denver va state catalog (rev 8.24.06) - leaderquest · web viewwhether you work or plan to work in...

266
6855 S. Havana Street, Suite 230 Englewood, CO 80112 Phone: 303-832-4665 Fax: 303-768-0513 7222 Commerce Center Dr., Suite 235 Colorado Springs, CO 80919 Phone: 719-596-4545 Fax: 719-559-3502 Catalog Number 1, Volume Number 24, Revised 6/1/2018 Approved and Regulated By the Colorado Department of Higher Education, Private Occupational School Board Certified true, correct in Content and Policy Bruce Stassen, VP of Operations/Controller and Student Administration Signature: Bruce Stassen 6/1/2018

Upload: others

Post on 15-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

6855 S. Havana Street, Suite 230Englewood, CO 80112Phone: 303-832-4665

Fax: 303-768-0513

7222 Commerce Center Dr., Suite 235Colorado Springs, CO 80919

Phone: 719-596-4545Fax: 719-559-3502

Catalog Number 1, Volume Number 24, Revised 6/1/2018

Approved and Regulated By the Colorado Department of Higher Education, Private Occupational School Board

Certified true, correct in Content and Policy

Bruce Stassen, VP of Operations/Controller and Student Administration

Signature: Bruce Stassen 6/1/2018

Page 2: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CONTENTSINTRODUCTION.........................................................................................4ADMINISTRATION STAFF...........................................................................4FACULTY..................................................................................................4PROGRAMS OFFERED................................................................................6SEMINARS OFFERED.................................................................................8TUITION AND FEES....................................................................................8CLASS SCHEDULE...................................................................................10

FULL TIME STUDENTS:..................................................................................................10PART-TIME STUDENTS:.................................................................................................10

ADMISSION REQUIREMENTS....................................................................10ENROLLMENT.........................................................................................11FACILITIES..............................................................................................11PLACEMENT ASSISTANCE........................................................................11ATTENDANCE REQUIREMENTS.................................................................11CERTIFICATION POLICY...........................................................................12GRADING SYSTEM/PROGRESS REPORTS...................................................12RE-ADMISSION POLICY............................................................................12GRADUATION POLICY..............................................................................12RESCHEDULE POLICY...........................................................................13CANCELLATION AND REFUND POLICY.......................................................13CONDUCT POLICY...................................................................................15STUDENT COMPLAINTS...........................................................................15EDUCATIONAL SERVICES.........................................................................15PREVIOUS CREDITS.................................................................................15DISMISSAL.............................................................................................15STUDENT GRIEVANCE PROCEDURE...........................................................16PROGRAMS............................................................................................17

COMPUTER USER SUPPORT SPECIALIST.........................................................................17NETWORK SUPPORT SPECIALIST.....................................................................................36CCNA......................................................................................................................53CYBERSECURITY SPECIALIST (CYBER)..............................................................61STPM – SENIOR TECHNOLOGY PROJECT MANAGER.............................................................74INSTALLING & CONFIGURING WINDOWS SERVER 2012.......................................................83MCSA WINDOWS 7 ASSOCIATE – DESKTOP SUPPORT SPECIALIST.........................................97MCSA WINDOWS 8 ASSOCIATE – DESKTOP SUPPORT SPECIALIST.......................................105MCSA SQL SERVER ADMINISTRATOR...........................................................................114

Page 3: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

MICROSOFT WEB DEVELOPMENT SPECIALIST (MWD).......................................................128TECHNICAL SUPPORT SPECIALIST (TSS)........................................................137INFORMATION SECURITY ANALYST (ISA).......................................................149

SEMINARS............................................................................................161COMPTIA A+ CERTIFICATION......................................................................................161CEH: CERTIFIED ETHICAL HACKER..................................................................168COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) ..............................173COMPTIA ADVANCED SECURITY PRACTITIONER (CASP)..............................177EC-COUNCIL CERTIFIED NETWORK DEFENDER (CND).................................181CISSP: CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL.....184EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)...................................188EC-COUNCIL DISASTER RECOVERY PROFESSIONAL (EDRP).......................191EC-COUNCIL CERTIFIED ENCRYPTION SPECIALIST (ECES).....................................193ITIL V3 FOUNDATIONS......................................................................................196CAPM/PMP- PROJECT MANAGEMENT PROFESSIONAL...................................199COMPTIA SECURITY +.......................................................................................203COMPTIA NETWORK +......................................................................................207COMPTIA SERVER +..........................................................................................21110975A: INTRODUCTION TO PROGRAMMING................................................21420480B: PROGRAMMING IN HTML 5 WITH JAVASCRIPT AND CSS3............218

3

Page 4: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

INTRODUCTIONLeaderQuest (hereinafter referred to as “The School”) offers job training programs that quickly close skill gaps and help individuals improve technical and management performance; producing rewarding careers and delivering an effective workforce for businesses across size and industry. The School provides world-class technology and equipment for student training. The School is staffed with Instructors who must meet minimum certification standard in their field of specialty. The School is an Authorized Training Partner for Microsoft, EC-Council and CompTIA. The owner of the School is George Cohlmia. The School is headquartered in Englewood, CO and as of this writing, offers classes on four campuses: Englewood, Colorado Springs, Jacksonville FL, and Irving TX. The School has the following history:

January 2001: School is approved by the Colorado Board of Higher Education Department of Private Educational Schools under the name of Hensmann Training and Education Centers.

February 2001: School opens its doors in Colorado Springs, CO and runs its first class.

March 2001: School opens its second campus in Englewood, Colorado. July 2006: School is sold to new ownership. The acquiring company is

LeaderQuest with one majority shareholder in George Cohlmia. School continues to operate as Hensmann Training and Education Centers through 2006 and into early 2007.

April 2007: School officially changes its name from Hensmann Training and Education Centers to LeaderQuest.

October 2014: Irving Dallas school is opened and approved by the Texas Workforce Commission

October 2015: Purchased Consultech Inc. in Jacksonville, FL and is approved by Florida Department of Education.

ADMINISTRATION STAFFKey Administrative Staff:

George Cohlmia - CEO & Owner Bruce Stassen – VP of Business Operations; VA Certifying Official Jerry Kukuchka – Chief Financial Officer Jennifer Strobl – Director of Training Operations Timothy Kalil – COO Bob Villareal – Campus Director – Irving Pete Lett- Campus Director –Colorado Springs Qwincy Houston – Campus Director – Englewood Robert Estes- Campus Director -Jacksonville Meghan Jurado – Certified Compliance Officer/Lead SCO Nathan Smith – Technology Manager James Gross- IT Instructor Manager Mary Walker- Accounting Taylor Grafton- Frontline Associate

4

Page 5: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Heidi Pelszynski- Frontline Associate Kenneth Tanner- Lead Instructor

FACULTY

Kenneth Tanner- Lead Technical Instructor

Kenneth is an engineering professional with many years of extensive hands-on experience in network, telecommunication and systems administration. He has designed, installed, configured, and maintained complex routed LAN and WAN networks that included voice, video and high security compliance.

Axelos Information Technology Infrastructure Library (ITILv3) Foundation Level

Cisco o Certified Network Professional (CCNP) Switch Examo Certified Network Associate (CCNA) Routing & Switchingo Certified Network Associate (CCNA) Securityo Certified Network Associate (CCNA) Voiceo Certified Design Associate (CCDA)

CompTIA Security+ EC Council Certified Ethical Hacker (CEHv9) (ISC)² Certified Information Systems Security Professional – CISSP

James Grimes - Technical Instructor

James has been working in the information technology field since 2002 having worked with a number of marquee companies including Walmart, EDS, BMC, and Dell. James is a US Army veteran and brings a broad base of IT field knowledge into his classroom, and has proven a unique ability to demystify complex technical concepts to students across all skill levels. James possesses a wide array of technology certifications including:

CompTIA A+ CompTIA Network+ CompTIA Security+ ITIL V3 Foundations

James Gross – Technical Instructor

Ever since childhood, James has been fascinated by technology. Years later, in high school, James learned how to program in BASIC and how to use the Apple IIe computer for math class. Now, with over 18 years of experience with computers and networks, James has a deep understanding, and fascination in the exceptional things that can be accomplished by IT. James’s journey into the IT arena started in 1996, when he had to learn the CompTIA six-step troubleshooting process to isolate a problem in his deal AMD 386DX-40 computer. After guessing that it was the I/O board and after purchasing the board and installing it, James’s computer sprang to life; and he was hooked on IT!After an illustrious career in the US Air Force starting in 1991, James retired as a Program Analyst from the 81st Training Wing and joined Level 3 Communication as a

5

Page 6: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Senior Operations Technician. Along the way, James earned a wide array of highly coveted IT certification including:

CompTIA A+ CompTIA Network+ CompTIA Security+ Certificate in Homeland Security - Level I MTA: Windows OS Fundamentals Web Foundations Associate Web Design Specialist MTA: Windows Operating System Fundamentals CompTIA Server+ ITIL Foundations

Marcia Ingino – Adjunct Instructor

Marcia has been teaching project management and business analysis for over 16 years where she’s maintained an aggregate evaluation score of 9.2 of 10.0. Marcia possesses a BS in Computer Engineering from University of Illinois and an MS in Engineering Management from University of Colorado. Marcia’s credentials include:

Certified Business Analysis Professional (CBAP) Master’s Certificate in Project Management Project Manager Professional (PMP) Certification

Jacob Miller- Technical Instructor

Jacob has extensive desktop support experience, as well as a background in critical thinking in management.  He has experience working hands-on with real world experience in several areas of IT.

PROGRAMS OFFERED

Program Title / Certificate

Course Number

Course Title Contact Hours (Hrs)

Program Completion Length* (Days)

Infrastructure and Tech SupportComputer User Support Specialist (CUSS)

220-901 A+ Essentials 40 25220-902 A+ Practical

Applications40

CompTIA A+ Cert. CompTIA Network+ Cert. CompTIA Security+ Cert. CompTIA Project+ Cert. CompTIA Linux+ Cert. CCENT Cert. CCNA Cert. IINS Cert.

6

Page 7: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

N10-007 Network+ 40SY0-501 Security+ 40ITIL-FND ITIL v3 Foundations 40

CCNA- (CCNA)ICND1 Interconnecting Cisco

Networking Devices 1 4010

ICND2 Interconnecting Cisco Networking Devices 2 40

Network Support Specialist (NSS)

N10-007 Network+ 40

20SY0-501 Security+ 40ICND1 Interconnecting Cisco

Networking Devices 1 40

ICND2 Interconnecting Cisco Networking Devices 2 40

Technical Support Specialist (TSS)

ITIL-FND ITIL v3 Foundations 40

15220-901 A+ Essentials 40

220-902 A+ Practical Applications

40

MCSA Windows 7(DSS)

6292 Installing & Configuring Windows 7 Client 40

106293 Troubleshooting & Supporting Windows 7 in the Enterprise

40

MCSA Windows 8 (DSS)

20687 Configuring Windows 8 401020688 Maintaining and

Managing Windows 8 40

Installing & Configuring Windows Server 2012 (SA)

20410 Installing and Configuring Windows Server® 2012

4015

20411 Administering Windows Server® 2012

40

20412 Configuring Advanced Windows Server® 2012 Services

40

Information Security

Cybersecurity Specialist (CYBER)

SY0-501 CompTIA Security + 40

15312-50 Professional Ethical

Hacker40

312-49 Computer Hacking Forensics Investigator 40

7

Page 8: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

SY0-501 Security + 40Information Security Analyst-(ISA)

CND Certified Network Defender 40

15

312-50 Certified Ethical Hacker 40Database Administration

MCSA SQL Server Administrator - SQL

20461 Querying a Microsoft SQL Server 40

1520462 Administering

Microsoft SQL Server Database

40

20463 Implementing a Data Warehouse with SQL Server

40

Project and Service Management

Senior Tech Project Manager (STPM)

ITIL-FND ITIL v3 Foundations 4010

PMP-EP PMP Preparations 40Web Development

Microsoft Web Development Specialist (MWD)

10975 Introduction to Programming 40

1020480 Programming in HTML5, CSS3 and JavaScript

40

*Program Completion Length does not include self-study prep time based on industry standard of 1 day of self-study prep for each day of course lecture.

SEMINARS OFFEREDSeminar Title Seminar

NumberContact Hours (Hrs)

CompTIA A+ 901/902 80Certified Professional Ethical Hacker CPEH 40Computer Hacker Forensic Investigator CHFI 40Certified Network Defender CND 40CompTIA Advanced Security Practitioner CASP 40Certified Information Systems Security Professional

CISSP 40

EC Council Certified Security Analyst ECSA 40EC-Council Disaster Recovery Professional EDRP 40EC-Council Certified Encryption Specialist ECES 24

8

Page 9: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

ITIL v3 Foundations ITIL-FND 40Project Management Specialist PMP 40Network+ N10-007 40Security+ SY0-501 40Server+ SK0-004 4010975 Introduction to Programming LQ-975 4020480 Programming in HTML5, CSS3, and Javascript

LQ-480 40

TUITION AND FEES

Base Tuition Materials Total Tuition Fee Registration FeeCUSS - Computer User Support Specialist – 200 hours

$12,334 $441 $12,775 $0CCNA – 80 hours

$6,252 $338 $6,590 $0NSS - Network Support Specialist - 160 hours

$11,402 $578 $11,980 $0CYBER – Cybersecurity Specialist – 120 hours

$9,006 $1,079 $10,085 $0STPM - Senior Technology Project Manager – 80 hours

$5,099 $191 $5,290 $0SA – Installing & Configuring Windows Server 2012 – 120 hours

$8,121 $864 $8,985 $0DSS – Desktop Support Specialist - MCSA Windows 7 – 80 hours

$5,444 $546 $5,990 $0DSS – Desktop Support Specialists - MCSA Windows 8 – 80 hours

$5,444 $546 $5,990 $0SQL- MCSA SQL Server Administrator – 120 hours

$8,121 $864 $8,985 $0TSS – Technical Support Specialist – 120 hours

$7,184 $201 $7,385 $0ISA – Information Security Analyst – 120 hours

9

Page 10: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

$9,074 $1,011 $10,085 $0CompTIA A+ Certification – 80 hours

$5,241 $149 $5,390 $0CompTIA Network+ Certification – 40 hours

$2,575 $120 $2,695 $0CompTIA Security+ Certification – 40 hours

$2,575 $120 $2,695 $0CompTIA Server + Certification – 40 hours

$2,575 $120 $2,695 $0CEH – Certified Ethical Hacker - 40 hours

$3,183 $512 $3,695 $0CHFI- Computer Hacking Forensic Investigator- 40 hours

$3,218 $477 $3,695 $0CND- Certified Network Defender – 40 hours

$3,316 $379 $3,695 $0CASP- CompTIA Advanced Security Practitioner- 40 hours

$3,3170 $325 $3,495 $0CISSP – Certified Information Systems Security Professional - 40 hours

$3,303 $92 $3,395 $0ECSA- EC-Council Certified Security Administrator- 40

$3,195 $500 $3,695 $0EDRP- EC- Council Disaster Recovery Professional- 40 hours

$3,045 $650 $3695 $0ECES- EC-Council Certified Encrypted Specialist- 24 hours

$2,045 $500 $2,545 $0ITIL-FND ITIL v3 Foundations – 40 hours

$1,943 $52 $1,995 $0PMP- Project Management Specialist – 40

$3,116 $179 $3,295 $0

CLASS SCHEDULEAll courses are determined by Vendor standards. Not all programs have been submitted for GI Bill benefits.

10

Page 11: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

FULL TIME STUDENTS:Monday through Friday 8:00am – 5:00 pm with one-hour lunch break

PART-TIME STUDENTS:Monday through Friday 6:00pm – 10:00pm. Some Saturdays allowed for make-up 8:00am – 4:30pm with one-half hour lunch break. When an unexpected closure occurs due to extraordinary conditions such as inclement weather, students will be notified as soon as possible by phone and/or radio, and/or TV who provide closure information as a public service. Classes are not held on the following holidays:

New Year’s Eve Labor DayNew Year’s Day Thanksgiving Day & the Friday followingMemorial Day Christmas EveIndependence Day Christmas Day

ADMISSION REQUIREMENTSThe school does not discriminate based on race, sex, religion, ethnic origin, or disability.Prospective students must have a high school diploma or equivalency diploma with the willingness to learn; and a working knowledge of computers would be greatly appreciated. We also screen our students to make sure they will be successful with our program. In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.

ENROLLMENTProspective students may enroll anytime. Late enrollments will be only one week prior to class start time and as late as one day into first class, depending on the program and the student has adequate experience.LeaderQuest is authorized and approved to accept all VA benefits programs.

FACILITIESThe LeaderQuest main corporate office is located in Denver at 6855 S. Havana St, Englewood CO 80112. LeaderQuest also operates a second training facility in Colorado Springs at 7222 Commerce Center Dr, Colorado Springs 80919, a third campus in Dallas TX at 102 Decker Court, Ste 250, Irving, TX 75062, and a fourth located in Jacksonville FL at 8663 Baypine Rd Bldg 4 Suite 104, Jacksonville FL 32256. Hours of operation are from 8 am to 5 pm. All classrooms are furnished with the latest state-of-the-art equipment and furniture. A Resource Center, Study Center and Career Services Center are available to students. LeaderQuest is a smoke-free environment. For those that smoke, designated smoking areas are located outside our training facilities.

PLACEMENT ASSISTANCE

11

Page 12: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

LeaderQuest offers job lead referrals as they are sent to us from employers. However, we make no guarantee, express or imply of future employment. Current law prohibits any school from guaranteeing job placement as an inducement to enroll students.

ATTENDANCE REQUIREMENTSStudents are expected to arrive on time for classes with the proper materials and attitude. An overall attendance rate of at least 80% is required. Instructors take attendance on a daily basis through an attendance log that is submitted to student services by 11:00AM each day and added to the student’s file. On that attendance log, instructors mark whether the student was tardy, absent, or partial. Instructors may request students to withdraw from a course or program if excessive absences of over 70% or tardiness lead to unsatisfactory progress. Students who fall behind the 80% attendance rate or the 80% lab participation rate will be put on academic probation by student services and if they fall under 70% will automatically be dropped from the program. If students using VA benefits exceeds 70% total absences per period will be terminated from their VA Benefits for unsatisfactory attendance. All students will be given one additional training period after they are put on probation to meet requirement or will be terminated at that time. In order to show that the cause of unsatisfactory attendance has been removed, students must show good attendance (as defined) for one period after being terminated for unsatisfactory attendance. After such time, the student may be recertified for VA education benefits. Students who are unable to continue classes for medical reasons or severe personal problems will be required to take a leave of absence until that are able to return to class. Proper documentation will be required to substantiate a student’s withdrawal. We also offer an audit policy: Students can come and refresh any class on a space availability basis.

CERTIFICATION POLICYAs part of our commitment to student success, unless otherwise noted, LeaderQuest covers the cost of one certification attempt per class for students that meet the preparation guidelines. Upon completion of study time, one certification attempt per completed class outlined on the registration paperwork will be covered to enable the student to complete their education. Students are eligible to schedule a certification attempt appointment after completing each class in their program. The following policy statements outline conditions and requirements associated with certification:

It is highly recommended that any certification prep, labs, study guides and materials included in the program are completed before attempting certification. It is the Student’s responsibility, and to their advantage, to utilize resources both included in the program and outside of the program to ensure their readiness. For every hour of class time we expect a student to study an additional 2 to 3 hours on their own to be able to pass the vendor certification.Students are encouraged to take all certifications at the LeaderQuest facility on campus. Students must complete 80% of class before they can request their certification appointment be covered by contacting: [email protected].

12

Page 13: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Students are limited to only one attempt per class. In the event a student fails an attempt, they will have three options:

1. Exchange one of the other course attempts included in a program 2. Pay out of pocket 3. Elect not to retake and move on to the other courses in the program

Once registered at our center, LeaderQuest requires a minimum of 48 hours in advance for reschedule or the appointment may be void. Missed appointments cannot be recovered and eligibility to take that attempt will be lost.Certification attempts are required to be taken within 6 months from the last day of a completed class at the campus facility in order to complete training. Requests for certification attempts outside of this window are granted at LeaderQuest’s discretion.

GRADING SYSTEM/PROGRESS REPORTSOur grading system is pass/fail as required by vendor certification. Student must be present in 80% of classes and must participate in 80% of course labs or else they will be put on academic probation. If the student falls below the 70% attendance and/or lab completion the student will be evaluated on course content and asked to re-sit the course at a later date if needed. All students will be given one additional training period after they are put on probation to meet requirement or will be terminated at that time. Students receive certificates of completion at the end of each course if the above requirements are met. All students have the option of refreshing classes for the lifetime of the course version while it is being offered at no additional cost. All students will have a Progress report completed by their Instructor at the end of every course.

RE-ADMISSION POLICYThe school may allow a student whose enrollment was terminated for unsatisfactory progress to reenroll after a minimum of one probationary progress evaluation period. Such reenrollment does not circumvent the approved refund policy.

GRADUATION POLICYTo graduate and receive a Certificate of Completion, students must be present in 80% of classes and must participate and successfully complete 80% of course labs.

RESCHEDULE POLICYLeaderQuest is committed to keeping class sizes small in order to facilitate a high quality learning environment for our Students.  Many classes are full at 14-18 Students; because of this we have to minimize reschedules as much as possible Taking into account any unforeseen circumstances that may occur, LeaderQuest’s Reschedule Policy allows any student to reschedule their classes within their Program a maximum amount of 2 times total with no penalty or charge.  Beyond two reschedules, LeaderQuest Students will be dropped from their program and provided a refund for the remaining classes per the cancellation policy below. 

CANCELLATION AND REFUND POLICY

13

Page 14: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Postponement of starting date, whether at the request of the school or the student, requires a written agreement signed by the student and the school. The agreement must set forth:

a.) Whether the postponement is for the convenience of the school or student, and;

b.) A deadline for the new start date, beyond which the start date will not be postponed.

If the course is not commenced, or the student fails to attend by the new start date set forth in the agreement, the student will be entitled to an appropriate refund or prepaid tuition and fees within 30 days of the deadline of the new start date set forth in the agreement, determined in accordance with the school’s refund policy and all applicable laws and rules concerning the Private Occupational Education Act of 1981. Students not accepted by the school and students who cancel this contract by notifying the school within (3) business days are entitled to a full refund of all tuition and fees paid. Students who withdraw after (3) business days, but before commencement of classes, are entitled to a full refund of all tuition and fees paid except the cancellation fee of $150. Any credits for previous training shall not impact the refund. In the case of students withdrawing after commencement of classes, the Student’s refund will be based off of Tuition and Fee’s (stated on Registration form) which is based on the percentage of contact hours attended as described in the table below less a cancellation fee. Students Tuition and Fees consist of all the Students cost for books, lab material, hand-outs, that is needed for any program. The refund is based and determined by the date of a written cancellation notice that is given to LeaderQuest Holdings Inc. All refund will be refunded with 30 days once determination of refund has been agreed upon by both parties. REFUND TABLE

STUDENT IS ENTITLED TO UPON WITHDRAWAL/TERMINATION

IS ENTITLED TO A REFUND OF:

Within first 10% of program 90% less cancellation feeAfter 10% but within first 25% of program

75% less cancellation fee

After 25% but within first 50% of program

50% less cancellation fee

After 50% but within first 75% of program

25% less cancellation fee

After 75% No Refund(Less cancellation fee)

VETERANS REFUND POLICYVeterans not accepted by the school and who cancel this contract by notifying the school within 3 business days is entitled to a full refund of all tuition and fees paid. Veterans, who withdraw after three business days, but before commencement of classes, are entitled to a full refund of all tuition and fees paid. In the case of veterans withdrawing after commencement of classes, the school will retain a percentage of tuition and fees, which is based on the percentage of contact hours attended, as

14

Page 15: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

described in the table below. The refund is based on the last date of recorded attendance.

STUDENT IS ENTITLED TO UPON WITHDRAWAL/TERMINATION

IS ENTITLED TO A REFUND OF:

Within first 10% of program 90% less cancellation feeWithin 20% of program 80% less cancellation feeWithin 30% of program 70% less cancellation feeWithin 40% of program 60% less cancellation feeWithin 50% of program 50% less cancellation feeWithin 60% of program 40% less cancellation feeWithin 70% of program 30% less cancellation feeWithin 80% of program 20% less cancellation feeWithin 90% of program 10% less cancellation fee

ALL STUDENTS1. The student may cancel this contract at any time prior to midnight of

the third business day after signing this contract.

2. The official date of termination for refund purposes is the last date of recorded attendance. All refunds will be made within 30 days from the date of termination.

3. The student will receive a full refund of tuition and fees paid if the school discontinues a course program within a period of time a student could have reasonably completed it, except that this provision shall not apply in the event the school ceases operation.

4. Attempting to resolve any issue with the School first is strongly encouraged. Student complaints may be brought to the attention of the Division of Private Occupational Schools online at http://highered.colorado.gov/dpos or 303-862-3001. There is a two-year statute of limitations for the Division to take action on a student complaint (from student’s last date of attendance).

