About this course
Our Complete Career Training Programs (CCTP) include both the training you need and the skills you will want in order to be prepared for your new career. We have taken online career programs to a whole new level by bundling our Career Training with Professional Development and Personal Enrichment courses to ensure you have a diversified learning experience.
Our mentor-supported career courses focus on the industry standards that prepare you for your chosen career or certification. You will also get our smaller, self-study professional development courses to fine tune some of the softer skills needed in your chosen career, and our four-week long, instructor-led personal enrichment courses to further your employment training.
Sign up today for this all-inclusive career training program!
Cybersecurity
This course provides a comprehensive, trustworthy framework of practices for assuring information security. Students will learn how the various roles and functions within Cybersecurity practice can be combined and leveraged to produce a secure organization. Concepts will not be presented as stagnant theory; instead, they are interwoven in a real world adventure story that runs throughout. This approach grabs students' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. The content of the course is based on the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security.
Prerequisite(s): None
Terrorism and Homeland Security
In our Terrorism and Homeland Security course, students will learn how terrorism arises and how it functions. Packed with cutting-edge coverage, our course discusses the most sophisticated theories of the world's best terrorist analysts, while still focusing on the domestic and international threat of terrorism and the basic security issues surrounding terrorism today. Our Terrorism and Homeland Security course is arranged to enhance student learning. We will take a journey through the history of terrorism; from the ethnic, nationalistic, and separatist perspectives on international terrorism, along with religious and ideological terrorism to discussions on domestic terrorism, homeland security and future trends. Our Terrorism and Homeland Security course closes with discussions on emerging trends. Get ready to challenge your mind and become prepared for a position in the Homeland Security and Terrorism workforce.
Prerequisite(s): None
Cisco Certified Entry Networking Technician (CCENT) Interconnecting Networking Devices Part 1
The 100-101 Interconnecting Cisco Networking Devices Part 1 (ICND1) course is associated with the CCENT certification and the first step in achieving the CCNA Routing and Switching certification. Our CCENT course will prepare candidates for the Interconnecting Cisco Networking Devices Part 1 (ICND1) v2.0 exam. This course teaches the knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. Some topics include: the Operation of IP Data Networks; LAN Switching Technologies; IP Addressing (IPv4 & IPv6); IP Routing Technologies; IP Services (DHCP, NAT, ACLs); Network Device Security; and Basic Troubleshooting.
This course includes access to a hands-on Practice-Lab for 100-101, which will allow candidates to have training in the practical application of the course concepts without having to buy any additional software and will prepare them for success on the certification exam.
Prerequisite(s): Students should have keyboarding and computer skills, and be comfortable navigating the internet
Cisco Certified Network Associate (CCNA) Interconnecting Networking Devices Part 2
This CCNA 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2) course prepares for the exam associated with the Cisco Certified Network Associate certification. This course provides the knowledge and skills required to successfully install, operate, and troubleshoot a small to medium size enterprise branch network. This course covers topics LAN Switching Technologies; IP Routing Technologies; IP Services (FHRP, Syslog, SNMP v2 & v3); Troubleshooting; WAN Technologies.
This course includes access to a hands-on Practice-Lab for 200-101, which will allow candidates to have training in the practical application of the course concepts without having to buy any additional software and will prepare them for success on the certification exam.
Prerequisite(s): Cisco Certified Entry Networking Technician (CCENT) Interconnecting Networking Devices Part 1
Better Interpersonal Communication
Interpersonal Communication is a very important skill that is needed to develop and maintain personal and professional relationships. Just because you are talking does not mean you are communicating. This course will take you through the steps involved in understanding the importance of interpersonal communication and the effect on our daily interactions.
Critical Thinking: Implications for Leadership
Successful organizational leaders understand the importance of honing their critical thinking skills. Being an effective critical thinker is much like excelling at any art form; it takes commitment, practice, and years of hard work to achieve high results. This course explores the elements of critical thinking, the impact they have on strategic leadership, and the skills leaders must practice to be successful.
Email Etiquette
In decades past, business writing was a rare, formal event. Most everyone has a computer at home or work these days, so we are now many times more likely to send a written message to others using email. Sometimes these messages are poorly written, which creates misunderstandings and affects the sender's reputation.
Cybersecurity
Cybersecurity Module 1
Overview of Information Security
- Importance of Information Security
- Essential Body of Knowledge (EBK)
- Finding an Appropriate Model
- Strategic Governing Process
- Global Roadmap for Security
- EBK Competency Areas
- Roles in EBK Framework
- Implementation and Adjustment
- Adapting Best Practice
- Developing Solutions from EBK
- Chief Information Security Officer (CISO)
- Context and Scope
Cybersecurity Module 2
Information Security Team
- Defining Executive Roles
- Role of CISO
- Architect's Role
- Data Security Function
- Functional Security Roles
- Information Security Team
- IT Security Engineer
- Designing the Security Response
- Corollary Roles for Security
- Physical Security Professional
- Privacy Professional
- Procurement Professional
Cybersecurity Module 3
EBK Competencies
- Data Security
- Standard Models for Securing Data
- Cryptography
- Digital Forensics
- Ensuring Integrity
- Routine Evaluations
- Enterprise Continuity
- Successful Preparation
- Anticipating Disasters
- Incident Management
- Structured Response
- Consistent Execution
Cybersecurity Module 4
System Development and Maintenance
- Training and Awareness
- Ensuring Secure Behavior
- Build a Knowledgeable Workforce
- Effective Review Process
- IT Systems Operations and Maintenance
- Strategic Planning
- Controls Framework
- Maintaining Operational Capability
- Network and Telecommunications Security
- Managed Networks
- Boundaries of Trust
- Network Security Function
Cybersecurity Module 5
Controls and Regulations
- Personnel Security
- Screening and Hiring
- Formal Code of Conduct
- Physical Security
- Maintaining Secure Access
- Perimeter Controls
- Effective Procurement System
- Effective Supply Chains
- Identifying Trusted Suppliers
- Legal and Regulatory Compliance
- Role of Compliance Officer
- Evaluation Programs
Cybersecurity Module 6
Risk Management
- Risk Management Planning Process
- Risk Management Controls
- Targeting Security Controls
- Measuring Risk Management Process
- Strategic Management
- Defining Control Objectives
- Details of Implementation
- Making Informed Decisions
- System and Application Security
- Measuring Against Benchmarks
- Operational Framework
- Information-Based Management Process
Terrorism and Homeland Security
Terrorism and Homeland Security Module 1
Understanding Terrorism
- Defining Terrorism in Modern History
- Origins of Terrorism in Western History
- 1848 and the Radical Democrats
- Selective Terrorism and the Birth of the Irish Republic
- Terrorism as a Social Process
- Terrorism as Practical Criminology
- Justifying Terrorism
- Radicalization: Mixed Opinions
- Models of Terrorism
- Managing Terrorist Organizations
- The Political Economy of Terrorism
- Narcoterrorism
Terrorism and Homeland Security Module 2
Terrorism Tactics
- The Media and Social Construction of Images
- News Frames and Presentations
- The Internet and Terrorism
- Issues in the Media
- The Contagion Effect
- The Tactics of Terrorism and Multiplying Force
- Gender and Terrorism
- Technology and Cyberterrorism
- Nuclear Terrorism
- The Media as a Force Multiplier
- Economic Targeting and Transnational Attacks
- Suicide Attacks-Conflicting Opinions
Terrorism and Homeland Security Module 3
International Terrorism
- Ethnic and Nationalist Separatist Terrorism
- Modern Terrorism in Northern Island
- The Basque Nation and Liberty
- Post World War II Anticolonial Terrorism
- The Russian Federation
- Endemic Ethnic Terror in Sub-Saharan Africa
- Preemptive Strikes
- A Brief Introduction to Islam
- Militant Philosophy
- Synopsis of Traditional Middle Eastern Issues
- Factionalism in Palestinian Terrorism
- Controversial Counterterrorist Policies
Terrorism and Homeland Security Module 4
Ideological and Religious Movements in International Terrorism
- Revolutionary Terrorism
- Would-Be Revolutionaries: FARC, the ELN, and the MeK
- Maoist Revolutionary Terrorism
- The Transformation of European Revolutionary Terrorism
- The Decline of Revolutionary Terrorism
- Death Squads and Counter Revolutionaries
- The Rise of Religious Terrorism and the Soviet-Afghan War
- Bin Laden, Zawahiri, and al Qaeda
- The Evolution of al Qaeda
- Al Qaeda's Operational Capability
- Al Qaeda's Political Theology
- Pakistan and Other Networks in Asia
