Internet and Network Technology Online Training

Enroll in Individual Courses or the Full Program to Save $1000

Questions or comments? Contact us for more information.

Prerequisites: HS Diploma/GED, basic PC skills, and familiarity with the Internet


Partnership with the City University of New York (CUNY)

Queens College Professional & Continuing Studies (PCS) and Emerging Technologies Institute (ETI) have partnered to deliver ETI’s online career training programs to potential students interested in the option of online instruction.

Select one option:
1. Register with Queens College – Complete the PCS Registration Form
2. Register with ETI – Complete the ETI enrollment agreement (OLT-TRM)

Once registered, click on “Enroll Today” to process your payment.

Financial Assistance is available:

Internet and Network Technology – Online Training

Our online Internet and network technology training program prepares the student for job readiness in many business and technology-related careers. Understanding the fundamentals of networking, Internet protocols, LAN and WAN security as well as cloud computing is important for all professionals who use the Internet.

A computer or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other along network links (data connections). The connections between nodes are established using either cable media or wireless media. The best-known computer network is the InternetRead more from Wikipedia, the free encyclopedia

Occupational Objective: Network Technology Associate

Program: 171 clock hours

Course Listing for the Online Internet and Network Technology Training Program


Regularly $6,450

 Course Delivery  Online
 Duration 17-Week Term
 $25 Registration Fee  Included in Price
 Certificate/Diploma  Yes with Final Score
 Availability  Now Available

Enroll in individual courses below – Or enroll in full program to save $1000


Social Networking


  • Social Networking Technology and Security Fundamentals
    • Social Networking for Users
  • Yammer for Business Users
    • Using Yammer
  • Getting the Most From Social Networking
    • Social Networking Fundamentals
    • Social Networking Services, Strategy, and Management
  • Buffer for Business Users
    • Sign-In and Account Creation
    • Managing Social Media Activity
  • Flickr for End Users
    • Sign-In and Setup
    • Photo Storage Tools
    • Organizing Photos & Creating Albums
    • Editing Photos
    • Interacting with the Community
  • Facebook for Web
    • Sign-In and Setup
    • Finding and Interacting with Friends
    • Using the News Feed
    • Posting Updates
    • Photo Tools
    • Group Tools
    • Creating and Managing Pages
    • Creating and Organizing Events
    • Private Communication Tools
    • Privacy and Security Settings
  • Facebook Messenger
    • Sign-In and Setup
    • Communication and Connections
    • Using Messenger on the Web
  • YouTube for Web
    • Searching and Viewing Videos
    • Publishing Videos and Managing Channels
    • Creating and Editing Videos
  • Tumblr for Web
    • Getting Started with Blogs
    • Blog Authoring Tools
    • Finding Blogs
  • LinkedIn for Web
    • Setting Up a Profile
    • Managing Contacts and Connections
    • Posting Updates and Messages
    • Using Networking Tools
    • Using Groups
    • Configuring an Account


Networking, Internetworking, and Security Technologies


  • IT Security for End Users
    • IT Security Fundamentals
    • Using Corporate Devices Securely
    • Secure Corporate Communications and Networking
  • Securing User Accounts
    • Fundamental Security Concepts
    • Authorization, Registration and Passwords
    • Logon, Logoff, Account Changes, and Attack Mitigation
  • Exploring Security Trends
    • Attack Vectors and Mitigation
    • Vulnerabilities and Exploits
  • Foundations of Android Security
    • Android Architecture, Protection, and Development Best Practices
    • Android Security Vulnerabilities, Testing, and Enterprise Considerations
  • Foundations of iOS Security
    • iOS Security Architecture and Application Data Protection
    • Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
  • Cryptography Fundamentals
    • Cryptography Fundamentals: Defining Cryptography
    • Cryptography Fundamentals: Applying Cryptography
  • Securing Mobile Devices in the Enterprise
    • Securing Mobile Devices in the Enterprise: Mobile Security Threats
    • Securing Mobile Devices in the Enterprise: Mobile Security Technologies
    • Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
    • Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security