5. The policy for granting credit shall not impact the refund policy.

REFUND POLICY FOR STUDENTS CALLED TO ACTIVE MILITARY SERVICE. A student of the school or college who withdraws from the school or college as a result of the student being called to active duty in a military service of the United States or the National Guard may elect one of the following options for each program in which the student is enrolled:

15

Page 16: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

(a) if tuition and fees are collected in advance of the withdrawal, a pro rata refund of any tuition, fees, or other charges paid by the student for the program and a cancellation of any unpaid tuition, fees, or other charges owed by the student for the portion of the program the student does not complete following withdrawal;

(b) a grade of incomplete with the designation "withdrawn-military" for the courses in the program, other than courses for which the student has previously received a grade on the student's transcript, and the right to re-enroll in the program, or a substantially equivalent program if that program is no longer available, not later than the first anniversary of the date the student is discharged from active military duty without payment of additional tuition, fees, or other charges for the program other than any previously unpaid balance of the original tuition, fees, and charges for books for the program; or

(c) assignment of an appropriate final grade or credit for the courses in the program, but only if the instructor or instructors of the program determine that the student has:(1) satisfactorily completed at least 90 percent of the required

coursework for the program; and(2) demonstrated sufficient mastery of the program material to

receive credit for completing the program.

CONDUCT POLICYStudents are expected to act in an adult manner. Possessions of weapons, illegal drugs, and alcohol of any kind are not allowed at any time. The school does not tolerate sexual harassment. Any violation of school policies may result in permanent dismissal from school.

STUDENT COMPLAINTSAttempting to resolve any issue with the School first is strongly encouraged. Student complaints may be brought to the attention of the Division of Private Occupational Schools online at http://highered.colorado.gov/dpos or 303-862-3001. There is a two-year statute of limitations for the Division to take action on a student complaint (from student’s last date of attendance).

EDUCATIONAL SERVICESLeaderQuest’s primary educational format is traditional classroom instruction with online content as an adjunct learning resource. When the student’s schedule or personal circumstance prevents them from participating physically, LeaderQuest does provide online training as an alternate method of training if approved by funding source. Each LeaderQuest training facility offers students a break room and a study area for their convenience.

PREVIOUS CREDITSCredit for previous education will be evaluated and when appropriate, credit will be granted and the program shortened accordingly. LeaderQuest does not guarantee the

16

Page 17: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

transferability of its credits to any other institution unless there is written agreement with another institution.

DISMISSALAny student may be dismissed for violations of rules and regulations of the school, as set forth in the schools’ publications. A student also may be withdrawn from classes if he or she does not prepare sufficiently, neglects assignments, or makes unsatisfactory progress. The director, after consultation with all parties involved, makes the final decision.

STUDENT GRIEVANCE PROCEDUREAttempting to resolve any issue with the School first is strongly encouraged. Student complaints may be brought to the attention of the Division of Private Occupational Schools online at http://highered.colorado.gov/dpos or 303-862-3001. There is a two-year statute of limitations for the Division to take action on a student complaint (from student’s last date of attendance).

All student records are kept secure in a locked room and are only assessable to LeaderQuest employees. All student can request a copy of their records by submitting

an email to [email protected] AD REGULATED BY THE COLORADO DEPARTMENT OF HIGHER EDUCATION,

PRIVATE OCCUMPATIONAL SCHOOL BOARD.

17

Page 18: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAMSCOMPUTER USER SUPPORT SPECIALIST

PROGRAM DESCRIPTIONThis program is designed to help individuals get jobs in the technical support and service field as end user support specialists. This program develops the skills required to perform the following job functions:

Install, configure, upgrade, and maintain PC workstations, focusing on the Windows Operating System.

Resolve PC, OS, and network connectivity issues and implement security practices.

Manage, maintain, troubleshoot, basic network infrastructure, describe networking technologies, basic design principles, and adhere to wiring standards.

Perform compliance and operational security tasks Anticipate, identify and prevent threats and vulnerabilities Manage application, data and host security Perform access control and identity management functions Understand basic Cryptography concepts Install, configure, upgrade, maintain, and troubleshoot servers. Examine server hardware and software, disaster recovery strategies. Perform installation, troubleshooting, and management functions in the

Windows Client operating system environment. Troubleshoot security system issues, such as Encrypting File Systems (EFS)

BitLocker Drive Encryption, and file permissions. The program also introduces the principles and core elements of IT service

management (ITSM) based on ITIL framework

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

220-901 A+ Essentials 20/20/0/40220-902 A+ Practical Applications 20/20/0/40N10-007 Network+ 20/20/0/40SY0-501 Security+ 20/20/0/40ITIL-FND ITIL v3 Foundations 20/20/0/40

18

Page 19: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The approximate time required to complete this program is 25 days for day students and 50 nights for evening students.

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for 25 days. Classes for evening students will be held on Monday through Friday 6:00pm to 10:00pm. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $12,334Materials: $441Total Tuition Fee: $12,775

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

220-901 A+ Essentials $2,695220-902 A+ Practical Applications $2,695N10-007 Network+ $2,695SY0-501 Security+ $2,695ITIL-FND ITIL v3 Foundations $1,995

CERTIFICATIONS REQUIRED 220-901 for CompTIA A+ Essentials 220-902 for CompTIA A+ Practical Application N10-007 for CompTIA Network+ SY0-501 for CompTIA Security+ ITIL v3 Foundations

TARGETED JOB ROLES End User Support Specialist Service Technician Technical Support Specialist Help Desk Specialist Desktop Support Specialist Security Administrator

19

Page 20: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

SUBJECT DESCRIPTIONS AND SYLLABI

COMPTIA A+ 901 ESSENTIALS

PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, troubleshoot, upgrade, and perform preventive maintenance on PCs and mobile device hardware.The CompTIA A+ (220-901) course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician. In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the hardware components of personal computers and mobile digital devices.

Identify networking and security fundamentals. Install, configure, and troubleshoot display devices. Install and configure peripheral components. Manage system components. Manage data storage. Identify the hardware and software requirements for client environment

configurations. Identify network technologies. Install and configure networking capabilities. Support mobile digital devices. Support printers and multifunction devices.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate)

20

Page 21: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $2,546Materials: $149Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

A+ 901 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCompTIA A+ (220-901) 093015SC (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA A+ 901

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

21

Page 22: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Hardware Fundamentals

Personal Computer Components Storage Devices Mobile Digital Devices Connection Interfaces

Lesson 2: Networking Fundamentals

Network Types Network Components

Lesson 3: Supporting Display Devices

Install Display Devices Configure Display Devices Troubleshoot Video and Display Devices

Lesson 4: Installing and Configuring Peripheral Components

Install and Configure Input Devices Install and Configure Output Devices Install and Configure Input/Output Devices Install and Configure Expansion Cards

Lesson 5: Managing System Components

Identify Motherboard Components and Features Install and Configure CPUs and Cooling Systems Install Power Supplies Troubleshoot System Components

Lesson 6: Managing Data Storage

Identify RAM Types and Features Troubleshoot RAM Issues Install and Configure Storage Devices Configure the System Firmware Troubleshoot Hard Drives and RAID Arrays

Lesson 7: Customized Client Environments

Types of Common Business Clients Custom Client Environments

22

Page 23: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 8: Networking Technologies

TCP/IP Properties and Characteristics TCP/IP Internet Connections Ports and Protocols Networking Tools

Lesson 9: Installing and Configuring Networking Capabilities

Configure Network Perimeters Install and Configure SOHO Networks Troubleshoot Wired and Wireless Networks

Lesson 10: Supporting Mobile Digital Devices

Install and Configure Exterior Laptop Components Install and Configure Interior Laptop Components Other Mobile Devices Mobile Device Accessories and Ports Troubleshoot Mobile Device Hardware

Lesson 11: Supporting Printers and Multifunction Devices

Printer and Multifunction Technologies Install and Configure Printers Maintain Printers Troubleshoot Printers

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA A+ 902 PRACTICAL APPLICATIONS

PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) software and operating systems to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, upgrade, secure, and perform preventive maintenance on PC and digital device operating systems.In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

PERFORMANCE OBJECTIVESStudents will learn:

23

Page 24: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Identify the basic components and functions of operating systems. Identify networking and security fundamentals. Identify the operational procedures that should be followed by professional PC

technicians. Install and configure Microsoft Windows. Optimize and maintain Microsoft Windows. Work with other operating systems. Identify network technologies. Configure networking capabilities. Support mobile digital devices. Identify security threats, vulnerabilities, and controls. Implement security controls. Troubleshoot system-wide issues.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $2,546Materials: $149Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURS

24

Page 25: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Seminar Number Seminar Title Contact Hours

A+ 902 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCompTIA A+ (220-902)093016SE (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA A+ Exam 902

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Operating System Fundamentals

PC and Mobile Operating Systems PC Operating System Tools and Utilities

Lesson 2: Networking and Security Fundamentals

Common Network Services Cloud Concepts Security Fundamentals

Lesson 3: Safety and Operational Procedures

Basic Maintenance Tools and Techniques Personal and Electrical Safety Environmental Safety and Materials Handling

25

Page 26: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Professionalism and Communication Organizational Policies and Procedures Troubleshooting Theory

Lesson 4: Installing and Configuring Microsoft Windows

 Implement Client-Side Virtualization Install Microsoft Windows Use Microsoft Windows Configure Microsoft Windows Upgrade Microsoft Windows

Lesson 5: Optimizing and Maintaining Microsoft Windows

Optimize Microsoft Windows Back Up and Restore System Data Perform Disk Maintenance Update Software

Lesson 6: Working With Other Operating Systems

The OS X Operating System The Linux Operating System

Lesson 7: Networking Technologies

TCP/IP Internet Connections

Lesson 8: Configuring Networking Capabilities

Configure Basic Windows Networking Configure Windows Proxy and Firewall Settings Using Windows Networking Features

Lesson 9: Supporting Mobile Digital Devices

Mobile Device Accessories and Ports Mobile Device Connectivity Mobile Device Synchronization

Lesson 10: Security Threats, Vulnerabilities, and Controls

Common Security Threats and Vulnerabilities General Security Controls Mobile Security Controls Data Destruction and Disposal Methods

Lesson 11: Implementing Security Controls

Secure Operating Systems Secure Workstations Secure SOHO Networks Secure Mobile Devices

26

Page 27: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 12: Troubleshooting System-Wide Issues

Troubleshoot PC Operating Systems Troubleshoot Mobile Device Operating Systems and Applications Troubleshoot Common Security Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA NETWORK +

PROGRAM DESCRIPTIONThe CompTIA® Network+® course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. If you are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification. Also, if your job duties include network troubleshooting, installation, or maintenance, or if you are preparing for any type of network-related career, it provides the background knowledge and skills you will require to be successful.

PERFORMANCE OBJECTIVESStudents will learn:

Identify basic network theory concepts and major network communications methods.

Describe bounded network media. Identify unbounded network media. Identify the major types of network implementations. Identify TCP/IP addressing and data delivery methods. Implement routing technologies. Identify the major services deployed on TCP/IP networks. Identify the infrastructure of a WAN implementation. Identify the components used in cloud computing and virtualization. Describe basic concepts related to network security. Prevent security breaches. Respond to security incidents. Identify the components of a remote network implementation. Identify the tools, methods, and techniques used in managing a network. Describe troubleshooting of issues on a network.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTS

27

Page 28: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Professional Helpdesk or Computer Support Experience CompTIA A+ Certification is helpful but not required

TUITION AND FEESRegistration: $0Base Tuition: $2,575Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

N10-007 CompTIA Network + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical Operations

CompTIA Network +

093029 Print and Digital Courseware

CERTIFICATION REQUIRED N10-007

28

Page 29: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

INSTRUCTIONAL METHODS Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Network Theory

Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods

Lesson 2: Bounded Network Media

Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control

Lesson 3: Unbounded Network Media

Wireless Networking Wireless Network Devices and Components Install a Wireless Network

Lesson 4: Network Implementations

Physical Network Topologies Logical Network Topologies Ethernet Networks Network Devices VLANs

Lesson 5: TCP/IP Addressing and Data Delivery

The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques

29

Page 30: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 6: Routing

Enable Static Routing Implement Dynamic IP Routing

Lesson 7: TCP/IP Services

Assign IP Addresses Domain Naming Services TCP/IP Commands Common TCP/IP Protocols

Lesson 8: WAN Infrastructure

WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies

Lesson 9: Cloud and Virtualization Technologies

Virtualization SAN Implementations Cloud Computing

Lesson 10: Network Security Basics

Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods

Lesson 11: Preventing Security Breaches

Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention Educate Users

Lesson 12: Responding to Security Incidents

Incident Management and Response Basic Forensic Concepts

Lesson 13: Remote Networking

Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols

Lesson 14: Network Management

30

Page 31: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Network Monitoring Configuration Management Documentation Network Performance Optimization

Lesson 15: Troubleshooting Network Issues

Network Troubleshooting Models Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Troubleshoot Security Configuration Issues Troubleshoot Security Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA SECURITY +

PROGRAM DESCRIPTIONCompTIA® Security+® (SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (SY0-501) certification, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.

31

Page 32: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TARGETED JOB ROLES IT Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended

TUITION AND FEES

Registration: $0Tuition: $2,575Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for night students.

REQUIRED TEXTBOOKLogical Operations093022S (Rev 1.1) Print and Digital Courseware

32

Page 33: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CERTIFICATION REQUIRED CompTIA Security + SY0-501

INSTRUCTIONAL METHODS Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Identifying Security Fundamentals

Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts

 Lesson 2: Analyzing Risk

Analyze Organizational Risk Analyze the Business Impact of Risk

 Lesson 3: Identifying Security Threats

Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats

 Lesson 4: Conducting Security Assessments

Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing

Lesson 5: Implementing Host and Software Security

Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security

33

Page 34: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Incorporate Security in the Software Development Lifecycle Lesson 6: Implementing Network Security

Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic

Lesson 7: Managing Identity and Access

Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts

 Lesson 8: Implementing Cryptography

Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates

 Lesson 9: Implementing Operational Security

Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls

 Lesson 10: Addressing Security Incidents

Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents

Lesson 11: Ensuring Business Continuity

Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan 

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

34

Page 35: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

ITIL V3 FOUNDATIONS

PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT INFRASTRUCTURE LIBRARY (ITIL®) FOUNDATION CERTIFICATION (2011 LIFECYCLE EDITION) course is the first step in your preparation. The course will prepare you for the ITIL Foundation certification, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.

Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation certification, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.

PERFORMANCE OBJECTIVESStudents will learn:

Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service

Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.

TARGETED JOB ROLES IT Professionals with an interest in Service Management

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

35

Page 36: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEESRegistration: $0Base Tuition: $1,943Materials: $52Total Tuition Fee: $1,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKIT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition) 093030SC (Rev 2.0) Print and Digital Courseware

CERTIFICATION REQUIRED ITL-FND

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to ITIL

36

Page 37: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

ITIL Basics The Service Lifecycle

Lesson 2: Service Strategy

Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process

Lesson 3: Service Design

Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process

Lesson 4: Service Transition

Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process

Lesson 5: Service Operation

Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process

Lesson 6: Service Operation Functions

The Service Desk Function The Technical Management Function The IT Operations Management Function The Application Management Function

Lesson 7: Continual Service Improvement

Basic Concepts of Continual Service Improvement CSI Principles

37

Page 38: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

NETWORK SUPPORT SPECIALIST

PROGRAM DESCRIPTIONNetwork Support Specialist is a certification program for entry-level network engineers that helps maximize investment in foundational networking knowledge and increase the value of an employer's network. Network Support Specialist is for Network Specialists, Network Administrators, and Network Support Engineers with 1-3 years of experience. The CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

N10-007 CompTIA Network+ 20/20/0/40SY0-501 CompTIA Security+ 20/20/0/40

ICND1 V2.0 Interconnecting Cisco Networking Devices Part 1 20/20/0/40

ICND2 V2.0 Interconnecting Cisco Networking Devices Part 2 20/20/0/40

The approximate time required to complete this program is twetny days for day students and forty nights for evening students.

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for approximately four weeks. Classes for evening students will be held Monday through Friday 6:00pm to 10:00pm. Night classes run for approximately eight weeks. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

38

Page 39: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEESRegistration: $0Base Tuition: $11,300Materials: $678Total Tuition Fee: $11,980

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

N10-007 CompTIA Network+ $2,695SY0-501 CompTIA Security+ $2,695

ICND1 V2.0 Interconnecting Cisco Networking Devices Part 1 $3,295

ICND2 V2.0 Interconnecting Cisco Networking Devices Part 2 $3,295

CERTIFICATIONS REQUIRED CompTIA Network+ CompTIA Security+ CCENT CCNA Routing & Switching

TARGETED JOB ROLES Network Support Technician Network Support Specialist Network Administrators Network Support Engineer

SUBJECT DESCRIPTIONS

COMPTIA NETWORK +

PROGRAM DESCRIPTIONThe CompTIA® Network+® course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. If you are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification. Also, if your job duties include network troubleshooting, installation, or maintenance, or if you are preparing for any type of network-related career, it provides the background knowledge and skills you will require to be successful.

PERFORMANCE OBJECTIVESStudents will learn:

39

Page 40: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Identify basic network theory concepts and major network communications methods.

Describe bounded network media. Identify unbounded network media. Identify the major types of network implementations. Identify TCP/IP addressing and data delivery methods. Implement routing technologies. Identify the major services deployed on TCP/IP networks. Identify the infrastructure of a WAN implementation. Identify the components used in cloud computing and virtualization. Describe basic concepts related to network security. Prevent security breaches. Respond to security incidents. Identify the components of a remote network implementation. Identify the tools, methods, and techniques used in managing a network. Describe troubleshooting of issues on a network.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Professional Helpdesk or Computer Support Experience CompTIA A+ Certification is helpful but not required

TUITION AND FEES

Registration: $0Base Tuition: $2,570Materials: $125Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening

40

Page 41: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

N10-007 CompTIA Network + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCompTIA Network +093029 Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA Network + N10-007

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Network Theory

Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods

Lesson 2: Bounded Network Media

41

Page 42: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control

Lesson 3: Unbounded Network Media

Wireless Networking Wireless Network Devices and Components Install a Wireless Network

Lesson 4: Network Implementations

Physical Network Topologies Logical Network Topologies Ethernet Networks Network Devices VLANs

Lesson 5: TCP/IP Addressing and Data Delivery

The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques

Lesson 6: Routing

Enable Static Routing Implement Dynamic IP Routing

Lesson 7: TCP/IP Services

Assign IP Addresses Domain Naming Services TCP/IP Commands Common TCP/IP Protocols

Lesson 8: WAN Infrastructure

WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies

Lesson 9: Cloud and Virtualization Technologies

Virtualization SAN Implementations Cloud Computing

Lesson 10: Network Security Basics

42

Page 43: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods

Lesson 11: Preventing Security Breaches

Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention Educate Users

Lesson 12: Responding to Security Incidents

Incident Management and Response Basic Forensic Concepts

Lesson 13: Remote Networking

Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols

Lesson 14: Network Management

Network Monitoring Configuration Management Documentation Network Performance Optimization

Lesson 15: Troubleshooting Network Issues

Network Troubleshooting Models Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Troubleshoot Security Configuration Issues Troubleshoot Security Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA SECURITY +

PROGRAM DESCRIPTION

43

Page 44: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CompTIA® Security+® (SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (SY0-501) certification, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.

TARGETED JOB ROLES IT Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended

44

Page 45: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEES

Registration: $0Base Tuition: $2,575Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.

REQUIRED TEXTBOOKLogical Operations093022S (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA Security + SY0-501

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

45

Page 46: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM OUTLINELesson 1: Identifying Security Fundamentals

Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts

 Lesson 2: Analyzing Risk

Analyze Organizational Risk Analyze the Business Impact of Risk

 Lesson 3: Identifying Security Threats

Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats

 Lesson 4: Conducting Security Assessments

Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing

Lesson 5: Implementing Host and Software Security

Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle

 Lesson 6: Implementing Network Security

Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic

Lesson 7: Managing Identity and Access

Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts

 Lesson 8: Implementing Cryptography

Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure

46

Page 47: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates

 Lesson 9: Implementing Operational Security

Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls

 Lesson 10: Addressing Security Incidents

Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents

Lesson 11: Ensuring Business Continuity

Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan 

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

ICND 1: INTERCONNECTING CISCO DEVICES

PROGRAM DESCRIPTION The ICND 1 (CCENT) certification validates the skills required for entry-level network support positions, the starting point for many successful careers in networking. CCENT certified professionals have the knowledge and skill to install, operate, and troubleshoot a small enterprise branch network, including basic network security.It opens doors to a career in networking. Having your CCENT means you have what it takes to manage a small, enterprise branch network. A CCENT is your first step toward CCNA certification and will help you stand out from the crowd in entry-level positions

PERFORMANCE OBJECTIVESStudents will learn:

Learn the basics of networking. Learn the basics of Cisco devices and commands. Set up an IPv4 network. Set up an IPv6 network. Learn infrastructure services. Learn LAN switching basics. Learn about routing basics. Learn about NAT basics.

47

Page 48: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Maintain the network infrastructure. Enhance network security. Troubleshoot networks.

TARGETED JOB ROLES Systems Administrators Networking Specialists

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $3,116Materials: $179Total Tuition Fee: $3,295

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

100-105 Interconnecting Cisco Network Devices 40

The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.

REQUIRED TEXTBOOKLogical Operations

48

Page 49: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CCENT093042SC (Rev 1.0)Print and Digital Courseware

CERTIFICATION REQUIRED 100-105 ICND 1

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Basics of Networking

Network Concepts The TCP/IP Model The OSI Model

Lesson 2: Basics of Cisco Devices and Commands

Cisco Devices Infrastructure Components in Cisco Network Cisco Architecture Types Cabling Types Cisco IOS Commands

Lesson 3: Setting Up an IPv4 Network

Basics of IPv4 Addressing VLSM Troubleshooting Methodologies Troubleshoot IPv4 Addressing and Subnetting Issues

Lesson 4: Setting Up an IPv6 Network

Basics of IPv6 Addressing Troubleshoot IPv6 Addressing Issues

Lesson 5: Infrastructure Services

49

Page 50: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configure DNS Configure DHCP Configure NTP

Lesson 6: LAN Switching Basics

Configure Switches Configure VLANs Interswitch Connectivity Layer 2 Protocols

Lesson 7: Routing Basics

Routing Concepts Configure Routing Interfaces Inter-VLAN Routing Configure IPv4 and IPv6 Static Routing

Lesson 8: NAT Basics

IPv4 Numbered and Named Access Lists Configure NAT

Lesson 9: Maintaining the Network Infrastructure

Monitor Network Devices Configure Network Devices Manage Network Devices Device Maintenance

Lesson 10: Enhancing Network Security

Configure Ports Secure Network Devices

Lesson 11: Troubleshooting Network

Troubleshoot Infrastructure Services Troubleshoot Common Network Issues Troubleshoot Switching Issues Troubleshoot Routing Issues Troubleshoot Port Security Issues Troubleshoot Inter-VLAN Routing Issues Troubleshoot Basic Device Hardening Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

ICND 2: INTERCONNECTING CISCO DEVICES PART 2

50

Page 51: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM DESCRIPTION In this course, you will learn how to install, configure, operate, and troubleshoot a small enterprise network.Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability and the related controller types and tools that are available to support software defined network architectures.

PERFORMANCE OBJECTIVESStudents will learn:

Manage VLANs on Cisco switches. Manage STP. Manage EtherChannels. Describe the mechanisms used to mitigate network threats. Configure infrastructure services. Describe QoS concepts and techniques to manage congestion. Perform infrastructure maintenance. Manage devices using AAA with the TACACS+ and RADIUS protocols. Describe the basics of network programmability. Describe the features of WAN technologies. Manage routing protocols.

TARGETED JOB ROLES Systems Administrators Networking Specialists

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills ICND 1 Course

TUITION AND FEES

Registration: $0Base Tuition: $3,036Materials: $259Total Tuition Fee: $3,295

51

Page 52: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

200-105 Interconnecting Cisco Network Devices Part 2 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCCNA ICND 2093043SC (Rev 1.0) Print and Digital Courseware

CERTIFICATION REQUIRED 200-105 ICND 2

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Managing VLANs on Cisco Switches

Configure VLANs on Cisco Switches Configure Connectivity Between Cisco Switches Troubleshoot VLANs Troubleshoot Interswitch Connectivity

52

Page 53: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 2: Managing STP

Basics of STP Configure STP Troubleshoot STP

Lesson 3: Managing EtherChannel

Basics of Switch Stacks and VSS Configure EtherChannel Troubleshoot EtherChannel

Lesson 4: Mitigating Threats to the Access Layer

Configure Access and Trunk Interfaces Configure IEEE 802.1x Port-Based Authentication Configure DHCP Snooping

Lesson 5: Configuring Infrastructure Services

Configure HSRP Overview of Cloud Services Configure Traffic Filtering Using Access Lists Troubleshooting ACLs Configure VRRP Describing QoS Concepts Describe the QoS Concepts Describe the Congestion Management and Avoidance Techniques

Lesson 7: Infrastructure Maintenance

Configure SNMP Troubleshoot Network Connectivity Issues Using ICMP Echo-based SLA Troubleshoot Problems Using Local SPAN Troubleshoot Basic Layer 3 End-to-End Connectivity Issues

Lesson 8: Managing Devices Using AAA

Manage a Device Using AAA with TACACS+ Manage a Device Using AAA with RADIUS

Lesson 9: Network Programmability

Network Programmability BasicsLesson 10: WAN Technologies

WAN Topology Basics WAN Access Connectivity Basics Configure PPP on WAN Interfaces Using Local Authentication Configure MLPPP on WAN Interfaces Using Local Authentication Configure PPPoE Client-Side Interfaces Configure GRE Tunnel Connectivity Describe Single-Homed Branch Connectivity

Lesson 11: Routing Technologies

53

Page 54: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Routing Protocols Configure Inter-VLAN Routing Configure OSFPFv2 Routing for IPv4 Configure OSFPFv3 Routing for IPv6 Configure EIGRPv4 Configure EIGRPv6 Troubleshoot Routing Protocols

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

CCNA

PROGRAM DESCRIPTIONCisco Certified Network Associate (CCNA) Routing and Switching is a certification program for entry-level network engineers that helps maximize investment in foundational networking knowledge and increase the value of an employer's network. CCNA Routing and Switching is for Network Specialists, Network Administrators, and Network Support Engineers with 1-3 years of experience. The CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

ICND1 V2.0 Interconnecting Cisco Networking Devices Part 1 20/20/0/40

ICND2 V2.0 Interconnecting Cisco Networking Devices Part 2 20/20/0/40

The approximate time required to complete this program is ten days for day students and twenty nights for evening students.

