CyberWarrior Program

The CyberWarrior program is a combination of hands-on technical modules that prepare you for a career in cybersecurity. The training is intensive and is delivered by white-hat hackers with day-to-day exposure to the rapidly changing threat landscape.

Program Cost $16,500

Hands on Modules can be taken separately – pricing varies

Scholarship Available

Register NowIs the CWA Program for me?
hands-on technical training

Hands-On Technical Training

NEXT CLASS: TBD

hands-on technical training

The CyberWarrior Program Objectives

The CyberWarrior Program is a hands-on cybersecurity training in which students gain:

Certifications

  • EC Council: Certified Network Defender (CND)
  • EC Council: Certified Ethical Hacker (CEH) 
  • Certified Cyberwarrior (CW)

Technical Knowledge of Cybersecurity Tools and Technologies

  • Firewalls & IDS Configuration 
  • Vulnerability Management 
  • Security Monitoring 
  • Packet Analysis 
  • Incident Response 
  • Security Automation

Consulting Experience 

  • Network Security and Penetration Testing Capstone Projects

Career Growth Hacks from Cybersecurity Executives & Subject-Matter Experts

Earn Three Cybersecurity Certifications Around Your Schedule

These Certifications Will Positively Set You Apart From Your Competition in the Cybersecurity Workforce

EC Council – Certified Network Defender (CND)

During weeks 1-4, you will develop a deep understanding of cybersecurity technologies and techniques to defend a network. In this module you will develop a fundamental understanding of the true construct of data transfers, network technologies, and software technologies in order to comprehend how networks operate, how software is automated and how to assess target systems.T

EC Council – Certified Ethical Hacker

During weeks 5-8, you will dive into the types of attacks used by hackers to break into and compromise a network. In this module, you will learn how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of various target systems.

CyberWarrior Certified

During weeks 23-24, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  
hands-on technical training

Learn More Than Just Technology

IT leaders list the inability to communicate effectively as one of the biggest challenges faced by their cybersecurity personnel. How you collaborate with your peers, how you’re perceived and how you influence the outcomes of the day are critical to your professional advancement. Improving interpersonal skills is just as important as honing technical skills in the profession. The CyberWarrior program offers career development modules to help you become your best self, get noticed, and advance in the competitive field of Information Security.

Personal Brand

  • How to Market Yourself
  • How to Leverage Limited Cybersecurity Experience

Communication Skills

  • Fostering Trust in a Team Environment
  • Conflict Management
  • Communicating with non-technical business leaders

Presentation Skills

  • Bringing Data to Life
  • Critical Thinking and Strategic Planning
  • Board Room Presentation Delivery

Part-time Curriculum

The 6 month curriculum provides you in-depth, hands-on technical and career development training to support the three certifications you will receive upon completion of the program.

Defend – CND

blank

WEEKS 1-4

  • Module 1: Computer Network and Defense Fundamentals 
  • Module 2: Network Security Threats, Vulnerabilities, and Attacks 
  • Module 3: Network Security Controls, Protocols, and Devices 
  • Module 4: Network Security Policy Design and Implementation 
  • Module 5: Physical Security 
  • Module 6: Host Security 
  • Module 7: Secure Firewall Configuration and Management 
  • Module 8: Secure IDS Configuration and Management 
  • Module 9: Secure VPN Configuration and Management 
  • Module 10: Wireless Network Defense 
  • Module 11: Network Traffic Monitoring and Analysis 
  • Module 12: Network Risk and Vulnerability Management 
  • Module 13: Data Backup and Recovery 
  • Module 14: Network Incident Response and Management

Attack – CEH

blank

WEEKS 5-8

  • Module 00: Student Introduction 
  • Module 01: Introduction to Ethical Hacking 
  • Module 02: Footprinting and Reconnaissance 
  • Module 03: Scanning Networks 
  • Module 04: Enumeration 
  • Module 05: Vulnerability Analysis 
  • Module 06: System Hacking 
  • Module 07: Malware Threats 
  • Module 08: Sniffing 
  • Module 09: Social Engineering 
  • Module 10: Denial-of-Service 
  • Module 11: Session Hijacking 
  • Module 12: Evading IDS, Firewalls, and Honeypots 
  • Module 13: Hacking Web Servers 
  • Module 14: Hacking Web Applications 
  • Module 15: SQL Injection 
  • Module 16: Hacking Wireless Networks 
  • Module 17: Hacking Mobile Platforms 
  • Module 18: IoT Hacking 
  • Module 19: Cloud Computing 
  • Module 20: Cryptography 

Hands-On Training

blank

WEEKS 9-10 (Firewalls & IDS Configuration)

