CYBERSECURITY

... Stopping a cyberattack or tracking a cyber terrorist!

We’ve all heard about “black hat” hackers who have the ability to access complex computer systems and create havoc in the world. Perhaps you’ve wanted to understand how hackers do what they do, and you would like to be the person saving others from the harmful actions of these computer criminals. In this program you will learn the basic elements of cybersecurity and will have the opportunity to develop some serious technical chops.

Cybersecurity is one of the fastest-growing fields in the country, with a tremendous job outlook. Because of our increasing reliance on computers, tablets, mobile phones, and other types of electronic devices, we are all at risk from acts of computer hacking: from individual identity theft, from illegal access of classified information, or from individuals breaking into and manipulating the systems that run the country’s infrastructure. Keeping a computer port open is like leaving a backdoor unlocked and wide open for a burglar. Cybersecurity experts are the key individuals responsible for protecting critical networks and sensitive information.

What does it take?

Strong interest in computers and programming, technical reading skills, math skills, communication skills, self-directed, detail-oriented, problem-solving, and teamwork. Foreign language skills are a plus.

Work/Environment Considerations

Deadline-driven, demanding environment, adaptability, strong communication skills, and a wide variety of work settings and work schedules.

What will I learn?

Networking and network security, operating systems, programming languages, communication protocols, troubleshooting, cybersecurity fundamentals, cyber ethics, and cyber safety.

What will I do?

Networking, computer programming, apply basic security concepts through modeling and simulation development, and prepare for industry certification tests. Use Kali Linux to perform pen-tests.

www.WarrenTech.org

Career Pathway ™

CYBERSECURIT Y ENTRY LEVEL (AFTER HIGH SCHOOL GRADUATION) School

Majors

Careers

WarrenTech

Introduction to Computer Information Systems Advanced Placement Computer Science CompTIA, Linux+, Security+ Cisco Academy - CCNA

Hardware Technician Customer Service Representative Computer Support Technician

TECHNICAL LEVEL (CERTIFICATES AND / OR ASSOCIATES DEGREE) School

Majors

Careers

Arapahoe Community College Community College of Aurora Front Range Community College Red Rocks Community College Aims Community College

Computer Information Systems Computer Network Technology Computer Science Computer Security Specialist

Information Assurance Technician Security Administrator Systems Administrator Network Administrator

PROFESSIONAL LEVEL (4 YEAR OR HIGHER UNIVERSITY DEGREE) School

Majors

Careers

Colorado Technical University Regis University United States Air Force Academy University of Colorado-Colorado Springs University of Denver New York University Polytechnic Institute (NYU-Poly) Massachusetts Institute of Technology (MIT) Stanford University Georgia Tech University of Maryland University College

Information Assurance and Security Information Technology Computer Networking Computer Science Computer Information Systems Computer Science Security Information Assurance

Cyber Policy Analyst Chief Security Officer Cybersecurity Software Engineer Digital Forensics Expert Information Systems Security Administrator Cyber Strategist Cyber Policy Analyst Cybersecurity Tester Secure Software Engineer

This is not an exhaustive list of schools or jobs. Please see the program instructor or your counselor for additional options. For more information related to this field of study, including descriptions and salaries, go to: • U.S. Department of Labor - http://www.bls.gov/ooh/computer-and-information-technology/home.htm • CyberWatch - http://www.cyberwatchcenter.org/ • Stay Safe Online - http://staysafeonline.org/about-us/ • Stop Think Connect - http://stopthinkconnect.org/

The District affirms that no individual shall be discriminated against in terms, conditions or privileges of employment, excluded from participation in a program or activity, denied benefits, or otherwise discriminated against on the grounds of the individual’s race, creed, color, religion, gender, national origin or ancestry, age, mental or physical disability, sexual orientation, gender identity, genetic information or veteran status. This statement is made in accordance with the provisions of and amendments to the Civil Rights Act of 1964, the Americans with Disabilities Act of 1990, the Age Discrimination Act of 1967 and the Rehabilitation Act of 1973. To that end, if a student feels that he or she has been discriminated against, he or she should report the alleged discrimination to:

REV-111816

13300 West 2nd Place • Lakewood, CO 80228 303.982-8600 • 303.982.8622 fx • www.WarrenTech.org

Equal Opportunity/ADA Compliance Officer Employee Relations Department • (303) 982-6544 1829 Denver West Drive • Building 27, 4th Floor P.O. Box 4001 Golden, Colorado 80401-0001

Cybersecurity-Central-Pathway-111816-PRT-1014.pdf

computer hacking: from individual identity. theft, from illegal access of classified. information, or from individuals breaking. into and manipulating the systems that. run the country's infrastructure. Keeping. a computer port open is like leaving a. backdoor unlocked and wide open for. a burglar. Cybersecurity experts are the.

854KB Sizes 3 Downloads 143 Views

Recommend Documents

No documents