Download the Course Catalog
Start Your Cybersecurity Training Today!
Are you ready to gain hands-on experience with the digital marketing industry's top tools, techniques, and technologies?
Outsmart the Competition
and Excel in Your Career
From the Fundamentals to Advanced Skills, We Have You Covered.
This non-credit, non-degree program is built for those looking to fast-track their career in cybersecurity, whatever their initial level of tech proficiency. Expert instructors guide your training in a safe cloud-based platform where you can practice defending and attacking various systems and applications. You will complete the program ready to defend organizations against real attacks, find weaknesses, and secure systems from threats–all the skills employers look for.
Additionally, our courses are regularly updated to incorporate the latest advancements in cyber tech, including AI tools and practices.
The Cybersecurity Bootcamp is offered through the Continuing Education services of Penn State Beaver, Penn State Behrend, Penn State Greater Allegheny, and Penn State New Kensington.
With over 700,000
job openings
nationwide, there’s
never been a better
time to join the
cybersecurity
industry.
- Source:
Cyberseek.org
Join the Rewarding
Field of Cybersecurity!
Train on the Industry’s Top Tools and Software
Develop the advanced skills and training you’ll need to become a well-rounded cybersecurity
professional, covering everything from the basics to highly sought-after, advanced industry skills.
Learn to Defend Against Cyberattacks
Thrive in the Expanding World of Cybersecurity
Hands-On Learning
Confidently enter the workforce with hands-on training in an accelerated, online environment. Gain real-world experience designed for professionals of all backgrounds and experience levels to excel in the field of cybersecurity.
Cyber Labs
Gain experience through real-world simulations identifying vulnerabilities on web, server, mobile, and desktop platforms and learn how to protect against a variety of threats. Our proprietary labs are designed by cybersecurity experts to help you practice the skills you need to succeed.
Virtual Classroom
Top-tier instructional methodologies are used with cloud-based chat software that encourages real-time interaction between you and your instructors. Attend classes virtually from the comfort of your own home on weekday evenings.
Industry-Leading Instructors
Experience personalized mentorship and guidance from expert instructors with current industry knowledge and a unique insider’s understanding of the fast-paced field of cybersecurity. Access guidance from thought leaders as you learn how to succeed as a cybersecurity professional.
Get the Knowledge and Experience You Need
to Become a Cyber Defender
Networking
Advantages
Attend virtual networking events to access local and global hiring partners looking to hire newly-qualified cybersecurity professionals. Events are designed to allow you to explore diverse career opportunities available upon program completion.
Professional
Coaching
Access a team of career coaches eager to help you achieve your professional goals in your cybersecurity career. Professional development is available to assist in resume writing, LinkedIn profile building, interview prep, and more.
Dedicated
Support
Your journey into the field of cybersecurity is backed by a dedicated team. Your student success manager will help ensure you have the tools and support you need to succeed in the program and beyond.
Career Search
Assistance
Our Career Outcomes team will assist in your search to find exciting job opportunities. Prepare for the interview process with our professional assistance to start your new career with confidence.
Download the
Course Catalog
Find out what you will learn.
Program Overview
4 Week Introductory Course |
32 Week Complete Program
-
Introductory Course
The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future.
The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics. -
Fundamentals Phase
In the Fundamentals Phase, you will delve into the core principles of cybersecurity. This immersive exploration will cover crucial concepts necessary for securing and defending as a cybersecurity professional, such as network architecture, operating systems, network communication, and cloud data storage.
By completing this phase, you will establish a solid foundation and gain a comprehensive understanding of fundamental cybersecurity concepts. -
Computer Networking Fundamentals
In this course, you will receive an introduction to computer networking, enabling you to gain practical experience in configuring and managing network devices for optimal performance and security. Through hands-on activities, you will enhance your device configuration and troubleshooting skills while developing an understanding of network architectures, protocols, and security measures. This course will also sharpen your critical thinking and problem-solving abilities as you tackle common networking challenges.
Key Learning Outcomes:- Acquire knowledge on the various entities in digital environments, including how they connect and interact.
- Develop an understanding of different network types and their significance in our interconnected world.
- Utilize the benefits of configuration settings documentation to optimize network operations.
