Systems Support

IT Support & Security Fundamentals

Denver

Close

Choose your location

This course is currently offered in select locations. Candidates must live within commutable distance of the Per Scholas location to be eligible.


IT Support & Security Fundamentals offers the opportunity to earn the CompTIA A+ certification, equipping you with fundamental concepts in security specialties and hands-on training to gain the initial knowledge and skills to get started in an entry-level security-related role. You will also learn cyber security fundamentals and gain some hands-on experience to help you prepare for entry into a security career. Currently a hybrid-style course.

Get Started

  • Hybrid

No catch. Training and job connections at no cost to you.

Per Scholas learners during tech training at computers.

Course level

Some technical knowledge recommended ?

Get certified in

  • CompTIA A+ ?

Schedule

  • Hybrid 9AM - 4PM
    Monday through Friday
    15 Weeks

Upcoming course dates

  • July 22nd, 2024
    Application Due July 8th, 2024
  • November 2024
  • Please note, this application process is very competitive and not all applicants will be accepted for our limited slots. Seats are offered on first come, first served basis.

While these courses may include either intermediate or advanced material, technical knowledge specified in these listings will be required as a prerequisite for applicants to be considered for admission.

While anyone may apply for this course, some technical background may be helpful.

Applicants with all levels of experience in tech are encouraged to apply.

Most CISCO Network Essentials certification holders move on to a job in IT support, like a help desk technician. Help desk technicians solve technical issues and work with people.

Most CISCO IT Essentials certification holders move on to a job in IT support, like a help desk technician. Help desk technicians solve technical issues and work with people.

Gain the knowledge and skills necessary to effectively demonstrate an overall understanding of the AWS Cloud and start a career in cloud computing.

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

The Google IT Support Professional Certificate introduces learners to troubleshooting, customer service, networking, operating systems, system administration and security. No prior experience is required.

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.

Most CompTIA A+ certification holders move on to a job in IT support, like a help desk technician. Help desk technicians solve technical issues and work with people.

In-person learning takes place at one of our facilities across the US.

Remote learners must live within commutable distance of a Per Scholas campus to best facilitate our professional development and post-training employment support. For individuals who live outside of a commutable distance, you may be eligible for our National training courses.

Hybrid courses allow flexibility for learners to participate in the course remotely or in-person based on several factors. Learn more about the course you're interested in by reaching out to your admissions lead or attending an admissions overview after applying.

?

Have questions?

We can help with course selection, and answer questions about eligibility requirements and special circumstances. Contact an admissions team member

How to Become a Cybersecurity Analyst

Rigorous instructor-led cybersecurity training that includes hands-on activities using real-world servers, tools, and technologies.


Essential Critical Skills Development

Develop critical thinking and problem-solving skills to apply in the field.


Earn Industry Recognized Credential at No Cost

Learn test taking strategies to best prepare and pass the CompTIA A+ exam.


Elective Skills to Support your Career

Learn Python and electives in the AWS Educate Platform to culminate your learning experience.

What does the future hold for you as an IT Support & Security Fundamentals graduate?

As an IT Support & Security Fundamentals graduate, you will earn the CompTIA A+ certification and have the opportunity to be hired into a 12-month apprenticeship as a Security Analyst with an Activate employer partner.

$38k The average salary Cyber Security graduates make at their first job.

Strengthen your Tech Professional Profile


Start your Tech Career Wherever you are!

Per Scholas will train you whether you are new to tech or a seasoned veteran looking to upskill. Remain competitive as the industry grows.

Zobaria at podium
Within a few months, I changed from a person with the least-desired skills to one of the most sought-after employees. I have become someone my kids can look up to.

Meet Zobaria Ashraf


Build Your IT Professional Network

Meet and network with working IT professionals and visit employer sites to see their operations firsthand.

Monique Little
If someone had told me that this was where I would be now, I would never have believed them. I have a completely different outlook on life. My future is something that I never thought it could be.

