Course

Credit Type:
Course
ACE ID:
IRON-0001
Version:
1
Organization's ID:
GOLD
Organization:
Location:
Online
Length:
11 weeks (100 hours)
Minimum Passing Score:
70
ACE Credit Recommendation Period:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 Fundamentals of Cybersecurity
Competency Framework Statement
NICE Workforce Framework for Cybersecurity Acquire resources to support cybersecurity program goals and objectives (T1056)
NICE Workforce Framework for Cybersecurity Communicate daily network event and activity reports (T1290)
NICE Workforce Framework for Cybersecurity Optimize network hubs, routers, and switches (T1101)
NICE Workforce Framework for Cybersecurity Skill in administering operating systems (S0678)
NICE Workforce Framework for Cybersecurity Skill in executing command line tools (S0424)
NICE Workforce Framework for Cybersecurity Skill in identifying vulnerabilities (S0504)
NICE Workforce Framework for Cybersecurity Skill in performing data analysis (S0854)
NICE Workforce Framework for Cybersecurity Skill in performing digital evidence analysis (S0856)
NICE Workforce Framework for Cybersecurity Skill in performing malware analysis (S0651)
NICE Workforce Framework for Cybersecurity Skill in performing network traffic analysis (S0873)
NICE Workforce Framework for Cybersecurity Skill in performing network traffic packet analysis (S0875)
Description

Objective:

The course objective is to introduce non-technical learners to core cybersecurity principles and career pathways. Delivered through three stackable microcredentials (Foundations, Systems, and Operations), the program combines 40% interactive learning with 60% hands-on labs, and culminates in an applied exam that emphasizes real-world readiness. Certified Cyber Associate provides a comprehensive entry point into cybersecurity without requiring prior technical experience.

Learning Outcomes:

  • Demonstrate effective prompt engineering with a locally hosted AI assistant to support coding and cybersecurity problem-solving
  • Analyze suspicious files in VirusTotal to identify potential malware threats
  • Navigate the Linux file system and manipulate files and directories using command-line operations
  • Analyze home network security practices to recommend protections for diverse user needs
  • Analyze HTTP and HTTPS traffic in Wireshark to distinguish between unencrypted and encrypted credentials
  • Analyze FTP and SFTP traffic in Wireshark to compare exposed data with encrypted communications
  • Implement a DHCP server in Cisco Packet Tracer to assign IP addresses dynamically
  • Apply administrative functions in a system environment to manage users, settings, and resources
  • Implement port security on a Cisco switch in Packet Tracer to restrict access and protect network infrastructure
  • Configure initial settings on a Cisco router in Packet Tracer to enable basic network functionality
  • Analyze processes in Windows Task Manager to evaluate system performance and detect anomalies
  • Execute Windows management commands to administer system settings and resources
  • Configure Windows Server settings to establish core system functionality and management
  • Create and manage Active Directory objects to administer users, groups, and resources
  • Implement basic Group Policy Object configurations to manage Windows system settings
  • Configure DNS settings to enable name resolution within a Windows Server environment
  • Implement user password policies to enforce authentication security requirements
  • Execute basic Linux commands to manage files, directories, and processes
  • Apply Linux pipelines to combine commands and process data efficiently
  • Manage Linux file permissions and user groups to enforce access control
  • Implement secure web server configurations in Linux to control access and mitigate vulnerabilities
  • Explain virtualization concepts to evaluate their role in isolating systems and enhancing security
  • Create an EC2 instance in AWS to support secure cloud-based operations
  • Manage a Windows Server EC2 instance in AWS using RDP and basic command-line operations
  • Perform Windows command-line operations on an EC2 instance in AWS to manage files and directories
  • Manage AWS IAM users by applying policies and enforcing Multi-Factor Authentication to secure accounts
  • Design a secure AWS VPC to control network traffic and protect cloud resources
  • Analyze network traffic in Wireshark to identify attacks and extract incident details
  • Exploit insecure VNC configurations to demonstrate unauthorized remote access risks
  • Research security vulnerabilities in public databases to analyze severity, impacts, and affected software
  • Experiment with LLM chatbot parameters to evaluate their impact on cybersecurity-focused responses
  • Apply LLM-assisted techniques to analyze logs, identify anomalies, and extract security-relevant entities
  • Simulate prompt injection attacks on an AI-powered chatbot to expose sensitive information and demonstrate access control risks

General Topics:

  • Foundations: Introduction to Cybersecurity, Computer Foundations, Network Fundamentals
  • Systems: Network Administration, Windows System Administration, Linux System Administration
  • Operations: Cloud Computing, Cybersecurity Fundamentals, Generative AI for Cybersecurity Professionals
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Computer Based Training
  • Laboratory
  • Practical Exercises
  • Work-based Learning
  • Performance Rubrics (Checklists)
  • Facilitation

Methods of Assessment:

  • Case Studies
  • Examinations
  • Performance Rubrics (Checklists)
  • Presentations
  • Quizzes
Supplemental Materials
Equivalencies