CEH Bootcamp

Information security protects the data and integrity of computing assets belonging to or connecting to an organization’s network. Its purpose is to defend those assets against all threat actors through-out the entire life cycle of a cyber-attack and our Information Security boot-camp can help you learn about and defend these attacks.
$3,950.00
Information security protects the data and integrity of computing assets belonging to or connecting to an organization’s network. Its purpose is to defend those assets against all threat actors through-out the entire life cycle of a cyber-attack and our Information Security boot-camp can help you learn about and defend these attacks.

More Information:

  • Modality: On Demand
  • Learning Style: BootCamp
  • Difficulty: Beginner
  • Duration: Varies
  • Certificate: See Sample

Course Information

About this Bootcamp:

The Information Security bootcamp is an immersive and accelerated training program with a focus on creating the next generation of cyber security professionals. You will attend courses, do hands on labs and apply your learning to successfully complete projects that address different cyber security topics. Throughout the program you will interact with experts who will guide you through the bootcamp, answer questions, and help with labs and project. The bootcamp will end with few capstone projects where you will apply your learnings to real life infomation security challenges. This is a 6 months program and students are expected to spend 15 to 25 hours a week to master the material. Graduates of this program will learn critical skills for different cyber security careers and will have access to career services throughout the program.

Bootcamp Objectives:

This bootcamp covers following networking and cyber security areas:

  • Computer/ Systems Fundamentals
    • Hardware architecture
    • Operating Systems (windows, linux, CISCO)
    • TroubleShooting
    • And More
  • Networking  
    • Network Management/ Troubleshooting
    • WAN
    • Virtualization Techniques
    • TCP/IP
    • Scanning / Sniffing (Wireshark Nmap, Etc.)
    • And More
  • Cyber Security
    • System/Network Security
    • Security Threats (Social Engineering, Malware)
    • Vulnerability Assessment
    • Identity and Assess Management
    • Cryptography
    • And More 
  • Security Analyst 
    • Managing And Remediating Vulnerabilities
    • Security and Software Development
    • Incidence Response
    • Forensic Tools
    • Cloud aSecurity tools
    • And More
  • Penetration Testing
    • OS Vulnerabilities Exploitation
    • Multi-level Pivoting
    • SQL Injection
    • Host-Based Application Exploits
    • XSFR
    • And More
  • Ethical Hacking
    • Footprinting
    • Reconnaissance
    • Networks Scanning
    • Enumeration
    • Session Hijacking
    • Hacking Web Applications
    • loT Hacking
    • And More
  • Scripting
    • Python
    • Hacking
    • Automation
    • Tooling
    • Shell Scripting
    • Data Analysis
    • And More

Certifications You Can Be Ready For:

This bootcamp will cover the material needed for following certifications:

  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CySA+
  • Certified Ethical Hacking
  • CompTIA Pentest+

During the bootcamp, you will work with your Career Counselor and Mentor to develop specific certification exams that you should take and additional activities you need to do to pass those certifications. We don't anticipate our students to take all of these exams during the bootcamp

Jobs Roles:

Graduates of the bootcamp will learn critical skills needed for following careers:

  • Cybersecurity Specialist
  • Penetration Tester
  • Incident Response Analyst
  • Desktop/Network Support Specialist
  • Network/System Security Administrator
  • Cyber Network Defender
  • Information Assurance Specialist
  • Vulnerability Assessment Analyst
  • Digital Forensics Examiner
  • Cybersecurity Operations Specialist
  • Secure Coding Specialist
  • Forensic Computer Analyst
  • Security Systems Administrator
  • IT Security Consultant
  • Computer Security Team Member

Audience:

  • You are happy in your current field but want to move to another company—or stay put but shift from a non-technical into a technical position.
  • You are looking to understand the implications of cyber and cybersecurity on the technology and overall business operations.
  • You are looking for a career in Cybersecurity or looking to change your careers to Cybersecurity.
  • You want to engage more deeply with your current job—or boost your earnings and broaden your experience with freelance work.
  • You have an entrepreneurial idea and need to acquire the skills to go “all in” on it and launch your business.
  • You’re a full-time student but hungry to learn more and expand your skill set.
  • You need to have at least an associate degree and commitment to work 15 to 25 hours a
  • week over next 6 months to earn these skills

Prerequisites:

  • To ensure your success in this bootcamp , you should have experience with basic computer user skills, be able to complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts.

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha