30-Hour Introductory Course | 370-Hour Extended Program
Explore the areas of networking, Linux and Windows operating systems, and virtualization concepts in the Introductory Course that covers the fundamentals you need to know.
The Introductory Course modules include the Cyber Attack Cycle, basic protocols and commands of computer communication, and the structure of operating systems. You will also encounter practical training sessions that introduce scenarios of real-life cyber attacks and how to apply countermeasures that defend and protect. The course concludes with an aptitude exam to assess the candidate's suitability for the full course and for a career in the field.
How to manage the networks and computers of an organization are covered in this course, including the fundamentals of Group Policy Objects and Windows Server 2012. Learn the practical side of setting up domain environments with the help of Active Directory, as well as managing network services (i.e., DHCP and DNS servers). The course will demonstrate how Windows Server 2012 differs from later updates and configuration of security services to make systems more robust.
Computer networking today is an integral part of any organizational structure in nearly every industry, such as finance, hospitality, healthcare, government, technology, manufacturing, transport, and others. In this course, you will gain deep knowledge of network devices, layers, and protocols that are typically in use.
An in-depth comprehension of networks is essential to a cybersecurity career. The Computer Networking course covers all the networking concepts that you must be familiar with, such as topologies, protocols, and devices. Included in this course is preparation for the CompTIA Network+ exam*, the first cyber industry certification that you will obtain during the bootcamp.
This course takes a close look at cloud storage, which is the infrastructure of choice for many businesses and organizations. Data stored in the cloud is in critical need of protection, as it often comprises sensitive information that is at extremely high risk. Cloud platforms, such as Google Cloud, Microsoft Azure, and AWS by Amazon, are highly popular, and therefore any cybersecurity professional must know how to implement and manage them.
Cloud security is an ongoing challenge and not just a one-time activity, so the course also covers how to ensure data integrity in the longer term. In addition, this course will prepare you with the skills and knowledge to successfully sit the AWS Certified Cloud Practitioner exam.*
Take this course to discover the ins and outs of the open-source Linux operating system, and particularly Kali Linux, the cybersecurity distribution. In addition to learning about Linux security and how to reinforce the OS environment, you will also get prepared to pass the LPI Linux Essentials certification exam*, a leading industry certification.
The rise of IoT has contributed to the popularity of Linux in the past few years, thanks to its significant benefits for information security personnel. This course will cover the Linux file system and how to navigate it, including running of basic commands, the configuration of network services, and how to exploit mitigations and manage access permissions.
The ability to manage, secure, and operate network communication equipment is the focus of this course, including all types of systems and organizations. In addition, the course covers preparation to sit the Cisco Certified CyberOps Associate exam.*
CYBER INFRASTRUCTURE & TECHNOLOGY
In addition, you'll learn the various infrastructure defenses put to use today, as well as secure architecture design, and how to make networks, cloud infrastructures, and devices as secure as possible. Practical training includes working with Security Information & Event Management (SIEM) solutions, particularly focusing on Splunk, an open-source solution that is highly popular today.
INTRODUCTION TO PYTHON FOR SECURITY
Delve into the world of basic programming and its surrounding concepts, and learn how to use one of the most widely-used programming languages in the cyber industry, Python. The hands-on focus provides instruction on setting up a Python environment in Linux and Windows, advanced levels of programming with Python, and the use of external libraries. Earn practical experience building and using tools for the automation of tasks involved in cybersecurity.
As part of the wider scope of cyberinfrastructure courses, this course will lay the foundation for a career as a Cybersecurity Practitioner, how to collaborate with Network Operations Center (NOC) teams, and how to function as the cybersecurity specialist for IT and NOC teams in a range of organization types.
OFFENSIVE SECURITY: ETHICAL HACKING
Enter the minds of black hat hackers and discover how cyber criminals think, who they are, and how to beat them at their own game.
The course covers the gamut of cyber attacks and how to defend against them, such as network attacks, cryptographic attacks, social engineering attacks, and application attacks. The practical exercises and simulations demonstrate how to uncover system vulnerabilities and exploit them via specialist knowledge and skills. You will also benefit from more preparation for a range of high-level certification exams, including CompTIA Security+, CompTIA CySA+, and (ISC)² SSCP** certification exams.*
DFIR & THREAT HUNTING
In this course, you will learn digital forensics and incident response (DFIR), including procedures for successful threat hunting, management of cyber attacks in real-time, pinpointing the threats that have managed to break through current security protocols, and how to collaborate as part of a Security Operations Center (SOC) team. During the course, you will undergo preparation for several certification exams*, including CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP**.
The thorough course curriculum covers threat hunting methods that are more advanced, including analytics of user behavior, artificial intelligence, and situational awareness. It all includes a deep examination of digital forensics and how to use them to investigate host and network attacks. The topic of reverse engineering of malware is also examined in-depth, so you can learn how it is executed on systems that are vulnerable. Another aspect of the course covers the SOC team's role in organizations and how it is activated to handle cyber attacks as they occur.
GAME THEORY STRATEGY IN CYBERSECURITY
The only way to get ahead of hackers is to understand how their minds work and what they plan to do next. In this course, learners get to know the concept of divergent thinking and how to implement it to win at the hacker's game. The course covers an introduction to Game Theory, which is a fundamental tool to understand the interaction of all players, the rational and irrational approaches to thought, and how to use "out of the box" thinking to predict impending attacks.
The material offered in the course sharpens the learner's strategic capabilities, imparts the skills to apply Game Theory to real-life cyber attacks, and instructs in methods of solving an organization's defense issues.
This course is dedicated to honing your job search and supporting your abilities to find a suitable job in the professional cybersecurity industry. A host of specialist career topics are covered, such as training for interviews, how to network, assistance in internship placement, and 1:1 meetings for resume writing, LinkedIn profile optimization, and more.
*While the courses offer the material necessary to pass the industry exams, the program is not designed exclusively for exam preparation. Moving forward to take the certification exams is not part of the program structure and costs are not included in the tuition fee. The cost of the certification exams is the responsibility of the learner.
** In order to certify, learners must have at least one year of work experience (cumulative) in at least one of the seven domains of the SSCP Common Body of Knowledge (CBK).