Terrorism and Homeland Security Module 5
Domestic Terrorism and Homeland Security
- Understanding Domestic Terrorism
- Anti-Government Criminal Extremism
- Change on the Left
- Homegrown Violent Extremists
- Single-Issue Criminal Extremists
- Defining Homeland Security
- Agencies Charged with Preventing and Interdicting Terrorism
- Building Intelligence Systems
- Issues in Homeland Security
- Perceived Weaknesses
- Intelligence Reform
- Intelligence Bureaucracies and the Future
Terrorism and Homeland Security Module 6
Law Enforcement, Constitutional Issues and the Future
- The Challenge of Bureaucracy
- Border Protection
- Infrastructure Protection
- Governmental Partnerships
- Responding to Disasters
- Civil Liberties and Federal Power
- Terrorism and the Constitution
- Civil Liberties and Policy Work
- Security and the Changing Nature of Terrorism
- Future Tactics
- Law Enforcement and the Future
- Probable Strategic Decisions
Cisco Certified Entry Networking Technician (CCENT) Interconnecting Networking Devices Part 1
CCENT Part 1 Module 1
Networking Fundamentals
- TCP/IP's and OSI Networking Modules
- Fundamentals of Ethernet LANs
- Fundamentals of WANs
- Fundamentals of IPv4 Addressing and Routing
- TCP/IP's Transport and Applications
- Packet Delivery Process
- Connecting to an Ethernet LAN
- Securing the Network
- Host-to-Host Communication Model
- Layer 4 Protocols
CCENT Part 1 Module 2
Ethernet LANs and Switches
- Building Ethernet LANs and Switches
- Installing and Operating Cisco LAN Switches
- Configuring Ethernet Switching
- Implementing Ethernet Switching
- Implementing Ethernet Virtual LANs
- Troubleshooting Ethernet LANs
- Challenges of Shared LANs
- Solving Network Challenges with Switched LAN Technology
- Packet Delivery Process
- Operating Cisco IOS Software
- Starting the Switch
CCENT Part 1 Module 3
Addressing and Subnetting
- Perspectives on IPv4 Subnetting
- Analyzing Classful IPv4 Networks
- Analyzing Subnet Masks
- Analyzing existing Subnets
- Using Public and Private IP Addresses for the IPv4
- Addressing Scheme using VLSM
- Requirements for LAN/WAN Environments
- IP Addressing and Host Configurations
- IOS Commands and Basic Router Set-up
- Different Methods of Routing Protocols
CCENT Part 1 Module 4
Implementing IP Version 4
- Operating Cisco Routers
- Configuring IPv4 Addresses and Routes
- Learning IPV4 Routes with OSPFv2
- Configuring and verifying host connectivity
- Understanding Binary Basics
- Constructing a Network Addressing Scheme
- Starting a Router
- Configuring a Router
- Packet Delivery Process
- Understanding Router Security
CCENT Part 1 Module 5
Advanced IPv4 Addressing Concepts
- Subnet Design
- Variable Length Solutions
- Route Summarization
- Access Control Lists
- IPv4 ACLs and Device Security
- Network Address translation
- Enabling the Internet Connection
- Enabling Static Routing
- Configuring Serial Encapsulation
- Enabling Routing Information Protocol (RIP)
CCENT Part 1 Module 6
IPv4 Services
- IPv4 Access Control List Basics
- Standard Numbered IPv4 ACLs
- List Logic with IP ACLs
- Matching Logic and Command Syntax
- Matching the Exact IP Address
- Matching a Subset of the Address with Wildcards
- Binary Wildcard Masks
- Extended Numbered IP Access Control Lists
- Matching the Protocol, Source IP, and Destination IP
- Matching TCP and UDP Port Numbers
- Extended IP ACL Configuration
CCENT Part 1 Module 7
IP Version 6
- Fundamentals of IP Version 6
- IPv6 Protocols
- Replacement Protocol
- IPv6 Addressing and Subnetting
- Prefix Length of Addressing
- IPv6 Addressing on Routers
- IPv6 Addressing on Hosts
- Implementing IPv6 Routing
- LAN/WAN Environment
- Troubleshooting Common IP Addressing Problems
CCENT Part 1 Module 8
Implementing IPv6
- IPv6 Protocols
- Neighbor Discovery
- Routers with MDP RS and RA
- Discovering Duplicate Addresses
- DHCPv6 Relay Agents
- Verification of Host IPv6 Connectivity
- Rules for Connected Local Routes
- Static IPv6 Routes
- Dynamic Routes with OSPFv3
**Outlines are subject to change, as courses and materials are updated.**
Cisco Certified Network Associate (CCNA) Interconnecting Networking Devices Part 2
CCNA Part 2 Module 1
LAN Switching
- Spanning Tree Protocol Concepts
- LAN Switching
- STP Features
- STP Configuration and Verification
