Who Is this Path For?
For those who want to pursue a Cybersecurity leadership position
For those looking to obtain advanced level professional certifications
For those who want to focus on DoD compliance and becoming an ethical hacker to better understand weaknesses and vulnerabilities of the systems that they are trying to protect
The skills you will gain
Network Monitoring
Manage and configure tools to monitor network activity
Research Skills
Research the latest IT security trends
Developing Standards
Develop security standards and best practices for the organization
Communication
Recommend security enhancements to management or senior staff
Disaster Planning
Develop and update business continuity and disaster recovery protocols
Management
Manage and train teams
IT and Technical Core Competencies
IT certification and compliance exams map directly to today’s current IT job roles laying the groundwork for specialized career paths in IT infrastructure or cybersecurity. Professional certifications give you the background you need, if you don’t already have it, and validates to employers that you know the material and can complete the appropriate work.
Courses On This Path
Covert Channels
This course delves into the technical realm of covert channels and how to communicate outside the design of many systems. The utilization of tools and applications are introduced to create various types of hidden communication to gain a better understanding of how those mechanisms operate. Prepares for the CompTIA PenTest+ Certification.
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee
Certified in Governance, Risk and Compliance (CGRC)
This course will help you prepare for ISC2 CGRC certification. The DOD Approved CGRC certification is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Earning the CGRC certification validates the knowledge of policies, procedures and methods of NIST SP 800-53. Prepares for the ISC2 CGRC Certification.
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee
Secure Software Development
This course explores the implementation of security controls within web applications, mobile applications, utility applications, and traditional applications. You will explore secure coding techniques as well as application security configuration techniques. A review of secure coding techniques will include Data Validation, Session Management, Exception Handling, and Data Encryption.
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee
Cloud Security and Virtualization
CCSP (Certified Cloud Security Professional). This course provides the foundational knowledge needed for the technical skills to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies, and procedures. This series can be used to prepare for the (ISC)²® CCSP® (Certified Cloud Security Professional) certification.
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee
Governance, Risk Management, and Compliance
This three-part course, following the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) provides a mechanism to inform risk decisions and improve cybersecurity. You will learn about risk-management concepts, policies, and roles defined by the relevant Department of Defense (DoD), NIST, and Committee on National Security Systems publications. Leads to the ECRMP (Enterprise Cloud Risk Management Practitioner Certification).
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee
Cyber Threats and Countermeasures
This course focuses on defensive methodology and tools to leverage defensive security practices. These practices require a strong understanding of current risks and exploits. Leveraging the knowledge acquired from the Information System Security Lab (offensive tools), this course builds on the remediation strategies for thwarting off active offensive attacks. Prepares for the EC Council CEH Certification.
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee
Cybersecurity Management
This is the first part of a 2-part course series of courses that combines theoretical security models with practical state-of-the-art examples for a comprehensive and useful introduction to this field. It benefits auditors, system administrators, or anyone else with a basic understanding of information technology. Topics include: security policies, risk analysis, cryptography, and network security. This course supports a certification that is a DoD approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements. Prepares for the ISC2 CISSP Certification.
Instructor Led | 2 to 8 Week Course | Full-Time, Part Time | Virtual Labs | Exam Voucher | Exam Pass Guarantee