Meet Monique Little


Direct Job Placement support

We match graduates to employers for tech roles across sectors and provide career coaching throughout the process.

When you are interviewing a Per Scholas graduate, you already have someone who is committed and prepared for the work world and responsible for their time and availability.

Meet David Jarvis

What You'll Learn


Introduction to Linux and Network Administration

Understand Linux and master Linux commands. Learn how to plan and install a network using real equipment in a virtual environment.


Behavioral Analytics and Security Monitoring

Learn how to detect and combat cybersecurity threats and develop core skills in areas such as threat management and cyber incident response.


Tools and Strategies to Succeed in the Workplace

Gain exposure to tools and techniques employed in the field by real cyber analysts and apply your learning to a final Capstone project.

Curriculum

Hands-on training along with career development and guest speakers

101: Core 1 PC Hardware
  • Explain cable types and connectors
  • Install and configure motherboards
  • Explain legacy cable types
  • Install and configure power supplies and cooling
  • Select and install storage devices
  • Install and configure system memory
  • Install and configure CPUs
  • Apply troubleshooting methodology
  • Configure BIOS/UEFI
  • Troubleshoot power and disk issues.
  • Troubleshoot system and display issues
  • Revisit and review module topics
  • Complete all module activities
  • Perform additional PS labs for extra practice
102: Core 1 Network Hardware and Services
  • Compare network types
  • Compare networking hardware
  • Explain network cable types
  • Compare wireless networking types
  • Compare Internet connection types
  • Use basic TCP/IP concepts
  • Compare protocols and ports
  • Compare network configuration concepts
  • Summarize services provided by networked hosts
  • Compare Internet and embedded appliances
  • Troubleshoot networks
  • Summarize client-side virtualization
  • Summarize cloud concepts
  • Revisit and review module topics
  • Complete all module activities
  • Perform additional PS labs for extra practice
103: Core 1 Mobile and Printer Hardware
  • Set up mobile devices and peripherals
  • Configure mobile device apps
  • Install and configure laptop hardware
  • Troubleshoot mobile device issues
  • Deploy printer and multifunction devices
  • Replace print device consumables
  • Troubleshoot print device issues
104: Core 2 Operating System Support
  • Configure Windows user settings
  • Configure Windows system settings
  • Use management consoles
  • Use performance and troubleshooting tools
  • Use command-line tools
  • Explain OS types
  • Compare Windows editions
  • Revisit and review module topics
  • Complete all module activities
  • Perform additional PS labs for extra practice
  • Perform OS installations and upgrades
  • Install and configure applications
  • Troubleshoot Windows OS problems
  • Configure Windows networking
  • Troubleshoot Windows networking
  • Configure Windows security settings
  • Manage Windows shares
  • Identify features of Linux
  • Identify features of macOS
  • Revisit and review module topics.
  • Complete all module activities
  • Perform additional PS labs for extra practice
105: Core 2 Security
  • Explain attacks, threats, and vulnerabilities
  • Compare wireless security protocols
  • Configure SOHO router security
  • Summarize security measures
  • Configure workstation security
  • Configure browser security
  • Troubleshoot workstation security issues
  • Configure mobile OS security
  • Troubleshoot mobile OS, app software, and security
  • Revisit and review module topics
  • Complete all module activities
  • Perform additional PS labs for extra practice
106: Core 2 Operational Procedures
  • Use remote access technologies
  • Implement backup and recovery
  • Explain data handling best practices
  • Identify basics of scripting
  • Implement best practice documentation
  • Use proper communication techniques
  • Use standard safety and environmental procedures
  • Revisit and review module topics
  • Complete all module activities
  • Perform additional PS labs for extra practice
107: A+ Certification Review
  • Test preparation
  • Voucher Eligibility 
  • Official Cert. Exam for 1101
108: A+ Certification Review
  • Test preparation
  • Voucher Eligibility 
  • Official Cert. Exam for 1102
109: ITIL Project Management
  • Introduce ITIL Project Management from the perspective of IT Service management
  • Demonstrate the logic behind IT services
  • Demonstrate an IT ticketing system
  • Articulate how ITIL processes find their way into IT ticketing systems and IT service desks
110: Networking Reinforcement
  • Introduce managing networking devices (Cisco IOS)
  • Introduce and explain OSI Reference Model
  • Explain DNS and DHCP in-depth
111: Introduction to Active Directory
  • Introduce Active Directory Domain Services
  • Explain Active Directory terminology
  • Experience using Active Directory for essential domain management.
112: Introduction to Microsoft 365 (user)
  • Introduce Microsoft 365 productivity environment from the user’s point of view
  • Experience using web-based Outlook Mail and Calendar
  • Experience using web-based Word
  • Introduce cloud storage
  • Experience using OneDrive
  • Introduce Microsoft 365 Admin Center
Module 904: Cloud and Security Basics
  • Cybersecurity concepts and principles
  • Identify and assess cybersecurity risks and vulnerabilities
  • Develop and implement effective security measures to mitigate risks
  • Government risk and compliance regulations
  • Fundamentals of cloud computing and identify cloud security risks and challenges
  • Different types of cloud monitoring and identify and respond to security incidents in the cloud
  • Understand and integrate security into the software development life cycle (SDLC)
  • Common application security vulnerabilities and remediate them
  • Effective endpoint security controls
  • Ethical hacking skills to identify and address security vulnerabilities.
Module 908: Security Operations, Monitoring, and DevSecOps
  • Intro to Splunk for monitoring
  • Threat modeling
  • OWASP Top 10 and CERT C Coding Standard
  • Continuous Integration and Continuous Delivery (CI/CD) – how it can improve security and software development processes.
  • Infrastructure security 
  • Compliance and regulation in maintaining the security of an organization’s data and systems.
  • Incident Response process – detect, analyze, contain, eradicate, and recover from security incidents.
  • Vulnerability assessment process, including identifying, assessing, prioritizing, and remediating vulnerabilities.
  • Vulnerability remediation in securing information systems 
  • Effective vulnerability management programs in organization
801: Professional Development and Graduation
  • Habits of success
  • Emotional Intelligence 
  • Communications 
  • IT and interpersonal skills and 
  • Any other desired topics