  • Module 1: Firewall & IDPS concepts 
  • Module 2: CISCO Access Control Lists (ACLs) 
  • Module 3: Linux IPTABLE 
  • Module 4: PFSense 
  • Module 5: Snort 
  • Module 6: Suricata  
  • Module 7: BRO 
  • Module 8: SecurityOnion 
  • Module 9: Infrastructure security, best practices & strategies 

WEEKS 11-12 (Vulnerability Management)

  • Module 1: Vulnerability scanning concepts 
  • Module 2: Dynamic asset inventory 
  • Module 3: NMAP vulnerability scanning and NSE 
  • Module 4: Nessus vulnerability scanning tool 
  • Module 5: Nexpose/InsightVM vulnerability management tool 
  • Module 6: OpenVAS Opensource vulnerability scanning 
  • Module 7: Web Application Vulnerability Scanning 
  • Module 8: Open Threat Intelligence 
  • Module 9: Effective vulnerability reporting 
  • Module 10: Vulnerability remediation strategies 

WEEKS 13-14 (Security Monitoring)

  • Module 1: Concepts, components and log sources 
  • Module 2: RSYSLOG 
  • Module 3: ELK (Elasticsearch, Logstash and Kibana) 
  • Module 4: GrayLog 
  • Module 5: Splunk 
  • Module 6: SecurityOnion 
  • Module 7: Open Threat Intelligence Integration 
  • Module 8: Strategies for effective security monitoring 

WEEKS 15-16 (Packet Analysis)

  • Module 1: Network and protocols concepts 
  • Module 2: Tcpdump 
  • Module 3: Wireshark & Tshark 
  • Module 4: Packet analysis automation with Python Scapy 
  • Module 5: Network sniffing attacks 
  • Module 6: Network forensic investigations 
  •  

WEEKS 17-18 (Malware Analysis & Incident Response)

  • Incident handling steps 
  • Linux SIFT Virtual Machine 
  • Logs analysis 
  • Network evidence acquisition 
  • Forensic malware analysis 
  • Triage process 
  • Incident reporting 
  • Situation handling 
  •  

WEEK 19-20 (Security Automation)

  • Python fundamentals 
  • Defending with Python 
  • Attacking with Python 

Career Hacks

blank

WEEKS 21-22

  • Personal Branding
  • Communication and Resource Management skills 
  • Critical Thinking and Presentation skills 

Prove

blank

WEEKS 23-24

In the Capstone module, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  

Learn More about CyberWarrior Program

Full-time Curriculum

The 10 week curriculum provides you in-depth, hands-on technical and career development training to support the three certifications you will receive upon completion of the program.

Defend – CND

blank

WEEKS 1-2

  • Module 1: Computer Network and Defense Fundamentals 
  • Module 2: Network Security Threats, Vulnerabilities, and Attacks 
  • Module 3: Network Security Controls, Protocols, and Devices 
  • Module 4: Network Security Policy Design and Implementation 
  • Module 5: Physical Security 
  • Module 6: Host Security 
  • Module 7: Secure Firewall Configuration and Management 
  • Module 8: Secure IDS Configuration and Management 
  • Module 9: Secure VPN Configuration and Management 
  • Module 10: Wireless Network Defense 
  • Module 11: Network Traffic Monitoring and Analysis 
  • Module 12: Network Risk and Vulnerability Management 
  • Module 13: Data Backup and Recovery 
  • Module 14: Network Incident Response and Management

Firewall & IDPS

blank

WEEK 3

  • Module 01: Firewall & IDPS concepts
  • Module 02: Cisco Access Control Lists
  • Module 03: Linux IPTABLE
  • Module 04: Pfsense
  • Module 05: Snort
  • Module 06: Suricata
  • Module 07: BRO
  • Module 08: P0F
  • Module 09: SecurityOnion
  • Module 10: Infrastructure security, best practices & strategies

Security Monitoring

blank

WEEK 4

  • Module 1: Security Monitoring 101
  • Module 2: RSyslog
  • Module 3: ELK Stack
  • Module 4: Graylog
  • Module 5: Splunk
  • Module 6: Security Onion
  • Module 7: Open threat Intelligence Integration
  • Module 8: Strategy for effective security monitoring

Packet Analysis | Vulnerability Management

blank

 

WEEK 5

Packet Analysis

  • Module 01: Network Protocols 101
  • Module 02: Tcpdump
  • Module 03: Tshark
  • Module 04: Wireshark
  • Module 05: Snort & Bro
  • Module 06: Python Scapy
  • Module 07: Detecting Network Attacks
  • Module 08: Network Forensic Investigation

