Make an Impact on Individual, Corporate, and National Security
Americans love their technology, and the internet has transformed our lives. Most of them in good ways, however, it has also increased the number of security threats.
Americans spend nearly 5.5 hours a day on their phones with millennials spending 5.7 hours per day. That number jumps to nearly 7.5 hours a day for teens. Surprisingly, these numbers don’t reflect all screen time.
We are constantly on devices, whether it be desktop, laptop, or mobile. We are plugging in personal information, saving passwords, and trusting the system.
But who makes sure the system is trustworthy?
Who understands the virtual environment?
Your trusty neighborhood cyber security gurus!
Are you interested in becoming the first line of defense against unauthorized access to computers, the protector from hackers and malicious software?
It’s not just individuals at risk. Network security is crucial to business success. Network systems protect and safeguard information as they minimize client information theft, secure shared files, protect against viruses, comply with regulatory requirements, and increase network performance.
Our network security program begins with the basics of computers (internal components, software). Then we move on to computer repair and networking. Security measures are integrated into all aspects of the program.
It’s important to develop a good foundation in building computers and servers before you’re in charge of configuring a network. In this class you will gain the hardware fundamentals:
- Configure and support PC, mobile and IoT device hardware
- Configure device operating systems, including Windows, Linux, Android and iOS
- Troubleshoot and problem solve service and support challenges
- Implement basic data backup and recovery methods
Now that we have connected almost every device in our homes and offices to the Internet, we must consider what information is on these devices and what we can do to secure these devices.
Here are some of the information being sought after by hackers, businesses, and sometimes governments:
- Personal information used in ID theft like SSN, DOB, Usernames and Passwords
- Financial information like credit card numbers, bank account, and retirement information
- Company information like intellectual property, trade secrets, and customer information
- Encrypting data and holding it for ransom
Not too long ago, people had computers without internet access. That’s hard to imagine today.
With technology changing so rapidly, consumers are moving from hardwired to wireless connections on their devices. Although this doesn’t change the need for hardwiring the infrastructure and the server, the shift from desktops to mobile devices has its own infrastructural operation requirements.
Using a wireless mesh-network you can communicate with the network through a series of access points. These components seamlessly deliver, and shift wi-fi access points as needed. Here’s a few places you may have seen this work in action:
- Restaurants allow for paying the bill right from your table
- Barcodes in retail stores are scanned for point of sale (POS) inventory and automatically reordered
- Telecommuters work remotely and students access distant learning through Zoom and other apps supported by it
- Doctors carry a laptop from one patient room to another and constantly update patient records
- Casinos network floor games and know when a machine pays out
- Thermostats in all Walmart stores are controlled through the headquarters in Bentonville
NETWORK SECURITY COMPLIANCE TECHNICIAN
This program prepares you to maintain and administer computer networks and related computing environments including:
- Computer Hardware
- Systems Software
- Applications Software
- All Configurations
You will learn to diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary. You will also learn how to safeguard computers, networks and servers from accidental or unauthorized modification, destruction, or disclosure.
Areas of Study
- Computer Repair
- Network Security
- Windows Administration
- Windows Security
- Linux Administration
- Linux Security
Potential Career Path
The network security class competes annually in the world’s largest cybersecurity competition. The network challenge involves finding and fixing security vulnerabilities in Windows and Linux operation systems. The Cisco challenge contains an online quiz and a virtual networking exercise based on specific training material. We have had teams place in the final competition!
Job Demand & Pay
Cybersecurity TechniciansRead More
Where do they find jobs?Read More
The computer and IT industry will continue to grow as spending on services, infrastructure, and software continue to trend upward. This is great news for our graduates as they have two options. Go to work, or go to college if you are interested in the management pathway.
Since companies hire based on your industry credentials, more and more students prefer going straight to work. They start gaining experience and making money immediately. In addition, many companies assist with college tuition. Graduates find by working and taking advantage of tuition assistance they:
- save thousands of dollars on student loans,
- gain experience as they are earning a degree,
- graduate college with employment, and
- work experience plus a degree earns them more income.
Our graduates find careers in a variety of industries with the top ones in health and energy. Some use their knowledge in the military while others work for large real estate companies.
May require additional fees.Read More
- IT Specialist – Networking
- IT Specialist – Network Security
- IT Specialist – Device Configuration and Management
- Cisco: CCNA
Students, Campus, TimesRead More
- Students: Adult & High School
- Campus: Drumright, Sapulpa
- Times: Morning, Afternoon, Full Day