Skip to main content

Cybersecurity

In this course, students develop ethical offensive and defensive strategies to protect various network configurations. They select tools and technologies to use during simulated attacks. Upon completion of the course, students will be able to analyze and secure network systems.

Enterprise Networking & Security CCNA3

In this course, students investigate enterprise networking. They configure, troubleshoot, and secure enterprise network devices in a wide area network(WAN). Students examine WAN technologies and quality of service (QoS)mechanisms used to secure remote access. They explore software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Upon completion of the course, students will have completed the CCNA course series, and they will have acquired practical, hands-on experience to prepare them for the CCNA certification exam.

Red Hat Enterprise Linux II

In this course, learners explore key tasks needed to become a Linux administrator. They build on foundational Linux skills as they learn to manage security and system access; execute shell scripts; automate repetitive tasks; manage storage devices, logical volumes, and file systems; and install Red Hat Enterprise Linux using scalable methods. Upon successful completion of this course learners will be prepared to take the Red Hat Certified SystemAdministrator (RHCSA) exam.

Gateway to Success

In this course, students explore the Gateway Technical College community. They examine college resources and services, investigate skills that lead to academic success, and identify strategies for achieving educational and personal goals.

IT Tech Skills

In this course, learners are introduced to fundamental IT concepts and terminology, including security, software development, database fundamentals, infrastructure, applications, and software. Upon completion of this course, students will be prepared to take the CompTia Tech+ Certification.

Network Security

Students will learn how to maintain security in the workplace. Security plans will be created based on, but not limited to, ten key security technologies: access control, network security, management security procedures, systems development security, cryptography, security models, operations security, disaster recovery, laws and ethics, and physical security.

Cloud Technologies

In this course, learners are introduced to different cloud computing infrastructures. Learners will develop skills for architecting the best cloud infrastructure solution for a business' goals. Cloud virtualization technologies will be examined and cloud solutions will be deployed. Cloud-related virtualization, networking, management, storage, security, and performance will be explored. Upon completion of the course, students will be able to deploy technology solutions within the cloud based infrastructure.

Speech

This course explores the fundamentals of effective oral presentation to small and large groups. Topic selection, audience analysis, methods of organization, research, structuring evidence and support, delivery techniques, and other essential elements of speaking successfully, including the listening process, form the basis of the course.

IT Job Search Skills

Learn how to start your IT job search! Students will develop a job search plan and prepare a professional job search portfolio. Different job search tools will be utilized in order to assist the student in finding the best job for them. Current job searching trends and interviewing techniques will be discussed and applied.