Cybersecurity
Endpoint Security- UCI 3056
This program is designed for IT professionals and system administrators seeking to expand technical skills. Upon successful course completion, graduates will be well-prepared to leverage security technologies in their current roles while also having set the groundwork should they wish to pursue intermediate and advanced courses in cybersecurity.
Get Started Instructor-Led
This 8-week course is designed to equip learners with the skills to identify cybersecurity threats, analyze network vulnerabilities, and implement effective endpoint protection strategies. Learners will examine cyber attack techniques, evaluate security controls, and apply best practices to secure enterprise networks and operating systems. The course also covers cybersecurity governance, risk management, and compliance principles to ensure data protection and regulatory adherence.
This intermediate course is designed for IT professionals and system administrators seeking to expand technical skills. Through an array of interactive labs, captivating lectures, and collaborative projects, individuals will develop hands-on expertise in detecting, mitigating, and defending against cyber threats while strengthening their ability to secure network and endpoint environments. Upon successful course completion, graduates will be well-prepared to leverage security technologies in their current roles while also having set the groundwork should they wish to pursue intermediate and advanced courses in cybersecurity.
Course Goals
Upon successful completion of all course requirements, learners will
- Identify cybersecurity threats, attack vectors, and vulnerabilities targeting enterprise networks, applications, and endpoint systems.
- Analyze network and endpoint attack techniques, including TCP/IP exploits, wireless threats, malware, and privilege escalation.
- Evaluate security controls such as firewalls, intrusion detection/prevention systems, access controls, and endpoint protection mechanisms.
- Implement security best practices to harden networks, operating systems, and endpoint devices against cyber threats.
- Apply cybersecurity governance, risk management, and compliance principles to ensure data protection and regulatory adherence.
- Implement basic Linux security.
- Evaluate endpoint protection and the impact of malware.
- Use cybersecurity best practices to improve confidentiality, integrity, and availability.
Upcoming Course Dates
-
June 15th 2026
Schedule B: Monday, Wednesday, Friday 6:00 pm - 9:00 pm EST -
August 4th 2026
Schedule I: Tuesday & Thursday 4:30 pm - 9:00 pm EST -
August 31st
Schedule B: Monday, Wednesday, Friday 6:00 pm - 9:00 pm EST -
November 9th 2026
Schedule B: Monday, Wednesday, Friday 6:00 pm - 9:00 pm EST
Course Level
- Intermediate
Venues
- Remote
Prerequisites
- Must be a Per Scholas Alumnus
- Some Prerequisites Required
Have questions?
We can help with course selection, and answer questions about eligibility requirements and special circumstances. Contact an Alumni Admissions team member