Designed for beginners with little to no technical background, as well as those with some prior knowledge, the
NC State Cybersecurity Bootcamp provides you with the skills and experience that hiring departments look for
in qualified cybersecurity personnel. If you are a gifted problem-solver, are good at puzzles, love figuring out
how things work, or have a strong affinity for technology, cybersecurity could be the right field for you.
This program qualifies you for a variety of cybersecurity and IT roles,* including:
Preparing You for
Cybersecurity Jobs
Designed for beginners with little to no technical background, as well as those with some prior knowledge, the
NC State Cybersecurity Bootcamp provides you with the skills and experience that hiring departments look for
in qualified cybersecurity personnel. If you are a gifted problem-solver, are good at puzzles, love figuring out
how things work, or have a strong affinity for technology, cybersecurity could be the right field for you.
This program qualifies you for a variety of cybersecurity and IT roles,* including:
Preparing You for.
Network security Engineer
A network security engineer protects systems from cyber threats, including bugs, malware, and hacking attempts
. The IT professional should be able to identify existing issues and build safeguards to avoid future threats. Testing and configuration of hardware and software systems is involved.
Network and System Security Administrator
A network and security administrator's main responsibility is to help secure an organization's computer network system
. Your job responsibilities include updating security infrastructure and monitoring network for security concerns.
Systems Security Manager
Information systems security managers are IT professionals who establish policies and procedures to protect computer systems and networks. This includes selecting, installing and using security software, such as data encryption programs and firewalls.
Systems Security Engineer
Systems security engineering is a specialty engineering field strongly related to systems engineering. It applies scientific, engineering, and information ...
Cyber Network Defender
As a Cyber Network Defender, you'll carry out specialized computer network defense duties, including maintaining infrastructure, responding to crises, auditing, and managing.
Vulnerability Assessment Analyst
This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Cybersecurity Operations Specialist
As a cyber systems operations specialist, your job is to help provide cyber intelligence to your employer. In this role, you may monitor an emerging threat, help protect a network, or implement new security measures. In any scenario, you work with a computer for extended periods.
Network Security Technician
The incumbent
assists with analyzing and troubleshooting network traffic and performance issues, and reports or escalates issues to management as required
. The Cybersecurity Technician helps maintain existing security related tools and systems and provides technical assistance to users and others in the College.
Cybersecurity Crime Investigator
A cybercrime investigator
can be used to gather crucial evidence to help solve these crimes
. While possessing and utilizing many of the same skills as a computer forensics investigator, the cybercrime investigator is more focused on and adept at investigating crimes that use the internet as the primary attack vector.
Cybersecurity Analyst
A cybersecurity analyst is
a trained cyberprofessional who specializes in network and IT infrastructure security
. The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks.
Security Operations Center (SOC) Analyst
A security operations center (SOC) analyst is
a central role in modern security teams
. SOC analysts are on the front line of cyber defense, detecting and responding to cyber attacks as they happen.
IT Security Manager
IT security managers (also known as cybersecurity managers) serve as an organization's experts on cybersecurity protection, detection, response, and recovery
. The responsibilities of an IT security manager, however, can vary depending on the size of the organization.
IT Support Engineer
The IT Support Engineer is
responsible for delivering application and technical support to end users
. They are responsible for resolving support requests and service tickets. Another part of their job is to identify, diagnose and rectify any issues with computer hardware, software, services, and applications.
Network Operations Center (NOC) Technician
Network Operations Center (NOC) technicians
oversee complex network components and are responsible for network management
. They perform troubleshooting on a daily basis. The work of a NOC technician entails maintaining network, servers, and telecom equipment in an organization.
Network and System Security Administrator
A network and security administrator's main responsibility is to
help secure an organization's computer network system
. Your job responsibilities include updating security infrastructure and monitoring network for security concerns.
Systems Security Manager
Information systems security managers are
IT professionals who establish policies and procedures to protect computer systems and networks
. This includes selecting, installing and using security software, such as data encryption programs and firewalls.
