NETWORK SECURITY & ADMINISTRATION

BUILD I.T.

It’s important to develop a good foundation in building computers and servers before you’re in charge of configuring a network. In this class you will gain the hardware fundamentals:  

  • Configure and support PC, mobile and IoT device hardware
  • Configure device operating systems, including Windows, Linux, Android and iOS
  • Troubleshoot and problem solve service and support challenges
  • Implement basic data backup and recovery methods

CONNECT I.T.

Not too long ago, people had computers without internet access. That’s hard to imagine today. 

With technology changing so rapidly, consumers are moving from hardwired to wireless connections on their devices. Although this doesn’t change the need for hardwiring the infrastructure and the server, the shift from desktops to mobile devices has its own infrastructural operation requirements.   

Using a wireless mesh-network you can communicate with the network through a series of access points. These components seamlessly deliver, and shift wi-fi access points as needed. Here’s a few places you may have seen this work in action: 

  • Restaurants allow for paying the bill right from your table
  • Barcodes in retail stores are scanned for point of sale (POS) inventory and automatically reordered
  • Telecommuters work remotely and students access distant learning through Zoom and other apps supported by it
  • Doctors carry a laptop from one patient room to another and constantly update patient records
  • Casinos network floor games and know when a machine pays out
  • Thermostats in all Walmart stores are controlled through the headquarters in Bentonville

PROTECT I.T.

Now that we have connected almost every device in our homes and offices to the Internet, we must consider what information is on these devices and what we can do to secure these devices.

Here are some of the information being sought after by hackers, businesses, and sometimes governments:

  • Personal information used in ID theft like SSN, DOB, Usernames and Passwords 
  • Financial information like credit card numbers, bank account, and retirement information 
  • Company information like intellectual property, trade secrets, and customer information 
  • Encrypting data and holding it for ransom 

Cyber Security: Make an Impact on Individual, Corporate, and National Security

Americans love their technology, and the internet has transformed our lives. Most of them in good ways, however, it has also increased the number of security threats.

Americans spend nearly 5.5 hours a day on their phones with millennials spending 5.7 hours per day. That number jumps to nearly 7.5 hours a day for teens. Surprisingly, these numbers don’t reflect all screen time.

We are constantly on devices, whether it be desktop, laptop, or mobile. We are plugging in personal information, saving passwords, and trusting the system.

But who makes sure the system is trustworthy?

Who understands the virtual environment?

Your trusty neighborhood cyber security gurus!

Are you interested in becoming the first line of defense against unauthorized access to computers, the protector from hackers and malicious software?

It’s not just individuals at risk. Network security is crucial to business success. Network systems protect and safeguard information as they minimize client information theft, secure shared files, protect against viruses, comply with regulatory requirements, and increase network performance.

Our network security program begins with the basics of computers (internal components, software). Then we move on to computer repair and networking. Security measures are integrated into all aspects of the program.

NETWORK SECURITY COMPLIANCE TECHNICIAN

This program prepares you to maintain and administer computer networks and related computing environments including:

  • Computer Hardware
  • Systems Software
  • Applications Software
  • All Configurations

You will learn to diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary. You will also learn how to safeguard computers, networks and servers from accidental or unauthorized modification, destruction, or disclosure.

AREAS OF STUDY:

  • Computer Repair
  • Networking
  • Network Security
  • Windows Administration
  • Windows Security
  • Linux Administration
  • Linux Security
  • Capstone/Internship

POTENTIAL CAREER PATH:

Source: Zippia.com Zippia Logo

CyberPatriot

The network security class competes annually in the world’s largest cybersecurity competition. The network challenge involves finding and fixing security vulnerabilities in Windows and Linux operation systems. The Cisco challenge contains an online quiz and a virtual networking exercise based on specific training material. We have had teams place in the final competition!

Central Tech's Network Security and Administration photo for CyberPatriot nationals
2020 Cyber Patriot Team
2017 Cyber Patriot Team
2017 Cyber Patriot Team
2015 Cyber Patriot Team
2015 Cyber Patriot Team
2014 Cyber Patriot Team
2014 Cyber Patriot Team

Job Demand & Pay

Cybersecurity Technicians

Read More

There is a global demand for cybersecurity talent. In fact, the job outlook is expected to grow by 31%. The average salary for “cybersecurity technician” ranges from $48,000 to $109,000 and continues to be a great field with high-paying jobs.

Our Graduates

Where do they find jobs?

Read More

The computer and IT industry will continue to grow as spending on services, infrastructure, and software continue to trend upward. This is great news for our graduates as they have two options. Go to work, or go to college if you are interested in the management pathway.

Since companies hire based on your industry credentials, more and more students prefer going straight to work. They start gaining experience and making money immediately. In addition, many companies assist with college tuition. Graduates find by working and taking advantage of tuition assistance they: 

  • save thousands of dollars on student loans,  
  • gain experience as they are earning a degree, 
  • graduate college with employment, and 
  • work experience plus a degree earns them more income. 

Our graduates find careers in a variety of industries with the top ones in health and energy. Some use their knowledge in the military while others work for large real estate companies.

Available Certifications/License

May require additional fees.

Read More
  • Certiport:
    • IT Specialist – Networking
    • IT Specialist – Network Security
    • IT Specialist – Device Configuration and Management
  • CompTIA:
    • A+
    • Linux+
    • Network+
    • Security+
  • Cisco: CCNA

Quick Facts

Students, Campus, Times

Read More
  • Students: Adult & High School
  • Campus: Drumright, Sapulpa
  • Times: Morning, Afternoon, Full Day
cybersecurity group working

You may also like