Curriculum

Hands-on training along with career development and guest speakers

View

Sample Schedule

  • Ice Breaker, Hacker News
  • Morning Lecture
  • Break for lunch
  • Hands on training and lab assignments
  • Wrap up for the afternoon and prepare for tomorrow

Learn to Think Like An IT Professional

Prepare to handle real workplace demands by challenging your understanding of course material and scenario problem solving.


Participate in Hands-on Labs

To provide an innovative, hands-on learning experience, Per Scholas provides learners with a tech kit based on their training track and delivery model, whether in person or remote. These kits are designed to enhance the learning experience and will be utilized in labs throughout the course.


Career Training with Employer Partners

Construct a tech professional resume and practice your interviewing skills with employees from some of our employer partners.

Meet Your Instructors

Learn from certified teachers with years of real-world training experience. Our instructors don’t just teach you what you need to know, but how to learn it.

Meet Our Graduates

It feels like I have a purpose. I have grown and changed so much. I tell people what I do, and they can’t believe me! They’re so impressed! I am proud to be one of the many individuals who are changing the face of tech.

Meet Rachel Sokol

How to Be Considered

Meet the Learner Profile Requirements

You may qualify to become a Per Scholas Cybersecurity Learner if you:

  • Are aged 18 or older
  • Have a High School diploma, equivalent, or higher
  • Are authorized to work in the U.S.
  • Have 1 year IT experience or have previously taken IT/Computer Courses
  • Live within commutable distance of the advertised Per Scholas Site
  • Can read, write and speak in English
  • Can attend classes full-time for the entire duration of the course
  • Are able to start a full-time job after course completion
  • Are ready to make an important commitment to building your future
  • Meet the pre-training income policy guidelines

*Women, youth, unemployed, underemployed and U.S. Veterans strongly encouraged to apply

Complete the Multi-Step Admissions Process

1. Submit an Eligibility Form

2. Admissions Overview: Once you submit an Eligibility Form, you’ll be directed to our Admissions Overview registration page. During this virtual webinar, you’ll learn more about our admissions process and next steps.