Systems Security Engineer
Systems security engineering is
a specialty engineering field strongly related to systems engineering
. It applies scientific, engineering, and information assurance principles to deliver trustworthy systems that satisfy stakeholder requirements within their established risk tolerance.
Cyber Network Defender
As a Cyber Network Defender, you'll
carry out specialized computer network defense duties, including maintaining infrastructure, responding to crises, auditing, and managing
.
Vulnerability Assessment Analyst
Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Personnel performing this work role may unofficially or alternatively be called: Blue Team Technician. Red Team Technician. Computer Network Defense (CND) Auditor.
| Cybersecurity Operations Specialist
Network Security Technician
The incumbent
assists with analyzing and troubleshooting network traffic and performance issues, and reports or escalates issues to management as required
. The Cybersecurity Technician helps maintain existing security related tools and systems and provides technical assistance to users and others in the College.
Cybersecurity Crime Investigator
A cybercrime investigator can be used to gather crucial evidence to help solve these crimes
.
While possessing and utilizing many of the same skills as a computer
forensics investigator, the cybercrime investigator is more focused on
and adept at investigating crimes that use the internet as the primary
attack vector.
Cybersecurity Analyst
A cybersecurity analyst is a trained cyberprofessional who specializes in network and IT infrastructure security
.
The cybersecurity analyst thoroughly understands cyberattacks, malware,
and the behavior of cybercriminals, and actively seeks to anticipate
and prevent these attacks.
Security Operations Center (SOC) Analyst
A security operations center (SOC) analyst is a central role in modern security teams
. SOC analysts are on the front line of cyber defense, detecting and responding to cyber attacks as they happen.
IT Security Manager
IT security managers (also known as cybersecurity managers) serve as an organization's experts on cybersecurity protection, detection, response, and recovery
. The responsibilities of an IT security manager, however, can vary depending on the size of the organization.
IT Support Engineer
The IT Support Engineer is responsible for delivering application and technical support to end users
.
They are responsible for resolving support requests and service
tickets. Another part of their job is to identify, diagnose and rectify
any issues with computer hardware, software, services, and applications
| Network Operations Center (NOC) Technician
What is the difference in a course completion certificate and letter of merit?
A course completion certificate is a document verifying you completed the course requirements.
A letter of merit is a letter from Cisco CEO Chuck Robbins acknowledging your exceptional performance in the course. It is awarded to students and instructors who received a qualifying score on their first attempt of the final exam.
Which courses have course completion certificates/letters of merit?
Course completion certificates and letters of merit are available in the courses below:
Letters of Merit
CCNA
CCNA Cybersecurity Operations
CCNA Security
CCNP
CyberOps Associate
DevNet Associate
IT Essentials
Network Security
Course Completion Certificates
CCNA
Networking Essentials
CCNA Cybersecurity Operations
CCNA Security
Emerging Technologies
Get Connected
Intro to Cybersecurity
Packet Tracer
Partner: NDG Linux Courses
Community: Smart Grid Essentials
IoT Hackathon (Instructors Only)
Mobility Fundamentals (End of Life)
CCNP
Cybersecurity Essentials
CyberOps Associate
DevNet Associate
Entrepreneurship
IT Essentials
Intro to IoT/ Intro to IoE
IoT Fundamentals
Partner: Programming Courses
Academy Orientation (Instructors Only)
Be Your Own Boss (End of Life)
Network Security
Is the course completion certificate the same as a Cisco certification?
No, a Certificate of Completion is awarded to all students and instructors who satisfactorily complete a Cisco Networking Academy course. A Cisco certification is a globally-recognized validation of your skills; received by passing a certification exam at a testing center. Networking Academy courses prepare you for specific Cisco certifications.
How can I locate information about my Cisco Career Certifications?
The Cisco Career Certifications Tracking System is available at www.cisco.com/go/certifications/login. The Certification Tracking System is a secure database that provides a record of exam history and certification progress for Associates, Professionals, Cisco Qualified Specialists, Cisco Sales Experts, and Cisco Technical Experts. The Tracking System also allows users to request certification logos for certifications they have achieved.