- Explore the role of audits in ensuring optimal network performance and security.
- Recognize the importance of system and communications protection in safeguarding information.
- Learn effective strategies for updating and adapting policies to keep pace with the ever-evolving landscape.
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, ISC2 Certified in Cybersecurity℠ -
Microsoft Security Systems Administration
In this course, learners will receive practical, hands-on training in securing Microsoft Windows environments. They will acquire the knowledge and skills necessary to implement security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. Additionally, learners will gain the ability to configure and manage networks using system admin tools to ensure security and stability. By the course's conclusion, participants will have a solid understanding of Microsoft's infrastructure and the competence to establish and maintain secure Windows environments across diverse professional roles.
Key Learning Outcomes:- Gain a comprehensive understanding of Microsoft's infrastructure and its integral components.
- Learn effective strategies for safeguarding Microsoft's infrastructure against potential threats.
- Develop proficiency in managing various types of accounts based on business requirements.
- Explore techniques for maintaining a secure and protected network environment.
- Discover the advantages of automations and scripting in bolstering both security and efficiency within cybersecurity roles. Understand the role of Active Directory in managing permissions and controlling access to network resources.
- Acquire the skills to enhance system security and operational efficiency using PowerShell.
-
Securing Your Network
In this course, you will expand your knowledge of networks and deepen your understanding of their intricacies. Through exploration, you will become familiar with the various components of both wired and wireless networks, including their security constraints and vulnerabilities. Furthermore, you will delve into the development of access controls, ensuring a comprehensive approach to network security that encompasses people, data, and devices. Additionally, the course will cover the safe construction and fortification of networks, including discussions on cryptography and privacy considerations.
Key Learning Outcomes:- Develop a thorough understanding of network security measures and the necessary strategies to maintain network safety.
- Begin mastering network monitoring techniques to detect and respond to potential threats.
- Gain proficiency in effectively managing accounts within a system.
- Explore how security attributes can reinforce network defenses.
- Familiarize yourself with a wide range of common tools and technologies that support network safety.
- Acquire the skills to construct a secure network architecture.
- Learn the fundamentals of MHN (Multi-Hop Network) networks and effective setup practices.
- Understand the relationship between Telnet and POP3 machines in the context of network security.
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate -
Integrating Your Infrastructure Security
This course provides learners with the essential skills to proficiently manage Linux operating systems, leverage basic Python programming, explore cloud computing, and enhance system security against various threats and vulnerabilities. Participants will learn how to effectively monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments, while also gaining familiarity with remediation techniques. Moreover, learners will gain insights into the impact of DevSecOps on the cybersecurity landscape.
Key Learning Outcomes:- Develop an understanding of Linux operating system management, including effective monitoring, scanning, and analysis of threats and vulnerabilities in Linux and cloud-based environments.
- Gain an introduction to Python programming, acquiring foundational skills for cybersecurity applications.
- Establish a basic comprehension of cloud computing environments and create an instance using Amazon Web Services (AWS).
- Understand the process of remediation and the importance of sharing details to protect other systems.
- Learn to create automation solutions that enhance system management and security.
- Explore the design principles behind scalable cloud solutions and the integration of diverse environments.
- Become familiar with the concept of DevSecOps and its significance in the cybersecurity domain.
Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner -
Infrastructure Phase
The Infrastructure Phase provides you with the essential knowledge and practical experience to establish and maintain secure infrastructures and technologies.
By the end of this phase, you will acquire a comprehensive understanding of critical security measures, endpoint security, and other essential concepts crucial for safeguarding organizations. -
Designing Your Cybersecurity Infrastructure
This course extensively covers the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and employing advanced tools and strategies to safeguard an organization's digital assets.
By the completion of this course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations associated with industrial systems and IoT devices.
Key Learning Outcomes:- Engage in exploring endpoint devices to gain knowledge on evaluating, identifying threats, and implementing protection measures.
- Acquire skills in documenting and tracking configurations and tool options.
- Comprehend the establishment of rules and restrictions to safeguard endpoint devices from potential harm.
- Discover methods of working with external information systems while ensuring the security of endpoint devices.