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00PM for approximately four weeks. Classes for evening students will be held on Monday

54

Page 55: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

through Friday 6:00pm to 10:00pm. Night classes run for approximately eight weeks. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00 PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $6,152Materials: $438Total Tuition Fee: $6,590

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

ICND1 V2.0 Interconnecting Cisco Networking Devices Part 1 $3,295

ICND2 V2.0 Interconnecting Cisco Networking Devices Part 2 $3,295

CERTIFICATIONS REQUIRED CCENT CCNA Routing & Switching

TARGETED JOB ROLES Network Specialist Network Administrators Network Support Engineer

SUBJECT DESCRIPTIONS

ICND 1: INTERCONNECTING CISCO DEVICES

PROGRAM DESCRIPTION The ICND 1 (CCENT) certification validates the skills required for entry-level network support positions, the starting point for many successful careers in networking. CCENT certified professionals have the knowledge and skill to install, operate, and troubleshoot a small enterprise branch network, including basic network security.It opens doors to a career in networking. Having your CCENT means you have what it takes to manage a small, enterprise branch network. A CCENT is your first step toward CCNA certification and will help you stand out from the crowd in entry-level positions

PERFORMANCE OBJECTIVESStudents will learn:

Learn the basics of networking. Learn the basics of Cisco devices and commands.

55

Page 56: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Set up an IPv4 network. Set up an IPv6 network. Learn infrastructure services. Learn LAN switching basics. Learn about routing basics. Learn about NAT basics. Maintain the network infrastructure. Enhance network security. Troubleshoot networks.

TARGETED JOB ROLES Systems Administrators Networking Specialists

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $3,116Materials: $179Total Tuition Fee: $3,295

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

ICND 1 Interconnecting Cisco Network Devices 40

56

Page 57: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCCENT093042SC (Rev 1.0)Print and Digital Courseware

CERTIFICATION REQUIRED 100-105 ICND 1

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Basics of Networking

Network Concepts The TCP/IP Model The OSI Model

Lesson 2: Basics of Cisco Devices and Commands

Cisco Devices Infrastructure Components in Cisco Network Cisco Architecture Types Cabling Types Cisco IOS Commands

Lesson 3: Setting Up an IPv4 Network

Basics of IPv4 Addressing VLSM Troubleshooting Methodologies Troubleshoot IPv4 Addressing and Subnetting Issues

Lesson 4: Setting Up an IPv6 Network

57

Page 58: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Basics of IPv6 Addressing Troubleshoot IPv6 Addressing Issues

Lesson 5: Infrastructure Services

Configure DNS Configure DHCP Configure NTP

Lesson 6: LAN Switching Basics

Configure Switches Configure VLANs Interswitch Connectivity Layer 2 Protocols

Lesson 7: Routing Basics

Routing Concepts Configure Routing Interfaces Inter-VLAN Routing Configure IPv4 and IPv6 Static Routing

Lesson 8: NAT Basics

IPv4 Numbered and Named Access Lists Configure NAT

Lesson 9: Maintaining the Network Infrastructure

Monitor Network Devices Configure Network Devices Manage Network Devices Device Maintenance

Lesson 10: Enhancing Network Security

Configure Ports Secure Network Devices

Lesson 11: Troubleshooting Network

Troubleshoot Infrastructure Services Troubleshoot Common Network Issues Troubleshoot Switching Issues Troubleshoot Routing Issues Troubleshoot Port Security Issues Troubleshoot Inter-VLAN Routing Issues Troubleshoot Basic Device Hardening Issues

GRADINGGrading will be assigned as follows:

Attendance: 50%

58

Page 59: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Participation: 50%

ICND 2: INTERCONNECTING CISCO DEVICES PART 2

PROGRAM DESCRIPTION In this course, you will learn how to install, configure, operate, and troubleshoot a small enterprise network.

Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability and the related controller types and tools that are available to support software defined network architectures.

PERFORMANCE OBJECTIVESStudents will learn:

Manage VLANs on Cisco switches. Manage STP. Manage EtherChannels. Describe the mechanisms used to mitigate network threats. Configure infrastructure services. Describe QoS concepts and techniques to manage congestion. Perform infrastructure maintenance. Manage devices using AAA with the TACACS+ and RADIUS protocols. Describe the basics of network programmability. Describe the features of WAN technologies. Manage routing protocols.

TARGETED JOB ROLES Systems Administrators Networking Specialists

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills ICND 1 Course

59

Page 60: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEES

Registration: $0Base Tuition: $3,116Materials: $259Total Tuition Fee: $3,295

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

ICND 2 Interconnecting Cisco Network Devices Part 2 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCCNA ICND 2093043SC (Rev 1.0) Print and Digital Courseware

CERTIFICATION REQUIRED 200-105 ICND 2

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO

60

Page 61: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

15:1

PROGRAM OUTLINELesson 1: Managing VLANs on Cisco Switches

Configure VLANs on Cisco Switches Configure Connectivity Between Cisco Switches Troubleshoot VLANs Troubleshoot Interswitch Connectivity

Lesson 2: Managing STP

Basics of STP Configure STP Troubleshoot STP

Lesson 3: Managing EtherChannel

Basics of Switch Stacks and VSS Configure EtherChannel Troubleshoot EtherChannel

Lesson 4: Mitigating Threats to the Access Layer

Configure Access and Trunk Interfaces Configure IEEE 802.1x Port-Based Authentication Configure DHCP Snooping

Lesson 5: Configuring Infrastructure Services

Configure HSRP Overview of Cloud Services Configure Traffic Filtering Using Access Lists Troubleshooting ACLs Configure VRRP Describing QoS Concepts Describe the QoS Concepts Describe the Congestion Management and Avoidance Techniques

Lesson 7: Infrastructure Maintenance

Configure SNMP Troubleshoot Network Connectivity Issues Using ICMP Echo-based SLA Troubleshoot Problems Using Local SPAN Troubleshoot Basic Layer 3 End-to-End Connectivity Issues

Lesson 8: Managing Devices Using AAA

Manage a Device Using AAA with TACACS+ Manage a Device Using AAA with RADIUS

Lesson 9: Network Programmability

Network Programmability Basics

61

Page 62: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 10: WAN Technologies

WAN Topology Basics WAN Access Connectivity Basics Configure PPP on WAN Interfaces Using Local Authentication Configure MLPPP on WAN Interfaces Using Local Authentication Configure PPPoE Client-Side Interfaces Configure GRE Tunnel Connectivity Describe Single-Homed Branch Connectivity

Lesson 11: Routing Technologies

Routing Protocols Configure Inter-VLAN Routing Configure OSFPFv2 Routing for IPv4 Configure OSFPFv3 Routing for IPv6 Configure EIGRPv4 Configure EIGRPv6 Troubleshoot Routing Protocols

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

CYBERSECURITY SPECIALIST (CYBER)

PROGRAM DESCRIPTIONBattles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life.This program is designed to help individuals get jobs as information security auditors, site administrators, computer forensics investigators.This program will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems; emphasizing perimeter defenses, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. It also presents a detailed methodological approach to computer forensics and evidence analysis, covering major forensic investigation scenarios that provide hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. After program completion, student will have sat through three highly coveted information security certifications:

- CompTIA Security+ - Certified Ethical Hacker (CEH)- EC-Council Computer Hacking Forensic Investigator (CHFI)

62

Page 63: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the LeaderQuest Basic Skills Test.

PROGRAM OUTLINESubject Number Subject Title

Clock HoursLecture/Lab/Ext/Total

SY0-501 Security+ 20/20/0/40312-50 Certified Ethical Hacker 20/20/0/40312-49 Computer Hacking Forensics Investigator 20/20/0/40

The approximate time required to complete this program is fifteen days for day students and thirty nights for evening students.

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for approximately eight days. Classes for evening students will be held Monday through Friday 6:00pm to 10:00pm. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00 PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $9,006Materials: $1,,079Total Tuition Fee: $10,085

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

SY0-501 Security+ $2,695312-50 Certified Ethical Hacker $3,695312-49 Computer Hacking Forensics Investigator $3,695

CERTIFICATIONS REQUIRED SY0-501 CompTIA Security+ 312-49 EC-Council Computer Hacking Forensic Investigator V9 312-50 EC-Council Certified Ethical Hacker V9

63

Page 64: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TARGETED JOB ROLES Information Security Specialist Information Security Auditor Site Security Administrator Computer forensics Investigator

SUBJECT DESCRIPTIONS AND SYLLABI

COMPTIA SECURITY +

PROGRAM DESCRIPTIONCompTIA® Security+® (SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (SY0-501) certification, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.

TARGETED JOB ROLES IT Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age

64

Page 65: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended

TUITION AND FEES

Registration: $0Base Tuition: $2,575Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical Operations093022S (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA Security + SY0-501

INSTRUCTIONAL METHODS Lecture Overhead slides Labs

65

Page 66: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Identifying Security Fundamentals

Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts

 Lesson 2: Analyzing Risk

Analyze Organizational Risk Analyze the Business Impact of Risk

 Lesson 3: Identifying Security Threats

Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats

 Lesson 4: Conducting Security Assessments

Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing

Lesson 5: Implementing Host and Software Security

Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle

 Lesson 6: Implementing Network Security

Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic

66

Page 67: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 7: Managing Identity and Access

Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts

 Lesson 8: Implementing Cryptography

Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates

 Lesson 9: Implementing Operational Security

Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls

 Lesson 10: Addressing Security Incidents

Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents

Lesson 11: Ensuring Business Continuity

Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan 

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

CEH: CERTIFIED ETHICAL HACKER

PROGRAM DESCRIPTION This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When you leave this

67

Page 68: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

intensive 5 day class, you will have hands on understanding and experience in Ethical Hacking.

PERFORMANCE OBJECTIVES Students will learn: Background of technology and technological operations Risk and system analysis Systems securities and vulnerabilities Regulations and ethics

TARGETED JOB ROLES Site Administrators Security Auditors Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

TUITION AND FEESRegistration: $0Base Tuition: $3,183Materials: $512Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURS

68

Page 69: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Seminar Number Seminar Title Contact Hours312-50 CEH Certified Ethical Hacker 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKEC-Council Digital CoursewareCEHv9 e-Courseware

CERTIFICATION REQUIRED 312-50 CEH

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to Ethical Hacking

Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Concepts Hacking and Scopes Information Security Controls Physical Security Information Management Vulnerability Assessment Penetration Testing Security Laws and Standards

Lesson 2: Footprinting and Reconnaissance

Footprinting Concepts Footprinting Methodology Footprinting Using Advanced Google Hacking Techniques Footprinting Tools

69

Page 70: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Footprinting Countermeasures Footprinting Penetration Testing

Lesson 3: Scanning Networks

Overview of Network Scanning CEH Scanning Methodology

Lesson 4: Enumeration

Enumeration Concepts Enumerations Countermeasures Enumeration Penetration Testing

Lesson 5: System Hacking

System Hacking: Goals CEH Hacking: Methodology CEH System Hacking Steps Escalating Privileges Executing Applications Spyware Defending Against Keyloggers Hiding Files Detecting Rootkits NTFS Data Stream Steganography/Steganlysis Covering Tracks

Lesson 6: Malware Threats

Trojan Concepts Types of Trojans Virus and Worm Concepts Ransomware Malware Reverse Engineering Malware Detection Countermeasures Penetration Testing

Lesson 7: Sniffing

Sniffing Concepts MAC/DHCP Attacks IDRP Spoofing ARP/DNS Poisoning Sniffing Tools Detection Techniques Counter Measures

Lesson 8: Social Engineering

Social Engineering Concepts Social Engineering Techniques

70

Page 71: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Identity Theft Social Engineering Countermeasures

Lesson 9: Denial of Service

DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DoS/DDos Attack Tools Counter Measures DoS/DDos Protection Tools

Lesson 10: Session Hijacking

Session Hijacking Concepts Application Level Hijacking Network Level Hijacking Hijacking Tools Countermeasures

Lesson 11: Hacking Web Servers

Webserver Concepts Webserver Attakcs Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools

Lesson 12: Hacking Web Applications

Web App Concepts Web App Threats Web App Hacking Methodology Attack Web Servers Analyze Web Apps Authorization Attack Schemes Perform Injection Attacks Attack Data Connectivity

Lesson 13: SQL Injection

SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter Measures Snort Rule Detection to SQL Injection Attacks Detection Tools

Lesson 14: Hacking Wireless Networks

Wireless Statistics Wireless Concepts

71

Page 72: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Wireless Encryption Breaking Encryption Defending Against WPA Cracking Wireless Threats Wireless Hacking Methodology WEP/WPA Cracking Tools Counter Measures Security Tools

Lesson 15: Hacking Mobile Platforms

Mobile Platform Attack Vectors Hacking Android/IOS Hacking Windows/BlackBerry Mobile Device Management Mobile Security Guidelines and Tools

Lesson 16: Evading IDS, Firewalls and Honeypots

IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Systems IDS/Firewall Evading Tools Detecting Honeypots Counter Measures

Lesson 17: Cloud Computing

Introduction to Cloud Computing Cloud Computing Threats/Attacks Cloud Security Cloud Penetration Testing

Lesson 18: Cryptography

Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

CHFI: COMPUTER HACKING FORENSIC INVESTIGATOR

PROGRAM DESCRIPTION

72

Page 73: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The Computer Hacking Forensic Investigator program presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation.If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.CHFI is a certification that gives a complete overview of the process that a forensic investigator must follow when investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident.

PERFORMANCE OBJECTIVESStudents will learn:

The computer forensic investigation process and the various legal issues involved

Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner

Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category

Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene

How to set up a computer forensics lab and the tools involved in the lab Various file systems and how to boot a disk Gathering volatile and nonvolatile information from Windows Data acquisition and duplication rules, validation methods and tools required How to recover deleted files and deleted partitions in Windows, Mac OS X, and

Linux The process involved in forensic investigation using AccessData FTK and

EnCase Steganography and its techniques, Steganalysis, and image file forensics Password Cracking Concepts, tools, types of password attacks and how to

investigate password protected files Different types of log capturing, log management, time synchronization, and

log capturing tools How to investigate logs, network traffic, wireless attacks, and web attacks How to track e-mails and investigate e-mail crimes Mobile forensics and mobile forensics software and hardware tools How to write investigative reports

73

Page 74: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TARGETED JOB ROLES Junior Computer Forensics Investigator Incident Response Technician Junior Computer Security Analyst

ADMISSION REQUIREMENTS Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Certified Ethical Hacker (CEH) certification or equivalent experience

TUITION AND FEESRegistration: $0Base Tuition: $3,248Materials: $447Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

CHFI Computer Hacking Forensic Investigator 40

The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.

REQUIRED TEXTBOOKEC-Council Digital CoursewareCHFI v9 e-Courseware

74

Page 75: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CERTIFICATION REQUIRED CHFI

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson: 1

Computer Forensics in Today’s World Computer Forensics Investigation Process Understanding Hard Discs and File Systems

Lesson: 2 Operating Systems Forensics Defeating Anti-Forensic Techniques Data Acquisition and Duplication

Lesson: 3 Network Forensics Investigating Web Attacks Database Forensics

Lesson: 4 Cloud Forensics Malware Forensics Investigating Email Crimes

Lesson: 5 Mobile Forensics Investigative Reports

GRADINGGrading will be assigned as follows:

Attendance: 50%

75

Page 76: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Participation: 50%

STPM – SENIOR TECHNOLOGY PROJECT MANAGER

PROGRAM DESCRIPTIONThis program is based on the Project Management Professional (PMP) and Service Management (ITIL) credentials. The PMP is one of the most important industry-recognized certification for IT project managers. Globally recognized and demanded, the PMP demonstrates that students have the experience, education and competency to lead and direct projects. This recognition is seen through increased marketability to employers and higher salary; according to the PMI Project Management Salary Survey–Seventh Edition, this certification positively impacts project manager salaries.Our PMP program has a strong IT orientation and covers a number of foundational IT management skills in addition to the core project management skills. The program introduces the principles and core elements of project management and IT service management (ITSM) based on ITIL framework, then moves into advanced project management principles including topics that prepare the student for the PMP certification.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to have a bachelor’s degree and 4,500 hours of Project Management experience in the five PM process groups, OR, a secondary school diploma and 7,500 hours of PM experience in the five process groups.

PROGRAM OUTLINESubject Number Subject Title

Clock HoursLecture/Lab/Ext/Total

ITIL-FND ITIL v3 Foundations 20/20/0/40PMP-EP PMP Preparation 40/0/0/40

The approximate time required to complete this program is ten days for day students and twenty nights for evening students.

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for ten days. Classes for evening students will be held Monday through Friday, 6:00 to 10:00 pm. Night classes run for approximately twenty days. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00 PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $5,059Materials: $231

76

Page 77: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Total Tuition Fee: $5,290

COST PER SINGLE SUBJECTSubject Number

Subject Title Cost

ITIL-FND ITIL v3 Foundations $1,995PMP-EP PMP Preparation $3,295

CERTIFICATIONS REQUIRED ITIL v3 Foundations PMP

TARGETED JOB ROLES Project Manager Business Analyst Service Delivery Manager Incident Manager Engagement Manager Client Service Manager Technical Support Manager Software Engineering Manager QA Analyst

SUBJECT DESCRIPTIONS

ITIL V3 FOUNDATIONS

PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT INFRASTRUCTURE LIBRARY (ITIL®) FOUNDATION CERTIFICATION (2011 LIFECYCLE EDITION) course is the first step in your preparation. The course will prepare you for the ITIL Foundation certification, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.

PERFORMANCE OBJECTIVES

77

Page 78: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Students will learn: Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service

Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.

TARGETED JOB ROLES IT Professionals with an interest in Service Management

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEESRegistration: $0Base Tuition: $1,943Materials: $52Total Tuition Fee: $1,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.

78

Page 79: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

REQUIRED TEXTBOOKIT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition)093030SC (Rev 2.0) Print and Digital Courseware

CERTIFICATION REQUIRED ITL-FND

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to ITIL

ITIL Basics The Service Lifecycle

Lesson 2: Service Strategy

Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process

Lesson 3: Service Design

Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process

Lesson 4: Service Transition

79

Page 80: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process

Lesson 5: Service Operation

Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process

Lesson 6: Service Operation Functions

The Service Desk Function The Technical Management Function The IT Operations Management Function The Application Management Function

Lesson 7: Continual Service Improvement

Basic Concepts of Continual Service Improvement CSI Principles

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

CAPM/PMP- PROJECT MANAGEMENT PROFESSIONAL

PROGRAM DESCRIPTION You can find PMPs leading projects in nearly every country and, unlike other certifications that focus on a particular geography or domain, the PMP® is truly global. As a PMP, you can work in virtually any industry, with any methodology and in any location. The PMP signifies that you speak and understand the global language of project management and connects you to a community of professionals, organizations and experts worldwide.This course provides an intensive review of the subject matter tested on the Project Management Institute’s Project Management Professional (PMP) certification. This course will provide a summary review of the nine knowledge areas and five process groups covered in A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Participants will improve their test-taking skills by completing sample certifications totaling 200 questions and by discussing the rationale behind both correct and incorrect answers. The program is specifically designed to maximize the probability that you will succeed in passing the PMP the first time. Each student will

80

Page 81: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

receive a student manual including review materials, key definitions and formulas, sample questions and answers.

PERFORMANCE OBJECTIVESStudents will learn:

Initiating Domains. Planning Domains. Executing Domains. Monitoring Domains. Closing Domains.

TARGETED JOB ROLES Project Managers

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEESRegistration: $0Base Tuition: $3,116Materials: $179Total Tuition Fee: $3,295

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

PMP-EP Project Management Professional 40

81

Page 82: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKProject Management InstitutePMBOK 6th Edition

CERTIFICATION REQUIRED Project Management Professional

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1:

Module 1: Project Management Fundamentals Key Project Management Definitions Role of the Project Manager Knowledge Areas and Process Groups Project Lifecycle Models Project Processes Organizational Influences on Project Management Project Maturity ModelsModule 2: Project Initiation Project Selection Process Project Charter Elements Exercise 1: Prepare Project Charter and Milestone Schedule Stakeholder Identification Exercise 2: Identify StakeholdersModule 3: Planning the Project Project Requirements Class Exercise: Define Case Study Requirements

82

Page 83: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Scope Definition & Management Work Breakdown Structure Exercise 3: Prepare WBS Schedule Development Define Activities Sequence Activities Estimate Durations Develop Schedule Exercise 4: Prepare Project Schedule using Critical Path MethodLesson 2:

Module 3: Planning the Project (continued) Cost Estimating and Budgeting Project Risk Management Risk Identification Risk Analysis Risk Response Planning Exercise 5: Prepare Risk Management Plan Project Communications Managing Expectations Stakeholder Communications Assigning Responsibilities using a RACI Chart Exercise 6: Prepare RACI Chart & Communications PlanModule 4: Executing, Monitoring and Controlling the Project Integrated Change Control Exercise 7: Decide on Change Order Resolution Risk Monitoring and Control Exercise 8: Manage Risk EventModule 5: Project Close-out Project Closing and Acceptance Project Archives and Lessons LearnedCourse Wrap-up Review of Key Learning's & How to Apply to ProjectsLesson 3:

Module 6: Introduction and PMP® Program Overview Applying for and Taking the PMP Strategies: General and Question-by-Question

Module 7: Project Management Framework Project Life Cycles and Stakeholder Management The Triple Constraint and Organizational Issues

Module 8: Project Scope Management Initiating the Project: Project Plans

83

Page 84: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Work Breakdown Structures Lesson 4:

Module 9: Project Time Management Project Schedules and Logic Diagramming Critical Path Analysis and Performance Measurement

Module 10: Project Human Resource Management Project Manager Responsibilities Power & Conflict Management

Module 11: Project Quality Management Project Management and Quality management Statistical Process Control

Module 12: Project Cost Management Estimating versus Pricing Financial Analysis

Lesson 5:

Module 13: Project Procurement Management Procurement Planning Business Issues, Selection, and Evaluation

Module 14: Project Risk Management Expected Values Decision Trees and Cause and Effect

Module 15: Project Communication Management Tools and Techniques Reporting and Lessons Learned

Module 16: Professional Responsibility Professional Responsibility Ethics

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

INSTALLING & CONFIGURING WINDOWS SERVER 2012

PROGRAM DESCRIPTION

84

Page 85: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Windows Server 2012 is Microsoft’s next generation server product. This product delivers hundreds of new features for enabling virtualization and cloud computing. Adoption of this technology is very strong as organizations continue to invest in areas of virtualization, networking, storage, and user experience. This career training program is for individuals who wish to implement, configure, and manage a cloud computing and virtualization environment through Microsoft technology. This program is for IT Professionals who have prior Windows Server operating system experience and want to develop the skills and knowledge necessary to implement and manage the Windows Server 2012 core infrastructure services.

This training program will help you develop the following skills: Installing and Configuring Windows Server 2012 Managing and Maintaining Active Directory Domain Services and Objects Implementing Networking Services, Local Storage, File and Print Services Implementing Server Virtualization with Hyper-V Implementing a Group Policy Infrastructure Managing User and Service Accounts Configuring and Troubleshooting DNS Configuring and Troubleshooting Remote Access Installing, Configuring, and Troubleshooting the Network Policy Server role Optimizing File Services and increasing File System Security Implementing Update Management Implementing Advanced Network Services and Advanced File Services Implementing Dynamic Access Control Implementing Network Load Balancing and Failover Clustering Implementing Disaster Recovery

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED

certificate) In the event the applicant is unable to provide proof of secondary

education, achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

20410 Installing and Configuring Windows Server® 2012 20/20/0/40

20411 Administering Windows Server® 2012 20/20/0/40

20412 Configuring Advanced Windows Server® 2012 Services 20/20/0/40

The approximate time required to complete this program is fifteen days for day students and thirty nights for evening students.

85

Page 86: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for approximately three weeks. Classes for evening students will be held Monday through Friday from 6:00 to 10:00pm. Night classes run for approximately six weeks. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00 PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $8,121Materials: $864Total Tuition Fee: $8,985

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

20410 Installing and Configuring Windows Server® 2012 $2,995

20411 Administering Windows Server® 2012 $2,995

20412 Configuring Advanced Windows Server® 2012 Services $2,995

CERTIFICATIONS REQUIRED 70-410 Installing and Configuring Windows Server 2012 70-211 Administering Windows Server 2012 70-212 Configuring Advanced Windows Server 2012 Services

TARGETED JOB ROLES Network Engineer Systems Administrator Cloud Computing Consultant Business Technology Analyst Active Directory Consultant

SUBJECT DESCRIPTIONS

20410D: INSTALLING AND CONFIGURING WINDOWS SERVER 2012

PROGRAM DESCRIPTION This course maps directly to and is the preferred choice for hands-on preparation for the Microsoft Certified Solutions Associate (MCSA) 410: Installing and Configuring Windows Server 2012, which is the first of three certifications required for the MCSA: Windows Server 2012 credential.

