Cybersecurity Program

Be more than just your family’s personal tech support. 

Become an expert in IT, Network, and Security support. 

Full-Time and Evening programs available
Simulated Cyber-Attack Exercise
Includes 1
Paid Certification
Professional Job
Assistance Provided

Thoughts From The Ones Who Came Before.

Course Overview

The Kable Academy Cybersecurity course focuses on the fundamental concepts of the IT Support, Network Support and Security Support.  These fundamentals introduce students to computer hardware, computer software, databases, networking, security, and software development. This 12- or 24-weeks course prepares student for CompTIA IT Fundamentals, A+, Network + or Security + certifications.

Phase 1: IT Support

Week 1

Install and Configure: Learn to install and configure laptop hardware components. 

Mobile Devices: Learn the characteristics of various mobile devices.

Connections and Ports: Learn to connect and configure mobile device accessories and ports.

Mobile Device Connectivity: Configure basic mobile device network connectivity and application support. 

Mobile Device Synchronization: Learn methods to perform mobile device synchronization.

TCP and UDP:  Learn the difference between TCP and UDP ports, protocols and purposes.

Network Hardware: Learn common networking hardware devices.

SOHO Network: Learn to install and configure a basic wired and wireless SOHO network.

Network Host: Learn the properties and purposes of service provided by network host.

Network Configurations: Learn common network configuration concepts and features.

Cable and Connector Types: Learn the basic cable types, features and purpose and their associated connectors.

RAM Installation: Learn to install various types of RAM.

Storage Devices: Learn to select, install and configure various storage devices.

Motherboards and CPUs: Learn to install motherboards, CPUs and add-on cards to a device.

Peripherals: Learn the purposes and uses of various peripheral types.

Power Supply: Learn the features and different types of power supply units.

Week 2

Devices and Printers: Learn to the concepts of common devices and configure SOHO multifunctional devices/printers and settings.

Cloud Computing: Learn the concepts of cloud computing.

Client-side Virtualization: Learn to set up and configure client-side virtualization.

Basic Troubleshooting: Learn the best practices and methodologies to resolve common problems.

Motherboard CPU, RAM and Power Supply Troubleshooting: Learn specific techniques for troubleshooting motherboards, CPUs, RAM and Power Supplies.

Troubleshooting Hard drives and RAID Arrays: Learn specific techniques to troubleshoot hard drives and RAIDs.

Video and Display Troubleshooting: Learn to troubleshoot video, projectors and display issues.

Troubleshooting Mobile Devices: Learn to troubleshoot common mobile device issues and apply the appropriate procedure.

Common Operating Systems: Learn common operating system types and their purposes.

Microsoft Windows: Learn the differences between various version of Microsoft Windows.

OS Installation: Understand the concepts of OS installation and upgrade methods.

Command Lines: Learn the use of Microsoft command line tools.

Control Panel: Learn the functionality of the Microsoft Windows Control Panel.

MS Networking: Learn to configure Microsoft Windows networking on a client/desktop.

Mac iOS: Learn the features and tools of Mac iOS.

Linux: Learn the features of a Linux client/desktop operating system.

Week 3

Logical Security: Learn the concepts of logical security.

Wireless Security: Learn about wireless security protocols and authentication methods.

Malware: Learn to detect, remove and prevent malware using the appropriate tools and methods.

Threats: Learn the concepts of social engineering, threats and

MS Windows Security: Learn the differences of basic MS Windows OS security settings.

Workstation Security: Learn to implement the best security practices for workstations.

Mobile Security: Learn to implement the best security practices for mobile devices.

Data Disposal: Learn to implement the appropriate date destruction and disposal methods.

SOHO Security: Learn to configure security on SOHO wired and wireless networks.

MS Windows OS: Learn to troubleshoot common issues on MS Windows.

Security Practices and Documentation: Learn the best practices associated with appropriate incident documentation.

Disaster Recovery: Learn to implement the basic disaster prevention and recovery methods.

Environmental Controls: Learn the impact of the environment on devices and networks and how to apply the appropriate control measures.

Network Misuse: Learn the process of addressing prohibited content and activities.

Policies: Learn the policies on user privacy and software licensing.

Remote Access: Learn to use remote access technologies.


Phase 2: Network Support

Week 4

Networking Ports and Protocols: Learn the purposes and uses of ports and protocols.

OSI Model: Build an understanding of the OSI layers of devices, applications, protocols and services.

Routing and Switching: Learn the concepts and characteristics of routing and switching.

IP Address Components: Learn to configure the appropriate IP address components.

Week 5

Network Topologies: Compare and contrast the characteristics of network topologies, types and technologies.

Wireless Configuration: Learn to implement the appropriate wireless technologies and configurations.