 

Vulnerability Management

  • Module 01: Vulnerability Management Fundamentals
  • Module 02: Dynamic Asset Inventory
  • Module 03: NMAP Vulnerability Scanning and NSE
  • Module 04: Tenable Nessus Vulnerability Scanner
  • Module 05: Rapid7 Nexpose or InsightVM
  • Module 06: Opensource & Free Vulnerability Scanners
  • Module 07: Web Application Vulnerability Scanning with Opensource Tools
  • Module 08: Vulnerability Research
  • Module 09: Effective Vulnerability Reporting
  • Module 10: Vulnerability Remediation Strategies

Attack – CEH

blank

WEEKS 6-7

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: Vulnerability Analysis
  • Module 6: System Hacking
  • Module 7: Malware Threats
  • Module 8: Sniffing 
  • Module 9: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Malware analysis & Incident Response

blank

 

WEEK 8

  • Module 01: Revere engineering 101
  • Module 02: Advanced Static Analysis
  • Module 03: Advanced Dynamic Analysis
  • Module 04: Malware Functionality
  • Module 05: Anti-Reverse-Engineering
  • Module 06: Incident Response – Preparation & Detection
  • Module 07: Incident Response – Data Collection & Analysis
  • Module 08: Incident Response – Remediation

Security Automation

blank

WEEK 9

  • Module 1: The Python Language
  • Module 2: Penetration Testing with Python
  • Module 3: Forensic Investigations with Python
  • Module 4: Network Traffic Analysis
  • Module 5: Wireless Hacking with Python
  • Module 6: Web Hacking with Python
  • Module 7: Python vulnerability scanning automation
  • Module 8: Python security monitoring 

Capstone

blank

 

WEEK 10

  • Module 01: Personal Branding
  • Module 02: Presentation Skills
  • Module 03: Communication Skills
  • Module 04: Social Networking
  • Module 05: Critical thinking
  • Module 06: Problem Solving Techniques
  • Module 07: Introduction to the challenge
  • Module 08: Development time and instructor guidance
  • Module 09: Final presentation

Career Opportunities

Gain New Knowledge, Skills, and Abilities

CyberWarriors Academy Cybersecurity training aligns its curriculum to the National Initiative for Cybersecurity Education (NICE) Framework. This allows you to understand the knowledge, skills, and abilities (KSAs) that are valued by employers for in-demand cybersecurity jobs and positions.

Security Provision:

  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer

Analyze:

  • Threat Analyst

Operate and Maintain:

  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst

Protect and Defend:

  • Cybersecurity Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst
hands-on technical training
hands-on technical training
hands-on technical training

Admission Requirements

Program Prerequisites: 

  • Good understanding of different numeral systems like binary, decimal and hexadecimal numbers
  • Good understanding of computer components, memory, disk space, CPU, etc
  • Good understanding of how to install/uninstall a Windows and Linux operating system
  • Basic understanding of how to use virtualization environments like VMware or VirtualBox
  • Basic understanding of fundamental network protocols like ICMP, DNS, DHCP, HTTP
  • Ability to convert between numeral systems
The most successful Cybersecurity professionals are those who possess character traits such as:

Curiosity: The desire to explore new things and different ways of using common items.

Resilience: Ability to push through a steep learning curve and handle the frustration of guiding through undefined situations.

Autodidactic Ability: The ability to self-teach…people with this ability want to spend their time learning and as such their brain is wired to absorb information.

CyberWarrior Program Scholarships Available

Frequently Asked Questions

blank

What sets CyberWarrior apart from other training programs?

CyberWarrior is a social enterprise and workforce development program providing cybersecurity training and career advancement services. The training is intensive, hands-on and delivered by practicing white-hat hackers. Our students graduate with 3 certifications (EC Council – Ethical Hacker, EC Council – Network Defender, and CyberWarrior Certified), develop the technical competency to deliver immediate value to leading corporations, and learn how to constantly investigate new innovations.

What is the total investment?

Tuition is $16,500USD for the entire 6-month program including instruction, courseware, certification exams, learning platform, and labs. Certifications (CND & CEH – $2,900) and hands-on modules ($2,200) can be purchased separately.

Is cybersecurity experience a prerequisite for the training program?

No. While certain IT skills and/or experience are required for the CW program, cybersecurity experience is not a prerequisite. Examples of the types of backgrounds we recruit from are: Technical Support, IT Specialist, Network Specialist, Network and Systems Administrator, Applications Support, Help Desk Analyst and Developer.

Contact Us

If you have any questions or concerns about the program, please do not hesitate to contact us.

12 + 13 =