86

Page 87: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PERFORMANCE OBJECTIVESStudents will learn:

Install and configure Windows Server 2012. Describe AD DS. Manage Active Directory objects. Automate Active Directory administration. Implement IPv4. Implement Dynamic Host Configuration Protocol (DHCP). Implement Domain Name System (DNS). Implement IPv6. Implement local storage. Implement file and print services. Implement Group Policy. Secure Windows servers by using Group Policy Objects (GPOs). Implement server virtualization by using Hyper-V.

TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Technicians

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES A good understanding of networking fundamentals. An understanding of and experience with configuring security and

administration tasks in an enterprise environment. Experience supporting or configuring Windows operating system clients. Good hands-on Windows client operating system experience with Windows

Vista, Windows 7, or Windows 8. An understanding of basic Active Directory Domain Services (AD DS) concepts,

such as the purpose of user accounts and computer accounts. Students would also benefit from having some previous Windows Server

operating system experience

TUITION AND FEES

Registration: $0Base Tuition: $2, 707Materials: $288Total Tuition Fee: $2,995

87

Page 88: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20410 Installing & Configuring Windows Server 2012 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK

70-410 Installing & Configuring Windows Server 2012Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-410

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Deploying and Managing Windows Server 2012

Windows Server 2012 Overview Overview of Windows Server 2012 Management Installing Windows Server 2012 Post-Installation Configuration of Windows Server 2012 Introduction to Windows PowerShell

88

Page 89: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lab: Deploying and Managing Windows Server 2012 Lesson 2: Introduction to Active Directory Domain Services

Overview of AD DS Overview of Domain Controllers Installing a Domain Controller Lab: Installing Domain Controllers

Lesson 3: Managing Active Directory Domain Services Objects

Managing User Accounts Managing Group Accounts Managing Computer Accounts Delegating Administration Lab: Managing Active Directory Domain Services Objects

Lesson 4: Automating Active Directory Domain Services Administration

Using Command-line Tools for AD DS Administration Using Windows PowerShell for AD DS Administration Performing Bulk Operations with Windows PowerShell Lab: Automating AD DS Administration by Using Windows PowerShell

Lesson 5: Implementing IPv4

Overview of TCP/IP Understanding IPv4 Addressing Subnetting and Supernetting Configuring and Troubleshooting IPv4 Lab: Implementing IPv4

Lesson 6: Implementing Dynamic Host Configuration Protocol

Installing a DHCP Server Role Configuring DHCP Scopes Managing a DHCP Database Securing and Monitoring DHCP Lab: Implementing DHCP

Lesson 7: Implementing Domain Name System

Name Resolution for Windows Clients and Servers Installing and Managing a DNS Server Managing DNS Zones Lab: Implementing DNS

Lesson 8: Implementing IPv6

Overview of IPv6 IPv6 Addressing Coexistence with IPv6 IPv6 Transition Technologies Lab: Implementing IPv6

Lesson 9: Implementing Local Storage

89

Page 90: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Overview of Storage Managing Disks and Volumes Implementing Storage Spaces Lab: Implementing Local Storage

Lesson 10: Implementing File and Print Services

Securing Files and Folders Protecting Shared Files and Folders Using Shadow Copies Configuring Network Printing Lab: Implementing File and Print Services

Lesson 11: Implementing Group Policy

Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates Lab: Implementing Group Policy

Lesson 12: Securing Windows Servers Using Group Policy Objects

Windows Operating Systems Security Overview Configuring Security Settings Lab A: Increasing Security for Server Resources Restricting Software Configuring Windows Firewall with Advanced Security Lab B: Configuring AppLocker and Windows Firewall

Lesson 13: Implementing Server Virtualization with Hyper-V

Overview of Virtualization Technologies Implementing Hyper-V Managing Virtual Machine Storage Managing Virtual Networks Lab: Implementing Server Virtualization with Hyper-V

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20411D: ADMINISTERING WINDOWS SERVER 2012

PROGRAM DESCRIPTION This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA) 411: Administering Windows Server 2012, which is the second of three certifications required for MCSA: Windows Server 2012 credential.

PERFORMANCE OBJECTIVESStudents will learn:

90

Page 91: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configure and Troubleshoot Domain Name System Maintain Active Directory Domain Services Manage User and Service Accounts Implement Group Policy Infrastructure Manage User Desktops using Group Policy Install, Configure and Troubleshoot Network Policy Server Implement Network Access Protection Implement Remote Access Optimize File Services Configure Encryption and Advanced Auditing Deploy and Maintain Server Images Implement Update Managements Monitor Windows Server 2012

TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Technicians

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES A good understanding of networking fundamentals. An understanding of and experience with configuring security and

administration tasks in an enterprise environment. Experience supporting or configuring Windows operating system clients. Good hands-on Windows client operating system experience with Windows

Vista, Windows 7, or Windows 8. An understanding of basic Active Directory Domain Services (AD DS) concepts,

such as the purpose of user accounts and computer accounts. Knowledge equivalent to that already covered in “20410A: Installing and

Configuring Windows Server 2012”. Students would also benefit from having some previous Windows Server

operating system experience

TUITION AND FEES

Registration: $0Base Tuition: $2,707Materials: $288Total Tuition Fee: $2,995

CLASS SCHEDULE

91

Page 92: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Day students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20411 Administering Windows Server 2012 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK70-411 Administering Server 2012Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-411

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Deploying and Maintaining Server Images

Overview of Windows Deployment Services Implementing Deployment with Windows Deployment Services Administering Windows Deployment Services Lab: Using Windows Deployment Services to Deploy Windows Server 2012

Lesson 2: Configuring and Troubleshooting Domain Name System

Installing the DNS Server Role Configuring the DNS Server Role Configuring DNS Zones

92

Page 93: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configuring DNS Zone Transfers Managing and Troubleshooting DNS Lab: Configuring and Troubleshooting DNS

Lesson 3: Maintaining Active Directory Domain Services

Overview of AD DS Implementing Virtualized Domain Controllers Implementing Read-Only Domain Controllers Administering AD DS Managing the AD DS Database Lab: Maintaining AD DS

Lesson 4: Managing User and Service Accounts

Automating User Account Management Configuring Password-Policy and User-Account Lockout Settings Configuring Managed Service Accounts Lab: Managing User and Service Accounts

Lesson 5: Implementing a Group Policy Infrastructure

Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing a Group Policy Infrastructure

Lesson 6: Managing User Desktops with Group Policy

Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Managing Software with Group Policy Lab: Managing User Desktops with Group Policy

Lesson 7: Configuring and Troubleshooting Remote Access

Configuring Network Access Configuring VPN Access Overview of Network Policies Troubleshooting Routing and Remote Access Lab A: Configuring Remote Access Configuring DirectAccess Lab B: Configuring DirectAccess

Lesson 8: Installing, Configuring, and Troubleshooting the Network

Network Policy Server Role Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server Lab: Installing and Configuring a Network Policy Server

Lesson 9: Implementing Network Access Protection

93

Page 94: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Overview of Network Access Protection Overview of NAP Enforcement Processes Configuring NAP Monitoring and Troubleshooting NAP Lab: Implementing NAP

Lesson 10: Optimizing File Services

Overview of FSRM Using FSRM to Manage Quotas, File Screens, and Storage Reports Implementing Classification and File Management Tasks Lab A: Configuring Quotas and File Screening Using FSRM Overview of DFS Configuring DFS Namespaces Configuring and Troubleshooting DFS-R Lab B: Implementing DFS

Lesson 11: Configuring Encryption and Advanced Auditing

Encrypting Files by Using Encrypting File System Configuring Advanced Auditing Lab: Configuring Encryption and Advanced Auditing

Lesson 12: Implementing Update Management

Overview of WSUS Deploying Updates with WSUS Lab: Implementing Update Management

Lesson 13: Monitoring Windows Server 2012

Monitoring Tools Using Performance Monitor Monitoring Event Logs Lab: Monitoring Windows Server 2012

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20412D: CONFIGURING WINDOWS ADVANCED SERVER 2012 SERVICES

PROGRAM DESCRIPTION This course is part three in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA) 412: Configuring Advanced Windows Server 2012 Services, which is the third of three certifications required for MCSA: Windows Server 2012 credential.

94

Page 95: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PERFORMANCE OBJECTIVESStudents will learn:

Configure advanced features for Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and configure IP Address Management (IPAM) with Windows Server 2012.

Configure and manage iSCSI, BranchCache and FSRM. Configure DAC to manage and audit access to shared files. Plan and implement an AD DS deployment that includes multiple domains and

forests. Plan and implement an AD DS deployment that includes locations. Implement and configure an Active Directory Certificate Services

(AD CS) deployment. Implement an AD RMS deployment. Implement an AD FS deployment. Provide high availability and load balancing for web-based applications by

implementing Network Load Balancing (NLB). Implement and validate high availability and load balancing for web-based

applications by implementing NLB. Provide high availability for network services and applications by implementing

failover clustering. Implement a failover cluster, and configure and validate a highly available

network service. Deploy and manage Hyper-V virtual machines in a failover cluster. Implement a backup and disaster recovery solution based on business and

technical requirements.

TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Technicians

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES A good understanding of networking fundamentals. An understanding of and experience with configuring security and

administration tasks in an enterprise environment. Experience supporting or configuring Windows operating system clients. Good hands-on Windows client operating system experience with Windows

Vista, Windows 7, or Windows 8. An understanding of basic Active Directory Domain Services (AD DS) concepts,

such as the purpose of user accounts and computer accounts.

95

Page 96: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Knowledge equivalent to that already covered in “20410A: Installing and Configuring Windows Server 2012”.

Students would also benefit from having some previous Windows Server operating system experience

TUITION AND FEESRegistration: $0Base Tuition: $2,707Materials: $288Total Tuition Fee: $2,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20412 Configuring Advanced Windows Server 2012 Services 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK

70-412 Configuring Advanced Windows Server 2012 ServicesOfficial Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-412

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

96

Page 97: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Implementing Advanced Network Services

Configuring Advanced DHCP Features Configuring Advanced DNS Settings Implementing IPAM Lab: Implementing Advanced Network Services

Lesson 2: Implementing Advanced File Services

Configuring iSCSI Storage Configuring BranchCache Optimizing Storage Usage Lab A: Implementing Advanced File Services Lab B: Implementing BranchCache

Lesson 3: Implementing Dynamic Access Control

Overview of Dynamic Access Control Planning for Dynamic Access Control Deploying Dynamic Access Control Lab: Implementing Dynamic Access Control

Lesson 4: Implementing Distributed Active Directory Domain Services

Deployments Overview of Distributed AD DS Deployments Deploying a Distributed AD DS Environment Configuring AD DS Trusts Lab: Implementing Distributed AD DS Deployments

Lesson 5: Implementing Active Directory Domain Services Sites

Replication Overview of AD DS Replication Configuring AD DS Sites Configuring and Monitoring AD DS Replication Lab: Implementing AD DS Sites and Replication

Lesson 6: Implementing Active Directory Certificate Services

PKI Overview Deploying CAs Lab A: Deploying and Configuring CA Hierarchy Deploying and Managing Certificate Templates Implementing Certificate Distribution and Revocation Managing Certificate Recovery Lab B: Deploying and Managing Certificates

Lesson 7: Implementing Active Directory Rights Management Services

AD RMS Overview

97

Page 98: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Deploying and Managing an AD RMS Infrastructure Configuring AD RMS Content Protection Configuring External Access to AD RMS Lab: Implementing AD RMS

Lesson 8: Implementing Active Directory Federation Services

Overview of AD FS Deploying AD FS Implementing AD FS for a Single Organization Deploying AD FS in a B2B Federation Scenario Lab: Implementing Active Directory Federation Services

Lesson 9: Implementing Network Load Balancing

Overview of NLB Configuring an NLB Cluster Planning an NLB Implementation Lab: Implementing Network Load Balancing

Lesson 10: Implementing Failover Clustering

Overview of Failover Clustering Implementing a Failover Cluster Configuring Highly Available Applications and Services on a Failover Cluster Maintaining a Failover Cluster Implementing a Multi-Site Failover Cluster Lab: Implementing Failover Clustering

Lesson 11: Implementing Failover Clustering with Hyper-V

Overview of Integrating Hyper-V with Failover Clustering Implementing Hyper-V Virtual Machines on Failover Clusters Implementing Hyper-V Virtual Machine Movement Managing Hyper-V Virtual Environments by Using VMM Lab: Implementing Failover Clustering with Hyper-V

Lesson 12: Implementing Disaster Recovery

Overview of Disaster Recovery Implementing Windows Server Backup Implementing Server and Data Recovery Lab: Implementing Windows Server Backup and Restore

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

MCSA WINDOWS 7 ASSOCIATE – DESKTOP SUPPORT SPECIALIST

PROGRAM DESCRIPTION

98

Page 99: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

This program is intended for ITI professionals who are interested in expanding their knowledge base and technical skills about Windows 7. It provides guidance on installing, upgrading, and licensing for Windows 7. Students will learn how to install, upgrade to Windows 7, how to manage storage and how to optimize file-system performance. Additionally, they will learn how to manage available disk space by using quotas. Students will work with Windows tools and services to determine the source of performance and reliability issues, and to troubleshoot these issues. The program also describes how to configure networking to include IPv4, IPv6, how connect to wireless networks, and use the networking features included in Windows 8 to troubleshoot networking issues. Students will also learn preventive measures and tools that work together to protect their computers from security threats. The program then covers the features related to file and folder management, which include setting permissions, file/folder compression, and configuring shared folders. Students will also learn about installing and managing printers. Additionally, the program provides an overview of the SkyDrive functionality, and describes the procedures to install and configure applications, including Windows Store apps. The program also examines the fundamentals of working with virtual machines in the Client Hyper-V environment in Windows 7.Throughout the program, students will use Windows PowerShell 3.0, and its graphical user interface (GUI) to configure and manage the system. Students will also use the scripting editor to create and examine PowerShell scripts used to manage the system.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

6292 Installing and Configuring Windows 7 Client 20/20/0/40

6293 Troubleshooting and Supporting Windows 7 in the Enterprise 20/20/0/40

The approximate time required to complete this program is ten days for day students and twenty nights for evening students.

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

99

Page 100: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEESRegistration: $0Base Tuition: $3,202Materials: $388Total Tuition Fee: $3,590

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

6292 Installing and Configuring Windows 7 Client $1,795

6293 Troubleshooting and Supporting Windows 7 in the Enterprise $1,795

CERTIFICATIONS REQUIRED 70-680 Windows 7: Configuring 70-685 Windows 7: Enterprise Desktop Support Technician

TARGETED JOB ROLES System Support Specialist Systems Engineer Windows 7 Specialist Windows Help Desk Technician Technical Support Representative

SUBJECT DESCRIPTIONS

6292: INSTALLING AND CONFIGURING WINDOWS CLIENT

PROGRAM DESCRIPTION This course is intended for IT professionals who are interested in expanding their knowledge base and technical skills about Windows® 7 Client. In this course, students learn how to install, upgrade, and migrate to Windows 7 client. Students then configure Windows 7 client for network connectivity, security, maintenance, and mobile computing.

PERFORMANCE OBJECTIVESStudents will learn:

Perform a clean installation of Windows 7, upgrade to Windows 7, and migrate user-related data and settings from an earlier version of Windows.

Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer.

Configure file access and printers on a Windows 7 client computer. Configure network connectivity on a Windows 7 client computer. Configure wireless network connectivity on a Windows 7 client computer. Secure Windows 7 client desktop computers.

100

Page 101: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Optimize and maintain the performance and reliability of a Windows 7 client computer.

Configure mobile computing and remote access settings for a Windows 7 client computer.

TARGETED JOB ROLES System Support Specialist Systems Engineer Windows 7 Specialist Windows Help Desk Technician Technical Support Representative

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $1,645Materials: $150Total Tuition Fee: $1,795

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

6292 Installing & Configuring Windows Client 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

101

Page 102: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

REQUIRED TEXTBOOK70-680 Windows 7 ConfigurationOfficial Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-680

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Installing, Upgrading, and Migrating to Windows 7

Preparing to install Windows 7 Performing a Clean Installation of Windows 7 Upgrading and Migrating to Windows 7 Performing Image-based Installation of Windows 7 Configuring Application Compatibility Lab A: Installing and Configuring Windows 7

Lesson 2: Configuring Disks and Device Drivers Partitioning Disk in Windows 7 Managing Disk Volumes Maintaining Disk in Windows 7 Lab: Configuring Disk and Device Drivers

Lesson 3: Configuring File Access and Printers on Windows 7 Client Computers Overview of Authentication and Authorization Managing File Access in Windows 7 Managing Shared Folders Configuring File Compression Managing Printing Lab A: Configuring File Access and Printers on Windows 7 Client Computers

Lesson 4: Configuring Network Connections

102

Page 103: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configuring IPv4 Network Connectivity Configuring IPv6 Network Connectivity Implementing Automatic IP Address Allocation Lab A: Configuring Network Connection Implementing Name Resolution Troubleshooting Network Connectivity Lab B: Troubleshooting Network Connectivity

Lesson 5: Configuring Wireless Network Connections Overview of Wireless Networks Implementing a Wireless Network Lab: Configuring Wireless Network Connections

Lesson 6: Securing Windows 7 Desktop Overview of Security Management in Windows 7 Securing a Windows 7 Client computer by Using Local Security Policy Settings Securing Data by Using EFS and BitLocker Configuring Application Restrictions Configuring User Account Control Configuring Windows Firewall Configuring Security Setting in Internet Explorer 8 Configuring Windows Defender Lab A: Configuring Windows Firewall, Internet Explorer 8 Security Settings, and

Windows Defender Lab B: Configuring UAC, Local Security Policies, EFS, and AppLocker

Lesson 7: Optimizing and Maintaining Windows 7 Client Computers Maintaining Performance by Using the Windows 7 Performance Tools Maintaining Reliability by Using the Windows 7 Diagnostic Tools Backing Up and Restoring Data by Using Windows Backup Restoring a Windows 7 System by Using System Restore Points Configuring Windows Update Lab A: Optimizing and Maintaining Windows 7 Client Computers

Lesson 8: Configuring Mobile Computing and Remote Access in Windows 7 Configuring Mobile Computer and Device Settings Configuring Remote Desktop and Remote Assistance for Remote Access Configuring DirectAccess for Remote Access Configuring BranchCache for Remote Access Lab A: Configuring Mobile Computing and Remote Access in Windows 7

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

6293: TROUBLESHOOTING & SUPPORTING WINDOWS 7 IN THE ENTERPRISE

103

Page 104: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM DESCRIPTION This course is designed for Information Technology (IT) professionals who have experience with Windows XP and Windows Vista who work as Windows 7 Enterprise Desktop Support Technicians (EDSTs) in Tier 2 support environments. The goal of this training is to enable these individuals to support the Windows 7 operating system and solve technical troubleshooting problems in a Windows 7 and Windows Server 2008 R2 networking environment. By the course’s end, students will have been exposed to the process of establishing and using a troubleshooting methodology, and the EDST job role and responsibilities. Additionally, students will be exposed to various troubleshooting tools and techniques that enable them to address the following Windows 7 issues in an enterprise network environment.

PERFORMANCE OBJECTIVESStudents will learn:

Describe the processes of establishing and using a troubleshooting methodology, and define the EDST job role and responsibilities.

Troubleshoot startup issues on a Windows 7 computer. Troubleshoot client-configuration failures and Group Policy object (GPO)

application issues. Troubleshoot hardware device, device driver, and performance issues. Troubleshoot network connectivity issues. Troubleshoot remote connectivity issues. Troubleshoot logon and resource access issues. Troubleshoot security system issues, such as Encrypting File Systems (EFS)

BitLocker Drive Encryption, and file permissions. Troubleshoot operating system and applications issues.

TARGETED JOB ROLES System Support Specialist Systems Engineer Windows 7 Specialist Windows Help Desk Technician Technical Support Representative

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Networking fundamentals, including TCP/IP/User Datagram Protocol (UDP),

Domain Name System (DNS) Active Directory principles and management

104

Page 105: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Windows Server 2008 fundamentals Windows operating systems and updates Client network connectivity

TUITION AND FEES

Registration: $0Base Tuition: $1,550Materials: $245Total Tuition Fee: $1,795

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

6293 Troubleshooting & Supporting Windows 7 in the Enterprise 40

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK

70-685 Windows 7 ConfigurationOfficial Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-685

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

105

Page 106: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Implementing a Troubleshooting Methodology

Introduction to EDST Job Role Overview of Troubleshooting Steps

Lesson 2: Troubleshooting Startup Issues Overview of the Windows 7 Recovery Environment Configuring and Troubleshooting Startup Settings Troubleshooting Operating System Services Issues Lab A: Troubleshooting Startup Issues

Lesson 3: Using Group Policy to Centralize Configuration Overview of Group Policy Application Resolve Group Policy Application

Lesson 4: Troubleshooting Hardware Device, Device Driver, and Performance Issues Overview of Hardware Troubleshooting Troubleshooting Physical Failures Monitoring Reliability and Performance Configuring Performance Options in Windows 7 Troubleshooting Device Driver Failures Lab A: Resolving Hardware Device and Device Driver Issues Lab B: Troubleshooting Performance-Related Issues

Lesson 5: Troubleshooting Network Connectivity Issues Determining Network Settings Troubleshooting Network Connectivity Issues Lab A: Troubleshooting Network Connectivity Issues

Lesson 6: Troubleshooting Remote Connectivity Issues Troubleshooting VPN Connectivity Issues Using Remote Desktop Troubleshooting User Issues by Using Remote Assistance Troubleshooting NAP Issues Troubleshooting DirectAccess Issues Lab A: Resolving remote connectivity Issues

Lesson 7: Troubleshooting Logon and Resource Access Issues Troubleshooting User Logon Issues Troubleshooting User Profile Issues Troubleshooting File Access Issues Troubleshooting File Permissions Issues Troubleshooting Printer Access Issues Lab A: Troubleshooting Logon and Resource Access Issues

106

Page 107: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 8: Troubleshooting Security Issues Recovering Files Encrypted by EFS Recovering BitLocker-Protected Drives Troubleshooting Internet Explorer and Content Access Issues Lab A: Troubleshooting Security Issues

Lesson 9: Troubleshooting Operating System and Application Issues Troubleshooting Application Installation Issues Troubleshooting Application Operations Issues Applying Application and Windows Updates Lab A: Troubleshooting Operating System and Application Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

MCSA WINDOWS 8 ASSOCIATE – DESKTOP SUPPORT SPECIALIST

PROGRAM DESCRIPTIONThis program provides hands-on experience with Windows 8. It provides guidance on installing, upgrading, and licensing for Windows 8. Students will learn how to manage storage and how to optimize file-system performance. Additionally, they will learn how to manage available disk space by using quotas. Students will work with Windows tools and services to determine the source of performance and reliability issues, and to troubleshoot these issues. The program also describes how to configure networking to include IPv4, IPv6, how connect to wireless networks, and use the networking features included in Windows 8 to troubleshoot networking issues. Students will also learn preventive measures and tools that work together to protect their computers from security threats. The program then covers the features related to file and folder management, which include setting permissions, file/folder compression, and configuring shared folders. Students will also learn about installing and managing printers. Additionally, the program provides an overview of the SkyDrive functionality, and describes the procedures to install and configure applications, including Windows Store apps. The program also examines the fundamentals of working with virtual machines in the Client Hyper-V environment in Windows 8.Throughout the program, students will use Windows PowerShell 3.0, and its graphical user interface (GUI) to configure and manage the system. Students will also use the scripting editor to create and examine PowerShell scripts used to manage the system.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate)

107

Page 108: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

In the event the applicant is unable to provide proof of secondary education, achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

20687 Configuring Windows 8 20/20/0/4020688 Maintaining and Managing

Windows 8 20/20/0/40The approximate time required to complete this program is ten days for day students and twenty nights for evening students.

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Tuition: $5,444Materials: $546Total Tuition Fee: $5,990

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

20687A Configuring Windows 8 $2,995

20688A Maintaining and Managing Windows 8 $2,995

CERTIFICATIONS REQUIRED 70-687 Configuring Windows 8 70-688 Maintaining and Managing Windows 8

TARGETED JOB ROLES System Support Specialist Systems Engineer Windows 8 Specialist Windows Help Desk Technician Technical Support Representative

SUBJECT DESCRIPTIONS

108

Page 109: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

20687D: CONFIGURING WINDOWS 8.1

PROGRAM DESCRIPTION Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course is designed for experienced IT professionals who have knowledge and experience administering Windows PCs and devices in a domain environment with managed access to the Internet. You will learn the skills you need to administer Windows 8.1 in a Windows Server domain environment and also provide secure, managed access to users from their non-domain joined Windows devices. You will learn how to install and customize Windows 8.1 operating systems and apps, integrate and control access to domains and cloud services, and migrate and synchronize settings across multiple devices. In addition, you will learn how to implement mobile security and customize configurations using Windows management tools including Group Policy and Windows PowerShell cmdlets. You will also learn how to configure user settings and profiles, local and remote network connectivity, Client Hyper-V, virtual apps, and Internet Explorer 11. Finally, you will learn how to optimize security and provide controlled access from Windows 8.1 PCs and devices to specified resources through Workplace Join services and Work Folders. This course is also designed to prepare certification candidates for 70-687, Configuring Windows 8.1. As part of the learning experience, you will perform hands-on exercises in a virtual lab environment.

