Data Threats: GPS Metadata, IoT, and AI
Non-Traditional Hosts: Point-of-Sale (POS) and Critical Infrastructure

Network Security & Software Management
Module 3 - Lesson 1
Network Packets, Packet Tools, and the Three-Way Handshake
Using the netstat Command
Evaluating and Reducing Network Threats: Denial-of-Service (DoS)
Managing Remote Connections: SSH and FTP
Network Design: DHCP Vulnerabilities and Design Techniques
Protecting Network Devices: Switches, Routers, and UTM

Module 3 - Lesson 2
Wireless Networking Trends: Wi-Fi and Cellular Basics
Wireless Vulnerabilities: Router Security and MAC Filtering
Captive Portals and Acceptable Use Policies
Understanding Encryption and Cryptography
IP Security and Securing Network Transmission
Hashing, Public Key Infrastructure (PKI), and Digital Signatures
Encryption Applications: Manual, E-Mail, SMS, and Passwords

Module 3 - Lesson 3
Software Restriction and Group Policies
Protecting Source Code and Antimalware Software
Web Application Threats and Browser Security Settings
Web Server Protection and Database Threats
Frameworks: NIST Cybersecurity Framework and Regulatory Compliance
Introduction to Penetration Testing: Standard Procedures

Risk Management & Professional Development
Module 4 - Lesson 1
Cloud Fundamentals: Deployment Models, Storage, and Services
Virtualized Machines and Benefits of Virtualization
Risk Management: Assets, Probability, and Evaluation
Best Practices and Implementing Security Controls

Module 4 - Lesson 2
Business Continuity and Disaster-Recovery Planning
Resilience, Fault Tolerance, and Redundancy
RAID Processes, Database Replication, and Failover Systems
Managing Backups and Power Considerations
Incident Response: NIST Life-Cycle and Communication
Computer Forensics: Digital Evidence, File Signatures, and Hex Editors

Module 4 - Lesson 3
Researching Careers and Educational Pathways
Mathematical Skills, Problem-Solving, and Critical Thinking
Time, Task, and Resource Management
Job Acquisition, Advancement, and Student Organizations
Leadership Characteristics and Management Responsibilities
Business Considerations: Labor, Community, and Environmental Issues

This educational program is an introductory course designed to help students gain knowledge necessary for the vocational application of this subject. Completion of this program does not fulfill the legal requirements of particular state licenses or certifications, which may require additional training or apprenticeships. One or more of the course subjects/textbooks may vary as courses are updated.

*Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Computer Support Specialists.
Cybersecurity Course