Stratford's Cybersecurity course has 4 Modules and a total of 12 lessons.
This course is self-guided with ongoing support from instructors as requested. Once you successfully pass exams in one module, the next module will be made available to you.
Introduction to Cybersecurity
Module 1 - Lesson 1
Defining Cybersecurity
A Brief History of the Practice
Core Principles of Cybersecurity
Threats in the Digital Realm: Blackhats
Understanding and Preventing Viruses
Personal and Professional Device Security
Data Breach and Ransomware Examples
Module 1 - Lesson 2
Developing Strong Passwords & Preventing Theft
Strong Password Strategies and Examples
Social Engineering and Other Cyber Attacks
Establishing Network Defenses: Private and Professional Wireless
Introduction to VPNs: Configuring and Navigating Firewalls
Practicing Safe Browsing Habits
Tools for Ad Blocking and Anti-Trafficking
Module 1 - Lesson 3
Security Considerations for Social Media & Privacy Controls
Vulnerabilities in Online Shopping & Secure Payment Methods
Protecting Personal Information
Fundamentals of Data Encryption: At Rest and In Transit
Data Backup: Methods, Considerations, and Cloud Security
Detecting, Monitoring, and Countering a Cyberattack
Restoring Systems and Coordinating an Incident Response
Information Assurance & System Security
Module 2 - Lesson 1
Cybersecurity and Information Assurance
Understanding Attackers: Motives and Issues
Introduction to Attack Defenses
Skill Sets and Certifications for Professionals
Elements of the CIA Triad
Security Domains, Vulnerabilities, and Threats
Phishing and Insider Threats
Security Strategies and Best Practices
Module 2 - Lesson 2
Fundamentals of User Authentication: Passwords, Multi-factor, and Biometrics
Understanding Access Levels and Authorization
Operating System Permissions: Windows Folder Sharing & Linux User Management
Physical Security and Environmental Controls
Protecting Data Signals and Asset Management
Restricting Access During System Boot
Module 2 - Lesson 3
OS Components, System Hardening, and Baselines
Significance of Event Logging
Vulnerability Scanners and Patch Management
Windows Defender and Mobile Device Security
Data Threats: GPS Metadata, IoT, and AI
Non-Traditional Hosts: Point-of-Sale (POS) and Critical Infrastructure
Network Security & Software Management
Module 3 - Lesson 1
Network Packets, Packet Tools, and the Three-Way Handshake
Using the netstat Command
Evaluating and Reducing Network Threats: Denial-of-Service (DoS)
Managing Remote Connections: SSH and FTP
Network Design: DHCP Vulnerabilities and Design Techniques
Protecting Network Devices: Switches, Routers, and UTM
Module 3 - Lesson 2
Wireless Networking Trends: Wi-Fi and Cellular Basics
Wireless Vulnerabilities: Router Security and MAC Filtering
Captive Portals and Acceptable Use Policies
Understanding Encryption and Cryptography
IP Security and Securing Network Transmission
Hashing, Public Key Infrastructure (PKI), and Digital Signatures
Encryption Applications: Manual, E-Mail, SMS, and Passwords
Module 3 - Lesson 3
Software Restriction and Group Policies
Protecting Source Code and Antimalware Software
Web Application Threats and Browser Security Settings
Web Server Protection and Database Threats
Frameworks: NIST Cybersecurity Framework and Regulatory Compliance
Introduction to Penetration Testing: Standard Procedures
Risk Management & Professional Development
Module 4 - Lesson 1
Cloud Fundamentals: Deployment Models, Storage, and Services
Virtualized Machines and Benefits of Virtualization
Risk Management: Assets, Probability, and Evaluation
Best Practices and Implementing Security Controls
Module 4 - Lesson 2
Business Continuity and Disaster-Recovery Planning
Resilience, Fault Tolerance, and Redundancy
RAID Processes, Database Replication, and Failover Systems
Managing Backups and Power Considerations
Incident Response: NIST Life-Cycle and Communication
Computer Forensics: Digital Evidence, File Signatures, and Hex Editors
Module 4 - Lesson 3
Researching Careers and Educational Pathways
Mathematical Skills, Problem-Solving, and Critical Thinking
Time, Task, and Resource Management
Job Acquisition, Advancement, and Student Organizations
Leadership Characteristics and Management Responsibilities
Business Considerations: Labor, Community, and Environmental Issues
This educational program is an introductory course designed to help students gain knowledge necessary for the vocational application of this subject. Completion of this program does not fulfill the legal requirements of particular state licenses or certifications, which may require additional training or apprenticeships. One or more of the course subjects/textbooks may vary as courses are updated.
*Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Computer Support Specialists.