PERFORMANCE OBJECTIVESStudents will learn:

Describe solutions and features related to managing Windows 8.1 in an enterprise network environment.

Determine requirements and perform the tasks for installing and deploying Windows 8.1.

Manage profiles and user state between Windows devices. Determine the most appropriate management tools to configure Windows 8.1

settings. Configure disks, partitions, volumes, and device drivers in a Windows 8.1

system. Configure network connectivity. Configure resource connectivity for both domain-joined and non-domain joined

PCs and devices. Implement Windows 8.1 technologies to secure network connections. Configure file, folder, and printer access. Implement tools and technologies that can help secure Windows 8.1 PCs and

devices. Configure and control desktop apps, Windows Store apps, and virtual apps. Optimize and maintain Windows 8.1 PCs and devices. Configure mobile computer settings and to enable remote access. Determine how to recover Windows 8.1 from various failures. Describe and configure Client Hyper-V.

TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Technicians

109

Page 110: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+/Net+/Sec+ certifications

TUITION AND FEES

Registration: $0Base Tuition: $2,722Materials: $273Total Tuition Fee: $2,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20687 Configuring Windows 8.1 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK

70-687 Windows 8.1 ConfigurationOfficial Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-687

110

Page 111: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Installing and Deploying Windows 8

Introducing Windows 8 Preparing to Install Windows 8 Installing Windows 8 Lab A: Installing Windows 8 Automating the Installation of Windows 8 Lab B: Performing an Unattended Installation of Windows 8 Activating Windows 8

Lesson 2: Upgrading and Migrating to Windows 8

Upgrading to Windows 8 Migrating to Windows 8 Migrating User Data and Settings Lab: Migrating to Windows 8

Lesson 3: Managing Disks and Device Drivers

Managing Disks, Partitions, and Volumes Maintaining Disks, Partitions, and Volumes Working with Virtual Hard Disks Lab A: Managing Disks Installing and Configuring Device Drivers Lab B: Configuring Device Drivers

Lesson 4: Configuring and Troubleshooting Network Connections

Configuring IPv4 Network Connectivity Configuring IPv6 Network Connectivity Implementing Automatic IP Address Allocation Lab A: Configuring Network Connection Implementing Name Resolution Troubleshooting Network Connectivity Lab B: Troubleshooting Network Connectivity

Lesson 5: Implementing Wireless Network Connections

111

Page 112: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Overview of Wireless Networks Implementing a Wireless Network Lab: Planning the Implementation of Wireless Network Connections

Lesson 6: Implementing Network Security

Overview of Threats to Network Security Implementing Windows Firewall Lab A: Configuring Inbound and Outbound Firewall Rules Securing Network Traffic Lab B: Configuring IPSec Rules Configuring Windows Defender Lab C: Configuring Host-Based Virus and Malware Protection

Lesson 7: Configuring File Access and Printers on Windows 8 Clients

Managing File Access Managing Shared Folders Configuring File Compression Lab A: Configuring File Access Managing Printers Lab B: Configuring Printers Overview of SkyDrive

Lesson 8: Securing Windows 8 Desktops

Authentication and Authorization in Windows 8 Implementing GPOs Lab A: Implementing Local Group Policy Objects (GPOs) Securing Data with EFS and BitLocker Lab B: Securing Data Configuring User Account Control Lab C: Configuring Testing User Account Control (UAC)

Lesson 9: Configuring Applications

Install and Configure Applications Managing Apps from the Windows Store Configuring Internet Explorer Settings Lab A: Configuring Internet Explorer Security Configuring Application Restrictions in the Enterprise Lab B: Configuring AppLocker

Lesson 10: Optimizing and Maintaining Windows 8 Client Computers

Optimizing the Performance of Windows 8 Lab A: Optimizing Windows 8 Performance Managing the Reliability of Windows 8 Managing Windows 8 Updates Lab B: Maintaining Windows Updates

Lesson 11: Configuring Mobile Computing and Remote Access

Configuring Mobile Computers and Device Settings Lab A: Configuring a Power Plan Configuring VPN Access

112

Page 113: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lab B: Implementing a Virtual Private Network Connection Configuring Remote Desktop and Remote Assistance Lab C: Implementing Remote Desktop Overview of DirectAccess

Lesson 12: Implementing Hyper-V

Overview of Hyper-V Creating Virtual Machines Managing Virtual Hard Disks Managing Snapshots Lab: Implementing Hyper-V

Lesson 13: Troubleshooting and Recovering Windows 8

Backing Up and Restoring Files in Windows 8 Recovery Options in Windows 8 Lab: Recovering Windows 8

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20688D: SUPPORTING WINDOWS 8.1

PROGRAM DESCRIPTION Gain the knowledge and skills you need to support the Windows 8.1 operating system and solve technical troubleshooting problems in a Windows 8.1 and Windows Server 2012 R2 networking environment.  This course is designed for IT professionals who have experience with Windows devices and who work as Windows Enterprise Desktop Support Technicians (EDSTs) in Tier 2 support environments. Through this instructor lead, five day Microsoft Official Course, with extensive hands-on labs you will learn how key components of the Windows Operating system work in order to aid in troubleshooting system problems. How to identify and resolve issues with networking, Windows Store apps, security, group policy, Internet Explorer, remote access, and support of mobile devices.This course uses new versions of Desktop Optimization Package (MDOP), Application Compatibility Toolkit (ACT), Windows Performance Toolkit (WPT), Microsoft Message Analyzer, and is the first course that uses the popular Sysinternals tools, and other tools. This course also helps candidates prepare for 70-688, MCSA: Supporting Windows 8.1.

PERFORMANCE OBJECTIVESStudents will learn:

Describe the processes involved in planning and using a troubleshooting methodology for Windows 8.1.

Troubleshoot startup issues and operating system services on a Windows 8.1 system.

Resolve issues related to hardware devices and device drivers.

113

Page 114: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Troubleshoot computers remotely. troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to user settings. Troubleshoot remote connectivity issues. Resolve issues related to accessing resources from computers that are domain-

joined. Resolve issues related to accessing resources from computers that are not

domain-joined. Troubleshoot issues related to application installation and operation. Maintain Windows 8.1 following deployment. Design and implement extranet connectivity for Windows 8. Recover a computer running Windows 8.1.

TARGETED JOB ROLES IT Professionals Enterprise/Desktop Support Technicians

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+/Net+/Sec+ certifications

TUITION AND FEES

Registration: $0Base Tuition: $2.722Materials: $273Total Tuition Fee: $2,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

114

Page 115: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20688 Supporting Windows 8.1 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK70-688 Windows 8.1 SupportingOfficial Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-688

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Planning and Implementing Management of Windows 8

Local and Remote Management of Windows 8 Using Windows PowerShell for Management Using Group Policy for Management Additional Tools for Managing Windows 8

Lesson 2: Designing and Implementing an Installation Strategy

Determining a Deployment Strategy for Windows 8 Planning a Migration Strategy to Windows 8 Planning and Implementing Additional Windows 8 Deployment Methods Planning for Operating System Virtualization

Lesson 3: Planning and Implementing Authentication for Windows 8

Overview of User Authentication Overview of Domain-Based Security

115

Page 116: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 4: Planning and Implementing IP Addressing and Intranet Connectivity

Designing IPv4 Addressing Designing IPv6 Addressing Overview of Wired Network Connectivity Designing Wireless Network Connectivity Securing Network Connectivity with Windows Firewall

Lesson 5: Implementing an Application Strategy for Windows 8

Designing Application Deployment Planning an Application Compatibility Strategy Managing Windows 8 Apps

Lesson 6: Planning and Implementing a Solution for User Settings

Managing User Profiles Overview of UE-V Deploying and Using UE-V

Lesson 7: Configuring Cloud Services

Overview of Cloud Services Overview of Office 365

Lesson 8: Implementing Windows Intune

Introduction to Windows Intune Deploying Windows Intune Clients Basic Windows Intune Administration

Lesson 9: Managing Computers by Using Windows Intune

Working with Policies and Updates Deploying Software with Windows Intune

Lesson 10: Planning and Implementing Access to File and Print Resources

Managing Local Storage Planning Access to File Shares Planning File Caching Planning, Installing and Configuring Printing

Lesson 11: Planning and Implementing Encryption for Windows 8

Planning EFS Planning and Implementing BitLocker

Lesson 12: Designing and Implementing Endpoint Security for Windows 8

Planning an Update Strategy Implementing Virus and Malware Protection Implementing AppLocker

Lesson 13: Designing and Implementing Extranet Connectivity

Configuring Virtual Private Networks for Windows 8

116

Page 117: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Planning Direct Access for Windows 8 Managing Mobile Devices

Lesson 14: Planning and Implementing a Recovery Solution

Overview of the Windows 8 Boot Process Repairing Stability Issues in Windows 8 Planning User Data Recovery for Windows 8

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

MCSA SQL SERVER ADMINISTRATOR

PROGRAM DESCRIPTIONThe data explosion is happening at every level of the business—across devices, applications, and individual roles. Becoming certified on Microsoft SQL Server proves your knowledge and skills in designing, building, and maintaining the next wave of cloud-ready database and information solutions. As a Database administrator, you will use software to store and organize data, such as financial information and customer shipping records. You will make sure that data is available to users and is secure from unauthorized accessThis program is for experienced database administrators, implementers, system engineers, and developers.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

20461 Querying Microsoft SQL Server 20/20/0/40

20262 Administering Microsoft SQL Server 2014 Database 20/20/0/40

20463Implementing a Data Warehouse with SQL Server 2014

20/20/0/40

117

Page 118: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The approximate time required to complete this program is fifteen days for day students and thirty days for evening students

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $8,121Materials: $864Total Tuition Fee: $8,985

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

20461 Querying Microsoft SQL Server $2,99520462 Administering Microsoft SQL

Server Database $2,995

20463 Implementing a Data Warehouse with SQL Server $2,995

CERTIFICATIONS REQUIRED 70-461 Querying Microsoft SQL Server 70-462 Administering Microsoft SQL Server Database 70-463 Implementing a Data Warehouse with Microsoft SQL Server

TARGETED JOB ROLES System Database Administrator Application Database Administrator System Engineer Database Developer Business Intelligence Architect

SUBJECT DESCRIPTIONS

20461D: QUERYING MICROSOFT SQL SERVER 2014

PROGRAM DESCRIPTION This 5-day instructor led course provides students with the technical skills required to write basic Transact-SQL queries for Microsoft SQL Server 2014. This course is the foundation for all SQL Server-related disciplines; namely, Database Administration,

118

Page 119: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Database Development and Business Intelligence. The main purpose of the course is to prepare people for the "70-461: Writing Queries Using Microsoft® SQL Server® 2014 Transact-SQL." This certification will be the underlying cert for all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. As such, the primary target audience for this course is: Database Administrators, Database Developers and BI professionals.

PERFORMANCE OBJECTIVESStudents will learn:

Describe the basic architecture and concepts of Microsoft SQL Server 2014. Understand the similarities and differences between Transact-SQL and other

computer languages. Write SELECT queries Query multiple tables Sort and filter data Describe the use of data types in SQL Server Modify data using Transact-SQL Use built-in functions Group and aggregate data Use subqueries Use table expressions Use set operators Use window ranking, offset and aggregate functions Implement pivoting and grouping sets Execute stored procedures Program with T-SQL Implement error handling Implement transactions

TARGETED JOB ROLES Database Administrators Database Developers Business IT Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Working knowledge of relational databases. Basic knowledge of the Microsoft Windows operating system and its core

functionality.

119

Page 120: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEES

Registration: $0Base Tuition: $2,557Materials: $288Total Tuition Fee: $2,845

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20461 Querying a Microsoft SQL Server 2014 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK20461: Querying a Microsoft SQL Server 2014 Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-461

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINE

120

Page 121: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 1: Introduction to Microsoft SQL Server 2014

The basic Architecture of SQL Server SQL Server Editions and Versions Getting Started with SQL Server Management Studio Lab: Working with SQL Server 2014 Tools

Lesson 2: Introduction to T-SQL Querying

Introducing T-SQL Understanding Sets Understanding Predicate Logic Understanding the Logical Order of Operations in SELECT Statements Lab: Introduction to T-SQL Querying

Lesson 3: Writing SELECT Queries

Writing Simple SELECT Statements Eliminating Duplicates with DISTINCT Using Column and Table Aliases Writing Simple CASE Expressions Lab: Writing Basic SELECT Statements

Lesson 4: Querying Multiple Tables

Understanding Joins 5-3 Querying with Inner Joins 5-11 Querying with Outer Joins 5-18 Querying with Cross Joins and Self-Joins 5-24 Lab: Querying Multiple Tables 5-34

Lesson 5: Sorting and Filtering Data

Sorting Data Filtering Data with Predicates Filtering with TOP and OFFSET-FETCH Working with Unknown Values Lab: Sorting and Filtering Data

Lesson 6: Working with SQL Server 2014 Data Types

Introducing SQL Server 2014 Data Types Working with Character Data Working with Date and Time Data Lab: Working with SQL Server 2014 Data Types

Lesson 7: Using Built-In Functions

Writing Queries with Built-In Functions Using Conversion Functions Using Logical Functions Using Functions to Work with NULL Lab: Using Built-In Functions

121

Page 122: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 8: Grouping and Aggregating Data

Using Aggregate Functions Using the GROUP BY Clause Filtering Groups with HAVING Lab: Grouping and Aggregating Data

Lesson 9: Using Subqueries

Writing Self-Contained Subqueries Writing Correlated Subqueries Using the EXISTS Predicate with Subqueries Lab: Using Subqueries

Lesson 10: Using Table Expressions

Using Views Using Inline Table-Valued Functions Using Derived Tables Using Common Table Expressions Lab: Using Table Expressions

Lesson 11: Using Set Operators

Writing Queries with the UNION Operator Using EXCEPT and INTERSECT Using APPLY Lab: Using Set Operators

Lesson 12: Using Window Ranking, Offset, and Aggregate Functions

Creating Windows with OVER Lesson 2: Exploring Window Functions Lab: Using Window Ranking, Offset, and Aggregate Functions 13-26 Querying

Microsoft SQL Server 2012 Lesson 13: Pivoting and Grouping Sets

Writing Queries with PIVOT and UNPIVOT Working with Grouping Sets Lab: Pivoting and Grouping Sets

Lesson 14: Querying SQL Server Metadata

Querying System Catalog Views and Functions Executing System Stored Procedures Querying Dynamic Management Objects Lab: Querying SQL Server Metadata

Lesson 15: Executing Stored Procedures

Querying Data with Stored Procedures Passing Parameters to Stored Procedures Creating Simple Stored Procedures Working with Dynamic SQL Lab: Executing Stored Procedures

122

Page 123: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 16: Programming with T-SQL

T-SQL Programming Elements Controlling Program Flow Lab: Programming with T-SQL

Lesson 17: Implementing Error Handling

Using TRY / CATCH Blocks Working with Error Information Lab: Implementing Error Handling

Lesson 18: Implementing Transactions

Transactions and the Database Engine Controlling Transactions Lab: Implementing Transactions

Lesson 19: Improving Query Performance

Factors in Query Performance Displaying Query Performance Data Lab: Improving Query Performance

Lesson 20: Querying SQL Server Metadat

Querying System Catalog Views and Functions Executing System Stored Procedures Querying Dynamic Management Objects

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20462D: ADMINSTERING MICROSOFT SQL SERVER 2014 DATABASES

PROGRAM DESCRIPTION This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on teaching individuals how to use SQL Server 2014 product features and tools related to maintaining a database.

PERFORMANCE OBJECTIVESStudents will learn:

Describe core database administration tasks and tools. Install and configure SQL Server 2014. Configure SQL Server databases and storage. Plan and implement a backup strategy. Restore databases from backups. Import and export data. Monitor SQL Server. Trace SQL Server activity.

123

Page 124: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Manage SQL Server security. Audit data access and encrypt data. Perform ongoing database maintenance. Automate SQL Server maintenance with SQL Server Agent Jobs. Configure Database Mail, alerts and notifications.

TARGETED JOB ROLES Database Administrators Database Developers Business IT Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES 20461: Writing T-SQL Queries for Microsoft SQL Server - OR Basic knowledge of the Microsoft Windows operating system and its core

functionality. Working knowledge of Transact-SQL. Working knowledge of relational databases. Some experience with database design.

TUITION AND FEES

Registration: $0Base Tuition: $2,557Materials: $288Total Tuition Fee: $2,845

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20462 Administering Microsoft SQL Server Databases 40

124

Page 125: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK

20462: Querying a Microsoft SQL Server 2014 Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-462

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINE

Lesson 1: Introduction to SQL Server 2014 Database Administration

Database Administration Overview Introduction to the SQL Server Platform Database Management Tools and Techniques Lab 1: Introduction to SQL Server and Its Toolset

Lesson 2: Installing and Configuring SQL Server 2014

Preparing to Install SQL Server Installing SQL Server Upgrading and Automating Installation Lab 2: Installing and Configuring SQL Server

Lesson 3: Working with Databases and Storage

Overview of SQL Server Databases Working with Files and Filegroups Moving Database Files Lab 3: Working with Databases

Lesson 4: Planning and Implementing a Backup Strategy

125

Page 126: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Understanding SQL Server Recovery Models Planning a Backup Strategy Backing up Databases and Transaction Logs Using Backup Options Ensuring Backup reliability Lab 4: Backing up SQL Server Databases

Lesson 5: Restoring SQL Server 2014 Databases

Understanding the Restore Process Restoring Databases Advanced Restore Scenarios Lab 5: Understanding SQL Server Recovery Models

Lesson 6: Importing and Exporting Data

Introduction to Transferring Data Importing and Exporting Table Data Copying or Moving a Database Lab 6: Importing and Exporting Data

Lesson 7: Monitoring SQL Server 2014

Introduction to Monitoring SQL Server Dynamic Management Views and Functions Performance Monitor Lab 7: Monitoring SQL Server 2014

Lesson 8: Tracing SQL Server Activity

Tracing SQL Server Workload Activity Using Traces Tracing SQL Server Workload Activity

Lesson 9: Managing SQL Server Security

Introduction to SQL Server Security Managing Server –Level Security Managing Databases-Level Principals Lab 9: Managing SQL Server Security

Lesson 10: Auditing Data Access and encrypting Data

Auditing Data Access in SQL Server Implementing SQL Server Audit Encrypting Databases Lab 10: Auditing Data Access and Encrypting Data

Lesson 11: Performing Ongoing Database Maintenance

Ensuring Database Integrity Maintaining Indexes LAutomating Routine Database Maintenance Lab 11: Performing Ongoing Database Maintenance

Lesson 12: Automating SQL Server 014 Management

126

Page 127: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Automating SQL Server Management Implementing SQL Server Agent Jobs Managing SQL Server Agent Jobs Lab 12: Automating SQL Server Management

Lesson 13: Monitoring SQL Server 2014 by Using Alerts and Notifications

Monitoring SQL Server Errors Configuring Database Mail .Configuring Operators, Alerts, and Notifications Lab 13: Monitoring SQL Server by Using Alerts and Notifications

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20463D: IMPLENENTING A DATA WAREHOUSE WITH MS SQL SERVER 2014

PROGRAM DESCRIPTIONThis course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft® SQL Server® 2014, implement ETL with SQL Server Integration Services, and validate and cleanse data with SQL Server Data Quality Services and SQL Server Master Data Services.

PERFORMANCE OBJECTIVESStudents will learn:

Describe data warehouse concepts and architecture considerations. Select an appropriate hardware platform for a data warehouse. Design and implement a data warehouse. Implement Data Flow in an SSIS Package. Implement Control Flow in an SSIS Package. Debug and Troubleshoot SSIS packages. Implement an ETL solution that supports incremental data extraction. Implement an ETL solution that supports incremental data loading. Implement data cleansing by using Microsoft Data Quality Services. Implement Master Data Services to enforce data integrity. Extend SSIS with custom scripts and components. Deploy and Configure SSIS packages. Describe how BI solutions can consume data from the data warehouse.

TARGETED JOB ROLES Business Intelligence Roles

ADMISSION REQUIREMENTS

127

Page 128: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES 20461: Administering Microsoft SQL Server 2012 Database - OR At least 2 years’ experience of working with relational databases, including: Designing a normalized database. Creating tables and relationships. Querying with Transact-SQL. Some exposure to basic programming constructs (such as looping and

branching). An awareness of key business priorities such as revenue, profitability, and

financial accounting is desirable.

TUITION AND FEES

Registration: $0Base Tuition: $2,557Materials: $288Total Tuition Fee: $2,845

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20463 Implementing a Data Warehouse with MS SQL 40

The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.

REQUIRED TEXTBOOK20463: Querying a Microsoft SQL Server 2014 Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED

128

Page 129: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

70-463

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to Data Warehousing

Overview of Data Warehousing Considerations for a Data Warehouse Solution Lab 1: Exploring a Data Warehousing Solution

Lesson 2: Data Warehouse Hardware Considerations

Considerations for Building a Data Warehouse Data Warehouse Reference Architectures and Appliances

Lesson 3: Designing and Implementing a Data Warehouse

Logical Design for a Data Warehouse Physical Design for a Data Warehouse Lab 3: Implementing a Data Warehouse Schema

Lesson 4: Creating an ETL Solution with SSIS

Introduction to ETL with SSIS Exploring Source Data Implementing Data Flow Lab 4: Implementing Data Flow in an SSIS Package

Lesson 5: Implementing Control Flow in an SSIS Package

Introduction to Control Flow Creating Dynamic Packages Using Containers Lab 5A: Implementing Control Flow in an SSIS Package Managing Consistency Lab 5B: Using Transactions and Checkpoints

Lesson 6: Debugging and Troubleshooting SSIS Packages

Debugging an SSIS Package

129

Page 130: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Logging SSIS Package Events Handling Errors in an SSIS Package Lab 6: Debugging and Troubleshooting an SSIS Package

Lesson 7: Implementing an Incremental ETL Process

Introduction to Incremental ETL Extracting Modified Data Lab 7A: Extracting Modified Data Loading Modified Data Lab 7B: Loading Incremental Changes

Lesson 8: Enforcing Data Quality

Introduction to Data Quality Using Data Quality Services to Cleanse Data Lab 8A: Cleansing Data Using Data Quality Services to Match Data Lab 8B: Deduplication Data

Lesson 9: Using Master Data Services

Introduction to Master Data Services Implementing a Master Data Services Model 1 Managing Master Data Creating a Master Data Hub Lab 9: Implementing Master Data Services

Lesson 10: Extending SQL Server Integration Services

Using Custom Components in SSIS Using Scripts in SSIS Lab 10: Using Custom Components and Scripts

Lesson 11: Deploying and Configuring SSIS Packages

Overview of SSIS Deployment Deploying SSIS Projects Planning SSIS Package Execution Lab 11: Deploying and Configuring SSIS Packages 1

Lesson 12: Consuming Data in a Data Warehouse

Introduction to Business Intelligence Introduction to Reporting Introduction to Data Analysis Lab 12: Using Business Intelligence Tools

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

MICROSOFT WEB DEVELOPMENT SPECIALIST (MWD)

130

Page 131: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM DESCRIPTIONThis program is primarily for those intending to build a career as a web developer, preparing you for today’s main tools and technologies for developing interactive web sites using Microsoft’s Visual Studio development tools. Through this program, you will the basics of computer programming through the use of Microsoft Visual Studio and the Visual C# programming language. Then you will gain basic HTML5 /CSS3 /JavaScript programming skills. This program assumes no prior programming experience and begins with an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Then you will transition to the topic or HTML5 /CSS3 /JavaScript and implementing programming logic, defining and using variables, performing looping and branching, developing user interfaces, capturing and validating user input, storing data, and creating well-structured applications.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test

PROGRAM OUTLINE

Subject Number Subject TitleClock Hours

Lecture/Lab/Ext/Total

10975 Introduction to Programming 20/20/0/40

20480 Programming in HTML5 with JavaScript and CSS3 20/20/0/40

The approximate time required to complete this program is ten days for day students and twenty nights for evening students.

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEESRegistration: $0Base Tuition: $5,264Materials: $576Total Tuition Fee: $5,840

COST PER SINGLE SUBJECT

131

Page 132: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Subject Number Subject Title Cost

10975 Introduction to Programming $2,845

20480 Programming in HTML5 with JavaScript and CSS3 $2,995

CERTIFICATION REQUIRED 70-480 Microsoft Specialist: Programming in HTML5 with JavaScript and CSS3

TARGETED JOB ROLES Junior Web Developer HTML5 Developer Software Support Engineer Programmer/Analyst Front End Web Developer

SUBJECT DESCRIPTIONS

10975A: INTRODUCTION TO PROGRAMMING

PROGRAM DESCRIPTION In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2013 and either the Visual C# or Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, such as 20483B: Programming in C#.The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management.

PERFORMANCE OBJECTIVESStudents will learn:

Explain core programming fundamentals such as computer storage and processing.

Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and

queues. Implement object-oriented programming concepts. Create and use classes in a computer program.

132

Page 133: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle

errors. Identify the performance considerations for applications.

TARGETED JOB ROLES Entry Level IT Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Ability to use computers to start programs, open and save files, navigate

application menus and interfaces Ability to understand logical concepts such as comparisons Understand number theory Ability to create, understand, and follow structured directions or step-by-step

procedures Ability to understand and apply abstract concepts to concrete examples.

TUITION AND FEES

Registration: $0Base Tuition: $2,557Materials: $288Total Tuition Fee: $2,845

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

133

Page 134: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

10975 Introduction to Programming 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOK10975A: Introduction to Programming Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED NA

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINEDay 1

Lesson 1: Introduction to Core Programming Concepts

Computer Data Storage and Processing Application Types Application Life-Cycle Code Compilation

Lesson 2: Core Programming Language Concepts

Syntax Data Types Variables and Constants

Day 2

Lesson 3: Program Flow

Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition

134

Page 135: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 4: Algorithms and Data Structures

Understand How to Write Pseudo Code Algorithm Examples Introduction to Data Structures

Lesson 5: Error Handling and Debugging

Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging in Visual Studio

Day 3

Lesson 6: Introduction to Object-Oriented Programming

Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation

Day 4

Lesson 7: More Object-Oriented Programming

Introduction to Inheritance Introduction to Polymorphism Introduction to the .NET Framework and the Base Class Library

Lesson 8: Introduction to Application Security

Authentication and Authorization Code Permissions on Computers Introducing Code Signing

Day 5

Lesson 9: Core I/O Programming

Using Console I/O Using File I/O

Lesson 10: Application Performance and Memory Management

Value Types vs Reference Types Converting Types The Garbage Collector

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20480B: PROGRAMMING IN HTML 5 WITH JAVASCRIPT AND CSS3

135

Page 136: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM DESCRIPTION This course provides an introduction to HTML5, CSS3, and JavaScript. This course helps students gain basic HTML5/CSS3/JavaScript programming skills. This course is an entry point into both the Web application and Windows Store apps training paths. The course focuses on using HTML5/CSS3/JavaScript to implement programming logic, define and use variables, perform looping and branching, develop user interfaces, capture and validate user input, store data, and create well-structured application.The lab scenarios in this course are selected to support and demonstrate the structure of various application scenarios. They are intended to focus on the principles and coding components/structures that are used to establish an HTML5 software application.

PERFORMANCE OBJECTIVESStudents will learn:

Explain how to use Visual Studio 2012 to create and run a Web application. Describe the new features of HTML5, and create and style HTML5 pages. Add interactivity to an HTML5 page by using JavaScript. Create HTML5 forms by using different input types, and validate user input by

using HTML5 attributes and JavaScript code. Send and receive data to and from a remote data source by using

XMLHTTPRequest objects and jQuery AJAX operations. Style HTML5 pages by using CSS3. Create well-structured and easily-maintainable JavaScript code. Use common HTML5 APIs in interactive Web applications. Create Web applications that support offline operations. Create HTML5 Web pages that can adapt to different devices and form factors. Add advanced graphics to an HTML5 page by using Canvas elements, and by

using and Scalable Vector Graphics. Enhance the user experience by adding animations to an HTML5 page. Use Web Sockets to send and receive data between a Web application and a

server. Improve the responsiveness of a Web application that performs long-running

operations by using Web Worker processes.

TARGETED JOB ROLES Entry Level IT Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES

136

Page 137: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Ability to use computers to start programs, open and save files, navigate application menus and interfaces

Ability to understand logical concepts such as comparisons Understand number theory Ability to create, understand, and follow structured directions or step-by-step

procedures Ability to understand and apply abstract concepts to concrete examples. students who attend this training should have a combination of practical and

conceptual knowledge related to HTML5 programming.

TUITION AND FEES

Registration: $0Base Tuition: $2,707Materials: $288Total Tuition Fee: $2,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20480 Programming in HTML 5 with JavaScript and CSS3 40

The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.

REQUIRED TEXTBOOK20480A: Programming in HTML 5 with Javascript and CSS3Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-480

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

137

Page 138: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINEDay 1

Lesson 1: Overview of HTML and CSS Overview of HTML Overview of CSS Creating a Web Application by Using Visual Studio 2012

Lesson 2: Creating and Styling HTML Pages Creating an HTML5 Page Styling an HTML5 Page

Lesson 3: Introduction to JavaScript Overview of JavaScript Syntax Programming the HTML DOM with JavaScript Introduction to jQuery

Day 2

Lesson 4: Creating Forms to Collect and Validate User Input Overview of Forms and Input Types Validating User Input by Using HTML5 Attributes Validating User Input by Using JavaScript

Lesson 5: Communicating with a Remote Data Source Sending and Receiving Data by Using XMLHTTPRequest Sending and Receiving Data by Using jQuery AJAX operations

Lesson 6: Styling HTML5 by Using CSS3 Styling Text Styling Block Elements CSS3 Selectors Enhancing Graphical Effects by Using CSS3

Day 3

Lesson 7: Creating Objects and Methods by Using JavaScript Writing Well-Structured JavaScript Creating Custom Objects Extending Objects

138

Page 139: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 8: Creating Interactive Pages by Using HTML5 APIs Interacting with Files Incorporating Multimedia Reacting to Browser Location and Context Debugging and Profiling a Web Application

Lesson 9: Adding Offline Support to Web Applications Reading and Writing Data Locally Adding Offline Support by Using the Application Cache

Day 4

Lesson 10: Implementing an Adaptive User Interface Supporting Multiple Form Factors Creating an Adaptive User Interface

Lesson 11: Creating Advanced Graphics Creating Interactive Graphics by Using Scalable Vector Graphics Programmatically Drawing Graphics by Using a Canvas

Lesson 12: Animating the User Interface Applying CSS Transitions Transforming Elements Applying CSS Key-frame Animations

Day 5

Lesson 13: Implementing Real-time Communication by Using Web Sockets Introduction to Web Sockets Sending and Receiving Data by Using Web Sockets

Lesson 14: Creating a Web Worker Process Introduction to Web Workers Performing Asynchronous Processing by Using a Web Worker

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

TECHNICAL SUPPORT SPECIALIST (TSS)

PROGRAM DESCRIPTIONThis program is designed to quickly help individuals get to work in entry level jobs in the field of IT as Technical Support Specialists. This program develops the skills required to perform the following job functions:

139

Page 140: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Install, build, maintain, and configure personal computers, laptop computers, and printers

Principles of physical and TCP/IP networks, as well as the operational and professional procedures as an IT technician

Support personal computers, mobile devices, and small networks in a business setting

Troubleshoot hardware and software Install and configure Windows and other Operating Systems Examine server hardware and software, disaster recovery strategies Perform installation, troubleshooting, and management functions in the

Windows Client operating system environment. The program also introduces the principles and core elements of IT service

management (ITSM) based on ITIL frameworkAfter program completion, student will have sat through two highly coveted certifications:

- ITIL v3 Foundations- CompTIA A+

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PROGRAM OUTLINESubject Number Subject Title

Clock HoursLecture/Lab/Ext/Total

ITIL ITIL v3 Foundations 20/20/0/40A+ 901 CompTIA A+ 901 20/20/0/40A+ 902 CompTIA A+ 902 20/20/0/40

The approximate time required to complete this program is three weeks for day students and six weeks for evening students.

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for approximately ten days. Classes for evening students will be held on Monday through Friday from 6:00 to 10:00 pm. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

140

Page 141: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEESRegistration: $0Base Tuition: $7,184Materials: $201Total Tuition Fee: $7,385

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

ITIL ITIL v3 Foundations $1,995A+ 901 CompTIA A+ 901 $2,695A+ 902 CompTIA A+ 902 $2,695

CERTIFICATIONS REQUIRED

ITIL v3 Foundations CompTIA A+

TARGETED JOB ROLES

Technical Support Specialist Helpdesk Technician Computer Technician IT Support Specialist

SUBJECT DESCRIPTIONS AND SYLLABI

ITIL V3 FOUNDATIONS

PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT INFRASTRUCTURE LIBRARY (ITIL®) FOUNDATION CERTIFICATION (2011 LIFECYCLE EDITION) course is the first step in your preparation. The course will prepare you for the ITIL Foundation certification, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation certification, introducing you to basic concepts used in IT service

141

Page 142: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.

PERFORMANCE OBJECTIVESStudents will learn:

Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle. Describe the various functions of Service Operation Lifecycle in the IT Service

Lifecycle. Describe Continual Service Improvement in the IT Service Lifecycle.

TARGETED JOB ROLES IT Professionals with an interest in Service Management

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEESRegistration: $0Base Tuition: $1,1943Materials: $52Total Tuition Fee: $1,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

142

Page 143: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKIT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition) 093030SC (Rev 2.0) Print and Digital Courseware

CERTIFICATION REQUIRED ITL-FND

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to ITIL

ITIL Basics The Service Lifecycle

Lesson 2: Service Strategy

Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process

Lesson 3: Service Design

Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process

143

Page 144: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process

Lesson 4: Service Transition

Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process The Knowledge Management Process

Lesson 5: Service Operation

Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process

Lesson 6: Service Operation Functions

The Service Desk Function The Technical Management Function The IT Operations Management Function The Application Management Function

Lesson 7: Continual Service Improvement

Basic Concepts of Continual Service Improvement CSI Principles

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA A+ 901 ESSENTIALS

PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, troubleshoot, upgrade, and perform preventive maintenance on PCs and mobile device hardware.

144

Page 145: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The CompTIA A+ (220-901) course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician. In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the hardware components of personal computers and mobile digital devices.

Identify networking and security fundamentals. Install, configure, and troubleshoot display devices. Install and configure peripheral components. Manage system components. Manage data storage. Identify the hardware and software requirements for client environment

configurations. Identify network technologies. Install and configure networking capabilities. Support mobile digital devices. Support printers and multifunction devices.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

145

Page 146: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Registration: $0Base Tuition: $2,546Materials: $149Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

A+ 901 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCompTIA A+ (220-901) 093015SC (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA A+ 901

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

146

Page 147: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM OUTLINELesson 1: Hardware Fundamentals

Personal Computer Components Storage Devices Mobile Digital Devices Connection Interfaces

Lesson 2: Networking Fundamentals

Network Types Network Components

Lesson 3: Supporting Display Devices

Install Display Devices Configure Display Devices Troubleshoot Video and Display Devices

Lesson 4: Installing and Configuring Peripheral Components

Install and Configure Input Devices Install and Configure Output Devices Install and Configure Input/Output Devices Install and Configure Expansion Cards

Lesson 5: Managing System Components

Identify Motherboard Components and Features Install and Configure CPUs and Cooling Systems Install Power Supplies Troubleshoot System Components

Lesson 6: Managing Data Storage

Identify RAM Types and Features Troubleshoot RAM Issues Install and Configure Storage Devices Configure the System Firmware Troubleshoot Hard Drives and RAID Arrays

Lesson 7: Customized Client Environments

Types of Common Business Clients Custom Client Environments

Lesson 8: Networking Technologies

TCP/IP Properties and Characteristics TCP/IP Internet Connections Ports and Protocols Networking Tools

Lesson 9: Installing and Configuring Networking Capabilities

147

Page 148: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configure Network Perimeters Install and Configure SOHO Networks Troubleshoot Wired and Wireless Networks

Lesson 10: Supporting Mobile Digital Devices

Install and Configure Exterior Laptop Components Install and Configure Interior Laptop Components Other Mobile Devices Mobile Device Accessories and Ports Troubleshoot Mobile Device Hardware

Lesson 11: Supporting Printers and Multifunction Devices

Printer and Multifunction Technologies Install and Configure Printers Maintain Printers Troubleshoot Printers

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA A+ 902 PRACTICAL APPLICATIONS

PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) software and operating systems to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, upgrade, secure, and perform preventive maintenance on PC and digital device operating systems.In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the basic components and functions of operating systems. Identify networking and security fundamentals. Identify the operational procedures that should be followed by professional PC

technicians. Install and configure Microsoft Windows. Optimize and maintain Microsoft Windows.

148

Page 149: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Work with other operating systems. Identify network technologies. Configure networking capabilities. Support mobile digital devices. Identify security threats, vulnerabilities, and controls. Implement security controls. Troubleshoot system-wide issues.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $2,546Materials: $159Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

A+ 902 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.

149

Page 150: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

REQUIRED TEXTBOOKLogical OperationsCompTIA A+ (220-902)093016SE (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA A+ 902

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Operating System Fundamentals

PC and Mobile Operating Systems PC Operating System Tools and Utilities

Lesson 2: Networking and Security Fundamentals

Common Network Services Cloud Concepts Security Fundamentals

Lesson 3: Safety and Operational Procedures

Basic Maintenance Tools and Techniques Personal and Electrical Safety Environmental Safety and Materials Handling Professionalism and Communication Organizational Policies and Procedures Troubleshooting Theory

Lesson 4: Installing and Configuring Microsoft Windows

 Implement Client-Side Virtualization Install Microsoft Windows Use Microsoft Windows

150

Page 151: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configure Microsoft Windows Upgrade Microsoft Windows

Lesson 5: Optimizing and Maintaining Microsoft Windows

Optimize Microsoft Windows Back Up and Restore System Data Perform Disk Maintenance Update Software

Lesson 6: Working With Other Operating Systems

The OS X Operating System The Linux Operating System

Lesson 7: Networking Technologies

TCP/IP Internet Connections

Lesson 8: Configuring Networking Capabilities

Configure Basic Windows Networking Configure Windows Proxy and Firewall Settings Using Windows Networking Features

Lesson 9: Supporting Mobile Digital Devices

Mobile Device Accessories and Ports Mobile Device Connectivity Mobile Device Synchronization

Lesson 10: Security Threats, Vulnerabilities, and Controls

Common Security Threats and Vulnerabilities General Security Controls Mobile Security Controls Data Destruction and Disposal Methods

Lesson 11: Implementing Security Controls

Secure Operating Systems Secure Workstations Secure SOHO Networks Secure Mobile Devices

Lesson 12: Troubleshooting System-Wide Issues

Troubleshoot PC Operating Systems Troubleshoot Mobile Device Operating Systems and Applications Troubleshoot Common Security Issues

GRADINGGrading will be assigned as follows:

151

Page 152: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Attendance: 50% Participation: 50%

INFORMATION SECURITY ANALYST ( ISA)

PROGRAM DESCRIPTIONBattles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life.

This program is designed to help individuals get jobs as information security auditors, site administrators, computer forensics investigators.

This program will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems; emphasizing perimeter defenses, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. It also presents a detailed methodological approach to cyber network defense from three approaches: 1) Preventive 2) Reactive 3) Retrospective.

After program completion, student will have sat through three highly coveted information security certifications:

- CompTIA Security+ - EC-Council Certified Network Defender (CND)- Certified Ethical Hacker (CEH)

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PROGRAM OUTLINESubject Number Subject Title

Clock HoursLecture/Lab/Ext/Total

SY0-501 Security+ 20/20/0/40CND Network Defender 20/20/0/40312-50 Certified Ethical Hacker 20/20/0/40

The approximate time required to complete this program is fifteen days for day students and thirty nights for evening students.

152

Page 153: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

TUITION AND FEES

Registration: $0Base Tuition: $9,074Materials: $1,011Total Tuition Fee: $10,085

COST PER SINGLE SUBJECTSubject Number Subject Title Cost

SY0-501 CompTIA Security+ $2,695CND Network Defender $3,695312-50 Certified Ethical Hacker $3,695

CERTIFICATIONS REQUIRED

CompTIA Security+ EC-Council Certified Network Defender (CND) EC-Council Certified Ethical Hacker (CEH)

TARGETED JOB ROLES

Network Administrator Network Engineer Information Security Specialist Information Security Auditor Site Security Administrator

SUBJECT DESCRIPTIONS

COMPTIA SECURITY +

PROGRAM DESCRIPTIONCompTIA® Security+® (SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your

153

Page 154: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

organization. You can also take this course to prepare for the CompTIA Security+ certification. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (SY0-501) certification, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.

TARGETED JOB ROLES IT Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended

TUITION AND FEES

154

Page 155: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Registration: $0Base Tuition: $2,575Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical Operations093022S (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA Security +SY0-501

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Identifying Security Fundamentals

155

Page 156: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Identify Information Security Concepts Identify Basic Security Controls Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts

 Lesson 2: Analyzing Risk

Analyze Organizational Risk Analyze the Business Impact of Risk

 Lesson 3: Identifying Security Threats

Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats

 Lesson 4: Conducting Security Assessments

Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing

Lesson 5: Implementing Host and Software Security

Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle

 Lesson 6: Implementing Network Security

Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic

Lesson 7: Managing Identity and Access

Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts

 Lesson 8: Implementing Cryptography

Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys

156

Page 157: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Revoke Certificates Lesson 9: Implementing Operational Security

Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls

 Lesson 10: Addressing Security Incidents

Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents

Lesson 11: Ensuring Business Continuity

Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan 

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

SUBJECT: NETWORK DEFENDER (CND)

SUBJECT DESCRIPTIONCND prepares individuals on network security technologies and operations to achieve defense-in-depth objectives. CND is a comprehensive vendor-neutral network security certification course. This subject will immerse you into an interactive environment where you will learn and practice security skills. This class also prepares you for EC-Council Certified Network Defender 312-38.

SUBJECT HOURS40 hours total:

20 hours lecture 20 hours lab 0 hours externship

PERFORMANCE OBJECTIVESUpon completion of this course, students will expand their Security knowledge and skill on existing topics covered in Security+ and newly introduced topics:

Security Threats, Vulnerabilities, Attacks

157

Page 158: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Network Security Controls Network Policy Design Physical Security Host, Application, Data Security Firewalls IDS VPN Wireless Security Network Monitoring and Analysis Risk and Vulnerability Management Data Backup and Recovery Network Incident Response

PREREQUISITESSecurity+ or equivalent knowledgeBasic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

REQUIRD TEXTBOOKSCND (Cyber Network Defender)Author: EC-CouncilPublish Date: 2016

INSTRUCTIONAL METHODS

Lecture Overhead slides Cloud-based Lab exercises

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

OUTLINE

Day 1

Module 01: Computer Network Defense FundamentalsModule 02: Network Security Threats, Vulnerabilities, and AttacksModule 03: Network Security Controls, Protocols, and Perimeter AppliancesModule 04: Secure Firewall Configuration, Deployment and Management

Day 2

Module 05: Secure IDS Configuration and Management

158

Page 159: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Module 06: Secure VPN Configuration and ManagementModule 07: Designing a Secure NetworkModule 08: Network Traffic Signatures and Analysis

Day 3

Module 09: Monitoring and Securing Network TrafficModule 10: Network Vulnerability ScanningModule 11: Monitoring and Securing Network TrafficModule 12: Network Vulnerability Scanning

Day 4

Module 13: Host/System SecurityModule 14: Physical SecurityModule 15: Designing and Implementation of Network Security Policies

Day 5

Module 16: Network Incident Response and ManagementModule 17: Network Backup and Disaster RecoveryModule 18: Wireless Network Defense

GRADING Grading will be assigned as follows:

- Attendance: 50%- Lab Assignments: 50%

CEH: CERTIFIED ETHICAL HACKER

PROGRAM DESCRIPTION This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When you leave this intensive 5 day class, you will have hands on understanding and experience in Ethical Hacking.

PERFORMANCE OBJECTIVES Students will learn:

159

Page 160: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Background of technology and technological operations Risk and system analysis Systems securities and vulnerabilities Regulations and ethics

TARGETED JOB ROLES Site Administrators Security Auditors Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

TUITION AND FEESRegistration: $0Base Tuition: $3,183Materials: $512Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

312-50 CEH Certified Ethical Hacker 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for night students.

REQUIRED TEXTBOOK

160

Page 161: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

EC-Council Digital CoursewareCEHv9 e-Courseware

CERTIFICATION REQUIRED 312-50 CEH

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to Ethical Hacking

Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Concepts Hacking and Scopes Information Security Controls Physical Security Information Management Vulnerability Assessment Penetration Testing Security Laws and Standards

Lesson 2: Footprinting and Reconnaissance

Footprinting Concepts Footprinting Methodology Footprinting Using Advanced Google Hacking Techniques Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing

Lesson 3: Scanning Networks

Overview of Network Scanning CEH Scanning Methodology

161

Page 162: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 4: Enumeration

Enumeration Concepts Enumerations Countermeasures Enumeration Penetration Testing

Lesson 5: System Hacking

System Hacking: Goals CEH Hacking: Methodology CEH System Hacking Steps Escalating Privileges Executing Applications Spyware Defending Against Keyloggers Hiding Files Detecting Rootkits NTFS Data Stream Steganography/Steganlysis Covering Tracks

Lesson 6: Malware Threats

Trojan Concepts Types of Trojans Virus and Worm Concepts Ransomware Malware Reverse Engineering Malware Detection Countermeasures Penetration Testing

Lesson 7: Sniffing

Sniffing Concepts MAC/DHCP Attacks IDRP Spoofing ARP/DNS Poisoning Sniffing Tools Detection Techniques Counter Measures

Lesson 8: Social Engineering

Social Engineering Concepts Social Engineering Techniques Identity Theft Social Engineering Countermeasures

Lesson 9: Denial of Service

DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets

162

Page 163: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

DoS/DDos Attack Tools Counter Measures DoS/DDos Protection Tools

Lesson 10: Session Hijacking

Session Hijacking Concepts Application Level Hijacking Network Level Hijacking Hijacking Tools Countermeasures

Lesson 11: Hacking Web Servers

Webserver Concepts Webserver Attakcs Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools

Lesson 12: Hacking Web Applications

Web App Concepts Web App Threats Web App Hacking Methodology Attack Web Servers Analyze Web Apps Authorization Attack Schemes Perform Injection Attacks Attack Data Connectivity

Lesson 13: SQL Injection

SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter Measures Snort Rule Detection to SQL Injection Attacks Detection Tools

Lesson 14: Hacking Wireless Networks

Wireless Statistics Wireless Concepts Wireless Encryption Breaking Encryption Defending Against WPA Cracking Wireless Threats Wireless Hacking Methodology WEP/WPA Cracking Tools Counter Measures Security Tools

163

Page 164: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 15: Hacking Mobile Platforms

Mobile Platform Attack Vectors Hacking Android/IOS Hacking Windows/BlackBerry Mobile Device Management Mobile Security Guidelines and Tools

Lesson 16: Evading IDS, Firewalls and Honeypots

IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Systems IDS/Firewall Evading Tools Detecting Honeypots Counter Measures

Lesson 17: Cloud Computing

Introduction to Cloud Computing Cloud Computing Threats/Attacks Cloud Security Cloud Penetration Testing

Lesson 18: Cryptography

Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

SEMINARSCOMPTIA A+ CERTIFICATION

COMPTIA A+ 901 ESSENTIALS

PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, troubleshoot, upgrade, and perform preventive maintenance on PCs and mobile device hardware.

164

Page 165: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The CompTIA A+ (220-901) course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician. In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the hardware components of personal computers and mobile digital devices.

Identify networking and security fundamentals. Install, configure, and troubleshoot display devices. Install and configure peripheral components. Manage system components. Manage data storage. Identify the hardware and software requirements for client environment

configurations. Identify network technologies. Install and configure networking capabilities. Support mobile digital devices. Support printers and multifunction devices.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

165

Page 166: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Registration: $0Base Tuition: $2,546Materials: $149Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

A+ 901 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical OperationsCompTIA A+ (220-901) 093015SC (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA A+ 901

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

166

Page 167: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PROGRAM OUTLINELesson 1: Hardware Fundamentals

Personal Computer Components Storage Devices Mobile Digital Devices Connection Interfaces

Lesson 2: Networking Fundamentals

Network Types Network Components

Lesson 3: Supporting Display Devices

Install Display Devices Configure Display Devices Troubleshoot Video and Display Devices

Lesson 4: Installing and Configuring Peripheral Components

Install and Configure Input Devices Install and Configure Output Devices Install and Configure Input/Output Devices Install and Configure Expansion Cards

Lesson 5: Managing System Components

Identify Motherboard Components and Features Install and Configure CPUs and Cooling Systems Install Power Supplies Troubleshoot System Components

Lesson 6: Managing Data Storage

Identify RAM Types and Features Troubleshoot RAM Issues Install and Configure Storage Devices Configure the System Firmware Troubleshoot Hard Drives and RAID Arrays

Lesson 7: Customized Client Environments

Types of Common Business Clients Custom Client Environments

Lesson 8: Networking Technologies

TCP/IP Properties and Characteristics TCP/IP Internet Connections Ports and Protocols Networking Tools

Lesson 9: Installing and Configuring Networking Capabilities

167

Page 168: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configure Network Perimeters Install and Configure SOHO Networks Troubleshoot Wired and Wireless Networks

Lesson 10: Supporting Mobile Digital Devices

Install and Configure Exterior Laptop Components Install and Configure Interior Laptop Components Other Mobile Devices Mobile Device Accessories and Ports Troubleshoot Mobile Device Hardware

Lesson 11: Supporting Printers and Multifunction Devices

Printer and Multifunction Technologies Install and Configure Printers Maintain Printers Troubleshoot Printers

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA A+ 902 PRACTICAL APPLICATIONS

PROGRAM DESCRIPTIONThe course will build on your existing user-level knowledge and experience with personal computer (PC) software and operating systems to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, upgrade, secure, and perform preventive maintenance on PC and digital device operating systems.In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the basic components and functions of operating systems. Identify networking and security fundamentals. Identify the operational procedures that should be followed by professional PC

technicians. Install and configure Microsoft Windows. Optimize and maintain Microsoft Windows. Work with other operating systems.

