Applied Information Assurance and Cybersecurity

Duration: 6 months

Why Cybersecurity?
Our Cybersecurity program teaches students critical skills to assist in the identification, assessment, reporting, and mitigation of technology and information security risks. This professional-grade program provides information, strategies, and tactics to identify and manage information system vulnerabilities, create effective defenses and preventative measures, and deploy countermeasures against attackers.

Why should I join the Cybersecurity program with NVIT?

Our professional-grade program will give you the skills, insights, and information to build the foundation for your successful career in cybersecurity. Our cybersecurity instructors have decades of experience in the field, so you’ll get real-world, up-to-date instruction and guidance. The heavy emphasis on lab work means you’ll be learning by doing – deploying attacks and defending against others, identifying potential frontiers where attackers might strike, and more. Finally, NVIT’s unmatched reputation for career success and support will ensure you’re ready at graduation to move into a successful and rewarding career.

Fundamentals of Hardware

Learn about hardware and operating system fundamentals to build your baseline.

Labs:

Exploring the Lab Environment

Scanning and Identifying Network Nodes

Intercepting and Interpreting Network Traffic with Packet Sniffing

Analyzing the Results of a Credentialed Vulnerability Scan

Kali Linux Introduction

Build out your Kali Linux machine while also learning about networking and data security.

Labs:

Managing the Life Cycle of a Certificate

Managing Certificates with OpenSSL

Auditing Passwords with a Password Cracking Utility

Managing Centralized Authentication

Networking & Security

Learn about network configurations and data security.

Labs:

Installing, Using, and Blocking a Malware- based Backdoor

Performing Network Reconnaissance and Vulnerability Scanning

Cybersecurity Concepts

Enter into the cybersecurity realm by thinking about vulnerabilities and risks.

Labs:

Managing Access Controls in Windows Server

Configuring a System for Auditing Policies

Managing Access Controls in Linux

Virtual Machines

Get into more Windows administration tools.

Labs:

Configuring Identity and Access Management Controls

Implementing a Secure Network Design

Configuring a Firewall

Exploitation

Use Metasploit to run exploit code.

Labs:

Configuring an Intrusion Detection System

Implementing Secure Network Addressing Services

Implementing a Virtual Private Network

Implementing a Secure SSH Server

Building a Defensible Network

Learn the basics of different network architecture and design principles.

Labs:

Implementing Endpoint Protection

Securing the Network Infrastructure

Identifying Application Attack Indicators

Identifying Risks to your Network

Take the necessary steps to identify the risks to your network.

Labs:

Identifying a Browser Attack

Implementing PowerShell Security

Identifying Malicious Code

Scanning the Network

Begin scanning a network periphery to find vulnerabilities.

Labs:

Identifying Application Attacks

Managing Data Sources for Incident Response

Configuring Mitigation Controls

Cloud Computing

Learn about the Cloud and its implications for risks and vulnerabilities, and install Kali Linux with Cloud Computing.

Labs:

Acquiring Digital Forensics Evidence

Backing Up and Restoring Data in Windows and Linux

Managing Incident Response, Mitigation, and Recovery

Certification Review

Tie off the remaining concepts as you prepare for the CompTIA Security+ exam. Take the belt exam as your practice exam.

CompTIA Security+ Certification

A crucial point in your learning timeline: schedule, review, and complete your Security+ exam.

Threat Intelligence

Utilize threat intelligence and classification to support organizational security.

Labs:

Investigating Threat Data and Intelligence Sources

Developing a Network Threat Model

Analyzing Output from Network Security Monitoring Tools

Discovering the Lab Environment

Intelligence & Indicator Management

Implement controls to mitigate attacks and software vulnerabilities.

Labs:

Analyzing Output from Security Appliance Logs

Analyzing Output from Endpoint Security Monitoring Tools

Security Best Practices

Learn best practices of software, hardware, and infrastructure assurance.

Labs:

Analyzing Email Headers

Configuring SIEM Agents and Collectors

Analyzing, Filtering, and Searching Event Log and Syslog Output

Cloud Access & Techniques

Revisit cloud technologies and how to protect your cloud-based solutions.

Labs:

Collecting and Validating Digital Evidence

Analyzing Network-related IoCs

Attacking & Protecting

Learn about DoS attacks and mitigation as well as deploying honeypot solutions to intercept hackers.

Labs:

Analyzing Host and Application IoCs

Following an Incident Response Process

Impact Analysis & SIEM

Implement configuration changes to existing controls to improve security based on data analysis you make part of everyday security monitoring activities.

Labs:

Following an Incident Response Process

Observing IoCs during a Security Incident

Incident Response

Apply incident response procedures

Labs:

Configuring and Analyzing Share Permissions

Assessing the Impact of Web Application Vulnerabilities

Analyzing Output from Web Application Assessment Tools

Digital Forensics

Collect and analyze indicators of compromise.

Labs:

Analyzing Output from Cloud Infrastructure Assessment Tools

Assessing the Impact of Threats to Cloud Infrastructure

Proactive Threat Hunting

Become proactive in your approach to cybersecurity by seeking threats.

Labs:

Reviewing Risk Management Processes

Analyzing Output from Topology and Host Enumeration Tools

Testing Credential Security

Configuring Vulnerability Scanning and Analyzing Outputs

Security Monitoring

Deploy Security Content Automation Protocol (SCAP)

Labs:

Assessing Vulnerability Scan Outputs

Assessing the Impact of Regulation on Vulnerability Management

Performing Account and Permissions Audits

Configuring Network Segmentation and Security

Certification Review

Tie off the remaining concepts as you prepare for the CompTIA CySA+ exam. Take your second belt exam as prep.

CompTIA CySA+ Certification

The final step in your Bootcamp journey – is your CySA+ certification!