Cloud Concepts: Learn the foundations of cloud computing and its protocols.

Network Services: Learn the functions of network services and their purpose.

Week 6

Cabling: Learn the basics of deploying the appropriate cabling solution.

Placement of Network Devices: Learn the appropriate placement of network devices on a network and how to install and configure them.

Advanced Network Devices: Learn advanced concepts of securing multi types of network devices.

Virtualization: Learn purpose of virtualization and network storage technologies.

Week 7

WAN: Compare and contrast different WAN technologies.

Network Documents and Diagrams: Create the appropriate documentation and diagrams to manage a network.

Disaster Recovery Concepts: Compare and contrast business continuity and disaster recovery concepts.

Scanning, Monitoring, and Patching Process: Learn the common scanning, monitoring and patching processes and summarize their expected outputs.

Remote Access Methods: Learn the purpose and use of remote access methods.

Policies and Best Practices: Identify the best cybersecurity policies and practices for your organization.

Phase 3: Security Support

Week 8

Analyze Malware Indicators: Learn to analyze indicators of compromise and determine the type of malware.

Types of Attacks: Compare and contrast different types of cyberattacks.

Threat Vectors: Learn to identify various threat actors and their modus operandi.

Penetration Testing Concepts: Learn the concepts of different types of penetration testing.

Vulnerability Scanning Concepts: Learn the concepts and functionality of vulnerability scanning.

Types and Impacts of Vulnerabilities: Learn the impact associated with different types of cyber vulnerabilities.

Week 9

Network Concepts: Learn to install and configure both hardwired and software-based network components, to support your organizations cyber security.

Organizational Security: Learn to identify the appropriate software tools to assess the security posture of your organization.

Common Security Issues: Learn to identify and troubleshoot common cyber security issues.

Analyze and Interpret Output From Security Tools: Learn to analyze and interpret output from security technologies.

Deploy Mobile Device Security: Learn to deploy and secure mobile devices.

Implement Secure Protocols: Learn to implement security protocols.

Secure Configuration Guides: Learn use cases and purposes for frameworks, along with best best practices and secure configurations.

Week 10

Secure Network Architecture: Learn to develop and implement secure network architecture concepts.

Secure System Design: Learn to implement secure systems design.

Secure Staging Deployment Concepts: Learn the importance of secure staging deployment concepts.

Embedded Systems: Learn the security implications of embedded systems.

Application Development and Deployment: Learn to secure application development and deployment concepts.

Cloud and Virtualization Concepts: Learn the concepts of cloud and virtualization.

Resiliency and Automation Strategies: Learn how resiliency and automation strategies reduce risk.

Week 11

Physical Security Controls: Learn to importance of proper physical security controls and how to implement them.

Identity and Access Management Concepts: Learn to the concepts of identity access management.

Identity and Access Services: Learn to install and configure identity and access control services.

Identity and Access Management Controls: Learn implement identity access management controls.

Common Account Management Practices: Learn to differentiate between common account management practices.

Polices, Plans, Procedures for Organizations: Learn the importance of policies, plans, and procedures related to organizational security.

Business Impact Analysis Concepts: Learn to summarize business impact analysis concepts.

Risk Management Process and Concepts: Learn the concepts the risk management process.

Incident Response Procedures: Learn to develop and implement incident response procedures.

Week 12

Basic Concepts of Forensics: Learn the basics concepts of cybersecurity forensics and how to analyze them.

Disaster Recovery and Continuity of Operations: Learn the concepts of disaster recovery and the continuity of operations.

Types of Controls: Learn to compare and contrast various types of cybersecurity control tools.

Data Security and Privacy Practices: Learn to implement organizational data security and privacy practices.

Basic Concepts of Cryptography: Learn the basic concepts of cryptography and its purpose.

Basic Cryptography Algorithms: Learn cryptography algorithms and their basic characteristics.

Wireless Security: Learn to install and configure wireless security settings for optimal performance. 

Public Key Infrastructure: Learn to properly implement public key infrastructure.


  • * 600 Total Course Hours - 400 of which are live, instructor-led hours
  • * 60 Classroom Days
  • * 9AM-5PM. Monday- Friday, excluding holidays
  • * 90% In-Class Attendance Required
  • * You will need to bring your own laptop with you to this program.
    - If you do not have a personal laptop, the Kable Academy will provide you a loaner.

Upcoming Cohorts

12 Week Program (Full-Time)

Starts: Monday, April 3rd, 2023 – 
Ends: Friday, June 23rd, 2023

Hours: 9am-5pm, Monday-Friday

24 Week Program (Part-Time Evenings)

Starts: Monday, January 9, 2023
Ends: Thurdsay, June 30, 2023

Hours: 6pm-9pm, Monday-Thursday
1 Saturday/month