168

Page 169: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Identify network technologies. Configure networking capabilities. Support mobile digital devices. Identify security threats, vulnerabilities, and controls. Implement security controls. Troubleshoot system-wide issues.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $2,546Materials: $149Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

A+ 902 CompTIA A+ 901 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

169

Page 170: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

REQUIRED TEXTBOOKLogical OperationsCompTIA A+ (220-902)093016SE (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA A+ 902

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Operating System Fundamentals

PC and Mobile Operating Systems PC Operating System Tools and Utilities

Lesson 2: Networking and Security Fundamentals

Common Network Services Cloud Concepts Security Fundamentals

Lesson 3: Safety and Operational Procedures

Basic Maintenance Tools and Techniques Personal and Electrical Safety Environmental Safety and Materials Handling Professionalism and Communication Organizational Policies and Procedures Troubleshooting Theory

Lesson 4: Installing and Configuring Microsoft Windows

 Implement Client-Side Virtualization

170

Page 171: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Install Microsoft Windows Use Microsoft Windows Configure Microsoft Windows Upgrade Microsoft Windows

Lesson 5: Optimizing and Maintaining Microsoft Windows

Optimize Microsoft Windows Back Up and Restore System Data Perform Disk Maintenance Update Software

Lesson 6: Working With Other Operating Systems

The OS X Operating System The Linux Operating System

Lesson 7: Networking Technologies

TCP/IP Internet Connections

Lesson 8: Configuring Networking Capabilities

Configure Basic Windows Networking Configure Windows Proxy and Firewall Settings Using Windows Networking Features

Lesson 9: Supporting Mobile Digital Devices

Mobile Device Accessories and Ports Mobile Device Connectivity Mobile Device Synchronization

Lesson 10: Security Threats, Vulnerabilities, and Controls

Common Security Threats and Vulnerabilities General Security Controls Mobile Security Controls Data Destruction and Disposal Methods

Lesson 11: Implementing Security Controls

Secure Operating Systems Secure Workstations Secure SOHO Networks Secure Mobile Devices

Lesson 12: Troubleshooting System-Wide Issues

Troubleshoot PC Operating Systems Troubleshoot Mobile Device Operating Systems and Applications Troubleshoot Common Security Issues

GRADING

171

Page 172: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Grading will be assigned as follows:

Attendance: 50% Participation: 50%

CEH: CERTIFIED ETHICAL HACKER

PROGRAM DESCRIPTION This subject will immerse you into an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems. You will begin by understanding how perimeter defenses work and then be led into scanning and attacking your own networks, no real network is harmed. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When you leave this intensive 5 day class, you will have hands on understanding and experience in Ethical Hacking.

PERFORMANCE OBJECTIVES Students will learn: Background of technology and technological operations Risk and system analysis Systems securities and vulnerabilities Regulations and ethics

TARGETED JOB ROLES Site Administrators Security Auditors Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

TUITION AND FEES

172

Page 173: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Registration: $0Base Tuition: $3,147Materials: $512Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

312-50 CEH Certified Ethical Hacker 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKEC-Council Digital Courseware CEHv9 e-Courseware

CERTIFICATION REQUIRED 312-50 CEH

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to Ethical Hacking

Information Security Overview

173

Page 174: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Concepts Hacking and Scopes Information Security Controls Physical Security Information Management Vulnerability Assessment Penetration Testing Security Laws and Standards

Lesson 2: Footprinting and Reconnaissance

Footprinting Concepts Footprinting Methodology Footprinting Using Advanced Google Hacking Techniques Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing

Lesson 3: Scanning Networks

Overview of Network Scanning CEH Scanning Methodology

Lesson 4: Enumeration

Enumeration Concepts Enumerations Countermeasures Enumeration Penetration Testing

Lesson 5: System Hacking

System Hacking: Goals CEH Hacking: Methodology CEH System Hacking Steps Escalating Privileges Executing Applications Spyware Defending Against Keyloggers Hiding Files Detecting Rootkits NTFS Data Stream Steganography/Steganlysis Covering Tracks

Lesson 6: Malware Threats

Trojan Concepts Types of Trojans Virus and Worm Concepts Ransomware Malware Reverse Engineering Malware Detection

174

Page 175: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Countermeasures Penetration Testing

Lesson 7: Sniffing

Sniffing Concepts MAC/DHCP Attacks IDRP Spoofing ARP/DNS Poisoning Sniffing Tools Detection Techniques Counter Measures

Lesson 8: Social Engineering

Social Engineering Concepts Social Engineering Techniques Identity Theft Social Engineering Countermeasures

Lesson 9: Denial of Service

DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DoS/DDos Attack Tools Counter Measures DoS/DDos Protection Tools

Lesson 10: Session Hijacking

Session Hijacking Concepts Application Level Hijacking Network Level Hijacking Hijacking Tools Countermeasures

Lesson 11: Hacking Web Servers

Webserver Concepts Webserver Attakcs Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools

Lesson 12: Hacking Web Applications

Web App Concepts Web App Threats Web App Hacking Methodology Attack Web Servers Analyze Web Apps Authorization Attack Schemes Perform Injection Attacks

175

Page 176: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Attack Data ConnectivityLesson 13: SQL Injection

SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter Measures Snort Rule Detection to SQL Injection Attacks Detection Tools

Lesson 14: Hacking Wireless Networks

Wireless Statistics Wireless Concepts Wireless Encryption Breaking Encryption Defending Against WPA Cracking Wireless Threats Wireless Hacking Methodology WEP/WPA Cracking Tools Counter Measures Security Tools

Lesson 15: Hacking Mobile Platforms

Mobile Platform Attack Vectors Hacking Android/IOS Hacking Windows/BlackBerry Mobile Device Management Mobile Security Guidelines and Tools

Lesson 16: Evading IDS, Firewalls and Honeypots

IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Systems IDS/Firewall Evading Tools Detecting Honeypots Counter Measures

Lesson 17: Cloud Computing

Introduction to Cloud Computing Cloud Computing Threats/Attacks Cloud Security Cloud Penetration Testing

Lesson 18: Cryptography

Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure Email Encryption

176

Page 177: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Disk Encryption Cryptography Attacks Cryptanalysis Tools

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)

SEMINAR DESCRIPTION

The Computer Hacking Forensic Investigator program presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

CHFI is a certification that gives a complete overview of the process that a forensic investigator must follow when investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident.

PERFORMANCE OBJECTIVESStudents will learn:

The computer forensic investigation process and the various legal issues involved

Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner

Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category

Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene

How to set up a computer forensics lab and the tools involved in the lab

177

Page 178: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Various file systems and how to boot a disk Gathering volatile and nonvolatile information from Windows Data acquisition and duplication rules, validation methods and tools required How to recover deleted files and deleted partitions in Windows, Mac OS X, and

Linux The process involved in forensic investigation using AccessData FTK and

EnCase Steganography and its techniques, Steganalysis, and image file forensics Password Cracking Concepts, tools, types of password attacks and how to

investigate password protected files Different types of log capturing, log management, time synchronization, and

log capturing tools How to investigate logs, network traffic, wireless attacks, and web attacks How to track e-mails and investigate e-mail crimes Mobile forensics and mobile forensics software and hardware tools How to write investigative reports

TARGETED JOB ROLES

Junior Computer Forensics Investigator Incident Response Technician Junior Computer Security Analyst

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Certified Ethical Hacker (CEH) certification, or equivalent knowledge and

experience

TUITION AND FEES

Registration: $0Base Tuition: $3,248Materials: $447Total Tuition Fee: $3,695

CLASS SCHEDULE

178

Page 179: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Day students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

CHFI EC-Council Hacking Forensic Investigator 40

The approximate time required to complete this program is five days for day students and 10 evenings for evening students.

REQUIRED TEXTBOOKComputer Hacking Forensics Investigator Version 8EC-Council Official CoursewareIncludes: 3 Books (2 Courseware and 1 Lab Manual) and 4 Tools DVDs

CERTIFICATION REQUIRED

EC-Council Computer Hacking Forensic Investigator (CHFI) 312-49

INSTRUCTIONAL METHODS

Lecture Overhead slides Lab Exercises

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

SEMINAR OUTLINEDay 1

Computer Forensics in Today’s World Computer Forensics Investigation Process Searching and Seizing Computers

Day 2

Digital Evidence First Responder Procedures

179

Page 180: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Computer Forensics Lab Understanding Hard Disks and File Systems

Day 3

Windows Forensics Data Acquisition and Investigation Recovering Deleted Files and Partitions Forensics Investigation Using AccessData FTK Forensics Investigation Using EnCase

Day 4

Steganography and Image File Forensics Application Password Crackers Log Capturing and Event Correlation Network Forensics, Investigating Logs and Investigating Network Traffic Investigating Wireless Attacks

Day 5

Investigating Web Attacks Tracking Emails and investigating Email Crimes Mobile Forensics Investigative Reports Becoming an Expert Witness

GRADING Grading will be assigned as follows:

- Attendance: 50%- Lab Assignments: 50%

SEMINAR TUITIONTuition $3695

CLASS SCHEDULEDay students will attend classes Monday through Friday from 8:00AM to 5:00 PM for 25 days. Classes for evening students will be held on Monday through Friday 6:00 to 10:00pm. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minutes breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

COMPTIA ADVANCED SECURITY PRACTITIONER (CASP)

PROGRAM DESCRIPTION

180

Page 181: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

This 5-day program is designed for people looking to start or enhance their careers as information security experts. You will build knowledge and skills in enterprise security, risk management and incident response, research and analysis, integration of computing, communications and business disciplines, as well as technical integration of enterprise components. Through this program, you will be expected to develop your knowledge of general security concepts, and the specific tools and procedures used to guard against intrusion, hacking, and cybercrimes. The program course material will center around these subject matter areas as they relate to the CASP certification objectives.

PERFORMANCE OBJECTIVES

In this course, you will analyze and apply advanced security concepts, principles, and implementations that contribute to enterprise-level security. Students will learn:

Manage risk in the enterprise. Integrate computing, communications, and business disciplines in the

enterprise. Use research and analysis to secure the enterprise. Integrate advanced authentication and authorization techniques. Implement cryptographic techniques. Implement security controls for hosts. Implement security controls for storage. Analyze network security concepts, components, and architectures, and

implement controls. Implement security controls for applications. Integrate hosts, storage, networks, and applications in a secure enterprise

architecture. Conduct vulnerability assessments. Conduct incident and emergency responses.

TARGETED JOB ROLES

Network Security Engineer Information Security Specialist Information Security Auditor Security Analyst Security Architect Site Security Administrator

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

181

Page 182: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

TUITION AND FEES

Registration: $0Base Tuition: $3,3170Materials: $325Total Tuition Fee: $3,495

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

PROGRAM HOURSSeminar Number Seminar Title Contact Hours

CASP CompTIA Advanced Security Practitioner 40

The approximate time required to complete this program is five days for day students and ten nights for evening students.

REQUIRED TEXTBOOKCompTIA Advanced Security Practitioner (CASP) (CAS-002)  Number 093023SECC (Rev 1.1)Publisher: Logical Operations, Inc.

CERTIFICATION REQUIRED

CompTIA Advanced Security Practitioner CAS-002

INSTRUCTIONAL METHODS

Lecture Overhead slides Cloud-based Lab exercises and labs

182

Page 183: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINE

Day 1:

Lesson 1: Managing Risk

Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management

Lesson 2: Integrating Computing, Communications, and Business Disciplines

Facilitate Collaboration Across Business Units Secure Communications and Collaboration Solutions Implement Security Activities Throughout the Technology Life Cycle

Day 2:

Lesson 3: Using Research and Analysis to Secure the Enterprise

Determine Industry Trends and Effects on the Enterprise Analyze Scenarios to Secure the Enterprise

Lesson 4: Integrating Advanced Authentication and Authorization Techniques

Implement Authentication and Authorization Technologies Implement Advanced Identity Management

Lesson 5: Implementing Cryptographic Techniques

Describe Cryptographic Concepts Choose Cryptographic Techniques Choose Cryptographic Implementations

Day 3:

Lesson 6: Implementing Security Controls for Hosts

183

Page 184: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Select Host Hardware and Software Harden Hosts Virtualize Servers and Desktops Implement Cloud Augmented Security Services Protect Boot Loaders

Lesson 7: Implementing Security Controls for Enterprise Storage

Identify Storage Types and Protocols Implement Secure Storage Controls

Lesson 8: Analyzing and Implementing Network Security

Analyze Network Security Components and Devices Analyze Network-Enabled Devices Analyze Advanced Network Design Configure Controls for Network Security

Day 4:

Lesson 9: Implementing Security Controls for Applications

Identify General Application Vulnerabilities Identify Web Application Vulnerabilities Implement Application Security Controls

Lesson 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture

Implement Security Standards in the Enterprise Select Technical Deployment Models Secure the Design of the Enterprise Infrastructure Secure Enterprise Application Integration Enablers

Day 5:

Lesson 11: Conducting Vulnerability Assessments

Select Vulnerability Assessment Methods Select Vulnerability Assessment Tools

Lesson 12: Responding to and Recovering from Incidents

Design Systems to Facilitate Incident Response

184

Page 185: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Conduct Incident and Emergency Responses

GRADINGGrading will be assigned as follows:

Student Attendance: 50% Student Participation in Lab Exercises: 50%

EC-COUNCIL CERTIFIED NETWORK DEFENDER (CND)

PROGRAM DESCRIPTIONThe Certified Network Defender (CND) cyber security training program was developed as a result of extensive market research and surveys to give students a detailed understanding and the hands-on ability to act in real-life situations involving network defense.This course instructs entry and junior level network security administrators on Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. Hands-on labs, based on major network security tools and techniques, give network administrators real world experience on current network security technologies and operations.The included study kit provides over 10 GB of network security best practices, assessments, and protection tools. The kit also contains templates for various network policies and several white papers for additional learning. This cyber security training is skills-based and lab intensive. It based on a job-task analysis and the cyber security education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system and network administrators.The CND cyber security certification will verify that students have the technical depth required to actively design, monitor, and defend a secure network for an organization.

PERFORMANCE OBJECTIVESStudents will learn:

Various network security controls, protocols, and devices How to determine appropriate location for IDS/IPS sensors, tuning IDS for false

positives and false negatives, and configurations to harden security through IDPS technologies

How to implement secure VPNs for their organization How to identify various threats to wireless networks and learn how to mitigate

them How to monitor and conduct signature analysis to detect various types of

attacks and policy violation activities How to perform risk assessment, vulnerability assessment/scanning through

various scanning tools and generate detailed reports on it

185

Page 186: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

How to identify the critical data, choose appropriate back up method, media and technique to perform successful backup of organization data on regular basis

How to provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident

How to troubleshoot their network for various network problems How to identify various threats on organization network How to design and implement various security policies for their organizations The importance of physical security and able to determine and implement

various physical security controls for their organizations How to harden security of various hosts individually in the organization’s

network How to choose appropriate firewall solutions, topology, and configurations to

harden security through firewall

TARGETED JOB ROLES Entry Level Network Administrators Entry Level Network Security Administrators Junior Network Security Engineers Junior Network Defense Technicians Security Analysts Security Operators

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge Computer security knowledge and skills

TUITION AND FEESRegistration: $0Base Tuition: $3,316Materials: $379Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM

186

Page 187: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

PROGRAM HOURSSeminar Number Seminar Title Contact Hours

CND Certified Network Defender 40The approximate time required to complete this program is five days for day students and ten nights for evening students.

REQUIRED TEXTBOOKCertified Network Defender Volume 1EC-Council Official CoursewareIncludes: 3 Books (Courseware and Lab Manual) & Tools (Downloadable Online and Instruction provided in the Courseware)

CERTIFICATION REQUIREDEC-Council Certified Network Defender – CND 312-38

INSTRUCTIONAL METHODS Lecture Overhead slides Lab Exercises

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

OUTLINEDay 1

Computer Network Defense Fundamentals Network Security Threats, Vulnerabilities, and Attacks Network Security Controls, Protocols, and Perimeter Appliances Secure Firewall Configuration, Deployment and Management

Day 2 Secure IDS Configuration and Management Secure VPN Configuration and Management Designing a Secure Network Network Traffic Signatures and Analysis

Day 3 Monitoring and Securing Network Traffic Network Vulnerability Scanning Monitoring and Securing Network Traffic Network Vulnerability Scanning

187

Page 188: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Day 4 Host/System Security Physical Security Designing and Implementation of Network Security Policies

Day 5 Network Incident Response and Management Network Backup and Disaster Recovery Wireless Network Defense

GRADING Grading will be assigned as follows:

-Attendance: 50%-Lab Assignments: 50%

CISSP: CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

PROGRAM DESCRIPTION Welcome to Certified Information Systems Security Professional (CISSP)®: Fourth Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because the sponsoring organization, the International Information Systems Security Certification Consortium, Inc. (ISC)2 ®, regularly updates the test by using subject matter experts (SMEs) to make sure the material and the questions are relevant in today’s security environment. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.

PERFORMANCE OBJECTIVESStudents will learn:

Analyze components of the Security and Risk Management domain. Analyze components of the Asset Security domain. Analyze components of the Security Engineering domain. Analyze components of the Communications and Network Security domain. Analyze components of the Identity and Access Management domain. Analyze components of the Security Assessment and Testing domain. Analyze components of the Security Operations domain. Analyze components of the Software Development Security domain.

188

Page 189: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TARGETED JOB ROLES Security Auditors or Specialists Risk Management Professionals Network Admistrators Network Engineers

ADMISSION REQUIREMENTS Individuals applying for this program are required to: Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Network +/Security + Certification or Equivalent Experience CyberSecurity Experience Highly Recommended Five Years Direct Work Experience Required for Certification

TUITION AND FEESRegistration: $0Base Tuition: $3,303Materials: $92Total Tuition Fee: $3,395

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

CISSP Certified Information Security Systems Professional 40

The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.

REQUIRED TEXTBOOKCertified Information Systems Security Professional (CISSP): Fourth Edition

 093024SC (Rev 1.0) Print and Digital Courseware

189

Page 190: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CERTIFICATION REQUIRED CISSP (ISC2)

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Security and Risk Management

Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training

Lesson 2: Asset Security

Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling

Lesson 3: Security Engineering

Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts

190

Page 191: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities

Lesson 4: Communications and Network Security

Network Protocol Security Network Components Security Communication Channel Security Network Attack Mitigation

Lesson 5: Identity and Access Management

Physical and Logical Access Control Identification, Authentication, and Authorization Identity as a Service Authorization Mechanisms Access Control Attack Mitigation

Lesson 6: Security Assessment and Testing

System Security Control Testing Software Security Control Testing Security Process Data Collection Audits

Lesson 7: Security Operations

Security Operations Concepts Physical Security Personnel Security Logging and Monitoring Preventative Measures Resource Provisioning and Protection Patch and Vulnerability Management Change Management Incident Response Investigations Disaster Recovery Planning Disaster Recovery Strategies Disaster Recovery Implementation

Lesson 8: Software Development Security

Security Principles in the System Lifecycle Security Principles in the Software Development Lifecycle Database Security in Software Development Security Controls in the Development Environment Software Security Effectiveness Assessment

GRADINGGrading will be assigned as follows:

191

Page 192: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Attendance: 50% Participation: 50%

EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)

SEMINAR DESCRIPTIONECSA is one of the best cyber security certifications and is like no other! It is a globally accepted cyber security course and certification covering the testing of modern infrastructures, operating systems and application environments. Students also learn penetration testing documentation and reporting.

This 5-day cyber security training is highly interactive, comprehensive, standards-based, and methodology intensive with real-world labs. Emphasis is placed on the practical competency of the student.

This is all achieved through the iLabs cyber range which allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our web portal enables students to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available! With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing students to launch a complete Live range open for any form of hacking or testing.

PERFORMANCE OBJECTIVESThis course is intensively hands-on and a tremendous amount of emphasis is placed on practical competency.The student must conduct a detailed penetration test through the EC-Council Cyber Range iLabs environment and submit a written report via EC-Council’s ASPEN system. The design of the course is such that the instructor in the class will actually take you through the core concepts of conducting a penetration test and guide you through the report writing process for this organization. The course is comprised of 2 sets of lab challenges. Both are on the EC- Council ilabs Cyber Range. The first set covers practice labs for each module. The other is a Challenge Scenario which mimics an actual penetration test in an imaginary financial service company. As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSAV9.

TARGETED JOB ROLES

Penetration Tester

192

Page 193: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Network Administrator Firewall Administrator Security Tester Risk Assessment Professionals

ADMISSION REQUIREMENTSIndividuals applying for this seminar are required to:

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

TUITION AND FEES

Registration: $0Tuition: $3,195Materials: $500Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

PROGRAM HOURSSeminar Number Seminar Title Contact Hours

ECSA EC-Council Certified Security Analyst 40The approximate time required to complete this program is five days for day students and ten nights for evening students.

REQUIRED TEXTBOOKCertified Security Analyst Volume 9EC-Council Official Courseware

CERTIFICATION REQUIRED EC-Council Certified Security Analyst (ECSA)

INSTRUCTIONAL METHODS

193

Page 194: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Instructor Guided Lab exercises (Primary) Lecture (Secondary)

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINEDay 1: 8 Hours Lecture

Security Analysis and Penetration Testing Methodologies TCP/IP Packet Analysis Pre-penetration Testing Steps

Day 2: 3 Hours Lecture, 5 Hours Lab Work

Information Gathering Methodology Vulnerability Analysis External Network Penetration Testing Methodology Internal Network Penetration Testing Methodology

Day 3: 3 Hours Lecture, 5 Hours Lab Work

Firewall Penetration Testing Methodology IDS Penetration Testing Methodology Web Application Penetration Testing Methodology

Day 4: 3 Hours Lecture, 5 Hours Lab Work

SQL Penetration Testing Methodology Database Penetration Testing Methodology Wireless Network Penetration Testing Methodology

Day 5: 3 Hours Lecture, 5 Hours Lab Work

Mobile Devices Penetration Testing Methodology Cloud Penetration Testing Methodology Report Writing and Post Test Actions

GRADINGGrading will be assigned as follows:

Attendance: 50% Lab Assignments: 50%

In addition, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSAV9.

EC-COUNCIL DISASTER RECOVERY PROFESSIONAL (EDRP)

PROGRAM DESCRIPTION

194

Page 195: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized, and the organization will be able to either maintain or quickly resume mission-critical functions. Typically, disaster recovery planning involves an analysis of business processes and continuity needs; it may also include a significant focus on disaster prevention.The EDRP program teaches you the methods in identifying vulnerabilities and how to implement appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, and an understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster.This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.

PERFORMANCE OBJECTIVESStudents will learn:

The ability to plan, organize, and direct the testing of disaster response, recovery support, and business recovery procedures.

TARGETED JOB ROLES

Junior Network Server Administrators Firewall Administrators Junior Security Testers Junior System Administrators Risk Assessment Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Basic IP addressing knowledge

195

Page 196: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

TUITION AND FEES

Registration: $0Base Tuition: $3,045Materials: $650Total Tuition Fee: $3,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

PROGRAM HOURSSeminar Number Seminar Title Contact Hours

EDRP EC-Council Disaster Recovery Professional 40

The approximate time required to complete this program is five days for day students and ten nights for evening students.

REQUIRED TEXTBOOKDisaster Recovery Professional - Volume 1EC-Council Official CoursewareInclude: 3 Books (Courseware and Lab Manual) and 1 Tools CD

CERTIFICATION REQUIRED EC-Council Disaster Recovery Professional 312-76

INSTRUCTIONAL METHODS Lecture Hands-on Labs Overhead slides

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINEDay 1:

196

Page 197: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Introduction to Disaster Recovery and Business Continuity Nature and Causes of Disasters Emergency Management Laws and Acts

Day 2:

Business Continuity Management Disaster Recovery Planning Process Risk Management Facility Protection

Day 3:

Data Recovery System Recovery Backup and Recovery Centralized and Decentralized System Recovery

Day 4:

Windows Data Recovery Tools Linux, Mac and Novell Netware Data Recovery Tools Incident Response

Day 5:

Role of Public Services in Disaster Organizations Providing Services during Disasters Organizations Providing Disaster Recovery Solutions Case Studies

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

EC-COUNCIL CERTIFIED ENCRYPTION SPECIALIST (ECES) 

SEMINAR DESCRIPTION  If you think that there is only one type of encryption – think again!  Secure organizations employ multiple levels of encryption – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption – server/desktop, network link encryption, web server encryption, tape backup encryption and many more.  Some of the most recent attacks that have had serious consequences share one thing in common – they all had either little or no effective encryption. This resulted in thousands of users being affected and hundreds of millions in losses. It resulted in serious decline of brand value and public embarrassment.  And these were not technically naïve companies by any means.  To name a few – SONY PS3, RSA, iPhone, LinkedIn.  

197

Page 198: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others.  Other topic areas include the basics of information theory as it applies to cryptography; an introduction to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others; asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA; significant concepts such as diffusion, confusion, and Kerkcho’s principle.  

