Cybersecurity Training Certificate

by Bunker Hill Community College Claim Listing

BHCC is pleased to collaborate with Socratic Arts to offer the Cybersecurity Training Certificate program. If you are interested in a career in Cybersecurity, this program is for you.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Bunker Hill Community College Logo

img Duration

Enquire Now

Course Details

BHCC is pleased to collaborate with Socratic Arts to offer the Cybersecurity Training Certificate program. If you are interested in a career in Cybersecurity, this program is for you.

To determine if you qualify, please review the prerequisite requirement section below.  You may not enroll in the program until you have submitted the required information.

There are two main courses in the program:

  • NON-108E Cybersecurity: Immediate Immersion

Cyber attacks are considered to be one of the top five risks to businesses globally, and the level of threats from script kiddies, cyber criminals, and even nation-state actors is increasing daily. Businesses experience literally thousands of cyber attacks per day.

Cybersecurity: Immediate Immersion is designed to impart initial cybersecurity skills in eight weeks of study at 25 hours per week to help students determine if careers in cybersecurity are right for them. Students work through three online real-life tasks (about two weeks per task).

Cybersecurity: Immediate Immersion includes the following tasks:

  • Exploit a website (and fix its vulnerabilities)

  • Insider threat?

  • Analyze malicious network traffic

This course requires a textbook, which can be purchased at the publisher's website. As soon as you have registered for the course, you will buy the book: https://nostarch.com/packetanalysis3.

  • NON-118E Cybersecurity Defense

This course builds on the defensive skills and experience students gained in Immediate Immersion. The 15 week course is designed to impart a strong foundation of defensive information security skills, preparing students for entry-level careers as security operations center analysts and digital forensics analysts.

Students work through six online real-life tasks in a private cloud environment with help, advice and feedback from a knowledgeable mentor and extensive online learning resources. The tasks are embedded in the realistic, but fictional, context of work as an entry-level employee of a government cyber operations agency.

This course includes the following tasks:

Analyze a remote intrusion attempt

  • A security operations center analyst has seen evidence of a password cracking attempt within a key network. Students analyze a packet capture file and event logs within a security information and event management system (the Splunk SIEM) to determine if any passwords were compromised and if the network was breached as a result.

Investigate an incident using a SIEM

  • Students analyze a possible “watering hole” attack in which clicking on a malicious link embedded in an otherwise legitimate website launches an exploit kit that infects a user’s machine with a “banking trojan.”

Compile indicators of compromise to guide forensic analysis 

  • Students use a “hash” of a possible malware-containing file to conduct research using VirusTotal, online sandboxes, and open source intelligence sources to determine specific indicators of compromise to guide forensic analysis of memory and file system images of infected devices.

Examine a compromised host’s memory 

  • Students perform a forensic examination of a memory image taken from a computer to identify sophisticated malware that infected the system.

Conduct a forensic disk examination 

  • Students perform disk forensics on an infected system. By analyzing an image of the computer’s file system, the students are able to identify malware infections and to create a timeline for the attack.

Close your investigation

  • Students are asked to conclude their investigation by compiling a timeline for the attack and writing a comprehensive report for technical and non-technical stakeholders.

Upon successful completion of the two courses, you will separately enroll in Udemy’s 31-hour CompTIA Security + prep course, which includes the SY0-701 practice exam.

You will also purchase the CompTIA Security+ (SY0-701) Practice Exam Set 1. *Please note: Prices are set by Udemy and subject to change and BHCC has no control of the cost charged by Udemy.

Udemy is a global teaching and learning platform that provides online video courses. You must continue your learning through Udemy immediately after successfully completing your 23-week training. The program's cybersecurity mentor will support you as you work through the Udemy course.

In total, you are looking at 27 weeks, or six months, to complete the training and be ready to sit for the certification exam. Once you pass the CompTIA Security + exam, you will earn your cybersecurity certification.

 

Skills and Traits of the Ideal Cybersecurity Student

Useful technical skills:

  • Experience with the command-line interface

  • Experience installing and using complex software packages

Essential general skills:

  • Ability to do independent research (on technical issues) and put the results into practice

  • Proficiency using search engines

Essential traits:

  • Intense curiosity

  • Unwillingness to give up

  • Attention to detail

  • Predisposition for self-directed learning

  • Willingness to experiment (e.g., when instructions are unclear)

  • Openness to failing and trying again

  • Adequate time to devote to the program (Absent the time necessary to do the work, the skills and traits enumerated about will not be enough to result in success.)

  • Boston Branch

    250 New Rutherford Avenue, Boston

Check out more Cybersecurity courses in USA

Flatiron School Logo

Cyber Security

Become a cybersecurity engineer so you can help organizations of all sizes protect data from getting stolen, hacked, leaked, or damaged.  Our cybersecurity courses can help you get started in as little as 15 weeks. 

by Flatiron School [Claim Listing ]
Koenig Solutions LTD. Logo

Security Fundamentals: MTA Exam 98-367

This course has been structured to prepare the participants for MTA certification (98-367) and enhance their understanding about the Operating System Security, Security Layers, Security software and Network Security.

by Koenig Solutions LTD. [Claim Listing ]
Prelude Institute Logo

Cyber Security

Join The Prelude Institute and become a cybersecurity analyst in 15 weeks. We don't care about past experience/education - only that you want to work hard and transform yourself into a cybersecurity practitioner.

by Prelude Institute [Claim Listing ]
Devmountain Logo

Cybersecurity

Devmountain’s cybersecurity course will cover core programming language skills for use in security engineering including Python and Linux, as well as networking principles, software systems, core and offensive security practices, and standards, maintenance, and communication.

by Devmountain [Claim Listing ]
Ivy Tech Community College Logo

Cybercrime

The Cybercrime Certificate (CT) prepares you for an entry-level role in the industry. You’ll earn certificates in CompTIA A+, CompTIA Network+, CompTIA Security+, Cisco CyberOps Associate, EC Council Certified Hacking Forensics Investigator, and AWS Cloud Foundations.

by Ivy Tech Community College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy