.png)
NEXTSTEPS Educational Academy
"THEIR SUCCESS IS OUR FUTURE"
COURSES

Computer Building & Concepts
Build Your Own Computer(BYOC) – The Cyber Security Edition
From computer hardware to system software and security, BYOC is that hands-on experience where participants learn the full range of IT fundamentals from building a computer to securing a network from cyber-attack. Participants will
-
Break down and rebuild a computer system
-
Learn how a single computer system interacts and functions as part of a multi-system computer network
-
Design the cyber security to protect computer networks from hackers and attack
-
Receive industry level instruction and training
-
Develop soft skills, communication skills, and personal and business financial literacy through engaging workshops in language arts, etiquette, and wealth management
-
Includes Networking Wired and Wireless course
-
Includes Raspberry PI course
Networking Wired & Wireless
Computers communicate the same way that people communicate. In this course, students will learn how computers communicate., will learn the inter-working of how computers communicate. Students will work on a series of projects that will allow them to connect computers into work groups and domains. Students will also work on building smart rooms and leveraging wireless technology.


CYBER SECURITY 101
This learning session is an introduction to cyber-security and is designed to give students a birds-eye view into the vast world of cyber-security. Students will gain an understanding of security and how to recognize the threats that could harm them while online. Students will be introduced to the different types of malware, viruses, Trojans, and building systems and appliances to scan and eliminate security threats.
Intro Cyber Security
-
Understand the cyber security Framework Core and its five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover.
-
Understand the potential computer violations that may occur and the attackers.
-
Understand the methods used in doing reconnaissance against a computer system or network.
-
Understand how to prepare and defend against cyber-crimes and information theft.
-
Understand the appropriate measures to be taken should a cyber-crime occur.
-
Understand the effects of poor security in an organization.
Identify vulnerabilities and lock down systems (network, server and/or workstation) according to the organization's security policy. Configure systems according to the organization's security policy
Raspberry Pi Concepts
The Raspberry Pi is a credit-card-sized computer that plugs into your TV and a keyboard. Students will construct a Raspberry Pi and its corresponding parts to create a functional mini-computer to take home. Once constructed, the students will engage in a series of electronics projects including: building live chat sessions, internet browsing, remote OS installation, and playing games.
