Course/Program Inventory
Telecommunications, Networking, and Cybersecurity
|
|
Return to: TCAT Program Inventory
CIP Code: 09.15.0305.02
Program Description:
Training in Telecommunications, Networking, and Cybersecurity includes instruction in safety, ladder usage, copper, fiber, telephone, and various systems that an entry level telecommunications technician would expect to be familiar with on the job. Further study includes basic computer and networking stills, satellite installation fundamentals, including use of test equipment to troubleshoot and diagnose common issues with communications electronics. Students learn how to secure a network using a layered security model, as well as gaining the basic knowledge needed to analyze, monitor, and protect cybersecurity resources in a vendor-neutral format. It is designed to provide academic, hands-on, and valuable real-world training with the fundamental skill sets essential to those who strive to become a professional in the telecommunications, networking, and cybersecurity industries.
Program Outcomes:
At the completion of the diploma, graduates will be able to:
- Test circuits and components of malfunctioning telecommunications equipment to isolate sources of malfunctions, using test meters, circuit diagrams, polarity probes, and other hand tools.
- Test repaired, newly installed, or updated equipment to ensure that it functions properly and conforms to specifications, using test equipment and observation.
- Safely Climb ladders and enter areas such as manholes and cable vaults to install, maintain, or inspect equipment.
- Assemble and install communication equipment such as data and telephone communication lines, wiring, switching equipment, wiring frames, power apparatus, computer systems, and networks.
- Analyze indicators of compromise and determine the type of malware.
- Compare and contrast types of attacks.
- Explain threat actor types and attributes.
- Explain penetration testing concepts.
- Explain vulnerability scanning concepts.
- Explain the impact associated with types of vulnerabilities.
- Install and configure network components, both hardware- and software-based, to support organizational security.
- Use appropriate software tools to assess the security posture of an organization..
- Given a scenario, troubleshoot common security issues.
- Given a scenario, analyze and interpret output from security technologies.
- Deploy mobile devices securely.
- Implement secure protocols.
- Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- Implement secure network architecture concepts.
- Implement secure systems design.
- Explain the importance of secure staging deployment concepts.
- Explain the security implications of embedded systems.
- Summarize secure application development and deployment concepts.
- Summarize cloud and virtualization concepts.
- Explain how resiliency and automation strategies reduce risk.
- Explain the importance of physical security controls.
- Compare and contrast identity and access management concepts.
- Install and configure identity and access services.
- Implement identity and access management controls.
- Differentiate common account management practices.
- Explain the importance of policies, plans and procedures related to organizational security.
- Summarize business impact analysis concepts.
- Explain risk management processes and concepts.
- Follow incident response procedures.
- Summarize basic concepts of forensics.
- Explain disaster recovery and continuity of operations concepts.
- Compare and contrast various types of controls.
- Carry out data security and privacy practices.
- Compare and contrast basic concepts of cryptography.
- Explain cryptography algorithms and their basic characteristics.
- Install and configure wireless security settings.
- Implement public key infrastructure.
- Apply environmental reconnaissance techniques using appropriate tools and processes.
- Analyze the results of a network reconnaissance.
- Given a network-based threat, implement or recommend the appropriate response and countermeasure.
- Explain the purpose of practices used to secure a corporate environment
- Implement an information security vulnerability management process.
- Analyze the output resulting from a vulnerability scan.
- Compare and contrast common vulnerabilities found in the following targets within an organization
- Distinguish threat data or behavior to determine the impact of an incident.
- Prepare a toolkit and use appropriate forensics tools during an investigation.
- Explain the importance of communication during the incident response process.
- Analyze common symptoms to select the best course of action to support incident response.
- Summarize the incident recovery and post-incident response process
- Explain the relationship between frameworks, common policies, controls, and procedures.
- Use data to recommend remediation of security issues related to identity and access management.
- Review security architecture and make recommendations to implement compensating controls.
- Use application security best practices while participating in the Software Development Life Cycle (SDLC).
- Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.
Professional Accrediting Body: Council on Occupational Education
State Agency/Entity Oversight: Tennessee Board of Regents; Tennessee Higher Education Commission
Applicable Certification/License or Industry-recognized Certificates to Be Awarded:
Electronics Technician’s Association (ETA) Residential Electronic Systems Integrator (RESI) certification
CompTIA A+ Certification
CompTIA Network+ Certification
CompTIA Security+ Certification
C-Tech Copper, Fiber, Telephone, Home A/V, Energy Management
Satellite Broadcasting & Communications Association (SBCA) Satellite Fundamentals
|