Professional Documents
Culture Documents
Cybersecurity
Bootcamp
24 Weeks to a Cyber Career
WEEK 1 WEEK 5
Fundamentals of Hardware Virtual Machines
Learn about hardware and operating system Get into more Windows administration tools.
fundamentals to build your baseline. Labs:
Labs: • Configuring Identity and Access Management
• Exploring the Lab Environment Controls
• Scanning and Identifying Network Nodes • Implementing a Secure Network Design
• Intercepting and Interpreting Network Traffic • Configuring a Firewall
with Packet Sniffing
• Analyzing the Results of a Credentialed WEEK 6
Vulnerability Scan
Exploitation
WEEK 2 Use Metasploit to run exploit code.
Kali Linux Introduction Labs:
• Configuring an Intrusion Detection System
Build out your Kali Linux machine while also • Implementing Secure Network Addressing
learning about networking and data security. Services
Labs: • Implementing a Virtual Private Network
• Managing the Life Cycle of a Certificate • Implementing a Secure SSH Server
• Managing Certificates with OpenSSL
• Auditing Passwords with a Password Cracking WEEK 7
Utility
• Managing Centralized Authentication
Building a Defensible Network
Learn the basics of different network architecture
WEEK 3 and design principles.
WEEK 9 WEEK 13
Scanning the Network Threat Intelligence
Begin scanning a network periphery to find Utilize threat intelligence and classification to
vulnerabilities. support organizational security.
Labs: Labs:
• Identifying Application Attacks • Investigating Threat Data and Intelligence
• Managing Data Sources for Incident Response Sources
• Configuring Mitigation Controls • Developing a Network Threat Model
• Analyzing Output from Network Security
Monitoring Tools
WEEK 10
• Discovering the Lab Environment
Cloud Computing
WEEK 14
Learn about the Cloud and its implications for risks
and vulnerabilities, install Kali Linux with Cloud Intelligence & Indicator Management
Computing.
Implement controls to mitigate attacks and
Labs: software vulnerabilities.
• Acquiring Digital Forensics Evidence
• Backing Up and Restoring Data in Windows Labs:
and Linux • Analyzing Output from Security Appliance Logs
• Managing Incident Response, Mitigation and • Analyzing Output from Endpoint Security
Recovery Monitoring Tools
WEEK 11 WEEK 15
WEEK 17 WEEK 21
Attacking & Protecting Incident Response
Learn about DoS attacks and mitigation as well as Apply incident response procedures
deploying honeypot solutions to intercept hackers. Labs:
Labs: • Configuring and Analyzing Share Permissions
• Analyzing Host and Application IoCs • Assessing the Impact of Web Application
• Following an Incident Response Process Vulnerabilities
• Analyzing Output from Web Application
WEEK 18 Assessment Tools
WEEK 19
WEEK 23
Proactive Threat Hunting Certification Review
Become proactive in your approach to
Tie off remaining concepts as you prepare for the
cybersecurity by seeking threats.
CompTIA CySA+ exam. Take your second belt
Labs: exam as prep.
• Reviewing Risk Management Processes
• Analyzing Output from Topology and Host
Enumeration Tools WEEK 24
• Testing Credential Security CompTIA CySA+ Certification
• Configuring Vulnerability Scanning and
Analyzing Outputs The final step in your bootcamp journey - your
CySA+ certification!
WEEK 20
Security Monitoring
Deploy Security Content Automation Protocol (SCAP)
Labs:
• Assessing Vulnerability Scan Outputs
• Assessing the Impact of Regulation on
Vulnerability Management
• Performing Account and Permissions Audits
• Configuring Network Segmentation and Security
% %
Our Outcomes are third-party
verfied by the independent
firm, Delivery Associates, for
89.1 95.3
accuracy and transparency. within 6 months of within one year of
graduating graduating
Student was not employed until more than six months after
16 6.2%
graduation, but was then employed in a relevant position
Student was not employed until more than six months after
1 0.4%
graduation, and was not then employed in a relevant position
Apply Now
Financing Options
Schedule a call with an Admissions Advisor to discuss
which payment or financing option is right for you.
TALK TO US