Program Overview

Weeks

Full time – 8 hours a day

Are you up for the challenge?

Curriculum Outline

Week 1:  

  • Computer network and defense fundamentals
  • Network security threats, vulnerabilities, and attacks
  • Network security controls, protocols, and devices
  • Network security policy design and implementation
  • Physical security
  • Host security
  • Secure firewall configuration and management
  • Effective communication techniques (Professional development)

 Week 2:  

  • Secure IDS configuration and management
  • Secure VPN configuration and management
  • Wireless network defense
  • Network traffic monitoring and analysis
  • Network risk and vulnerability management
  • Data backup and recovery
  • Network incident response and management
  • Effective communication techniques (Professional development)

 Week 3:  

  • PowerShell Fundamentals
  • CTF – Defending the network
  • Taking Certified Network Defender Certification
  • Building Trust (Professional development)

Week 4:  

  • Introduction to ethical hacking
  • Foot printing and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware threats
  • Handling Objections/Conflict (Professional development)

 Week 5:  

  • Sniffing
  • Social engineering
  • Denial of service
  • Session hijacking
  • Hacking web servers
  • Python fundamentals
  • Time Management (Professional development)

Week 6:  

  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Hacking mobile platforms
  • Evading IDS, Firewalls, and Honeypot
  • Cloud computing
  • Python for Hackers
  • Effective problem solving (Professional development)

Week 7:  

  • Cryptography
  • CTF – Web Hacking Challenge
  • Taking Certified Ethical Hacker Certification
  • Storytelling – Making facts and data come to life (Professional development)

Week 8:

  • Incident response and handling
  • Risk assessment
  • Insider Threat
  • Forensic analysis
  • Incident reporting & recovery
  • Security policies and laws

Week 9: Secure Network Design

Students will be tasked with designing a secure network from scratch, with all the security features currently needed in any enterprise company. They will demonstrate their knowledge by delivering high-level diagrams and explain all the recommended functionalities. They will also provide a product matrix comparison to present it to “upper management” and simulate a real-life scenario.

Week 10: Penetration Testing

Students will be tasked with a penetration testing project where they will have to execute it from the kick-off meeting to the final result presentation. They will have to demonstrate their ability to execute a pentest of a highly secure environment and to explain their findings to the client through a final presentation and a detailed report.

Professional Development

Personal Brand

How are you perceived

How do you “show up”

Communication Skills

Core Concepts

Handling Conflicts

Writing Skills

Presentation Skills

Making Data come to life

Use of various media

Let’s stand up and do it

We mapped our program with the NICE Framework Job Roles based on the skills, and knowledge our graduates will obtain by completing the ten weeks. 

Security Provision:

  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer

Analyze:

  • Threat Analyst

Operate and Maintain:

  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst

Protect and Defend:

 

  • Cybersecurity Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst