top of page

Cyber Warrior Pre-Apprenticeship Program

The Cyber Warrior Pre-Apprenticeship Program is designed and delivered for Information Security Analyst / Cybersecurity Analyst Roles.  The program is 26 weeks in duration that includes 160 clock hours of CompTIA’s Network+ and Security+ lecture/labs.

At the conclusion of the program, students will have developed a thorough understanding of networks, the threats they face, vulnerabilities they have, and the hands-on skills to defend them. These knowledge, skills, and competencies will thoroughly prepare them to pass CompTIA’s Network+ and Security+ certification exams.

Module 1


The Network+ module first introduces the fundamental building blocks that form a modern network, such as protocols, media, topologies, and hardware. It then provides in-depth coverage of the essential concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, virtual networks, security, and troubleshooting. After completing this module and the exercises, students will be prepared to select the best network design, hardware, and software for their environment. Students will also have the skills to build a network from scratch and maintain, upgrade, troubleshoot, manage and secure an existing network.


Specific topic coverage includes:


  • Introduction to Networking

  • Network Infrastructure and Documentation

  • Addressing on Networks

  • Network Protocols and Routing

  • Network Cabling

  • Wireless Networking

  • Virtualization and Cloud Computing

  • Subnets and VLANs

  • Network Risk Management

  • Security in Network Design

  • Network Performance and Recovery

  • Wide Area Networks

Module 2


The Security+ module introduces the fundamentals of cyber threat intelligence analysis and advanced network security, including compliance and operational security; threats and vulnerabilities; application, data, host security; access control and identity management; and cryptography. The course covers new topics in network security, including psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security.


Specific topic coverage includes:


  • Introduction to Security

  • Malware and Social Engineering Attacks

  • Basic Cryptography

  • Advanced Cryptography and PKI

  • Networking and Server Attacks

  • Network Security Devices, Design, and Technology

  • Administering a Secure Network

  • Wireless Network Security

  • Host, Application, and Data Security

  • Mobile and Embedded Device Security

  • Authentication and Account Management

  • Access Management

  • Vulnerability Assessment and Data Security

  • Business Continuity

  • Risk Mitigation

bottom of page