- Devices with Ethernet LAN Switches
- Switch Verification
- Spanning Tree Protocol Implementation
- Troubleshooting LAN Switching
- Data Plan Analysis
- Root Cause Analysis
CCNA Part 2 Module 2
IP Version 4 Routing
- Troubleshooting IPv4 Routing
- IP Routing Logic
- Problem Isolation using Ping Command
- Creating Redundant First-Hop Routers
- Virtual Private Networks
- Host and Default Routers
- Improving Performance with Spanning Tree
- Routing Between VLANs
- Securing the Expanded Network
- Troubleshooting Switched Networks
CCNA Part 2 Module 3
Version 4 Routing Protocols
- Implementing OSPF for IPv4
- SPF Calculation Reduction Time
- Using Designated Routers and Ethernet Links
- EIGRP Concepts
- EIGRP Implementation
- Route Poisoning
- Advanced DV Protocol
- Troubleshooting IPv4 Routing Protocols
- Implementing VLSM
- Successor Routes
CCNA Part 2 Module 4
Wide Area Networks
- Implementing Point to Point WANs
- Leased Line WANs with HDLC
- Roles of CSU/DSU
- PPP Framing
- Frame Relay Concepts
- Implementing Frame Relay
- Types of WANs
- Frame Relay Layering
- Multipoint Subinterfaces
CCNA Part 2 Module 5
IP Version 6
- Normal IPv6 Operation
- Implementing OSPF
- Assigning Addresses to Hosts
- Routing Addresses and static Route Configuration
- Verifying IPv6 Connectivity
- OSPFv3 Configuration
- Load Balancing
- EIGRPv5 Configuration
- Troubleshooting IPv6 Routing
- Troubleshooting EIGRP
CCNA Part 2 Module 6
Network Management
- Managing Network Devices
- Managing IOS Files
- Managing IOS Licensing
- Managing Software Activation
- Cisco Passwords
- Recovery and Reset
- Exam Preparation
**Outlines are subject to change, as courses and materials are updated.**
Better Interpersonal Communication
Better Interpersonal Communication Module 1
Introduction to Interpersonal Communication
Module one will help students understand just what interpersonal communication is. Included is how you communicate face-to-face, and the process by which you exchange information through feelings and through verbal and non-verbal messages. Module one will discuss how you communicate through voice, facial features, gestures, and body language.
- Understanding Interpersonal Communication
- What is Communication
- Verbal Communication
- Non Verbal Communication
- Listening Skills
Better Interpersonal Communication Module 2
Self-Concept, Self-Esteem and Self-Disclosure
In module two, students will learn more about how communication affect's one's perception, attitude and behavior, all of which can be demonstrated through interpersonal communication. In order to communicate with others you first need to be able to understand yourself. Module two will also touch on gender communication and how to understand the differences in how males and females communicate.
- Understanding Your Self-Concept
- About Your Self-Esteem
- Exercising Self-Disclosure
- Understanding Gender Communication
- Perception of Interpersonal Communication
Better Interpersonal Communication Module 3
Perception, Defensiveness and Conflict
Not everyone's perception of their environment is the same. Module three will discuss how we pay attention to various stimuli and clues, whether consciously or not. Also included in this module is defensive behaviors and how to communicate without it dominating your interpersonal relationship. Finally, module three will discuss the conflicts that occur in communicating with others with there is an inconsistency in ideas, attitudes, emotions and values.
- Understanding Perception
- Physiological Perceptions
- Psychological Perceptions
- Defensive Behaviors
- Different Styles of Conflict
Better Interpersonal Communication Module 4
Electronic Communication
Electronic communication has become a part of about everyone's lives. We have the convenience of communicating via text, e-mail, social networking sites and phone calls and face to face communication has dwindled. Module four will discuss how electronic communication can enhance and hinder our communication and intimacy at the same time. Also included is how to most effectively use electronic communication.
- Types of Electronic Communication
- Characteristics of Electronic Communication
- Electronic Communication-Misuses
- Using Electronic Communication Effectively
- How Technology Plays a Role in Interpersonal Communication