3. Assessments: Each training requires either an academic assessment, tech assessment or both. Information will be provided in detail at the Admissions Overview.

4. Interview: Individuals who meet the assessment score requirements will be invited to attend a behavioral interview.

5. Offer Letter and Onboarding: The Admissions team will review assessment scores and interview results and offer seats to eligible candidates. The learner onboarding process mirrors Employment Onboarding.

Please note, this application process is very competitive and not all applicants will be accepted for our limited slots.

More than a Technical Training

Additional professional development and support included to help you develop the skills you need for the job you want now and in the future.


Modern Facilities

In-Person courses offer each trainee their own lab-based computer workstation for the entire course with breakout spaces to socialize and study.


A Community of Support

Build Personal and Financial Wellness by partnering with our Learner Support Team. Learners and Alums work with Financial Coaches to gain financial control and chart a path to achieve financial goals, and their Learner Support Managers to design success plans to achieve personal goals and support personal wellness.


Alumni Advancement

Complimentary upskilling opportunities extended to alumni up to two years post graduation to help them match in demand employer hiring profiles and continue their career growth.

Frequently Asked Questions

What kinds of jobs can I get after completing this training?

A wide variety: everything from working in an office supporting other computer users to helping secure a global corporate network or becoming a field technician installing and servicing remote locations. You can also seek a job as a vulnerability tester or a security auditor.

They all fall into the general categories of Cybersecurity analyst and network security technician.

Infrastructure management involves keeping computer systems running smoothly and securely at all times.

Desktop support means helping other people—whether customers or employees—use computer systems and software effectively.

As a security auditor you can ensure companies adhere to strict government and corporate policies governing the protection of private information.

Starting salaries vary greatly, but the average is about $45,000 per year.

How can the course be free? Are there hidden fees?

Most people who learn about Per Scholas for the first time think: “Too good to be true.” We know it seems that way, but it is true. Our services are provided at no cost to you, using funds we raise from foundations, corporations, government and generous individuals.

The costs you can prepare for include transportation or childcare—expenses that take care of you so you can focus on your studies.

What professional certifications can I earn?

Students will have the opportunity obtain the CompTIA CySA+ Certification.

Is there a learner pre-training income policy?

Yes, Per Scholas learners must meet the pre-training income policy requirements. View our Learner Pre-Training Income Policy here.

What if I don’t have a Laptop? What are the computer requirements?

Computer requirements are determined by each specific curriculum track. During the onboarding process, we will review each learner’s needs on a case-by-case basis. If you have any concerns about your situation, please elevate to the admissions team during the admissions process.

I receive unemployment insurance benefits or other benefits that require me to spend time working or looking for work. Can I still enroll?

Depending on the campus and course, Per Scholas training is approved for people receiving unemployment, as well as other benefits that would ordinarily require them to spend time working or looking for work. If you have questions or concerns about your situation, please contact admissions.

I meet other requirements, but I am not a U.S. citizen and haven’t received my work authorization yet. Can I still apply?

Unfortunately, we cannot process your application until you have received clearance to work in the U.S. However, if you are experiencing problems, we may be able to refer you to other organizations that may be able to help.

I have childcare responsibilities. Can you accommodate me?

We have onsite staff available to help students navigate childcare options. Ask to speak with the Childcare Navigator when you attend an info session.

I have a disability. Can you accommodate me?

We comply fully with the Americans with Disabilities Act and other relevant laws and regulations. Please contact [email protected] to discuss your specific situation and needs.

​ Does Per Scholas have a Non-Discrimination policy?​

We’re proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or national origin. See our full EEO statement here.

Close

Choose a location for
Your Course

This course is only offered at select Per Scholas locations. Choose a location to get the most accurate course information.