Cyber Security

  • Program Description:

    Baltimore City Community College’s Cybersecurity Academy provides students with superior non-credit cybersecurity training that prepares them for careers in cybersecurity through defined career and education pathways. Upon completion, students will take the CompTIA Certification exam to potentially become certified in that specific course. 
     
    The Academy achieves its goal by:
    • Offering stackable certifications that will lead to employment, advanced education, and other training opportunities.
    • Engaging business and industry in the development of curriculum that is aligned with current threats and adaptable to future cybersecurity concerns.
    • Providing students with cybersecurity training that fosters a challenging and welcoming environment for teaching and learning.
     
    Note: Some classes are grant-funded, so please call for eligibility. (Participants in grant-funded courses must be 18 years of age or older, have a High School Diploma or GED, pass a math and reading assessment, and present a clear background check/drug screen). 
     

    Courses:

    • A+ Certification
      This course prepares students to become A+ Certified. Students will learn about the meaning and usage of different hardware and software, operating systems, troubleshooting and different security protection procedures and strategies.


    • Network + Certification
      This course prepares students to become Network + certified. Students will learn about different networking tools and techniques. Students learn the knowledge and skills of working with different routers and networks, how to monitor businesses networks, basic networking and how to set up networks and different technology devices.

    • Security + Certification
      This course prepares students to become Security + certified. This course focuses on the security of different devices. Students will learn the different ways to secure networks, along with hardware, software and data. Students also focus on terminology needed in this field of cybersecurity, how to respond to different threats/ attacks and different ways to deal with those situations in different environments.

     

     

Contact