30-Hour Introductory Course | 370-Hour Extended Program
Our Introductory Course offers the unique opportunity to test-drive our Cybersecurity Bootcamp before you commit to the whole program. In just 8 hours a week—spread out in under one month across evenings and weekends—you’ll learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle.
You’ll also experience what an online learning environment feels like, how classes and interactions flow, and, most importantly, you’ll acquire all the information you need to make a confident and informed decision to enroll in the Extended Program.
At the end of the Introductory Course, learners take a summary exam to assess their ability to forge a successful future in their chosen career path.
The Fundamentals phase of the program helps learners understand the basics of cybersecurity. In Fundamentals, learners cover Microsoft Windows, Linux, and basic network and cloud security. This phase of the program acts as training to prepare learners for the more rigorous Infrastructure phase.
Globally, a multitude of companies trusts Windows Server exclusively to manage their computers and networks. The Microsoft Security course gives learners a hands-on education with modern and widely used versions of the Microsoft Windows and Server operating systems. Learners will discover how to administrate, secure, and become good practitioners with the Microsoft ecosystem of products.
Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few.
In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.
In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam*.
More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam*.
Fundamentals Phase Final Project : Building Your Own Environment
Building Your Own Environment: Learners will create an insecure small business infrastructure on which they will secure while practicing cyberattacks and forensics. Upon completion of the program, learners will be able to include this project in their portfolio to demonstrate their skill and ability.
Cybersecurity Infrastructure Phase
The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase.
This course gives learners the necessary knowledge to begin studying for the EC-Council CND exam.
Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the digital skillset needed to appeal most to potential employers.
Critical Infrastructure Security
Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.
After this course, learners will be prepared to begin studying for the CompTIA Security+ exam*.
Python for Security
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Infrastructure Phase Final Project
Using the infrastructure created in the previous final project, learners will take a threat scenario and secure the infrastructure to demonstrate infrastructure hardening.
Career Services Workshop
This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while CyWar hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field.
Advanced Cybersecurity Phase
The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers.
Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.
After this course, learners will be prepared to finish studying for the EC-Council CEH(Certified Ethical Hacker) certification exam*.
Digital Forensics & Incident Response
When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.
After this course, learners will be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.
Advanced Phase Final Project: Attack & Response
Learners will take the secure infrastructure they have created in previous projects, design an attack to compromise the infrastructure, gather forensic evidence, and write a complete investigative report.
Upon completion of the program, learners will have the reports, code, and designs from their projects to form a portfolio that they can show prospective employers.
How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.
*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation program, whose primary focus is the students' performance on the exam. Certification exams are not conducted as part of the program and require additional costs not included in tuition.