Duration: 6 months
Our Cybersecurity program teaches students critical skills to assist in the identification, assessment, reporting, and mitigation of technology and information security risks. This professional-grade program provides information, strategies, and tactics to identify and manage information system vulnerabilities, create effective defenses and preventative measures, and deploy countermeasures against attackers.
Why should I join the Cybersecurity program with NVIT?
Our professional-grade program will give you the skills, insights, and information to build the foundation for your successful career in cybersecurity. Our cybersecurity instructors have decades of experience in the field, so you’ll get real-world, up-to-date instruction and guidance. The heavy emphasis on lab work means you’ll be learning by doing – deploying attacks and defending against others, identifying potential frontiers where attackers might strike, and more. Finally, NVIT’s unmatched reputation for career success and support will ensure you’re ready at graduation to move into a successful and rewarding career.
Fundamentals of Hardware
Learn about hardware and operating system fundamentals to build your baseline.
Exploring the Lab Environment
Scanning and Identifying Network Nodes
Intercepting and Interpreting Network Traffic with Packet Sniffing
Analyzing the Results of a Credentialed Vulnerability Scan
Kali Linux Introduction
Build out your Kali Linux machine while also learning about networking and data security.
Managing the Life Cycle of a Certificate
Managing Certificates with OpenSSL
Auditing Passwords with a Password Cracking Utility
Managing Centralized Authentication
Networking & Security
Learn about network configurations and data security.
Installing, Using, and Blocking a Malware- based Backdoor
Performing Network Reconnaissance and Vulnerability Scanning
Enter into the cybersecurity realm by thinking about vulnerabilities and risks.
Managing Access Controls in Windows Server
Configuring a System for Auditing Policies
Managing Access Controls in Linux
Get into more Windows administration tools.
Configuring Identity and Access Management Controls
Implementing a Secure Network Design
Configuring a Firewall
Use Metasploit to run exploit code.
Configuring an Intrusion Detection System
Implementing Secure Network Addressing Services
Implementing a Virtual Private Network
Implementing a Secure SSH Server
Building a Defensible Network
Learn the basics of different network architecture and design principles.
Implementing Endpoint Protection
Securing the Network Infrastructure
Identifying Application Attack Indicators
Identifying Risks to your Network
Take the necessary steps to identify the risks to your network.
Identifying a Browser Attack
Implementing PowerShell Security
Identifying Malicious Code
Scanning the Network
Begin scanning a network periphery to find vulnerabilities.
Identifying Application Attacks
Managing Data Sources for Incident Response
Configuring Mitigation Controls
Learn about the Cloud and its implications for risks and vulnerabilities, and install Kali Linux with Cloud Computing.
Acquiring Digital Forensics Evidence
Backing Up and Restoring Data in Windows and Linux
Managing Incident Response, Mitigation, and Recovery
Tie off the remaining concepts as you prepare for the CompTIA Security+ exam. Take the belt exam as your practice exam.
CompTIA Security+ Certification
A crucial point in your learning timeline: schedule, review, and complete your Security+ exam.
Utilize threat intelligence and classification to support organizational security.
Investigating Threat Data and Intelligence Sources
Developing a Network Threat Model
Analyzing Output from Network Security Monitoring Tools
Discovering the Lab Environment
Intelligence & Indicator Management
Implement controls to mitigate attacks and software vulnerabilities.
Analyzing Output from Security Appliance Logs
Analyzing Output from Endpoint Security Monitoring Tools
Security Best Practices
Learn best practices of software, hardware, and infrastructure assurance.
Analyzing Email Headers
Configuring SIEM Agents and Collectors
Analyzing, Filtering, and Searching Event Log and Syslog Output
Cloud Access & Techniques
Revisit cloud technologies and how to protect your cloud-based solutions.
Collecting and Validating Digital Evidence
Analyzing Network-related IoCs
Attacking & Protecting
Learn about DoS attacks and mitigation as well as deploying honeypot solutions to intercept hackers.
Analyzing Host and Application IoCs
Following an Incident Response Process
Impact Analysis & SIEM
Implement configuration changes to existing controls to improve security based on data analysis you make part of everyday security monitoring activities.
Following an Incident Response Process
Observing IoCs during a Security Incident
Apply incident response procedures
Configuring and Analyzing Share Permissions
Assessing the Impact of Web Application Vulnerabilities
Analyzing Output from Web Application Assessment Tools
Collect and analyze indicators of compromise.
Analyzing Output from Cloud Infrastructure Assessment Tools
Assessing the Impact of Threats to Cloud Infrastructure
Proactive Threat Hunting
Become proactive in your approach to cybersecurity by seeking threats.
Reviewing Risk Management Processes
Analyzing Output from Topology and Host Enumeration Tools
Testing Credential Security
Configuring Vulnerability Scanning and Analyzing Outputs
Deploy Security Content Automation Protocol (SCAP)
Assessing Vulnerability Scan Outputs
Assessing the Impact of Regulation on Vulnerability Management
Performing Account and Permissions Audits
Configuring Network Segmentation and Security
Tie off the remaining concepts as you prepare for the CompTIA CySA+ exam. Take your second belt exam as prep.
CompTIA CySA+ Certification
The final step in your Bootcamp journey – is your CySA+ certification!