- Develop proficiency in implementing data loss prevention techniques.
- Gain familiarity with the threats and security measures pertaining to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, ISC2 CISSP -
Advanced Phase
The Advanced Phase courses are designed to enhance your readiness in responding to attacks, proactively identifying vulnerabilities through ethical hacking and strengthening system protection. In these courses, you will go beyond the theoretical aspects of cybersecurity technologies and delve into the motivations and social engineering techniques employed by malicious actors. You will gain knowledge about different types of attacks, the attack kill chain, implementing attacks, responding to ongoing attacks, and employing mitigation strategies.
Upon successfully completing this phase, you will be awarded the Cybersecurity Bootcamp certificate of completion. -
Social Engineering and Ethical Hacking
In the Social Engineering and Ethical Hacking course, participants will delve into the inner workings of hackers' minds and gain an understanding of game theory principles in relation to cybersecurity defense and solutions. By the end of the course, learners will acquire knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and safeguard against potential threats.
Key Learning Outcomes:- Acquire insights into the motivations and actions of potential attackers.
- Develop an understanding of leveraging the "state of mind" of malicious hackers to enhance system protection.
- Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure.
- Explore reconnaissance, penetration testing, and defense system bypassing as strategies to ensure system security.
- Learn techniques for identifying vulnerabilities in web applications and cloud-based systems.
- Cultivate skills to effectively report risks and provide defense recommendations. Understand the application of social engineering techniques in deceiving individuals.
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+ -
Digital Forensics and Incident Response
The Digital Forensics & Incident Response course provides learners with the necessary tools and knowledge to effectively respond to attacks, conduct investigations, gather evidence, and generate comprehensive reports. By the end of the course, participants will possess the skills to respond to incidents, conduct investigations, and report their findings, enabling them to identify, analyze, and mitigate security incidents to prevent future breaches.
Key Learning Outcomes:- Immerse themselves in the fundamentals of offensive security.
- Develop an understanding of the essential concepts of digital forensics.
- Explore strategies for recovering files and stolen data.
- Learn effective techniques for handling various types of attacks targeting organizations.
- Gain insights into the strategies employed by attackers to gain access to critical systems and data.
- Explore the basics of malware analysis to enhance the ability to detect and neutralize potential threats.
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and ISC2 SSCP -
Threat Hunting and Intelligence
The Threat Hunting and Intelligence course empowers learners with the necessary knowledge to detect and mitigate vulnerabilities within an organization's infrastructure. By the end of the course, participants will possess the expertise to identify vulnerabilities, respond to threats, and formulate robust plans to protect the organization's infrastructure.
Key Learning Outcomes:- Acquire an understanding of the various threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
- Enhance their ability to proactively identify and respond to threats, adopting a proactive stance in defending against potential attacks.
- Develop plans and procedures to effectively handle security incidents, ensuring a prompt and coordinated response.
- Cultivate skills to evaluate information sources and utilize the necessary tools to strengthen their defenses.
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP, ISC2 CISSP -
Elective CompTIA® Security+ Certification Exam Prep Course
The Cybersecurity Professional Certificate Program offers an optional CompTIA® Security+ Exam Prep Course*, specifically designed to equip students with the necessary skills and knowledge to obtain this highly valuable industry certification. Additionally, participants will receive a voucher for the CompTIA® Security+ certification exam.
Key Learning Outcomes:- Establishes a solid foundation of knowledge essential for any cybersecurity position.
- Emphasizes practical skills through hands-on training, making it the only foundational cybersecurity certification of its kind.
- Globally recognized certification that validates essential knowledge in the field and serves as a stepping stone to intermediate-level cybersecurity roles.
Introductory Course (4 Weeks)
The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future.
The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics.
Fundamentals Phase (16 Weeks)
In the Fundamentals Phase, you will delve into the core principles of cybersecurity. This immersive exploration will cover crucial concepts necessary for securing and defending as a cybersecurity professional, such as network architecture, operating systems, network communication, and cloud data storage.
By completing this phase, you will establish a solid foundation and gain a comprehensive understanding of fundamental cybersecurity concepts.
