Network Foundations (Network+): The Network+ and Cloud Practitioner certifications are generally the benchmark of most entry-level positions in Information Technology. This module is designed to help you obtain valuable knowledge that can be applied beyond the classroom and within the workplace. This accelerated module teaches the understanding of hardware and tools, networking and security skills, while providing the technical and performance-based exercises to make sure you are on the right track.
Security Necessities (Security+): This module focused on installation and configuration of systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
In addition, student learn the fundamental tools and concepts of Linux and Unix. Beginners develop a solid foundation in Linux/Unix and the command line, while advanced users discover new methods to optimize workflow and fill in gaps in their knowledge. Topics include basic file manipulation; basic and advanced file-system features; I/O redirection and pipes; text manipulation and regular expressions; managing jobs and processes; vi, the standard Unix editor; automating tasks with shell scripts; managing software; secure remote administration; and more.
Certified to Hack (CEH): Ethical hacking is the process of testing and validating an Information Technology system to determine its weaknesses and assess its vulnerabilities. Businesses and government organizations hire cyber-security professional to break past their online security systems so that they can recommend measures that help prevent denial of service, data theft, and fraud. Also known as penetration testers or information security analysts, ethical hackers identify potential threats and help mitigate the risk of a real cyber-attack. The purpose of this intermediate module is to help individuals master the core concepts of ethical hacking and develop the skills needed for future engagements.
Capture the Flag (CTF): Computer security represents a challenge to education due to its interdisciplinary and volatile nature. Topics in computer security are drawn from areas ranging from theoretical aspects of computer science to applied aspects of information technology management. This makes it difficult to encapsulate the spirit of what constitutes a computer security professional. One approximation for this measure has emerged: the ‘capture the flag’ competition. Attack-oriented (red team) CTF competitions try to distill the essence of many aspects of professional computer security work into a single short exercise that is objectively measurable. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational trade craft.
Certifications: By the end of this course you will have the skills needed to acquire CompTIA Network+, CompTIA Security+, and EC-Council Certified Ethical Hacker (CEH).
Open Doors to High-Growth Career Paths: Equip yourself to succeed in a ever evolving sector with help from DA’s expert network of industry insiders.