PERFORMANCE OBJECTIVES Students will learn: 

The basics of information theory as it applies to cryptography.  An introduction to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD

256 and others.  Asymmetric cryptography including thorough descriptions of RSA, Elgamal,

Elliptic Curve, and DSA.  Significant concepts such as diffusion, confusion, and Kerkcho’s principle.  Types of encryption standards and their differences.  How to select the best standard for your organization.  How to enhance your pen-testing knowledge in encryption.  Correct and incorrect deployment of encryption technologies.  Common mistakes made in implementing encryption technologies.  Best practices when implementing encryption technologies. 

TARGETED JOB ROLES  Entry Level Penetration Testers  Junior Computer Forensic Specialists  Anyone involved in basic information security operations  

ADMISSION REQUIREMENTS Individuals applying for this program are required to: 

Interview with a Career Training Consultant  Be at least 18 years of age   Present proof of secondary education (high school diploma or GED certificate)   In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.  

PREREQUISITES  Basic computer literacy  

198

Page 199: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Basic PC Operating System navigation skills  Basic Internet usage skills   Basic IP addressing knowledge  No prior knowledge of cryptography is assumed, and no mathematical skills

beyond basic algebra are required. 

TUITION AND FEES  Registration: $0 Base Tuition: $2,045Materials: $500 Total Tuition Fee: $2,545  

Class SCHEDULE Day students will attend weekday classes from 8:00AM to 5:00PM for three days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURS Seminar Number Seminar Title Contact Hours

ECES EC-Council Certified Encryption Specialist 24

 The approximate time required to complete this seminar is three days for day students and six nights for evening students. 

REQUIRED TEXTBOOKCertified Encryption Specialist Vol. 1 EC-Council Official Courseware  

CERTIFICATION REQUIRED   EC-Council Certified Encryption Specialist 212-81 

INSTRUCTIONAL METHODS   Lecture   Overhead slides  

MAXIMUM STUDENT TO INSTRUCTOR RATIO 15:1 

SEMINAR OUTLINE 

199

Page 200: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

 Day 1:  Introduction and History of Cryptography  Symmetric Cryptography & Hashes  

Day 2:  Number Theory and Asymmetric Cryptography  Applications of Cryptography 

Day 3:  Cryptanalysis 

GRADING 

Grading will be assigned as follows:   Attendance: 50%  Participation: 50% 

 

ITIL V3 FOUNDATIONS

PROGRAM DESCRIPTIONIf you are an IT professional looking to get into IT service management using ITIL best practices, the IT INFRASTRUCTURE LIBRARY (ITIL®) FOUNDATION CERTIFICATION (2011 LIFECYCLE EDITION) course is the first step in your preparation. The course will prepare you for the ITIL Foundation certification, introducing you to basic concepts used in IT service management. In this course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.Implementing and supporting IT services in the workplace can often be a daunting task since all organizations differ in key ways. Whether it's upgrading from one service to another, improving an existing service, or designing a service from scratch, business-focused leadership and management are crucial elements of services that your customers will perceive as valuable. The course will prepare you for the ITIL Foundation cert, introducing you to basic concepts used in IT service management. In this course, you will identify the fundamental concepts of ITIL to help prepare yourself for the Foundation Certification.

PERFORMANCE OBJECTIVESStudents will learn:

Describe the history and basic concepts of ITIL. Describe Service Strategy in the IT Service Lifecycle. Describe Service Design in the IT Service Lifecycle. Describe Service Transition in the IT Service Lifecycle. Describe Service Operation in the IT Service Lifecycle.

200

Page 201: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Describe the various functions of Service Operation Lifecycle in the IT Service Lifecycle.

Describe Continual Service Improvement in the IT Service Lifecycle.

TARGETED JOB ROLES IT Professionals with an interest in Service Management

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEESRegistration: $0Base Tuition: $1,943Materials: $52Total Tuition Fee: $1,995

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

ITL-FND ITIL v3 Foundations 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKIT Infrastructure Library (ITIL) Foundation Certification (2011 Lifecycle Edition) 093030SC (Rev 2.0) Print and Digital Courseware

201

Page 202: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

CERTIFICATION REQUIRED ITL-FND

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Introduction to ITIL

ITIL Basics The Service Lifecycle

Lesson 2: Service Strategy

Basic Concepts of Service Strategy The Financial Management Process The Service Portfolio Management Process The Demand Management Process The Business Relationship Management Process

Lesson 3: Service Design

Basic Concepts of Service Design The Design Coordination Process The Service Level Management Process The Service Catalog Management Process The Availability Management Process The Capacity Management Process The Information Security Management Process IT Service Continuity Management The Supplier Management Process

Lesson 4: Service Transition

Basic Concepts of Service Transition The Transition Planning and Support Process The Change Management Process The Service Asset and Configuration Management Process The Release and Deployment Management Process

202

Page 203: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

The Knowledge Management ProcessLesson 5: Service Operation

Basic Concepts of Service Operation The Event Management Process The Incident Management Process The Problem Management Process The Request Fulfillment Process The Access Management Process

Lesson 6: Service Operation Functions

The Service Desk Function The Technical Management Function The IT Operations Management Function The Application Management Function

Lesson 7: Continual Service Improvement

Basic Concepts of Continual Service Improvement CSI Principles

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

CAPM/PMP- PROJECT MANAGEMENT PROFESSIONAL

PROGRAM DESCRIPTION You can find PMPs leading projects in nearly every country and, unlike other certifications that focus on a particular geography or domain, the PMP® is truly global. As a PMP, you can work in virtually any industry, with any methodology and in any location. The PMP signifies that you speak and understand the global language of project management and connects you to a community of professionals, organizations and experts worldwide.This course provides an intensive review of the subject matter tested on the Project Management Institute’s Project Management Professional (PMP) certification. This course will provide a summary review of the nine knowledge areas and five process groups covered in A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Participants will improve their test-taking skills by completing sample certifications totaling 200 questions and by discussing the rationale behind both correct and incorrect answers. The program is specifically designed to maximize the probability that you will succeed in passing the PMP the first time. Each student will receive a student manual including review materials, key definitions and formulas, sample questions and answers.

PERFORMANCE OBJECTIVES

203

Page 204: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Students will learn: Initiating Domains. Planning Domains. Executing Domains. Monitoring Domains. Closing Domains.

TARGETED JOB ROLES Project Managers

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills

TUITION AND FEES

Registration: $0Base Tuition: $3,156Materials: $139Total Tuition Fee: $3,295

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

PMP-EP Project Management Professional 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

204

Page 205: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

REQUIRED TEXTBOOKProject Management InstitutePMBOK 6th Edition

CERTIFICATION REQUIRED Project Management Professional

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1:

Module 1: Project Management Fundamentals Key Project Management Definitions Role of the Project Manager Knowledge Areas and Process Groups Project Lifecycle Models Project Processes Organizational Influences on Project Management Project Maturity ModelsModule 2: Project Initiation Project Selection Process Project Charter Elements Exercise 1: Prepare Project Charter and Milestone Schedule Stakeholder Identification Exercise 2: Identify StakeholdersModule 3: Planning the Project Project Requirements Class Exercise: Define Case Study Requirements Scope Definition & Management Work Breakdown Structure Exercise 3: Prepare WBS

205

Page 206: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Schedule Development Define Activities Sequence Activities Estimate Durations Develop Schedule Exercise 4: Prepare Project Schedule using Critical Path MethodLesson 2:

Module 3: Planning the Project (continued) Cost Estimating and Budgeting Project Risk Management Risk Identification Risk Analysis Risk Response Planning Exercise 5: Prepare Risk Management Plan Project Communications Managing Expectations Stakeholder Communications Assigning Responsibilities using a RACI Chart Exercise 6: Prepare RACI Chart & Communications PlanModule 4: Executing, Monitoring and Controlling the Project Integrated Change Control Exercise 7: Decide on Change Order Resolution Risk Monitoring and Control Exercise 8: Manage Risk EventModule 5: Project Close-out Project Closing and Acceptance Project Archives and Lessons LearnedCourse Wrap-up Review of Key Learning's & How to Apply to ProjectsLesson 3:

Module 6: Introduction and PMP® Program Overview Applying for and Taking the Certification Strategies: General and Question-by-Question

Module 7: Project Management Framework Project Life Cycles and Stakeholder Management The Triple Constraint and Organizational Issues

Module 8: Project Scope Management Initiating the Project: Project Plans Work Breakdown Structures

Lesson 4:

206

Page 207: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Module 9: Project Time Management Project Schedules and Logic Diagramming Critical Path Analysis and Performance Measurement

Module 10: Project Human Resource Management Project Manager Responsibilities Power & Conflict Management

Module 11: Project Quality Management Project Management and Quality management Statistical Process Control

Module 12: Project Cost Management Estimating versus Pricing Financial Analysis

Lesson 5:

Module 13: Project Procurement Management Procurement Planning Business Issues, Selection, and Evaluation

Module 14: Project Risk Management Expected Values Decision Trees and Cause and Effect

Module 15: Project Communication Management Tools and Techniques Reporting and Lessons Learned

Module 16: Professional Responsibility Professional Responsibility Ethics

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA SECURITY +

PROGRAM DESCRIPTIONCompTIA® Security+® (SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification. In this course, you will build on your knowledge of and professional

207

Page 208: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (SY0-501) certification, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

PERFORMANCE OBJECTIVESStudents will learn:

Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.

TARGETED JOB ROLES IT Security Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills CompTIA A+ Certification is helpful but not required a fundamental understanding of computer and networking concepts six to nine months of helpdesk experience recommended

TUITION AND FEES

Registration: $0Base Tuition: $2,575

208

Page 209: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, a half hour lunch break will be taken every day from 12:00PM to 12:30PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

SY0-501 CompTIA Security + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKLogical Operations093022S (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA Security + SY0-501

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Identifying Security Fundamentals

Identify Information Security Concepts Identify Basic Security Controls

209

Page 210: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Identify Basic Authentication and Authorization Concepts Identify Basic Cryptography Concepts

 Lesson 2: Analyzing Risk

Analyze Organizational Risk Analyze the Business Impact of Risk

 Lesson 3: Identifying Security Threats

Identify Types of Attackers Identify Social Engineering Attacks Identify Malware Identify Software-Based Threats Identify Network-Based Threats Identify Wireless Threats Identify Physical Threats

 Lesson 4: Conducting Security Assessments

Identify Vulnerabilities Assess Vulnerabilities Implement Penetration Testing

Lesson 5: Implementing Host and Software Security

Implement Host Security Implement Cloud and Virtualization Security Implement Mobile Device Security Incorporate Security in the Software Development Lifecycle

 Lesson 6: Implementing Network Security

Configure Network Security Technologies Secure Network Design Elements Implement Secure Networking Protocols and Services Secure Wireless Traffic

Lesson 7: Managing Identity and Access

Implement Identity and Access Management Configure Directory Services Configure Access Services Manage Accounts

 Lesson 8: Implementing Cryptography

Identify Advanced Cryptography Concepts Select Cryptographic Algorithms Configure a Public Key Infrastructure Enroll Certificates Back Up and Restore Certificates and Private Keys Revoke Certificates

 Lesson 9: Implementing Operational Security

210

Page 211: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Evaluate Security Frameworks and Guidelines Incorporate Documentation in Operational Security Implement Security Strategies Manage Data Security Processes Implement Physical Controls

 Lesson 10: Addressing Security Incidents

Troubleshoot Common Security Issues Respond to Security Incidents Investigate Security Incidents

Lesson 11: Ensuring Business Continuity

Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan 

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA NETWORK +

PROGRAM DESCRIPTIONThe CompTIA® Network+® course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. If you are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification. Also, if your job duties include network troubleshooting, installation, or maintenance, or if you are preparing for any type of network-related career, it provides the background knowledge and skills you will require to be successful.

PERFORMANCE OBJECTIVESStudents will learn:

Identify basic network theory concepts and major network communications methods.

Describe bounded network media. Identify unbounded network media. Identify the major types of network implementations. Identify TCP/IP addressing and data delivery methods. Implement routing technologies. Identify the major services deployed on TCP/IP networks. Identify the infrastructure of a WAN implementation. Identify the components used in cloud computing and virtualization. Describe basic concepts related to network security.

211

Page 212: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Prevent security breaches. Respond to security incidents. Identify the components of a remote network implementation. Identify the tools, methods, and techniques used in managing a network. Describe troubleshooting of issues on a network.

TARGETED JOB ROLES Entry-level IT Professional

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Basic computer literacy Basic PC Operating System navigation skills Basic Internet usage skills Professional Helpdesk or Computer Support Experience CompTIA A+ Certification is helpful but not required

TUITION AND FEES

Registration: $0Base Tuition: $2,575Materials: $120Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

N10-007 CompTIA Network + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

212

Page 213: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

REQUIRED TEXTBOOKLogical OperationsCompTIA Network +093029 Print and Digital Courseware

CERTIFICATION REQUIRED CompTIA Network + N10-007

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Network Theory

Networking Overview Network Standards and the OSI Model Network Types Identify Network Configurations Data Transmission Methods

Lesson 2: Bounded Network Media

Copper Media Fiber Optic Media Bounded Network Media Installation Noise Control

Lesson 3: Unbounded Network Media

Wireless Networking Wireless Network Devices and Components Install a Wireless Network

Lesson 4: Network Implementations

Physical Network Topologies

213

Page 214: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Logical Network Topologies Ethernet Networks Network Devices VLANs

Lesson 5: TCP/IP Addressing and Data Delivery

The TCP/IP Protocol Suite IPv4 Addressing Default IP Addressing Schemes Create Custom IP Addressing Schemes IPv6 Address Implementation Delivery Techniques

Lesson 6: Routing

Enable Static Routing Implement Dynamic IP Routing

Lesson 7: TCP/IP Services

Assign IP Addresses Domain Naming Services TCP/IP Commands Common TCP/IP Protocols

Lesson 8: WAN Infrastructure

WAN Basics WAN Connectivity Methods WAN Transmission Technologies Unified Communication Technologies

Lesson 9: Cloud and Virtualization Technologies

Virtualization SAN Implementations Cloud Computing

Lesson 10: Network Security Basics

Introduction to Network Security Vulnerabilities Threats and Attacks Authentication Methods Encryption Methods

Lesson 11: Preventing Security Breaches

Physical Security Controls Network Access Controls Install and Configure Firewalls Harden Networks Intrusion Detection and Prevention Educate Users

214

Page 215: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Lesson 12: Responding to Security Incidents

Incident Management and Response Basic Forensic Concepts

Lesson 13: Remote Networking

Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking VPN Protocols

Lesson 14: Network Management

Network Monitoring Configuration Management Documentation Network Performance Optimization

Lesson 15: Troubleshooting Network Issues

Network Troubleshooting Models Network Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Troubleshoot Security Configuration Issues Troubleshoot Security Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

COMPTIA SERVER +

PROGRAM DESCRIPTION

The CompTIA® Server+® course builds on your existing professional experience with personal computer hardware support to present the next tier of skills and concepts that you will use on the job when administering any type of network server. If your job duties include server troubleshooting, installation, or maintenance, or if you are preparing for any type of network server-related career, it provides the primary knowledge and skills you will require to be successful. The CompTIA® Server+® course can also benefit you if you are preparing to take the CompTIA Server+ certification.

PERFORMANCE OBJECTIVESStudents will learn:

Manage server hardware.

215

Page 216: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Install server hardware and operating systems. Configure networking hardware and protocols. Perform basic server configuration tasks. Create a virtual server environment. Administer servers. Implement server storage solutions. Secure the server. Plan and test disaster recovery. Troubleshoot server issues.

TARGETED JOB ROLES IT professionals such as PC, desktop, and help desk technicians who have

experience supporting PC hardware who wish to make the transition to become server hardware and support specialists.

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES 18 to 24 months of hands-on experience with installation, configuration,

diagnosis, and troubleshooting of PC hardware and network operating system issues

CompTIA A+ CompTIA Network +

TUITION AND FEES

Registration: $0Base Tuition: $2410Materials: $285Total Tuition Fee: $2,695

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

216

Page 217: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

SK0-004 CompTIA Server + 40The approximate time required to complete this program is five days for day students, and approximately ten nights for evening students.

REQUIRED TEXTBOOKCompTIA Server +093007S (Rev 1.1) Print and Digital Courseware

CERTIFICATION REQUIRED SK0-004

INSTRUCTIONAL METHODS Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINELesson 1: Managing Server Hardware

Server Components Server Power Server Cooling Asset Management

Lesson 2: Installing a Server  Prepare an Installation Plan Prepare the Server Hardware Set Up the Server Hardware Install an Operating System

Lesson 3: Configuring Networking Manage Network Cabling Configure Network Interface Cards Implement IP Addressing and Network Infrastructure Services

Lesson 4: Creating a Virtual Environment Create Virtual Servers Create Virtual Switches

Lesson 5: Performing Basic Server Configuration

Configure Local Server Properties

217

Page 218: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Configure Server Roles Set Up IP Addressing Service Roles

Lesson 6: Administering the Server

Update the Server Server Administration Access and Control Methods Create Service Level Agreements Monitor Server Performance

Lesson 7: Implementing Storage Solutions

Perform Capacity Planning Deploy Primary Storage Devices Storage Technologies Configure RAID

Lesson 8: Securing the Server Configure Firewalls Configure Security Protocols Implement Intrusion Detection Systems Implement Logical Access Control Methods Implement Data Security Methods Apply Server Hardening Techniques Implement Physical Security Create Virtual Networks

Lesson 9: Planning and Testing Disaster Recovery

Implement Environmental Controls Manage Documentation for the Server and the Network Create A Disaster Recovery Plan Perform Backup and Restoration

Lesson 10: Troubleshooting Server Issues

Troubleshoot Theory and Methods Troubleshoot Hardware Issues Troubleshoot Software Issues Troubleshoot Networking Issues Troubleshoot Storage Issues Troubleshoot Security Issues

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

10975A: INTRODUCTION TO PROGRAMMING

PROGRAM DESCRIPTION In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2013 and either the Visual C# or Visual Basic

218

Page 219: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, such as 20483B: Programming in C#.The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management.

PERFORMANCE OBJECTIVESStudents will learn:

Explain core programming fundamentals such as computer storage and processing.

Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and

queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle

errors. Identify the performance considerations for applications.

TARGETED JOB ROLES Entry Level IT Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Ability to use computers to start programs, open and save files, navigate

application menus and interfaces Ability to understand logical concepts such as comparisons Understand number theory

219

Page 220: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Ability to create, understand, and follow structured directions or step-by-step procedures

Ability to understand and apply abstract concepts to concrete examples.

TUITION AND FEES

Registration: $0Base Tuition: $2,557Materials: $288Total Tuition Fee: $2,845

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

10975 Introduction to Programming 40The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.

REQUIRED TEXTBOOK10975A: Introduction to Programming Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED NA

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO

220

Page 221: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

15:1

PROGRAM OUTLINEDay 1

Lesson 1: Introduction to Core Programming Concepts

Computer Data Storage and Processing Application Types Application Life-Cycle Code Compilation

Lesson 2: Core Programming Language Concepts

Syntax Data Types Variables and Constants

Day 2

Lesson 3: Program Flow

Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition

Lesson 4: Algorithms and Data Structures

Understand How to Write Pseudo Code Algorithm Examples Introduction to Data Structures

Lesson 5: Error Handling and Debugging

Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging in Visual Studio

Day 3

Lesson 6: Introduction to Object-Oriented Programming

Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation

Day 4

Lesson 7: More Object-Oriented Programming

Introduction to Inheritance Introduction to Polymorphism Introduction to the .NET Framework and the Base Class Library

Lesson 8: Introduction to Application Security

221

Page 222: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Authentication and Authorization Code Permissions on Computers Introducing Code Signing

Day 5

Lesson 9: Core I/O Programming

Using Console I/O Using File I/O

Lesson 10: Application Performance and Memory Management

Value Types vs Reference Types Converting Types The Garbage Collector

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

20480B: PROGRAMMING IN HTML 5 WITH JAVASCRIPT AND CSS3

PROGRAM DESCRIPTION This course provides an introduction to HTML5, CSS3, and JavaScript. This course helps students gain basic HTML5/CSS3/JavaScript programming skills. This course is an entry point into both the Web application and Windows Store apps training paths. The course focuses on using HTML5/CSS3/JavaScript to implement programming logic, define and use variables, perform looping and branching, develop user interfaces, capture and validate user input, store data, and create well-structured application.

The lab scenarios in this course are selected to support and demonstrate the structure of various application scenarios. They are intended to focus on the principles and coding components/structures that are used to establish an HTML5 software application.

PERFORMANCE OBJECTIVESStudents will learn:

Explain how to use Visual Studio 2012 to create and run a Web application. Describe the new features of HTML5, and create and style HTML5 pages. Add interactivity to an HTML5 page by using JavaScript. Create HTML5 forms by using different input types, and validate user input by

using HTML5 attributes and JavaScript code. Send and receive data to and from a remote data source by using

XMLHTTPRequest objects and jQuery AJAX operations. Style HTML5 pages by using CSS3. Create well-structured and easily-maintainable JavaScript code. Use common HTML5 APIs in interactive Web applications.

222

Page 223: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Create Web applications that support offline operations. Create HTML5 Web pages that can adapt to different devices and form factors. Add advanced graphics to an HTML5 page by using Canvas elements, and by

using and Scalable Vector Graphics. Enhance the user experience by adding animations to an HTML5 page. Use Web Sockets to send and receive data between a Web application and a

server. Improve the responsiveness of a Web application that performs long-running

operations by using Web Worker processes.

TARGETED JOB ROLES Entry Level IT Professionals

ADMISSION REQUIREMENTSIndividuals applying for this program are required to:

Interview with a Career Training Consultant Be at least 18 years of age Present proof of secondary education (high school diploma or GED certificate) In the event the applicant is unable to provide proof of secondary education,

achieve a passing score on the Wonderlic Basic Skills Test.

PREREQUISITES Ability to use computers to start programs, open and save files, navigate

application menus and interfaces Ability to understand logical concepts such as comparisons Understand number theory Ability to create, understand, and follow structured directions or step-by-step

procedures Ability to understand and apply abstract concepts to concrete examples. students who attend this training should have a combination of practical and

conceptual knowledge related to HTML5 programming.

TUITION AND FEES

Registration: $0Base Tuition: $2,845Materials: $288Total Tuition Fee: $2,707

CLASS SCHEDULEDay students will attend weekday classes from 8:00AM to 5:00PM for five days. Classes for evening students will be held Monday through Friday from 6:00 PM to 10:00 PM. For day students, an hour lunch break will be taken every day from 12:00PM to 1:00PM with four 10 minute breaks dispersed throughout the day. For evening students, there will be no meal time allowed but there will be two 10 minute breaks taken throughout the evening.

223

Page 224: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

SEMINAR HOURSSeminar Number Seminar Title Contact Hours

20480 Programming in HTML 5 with JavaScript and CSS3 40

The approximate time required to complete this program is five days for day students, and approximately 10 nights for evening students.

REQUIRED TEXTBOOK

20480A: Programming in HTML 5 with Javascript and CSS3Official Microsoft Academic Courseware and Labs

CERTIFICATION REQUIRED 70-480

INSTRUCTIONAL METHODS

Lecture Overhead slides Labs

Lab Time 20 hoursLecture Time 20 hours

MAXIMUM STUDENT TO INSTRUCTOR RATIO15:1

PROGRAM OUTLINEDay 1

Lesson 1: Overview of HTML and CSS

Overview of HTML Overview of CSS Creating a Web Application by Using Visual Studio 2012

Lesson 2: Creating and Styling HTML Pages

Creating an HTML5 Page Styling an HTML5 Page

Lesson 3: Introduction to JavaScript

Overview of JavaScript Syntax Programming the HTML DOM with JavaScript

224

Page 225: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Introduction to jQueryDay 2

Lesson 4: Creating Forms to Collect and Validate User Input

Overview of Forms and Input Types Validating User Input by Using HTML5 Attributes Validating User Input by Using JavaScript

Lesson 5: Communicating with a Remote Data Source

Sending and Receiving Data by Using XMLHTTPRequest Sending and Receiving Data by Using jQuery AJAX operations

Lesson 6: Styling HTML5 by Using CSS3

Styling Text Styling Block Elements CSS3 Selectors Enhancing Graphical Effects by Using CSS3

Day 3

Lesson 7: Creating Objects and Methods by Using JavaScript

Writing Well-Structured JavaScript Creating Custom Objects Extending Objects

Lesson 8: Creating Interactive Pages by Using HTML5 APIs

Interacting with Files Incorporating Multimedia Reacting to Browser Location and Context Debugging and Profiling a Web Application

Lesson 9: Adding Offline Support to Web Applications

Reading and Writing Data Locally Adding Offline Support by Using the Application Cache

Day 4

Lesson 10: Implementing an Adaptive User Interface

Supporting Multiple Form Factors Creating an Adaptive User Interface

Lesson 11: Creating Advanced Graphics

Creating Interactive Graphics by Using Scalable Vector Graphics Programmatically Drawing Graphics by Using a Canvas

Lesson 12: Animating the User Interface

Applying CSS Transitions Transforming Elements

225

Page 226: Denver VA State Catalog (Rev 8.24.06) - LeaderQuest · Web viewWhether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer

Applying CSS Key-frame AnimationsDay 5

Lesson 13: Implementing Real-time Communication by Using Web Sockets

Introduction to Web Sockets Sending and Receiving Data by Using Web Sockets

Lesson 14: Creating a Web Worker Process

Introduction to Web Workers Performing Asynchronous Processing by Using a Web Worker

GRADINGGrading will be assigned as follows:

Attendance: 50% Participation: 50%

226