Computer Networking Fundamentals
In this course, you will receive an introduction to computer networking, enabling you to gain practical experience in configuring and managing network devices for optimal performance and security. Through hands-on activities, you will enhance your device configuration and troubleshooting skills while developing an understanding of network architectures, protocols, and security measures. This course will also sharpen your critical thinking and problem-solving abilities as you tackle common networking challenges.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, ISC2 Certified in Cybersecurity℠
Microsoft Security Systems Administration
In this course, learners will receive practical, hands-on training in securing Microsoft Windows environments. They will acquire the knowledge and skills necessary to implement security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. Additionally, learners will gain the ability to configure and manage networks using system admin tools to ensure security and stability. By the course's conclusion, participants will have a solid understanding of Microsoft's infrastructure and the competence to establish and maintain secure Windows environments across diverse professional roles.
Key Learning Outcomes:
Securing Your Network
In this course, you will expand your knowledge of networks and deepen your understanding of their intricacies. Through exploration, you will become familiar with the various components of both wired and wireless networks, including their security constraints and vulnerabilities. Furthermore, you will delve into the development of access controls, ensuring a comprehensive approach to network security that encompasses people, data, and devices. Additionally, the course will cover the safe construction and fortification of networks, including discussions on cryptography and privacy considerations.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate
Integrating Your Infrastructure Security
This course provides learners with the essential skills to proficiently manage Linux operating systems, leverage basic Python programming, explore cloud computing, and enhance system security against various threats and vulnerabilities. Participants will learn how to effectively monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments, while also gaining familiarity with remediation techniques. Moreover, learners will gain insights into the impact of DevSecOps on the cybersecurity landscape.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner
Infrastructure Phase (4 Weeks)
The Infrastructure Phase provides you with the essential knowledge and practical experience to establish and maintain secure infrastructures and technologies.
By the end of this phase, you will acquire a comprehensive understanding of critical security measures, endpoint security, and other essential concepts crucial for safeguarding organizations.
Designing Your Cybersecurity Infrastructure
This course extensively covers the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and employing advanced tools and strategies to safeguard an organization's digital assets.
By the completion of this course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations associated with industrial systems and IoT devices.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, ISC2 CISSP
Advanced Phase (12 Weeks)
The Advanced Phase courses are designed to enhance your readiness in responding to attacks, proactively identifying vulnerabilities through ethical hacking and strengthening system protection. In these courses, you will go beyond the theoretical aspects of cybersecurity technologies and delve into the motivations and social engineering techniques employed by malicious actors. You will gain knowledge about different types of attacks, the attack kill chain, implementing attacks, responding to ongoing attacks, and employing mitigation strategies.
Upon successfully completing this phase, you will be awarded the Cybersecurity Bootcamp certificate of completion.
Social Engineering and Ethical Hacking
In the Social Engineering and Ethical Hacking course, participants will delve into the inner workings of hackers' minds and gain an understanding of game theory principles in relation to cybersecurity defense and solutions. By the end of the course, learners will acquire knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and safeguard against potential threats.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+
Digital Forensics and Incident Response
The Digital Forensics & Incident Response course provides learners with the necessary tools and knowledge to effectively respond to attacks, conduct investigations, gather evidence, and generate comprehensive reports. By the end of the course, participants will possess the skills to respond to incidents, conduct investigations, and report their findings, enabling them to identify, analyze, and mitigate security incidents to prevent future breaches.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and ISC2 SSCP
Threat Hunting and Intelligence
The Threat Hunting and Intelligence course empowers learners with the necessary knowledge to detect and mitigate vulnerabilities within an organization's infrastructure. By the end of the course, participants will possess the expertise to identify vulnerabilities, respond to threats, and formulate robust plans to protect the organization's infrastructure.
Key Learning Outcomes:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP, ISC2 CISSP
Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)
The Cybersecurity Professional Certificate Program offers an optional CompTIA® Security+ Exam Prep Course*, specifically designed to equip students with the necessary skills and knowledge to obtain this highly valuable industry certification. Additionally, participants will receive a voucher for the CompTIA® Security+ certification exam.
Key Learning Outcomes:
Gear Up for Internationally
Recognized Certification Exams
This bootcamp is not a certification-prep program. However, we recognize that cybersecurity professionals breaking into the industry are more likely to be hired if they hold internationally recognized certifications. In an effort to boost your credentials even further, we have incorporated foundational information in our curriculum to help you develop skills applicable to certification exams*.
-
LPI Linux Essentials Certification
The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration. -
AWS Certified Cloud Practitioner Certification
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers. -
CompTIA® Network+ Certification
The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies. -
CompTIA® CySA+
This exam is specifically designed to emphasize the application of behavioral analytics to networks at an intermediate level, going beyond the scope of the CompTIA® Security+ exam. It encompasses essential cybersecurity skills while placing a greater emphasis on software and application security. In addition, the exam covers topics such as automation, threat hunting, and IT compliance, which are highly relevant in the industry. -
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate certification offers learners the opportunity to acquire knowledge and skills in detecting and responding to security incidents as part of Security Operations Centre (SOC) teams. It is widely recognized as an excellent entry point for individuals pursuing a career in cybersecurity. -
ISC2 SSCP – Systems Security Certified Practitioner** Certification
For students who achieved 1 year of experience—Post-Program Completion.
The ISC2 SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures. -
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification serves as proof of a practitioner's comprehensive understanding of information security beyond basic terminology and concepts. By obtaining the GSEC certification, individuals demonstrate their qualifications for hands-on IT systems roles involving security tasks. -
Certified Incident Handler
The GIAC Incident Handler certification confirms a practitioner's proficiency in identifying, responding to, and resolving computer security incidents through the application of critical security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents, including recognizing common attack techniques, vectors, and tools. They are equipped to defend against and respond to such attacks in a prompt and effective manner. -
Certified Information Security Manager
Today's IT professionals are acutely aware of the pressing concerns surrounding data breaches, ransomware attacks, and other ever-evolving security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the skills and knowledge necessary to evaluate risks, establish robust governance frameworks, and proactively address incidents. This certification empowers you to confidently navigate the complex landscape of information security, ensuring the protection of critical assets and the resilience of organizations.
LPI Linux Essentials Certification
The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration.
AWS Certified Cloud Practitioner Certification
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers.
CompTIA® Network+ Certification
The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies.
CompTIA® CySA+
This exam is specifically designed to emphasize the application of behavioral analytics to networks at an intermediate level, going beyond the scope of the CompTIA® Security+ exam. It encompasses essential cybersecurity skills while placing a greater emphasis on software and application security. In addition, the exam covers topics such as automation, threat hunting, and IT compliance, which are highly relevant in the industry.
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate certification offers learners the opportunity to acquire knowledge and skills in detecting and responding to security incidents as part of Security Operations Centre (SOC) teams. It is widely recognized as an excellent entry point for individuals pursuing a career in cybersecurity.
ISC2 SSCP – Systems Security Certified Practitioner** Certification
For students who achieved 1 year of experience—Post-Program Completion.
The ISC2 SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification serves as proof of a practitioner's comprehensive understanding of information security beyond basic terminology and concepts. By obtaining the GSEC certification, individuals demonstrate their qualifications for hands-on IT systems roles involving security tasks.
Certified Incident Handler
The GIAC Incident Handler certification confirms a practitioner's proficiency in identifying, responding to, and resolving computer security incidents through the application of critical security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents, including recognizing common attack techniques, vectors, and tools. They are equipped to defend against and respond to such attacks in a prompt and effective manner.
Certified Information Security Manager
Today's IT professionals are acutely aware of the pressing concerns surrounding data breaches, ransomware attacks, and other ever-evolving security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the skills and knowledge necessary to evaluate risks, establish robust governance frameworks, and proactively address incidents. This certification empowers you to confidently navigate the complex landscape of information security, ensuring the protection of critical assets and the resilience of organizations.
** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
Program Tuition
Now is the time to seize this opportunity to enter a new career in the tech field. Invest in your professional development with the knowledge and skills you need to enter the field of cybersecurity.
4-Week Introductory Course
$180
32-Week Complete Program
$18,720
Requirements
Internet access
Drive, ambition, and passion
Introductory course and admission exam
Tuition, fees, and deposits are subject to change.