Secure Your Organization

We offer a variety of modern cyber security lessons and courses that provides training to understand and even achieve certifications in the cyber security industry. The programs includes training in security basics, networks basics and defense, identity and access management, cryptography concepts, system administration, logging and monitoring, programming, web security, project management, and threats and vulnerabilities.

You will learn and be able to:

  • Use network assessment tools to gauge the security posture of an organization
  • Implement access management controls and account management practices
  • Identify, compare and contrast different types of attacks and related impacts
  • Use a programming language to automate system administration tasks
  • Use theoretical models and specific technical knowledge to secure web applications

Courses and Lessons

Security Foundations:
The Security Basics course will help students gain a fundamental understanding of security concepts that will be used throughout the Cyber Security track. Topics covered include basic security concepts; threat actors and attributes; organizational security; policy, procedures and frameworks; security controls business impact analysis; risk management; incident response and disaster recovery.

Systems Administration:
The course will cover System Administration basics from a security orientated point of view. This course will include information on installing and configuring network components to support organizational security. Additional topics include threats, vulnerabilities, secure protocols and secure system design.

Networking Foundations:
This course will provide instruction in technical skills required in network administration and support. This course will include information on media, topologies, protocols and standards, network support, and the knowledge and skills to sit for network certification.

Network Defense:
The Network Defense course will give students an overview of the various hardware and software tools available to defend a network against attack. Students will use various tools to assess the security posture of an organization and understand the possible impact of various vulnerabilities. Additionally, this course will cover the concepts of penetration testing and vulnerabilities testing.

Cryptography and Access Management:
The course will cover the different methodologies and concepts of Cryptography and Access management. Students will be exposed to different cryptography algorithms used to ensure safe transmission, storage and use of sensitive data. Students will also learn how to implement various access management controls and account management practices.

Logging and Monitoring:
The course will give students the knowledge and skills needed to properly analyze and interpret various security related logs produced by different security related technologies. This will focus on standard logs and in particular on Intrusion Detection and Prevention Systems. Students will also be given a basic understanding of forensics analyze and presented with such related topics as chain of custody.

Programming Foundations:
The Programming Foundations course will give students a foundation in one of the most popular programming languages in use today, generally a widely used high-level programming language for general-purpose programming. This module will give students a strong foundation upon which to build throughout the rest of the track.

Web Application Security:
The Web Application Security course is intended to be an introduction to the key concepts of Web Security. Students will learn the mindset, discipline, and methods for securing a software project. This course is designed to be useful and accessible to application developers, QA testers, operations teams, and leadership who want to understand how to have conversations and make decisions around application security. You will complete this course with both a theoretical model and specific technical knowledge.

Project Management:
This course covers the Agile software development methodology in use in many teams in the software industry today. Students will learn the different roles on an Agile team and how to be a successful part of one. The class will cover scrum, sprints, task estimation and bidding, and other parts of an Agile Project.

Threats and Vulnerabilities:
The Threats and Vulnerabilities course will provide students with an in depth look at the various threats and vulnerabilities faced by every organization and technology user. These will cover those related to hardware, software and people, including a detailed review of Social Engineering as used by various threat actors. Students will be able to identify, compare and contrast different types of attacks and related impacts.

Final Project
Students will learn to complete an analysis of network defense in a group setting.

Total Program Hours: 360