CompTIA Network+ 2017


  • Ports and Protocols and the OSI Model
  • Routing, Switching, & IP Addressing
  • Network Topologies & Technologies
  • Cloud Concepts, Network Services, & Cabling Solutions
  • Networking Devices
  • Network Storage, Virtualization, & WAN Technologies
  • Documentation and Diagrams & Business Continuity
  • Network Monitoring & Remote Access Methods
  • Policies and Best Practices
  • Security Devices, Wireless Security, & Access Control
  • Network Attacks & Device Hardening
  • Mitigation Techniques
  • Troubleshooting Methodology & Tools
  • Troubleshooting Connectivity & Performance Issues
  • Troubleshooting Common Network Service Issues
  • Mentoring CompTIA  Network+ N10-007


Microsoft Security Fundamentals


  • Mentoring 98-367 Security Fundamentals
  • Microsoft Security Fundamentals: Security Layers
  • Microsoft Security Fundamentals: Operating System Security
  • Microsoft Security Fundamentals: Network Security
  • Microsoft Security Fundamentals: Security Software
  • TestPrep 98-367 Microsoft Security Fundamentals


CompTIA Security+ SY0-501


  • The Present Threat Landscape
  • Types of Malware
  • Social Engineering and Related Attacks
  • Application and Service Attacks
  • Cryptographic and Wireless Attacks
  • Penetration Testing and Vulnerability Scanning
  • Impacts from Vulnerability Types
  • Components Supporting Organizational Security
  • Security Assessment Using Software Tools
  • Cryptography
  • Public Key Infrastructure
  • Wireless Security Settings
  • Analyzing Output from Security Technologies
  • Deploying Mobile Devices Securely
  • Implementing Secure Protocols
  • Troubleshooting Common Security Issues
  • Identity Concepts and Access Services
  • Identity and Access Management Controls
  • Common Account Management Practices
  • Frameworks, Guidelines, and Physical Security
  • Implement Secure Network Architecture Concepts
  • Secure System and Application Design and Deployment
  • Cloud, Virtualization, and Resiliency Concepts
  • Policies, Plans, and Procedures
  • Business Impact Analysis and Risk Management
  • Incident Response, Forensics, Disaster Recovery, and Security Controls
  • Mentoring SY0-501 CompTIA Security+


Cloud Computing Fundamentals


  • Cloud Computing for the Business User
    • Cloud Computing for the Business User: Concepts and Moving to the Cloud
  • Cloud Computing Technology Fundamentals
    • Cloud Computing Fundamentals: Overview
    • Cloud Computing Fundamentals: Virtualization and Data Centers
    • Cloud Computing Fundamentals: Storing and Managing Cloud Data
    • Cloud Computing Fundamentals: Migrating to the Cloud
    • Cloud Computing Fundamentals: Identity, Presence, and Privacy
    • Cloud Computing Fundamentals: Cloud Security


CompTIA Cloud+ CV0-001


  • Mentoring CV0-001 CompTIA Cloud+
  • CompTIA Cloud+ CV0-001: Cloud Fundamentals
  • CompTIA Cloud+ CV0-001: Virtualization
  • CompTIA Cloud+ CV0-001: Data Center Infrastructure
  • CompTIA Cloud+ CV0-001: Cloud Management
  • CompTIA Cloud+ CV0-001: Cloud Security
  • CompTIA Cloud+ CV0-001: Managing Cloud Systems
  • TestPrep CV0-001 CompTIA Cloud+


Certified Cloud Security Professional (CCSP)


  • Cloud System Architecture – Concepts and Design
  • Cloud Data Security
  • Cloud System Security – Platform and Infrastructure
  • Cloud Application Security
  • Cloud Service – Operations Management
  • Cloud Service – Legal and Compliance