Course Curriculum
What you’ll learn:
- In this Network Accelerator program you’ll attain entry-level proficiency in core Networking and Cyber protocols. You’ll also get the support you need to pass CCNA, CompTIA Security+, and AWS CSA exams.
- Through 50 labs, 3 capstone projects, and hands-on experience with practical tools you’ll gain real-world context on networking and improve your job prospects.
- The Network Accelerator is a 16-week program for students devoting ~20 hours per week with live instruction 2x per week, open office hours, and take home assignments for self-study.
What you’ll gain:
![]() |
![]() |
![]() |
![]() |
Explore Key Topics
Click on a topic from the left to see a brief description on the right. It’s a quick and easy way to explore concepts that our Network Accelerator covers.
- Basics of networking
- Routing and connectivity troubleshooting
- Optimizing network redundancy
- Securing network infrastructure
- Cloud computing fundamentals
- Cybersecurity essentials
- Cybersecurity operations management
- Vulnerability and threat management
- AWS cloud networking concepts
- AWS architectural design
- AWS security, compliance, and troubleshooting
- AWS cost optimization
Basics of networking
- Understand core networking principles
- Master subnetting techniques
- Configure Cisco IOS essentials
- Explore host-to-host communications
- Navigate the OSI model
- Learn IP addressing fundamentals
- Examine packet transmission behavior
Routing and connectivity troubleshooting
- Diagnose IP addressing problems
- Troubleshoot OSPF neighbor relationships
- Validate router interface configurations
- Analyze routing table entries
- Resolve inter-VLAN routing issues
Optimizing network redundancy
- Configure HSRP gateway redundancy
- Implement VRRP for failover support
- Optimize GLBP for load balancing
- Align STP protocols with FHRP
- Eliminate single points of failure
Securing network infrastructure
- Configure secure network devices
- Implement access control mechanisms
- Deploy network security protocols
- Monitor network security posture
- Mitigate common security threats
Cloud computing fundamentals
- Build secure cloud infrastructure
- Configure AWS-specific cloud solutions
- Design scalable network architectures
- Implement cloud security controls
Cybersecurity essentials
- Identify common threat vectors
- Implement access control mechanisms
- Configure network security protocols
- Establish data protection measures
- Deploy security monitoring tools
Cybersecurity operations management
- Monitor security event queues
- Analyze network traffic patterns
- Establish incident response workflows
- Implement threat detection technologies
- Coordinate SOC team functions
Vulnerability and threat management
- Identify common network attack vectors
- Detect vulnerabilities using scanning tools
- Analyze threat patterns and behaviors
- Mitigate risks with security controls
- Respond to incidents with procedures
AWS cloud networking concepts
- Design virtual private cloud architectures
- Configure subnets and route tables
- Implement security groups and NACLs
- Connect networks with VPNs/direct connect
- Optimize traffic using load balancers
AWS architectural design
- Design scalable cloud-based solutions
- Select appropriate AWS services
- Implement high availability architectures
- Optimize cost through resource planning
- Ensure fault tolerance and resilience
AWS security, compliance, and troubleshooting
- Implement identity and access controls
- Encrypt data at rest/in transit
- Monitor compliance with AWS tools
- Audit activity using CloudTrail logs
- Troubleshoot security and access issues
AWS cost optimization
- Analyze usage with Cost Explorer
- Select right pricing models
- Implement resource scheduling strategies
- Rightsize instances and storage options
- Monitor spending with budget alerts