By Gregory Sykes
•
February 25, 2023
Designed for beginners with little to no technical background, as well as those with some prior knowledge, the NC State Cybersecurity Bootcamp provides you with the skills and experience that hiring departments look for in qualified cybersecurity personnel. If you are a gifted problem-solver, are good at puzzles, love figuring out how things work, or have a strong affinity for technology, cybersecurity could be the right field for you. This program qualifies you for a variety of cybersecurity and IT roles,* including: Preparing You for Cybersecurity Jobs Designed for beginners with little to no technical background, as well as those with some prior knowledge, the NC State Cybersecurity Bootcamp provides you with the skills and experience that hiring departments look for in qualified cybersecurity personnel. If you are a gifted problem-solver, are good at puzzles, love figuring out how things work, or have a strong affinity for technology, cybersecurity could be the right field for you. This program qualifies you for a variety of cybersecurity and IT roles,* including: Preparing You for. Network security Engineer A network security engineer protects systems from cyber threats, including bugs, malware, and hacking attempts . The IT professional should be able to identify existing issues and build safeguards to avoid future threats. Testing and configuration of hardware and software systems is involved. Network and System Security Administrator A network and security administrator's main responsibility is to help secure an organization's computer network system . Your job responsibilities include updating security infrastructure and monitoring network for security concerns. Systems Security Manager Information systems security managers are IT professionals who establish policies and procedures to protect computer systems and networks. This includes selecting, installing and using security software, such as data encryption programs and firewalls. Systems Security Engineer Systems security engineering is a specialty engineering field strongly related to systems engineering. It applies scientific, engineering, and information ... Cyber Network Defender As a Cyber Network Defender, you'll carry out specialized computer network defense duties, including maintaining infrastructure, responding to crises, auditing, and managing. Vulnerability Assessment Analyst This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Cybersecurity Operations Specialist As a cyber systems operations specialist, your job is to help provide cyber intelligence to your employer. In this role, you may monitor an emerging threat, help protect a network, or implement new security measures. In any scenario, you work with a computer for extended periods. Network Security Technician The incumbent assists with analyzing and troubleshooting network traffic and performance issues, and reports or escalates issues to management as required . The Cybersecurity Technician helps maintain existing security related tools and systems and provides technical assistance to users and others in the College. Cybersecurity Crime Investigator A cybercrime investigator can be used to gather crucial evidence to help solve these crimes . While possessing and utilizing many of the same skills as a computer forensics investigator, the cybercrime investigator is more focused on and adept at investigating crimes that use the internet as the primary attack vector. Cybersecurity Analyst A cybersecurity analyst is a trained cyberprofessional who specializes in network and IT infrastructure security . The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks. Security Operations Center (SOC) Analyst A security operations center (SOC) analyst is a central role in modern security teams . SOC analysts are on the front line of cyber defense, detecting and responding to cyber attacks as they happen. IT Security Manager IT security managers (also known as cybersecurity managers) serve as an organization's experts on cybersecurity protection, detection, response, and recovery . The responsibilities of an IT security manager, however, can vary depending on the size of the organization. IT Support Engineer The IT Support Engineer is responsible for delivering application and technical support to end users . They are responsible for resolving support requests and service tickets. Another part of their job is to identify, diagnose and rectify any issues with computer hardware, software, services, and applications. Network Operations Center (NOC) Technician Network Operations Center (NOC) technicians oversee complex network components and are responsible for network management . They perform troubleshooting on a daily basis. The work of a NOC technician entails maintaining network, servers, and telecom equipment in an organization. Network and System Security Administrator A network and security administrator's main responsibility is to help secure an organization's computer network system . Your job responsibilities include updating security infrastructure and monitoring network for security concerns. Systems Security Manager Information systems security managers are IT professionals who establish policies and procedures to protect computer systems and networks . This includes selecting, installing and using security software, such as data encryption programs and firewalls. Systems Security Engineer Systems security engineering is a specialty engineering field strongly related to systems engineering . It applies scientific, engineering, and information assurance principles to deliver trustworthy systems that satisfy stakeholder requirements within their established risk tolerance. Cyber Network Defender As a Cyber Network Defender, you'll carry out specialized computer network defense duties, including maintaining infrastructure, responding to crises, auditing, and managing . Vulnerability Assessment Analyst Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Personnel performing this work role may unofficially or alternatively be called: Blue Team Technician. Red Team Technician. Computer Network Defense (CND) Auditor. | Cybersecurity Operations Specialist Network Security Technician The incumbent assists with analyzing and troubleshooting network traffic and performance issues, and reports or escalates issues to management as required . The Cybersecurity Technician helps maintain existing security related tools and systems and provides technical assistance to users and others in the College. Cybersecurity Crime Investigator A cybercrime investigator can be used to gather crucial evidence to help solve these crimes . While possessing and utilizing many of the same skills as a computer forensics investigator, the cybercrime investigator is more focused on and adept at investigating crimes that use the internet as the primary attack vector. Cybersecurity Analyst A cybersecurity analyst is a trained cyberprofessional who specializes in network and IT infrastructure security . The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks. Security Operations Center (SOC) Analyst A security operations center (SOC) analyst is a central role in modern security teams . SOC analysts are on the front line of cyber defense, detecting and responding to cyber attacks as they happen. IT Security Manager IT security managers (also known as cybersecurity managers) serve as an organization's experts on cybersecurity protection, detection, response, and recovery . The responsibilities of an IT security manager, however, can vary depending on the size of the organization. IT Support Engineer The IT Support Engineer is responsible for delivering application and technical support to end users . They are responsible for resolving support requests and service tickets. Another part of their job is to identify, diagnose and rectify any issues with computer hardware, software, services, and applications | Network Operations Center (NOC) Technician What is the difference in a course completion certificate and letter of merit? A course completion certificate is a document verifying you completed the course requirements. A letter of merit is a letter from Cisco CEO Chuck Robbins acknowledging your exceptional performance in the course. It is awarded to students and instructors who received a qualifying score on their first attempt of the final exam. Which courses have course completion certificates/letters of merit? Course completion certificates and letters of merit are available in the courses below: Letters of Merit CCNA CCNA Cybersecurity Operations CCNA Security CCNP CyberOps Associate DevNet Associate IT Essentials Network Security Course Completion Certificates CCNA Networking Essentials CCNA Cybersecurity Operations CCNA Security Emerging Technologies Get Connected Intro to Cybersecurity Packet Tracer Partner: NDG Linux Courses Community: Smart Grid Essentials IoT Hackathon (Instructors Only) Mobility Fundamentals (End of Life) CCNP Cybersecurity Essentials CyberOps Associate DevNet Associate Entrepreneurship IT Essentials Intro to IoT/ Intro to IoE IoT Fundamentals Partner: Programming Courses Academy Orientation (Instructors Only) Be Your Own Boss (End of Life) Network Security Is the course completion certificate the same as a Cisco certification? No, a Certificate of Completion is awarded to all students and instructors who satisfactorily complete a Cisco Networking Academy course. A Cisco certification is a globally-recognized validation of your skills; received by passing a certification exam at a testing center. Networking Academy courses prepare you for specific Cisco certifications. How can I locate information about my Cisco Career Certifications? The Cisco Career Certifications Tracking System is available at www.cisco.com/go/certifications/login. The Certification Tracking System is a secure database that provides a record of exam history and certification progress for Associates, Professionals, Cisco Qualified Specialists, Cisco Sales Experts, and Cisco Technical Experts. The Tracking System also allows users to request certification logos for certifications they have achieved.