CWA Program Schedule

CyberWarrior Program

Part-time Program

Live Online | 6 months

Blank
Class Description

This immersive curriculum includes hands-on skills development, instructor-led labs and tools to help you manage your career. CW students graduate with the sought after knowledge and credentials for immediate employment in roles such as Security Analysts and Information Security Engineers. Tuition includesthe learning platform, certification exam vouchers, professional development for cybersecurity professionals, access to events featuring renown cybersecurity experts, and more.

Dates

TBD

Schedule

TBD

Full-time Program

UMass Campus | 10 weeks

Blank
Class Description

The program consists of hands-on classroom training including technical training in cybersecurity methods and procedures as well as professional and business tools. Training is facilitated by technical security practitioners and experts in emotional intelligence and leadership development. Boston-area executives within the IT field will participate to discuss opportunities and provide guidance and coaching for students to help navigate their careers.

Dates

TBD

Schedule

TBD

Certification Programs

Certified Ethical Hacker Training

Live Online | 4 Weeks​

Blank
Class Description

Designed by cybersecurity professionals, this course prepares you for EC-Council Certified Ethical Hacker Exam 312-50, which certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.​ Content design is lab-driven and will provide a working knowledge of the tools and technologies required to penetrate and defend a network. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Dates

TBD

Schedule

TBD

Certified Network Defender Training

Live Online | 4 Weeks​

Blank
Class Description

Designed by cybersecurity professionals, this course prepares you for the EC-Council Certified Network Defender Exam 312-49, which certifies individuals in the specific network security discipline of Network Defense from a vendor-neutral perspective.​ Content design is lab-driven and will provide a working knowledge of the tools and technologies required to defend a network and ensure continuity of operations during attacks. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Dates

TBD

Schedule

TBD

Hands-On Modules

Firewall Configuration and IDPS

Live Online | 2 Weeks​

Blank
Class Description

Advoqt Academy’s Firewall and IDPS (intrusion detection and prevention systems) Training was created to equip IT professionals with knowledge and experience in the areas of: firewall configuration, IDPS, infrastructure security, network security, and more. You will learn basic Cisco access control lists (ACLs) using packet simulators like PacketTracer, the popular Linux Iptables, open source firewall Pfsense, and implementing Snort IDPS. You will delve into creating your own customized rules using Suricata and BRO and connecting it to SecurityOnion as your NSM tool. In addition, this training covers best practices and strategies to implement network security and get you comfortable working with any firewall or intrusion detection/prevention system in the market.

Content design is lab-driven and will provide a working knowledge of the tools and technologies required to implement a firewall using open source software. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Dates

TBD

Schedule

TBD

Malware Analysis and Incident Response

Live Online | 2 Weeks​

Blank
Class Description

Advoqt Academy’s Malware Analysis and Incident Response Training was created to equip IT professionals with knowledge and experience in the disciplines of: incident handling procedures, log analysis, network evidence acquisition, forensic malware analysis, incident reporting, and more.

Content design is lab-driven and will provide a working knowledge of the tools and technologies required to defend a network from malware and respond to cyber incidents. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Dates

TBD

Schedule

TBD

Packet
Analysis

Live Online | 2 Weeks​

Blank
Class Description

Advoqt Academy’s Packet Analysis Training was created to equip IT professionals with knowledge and experience analyzing packets and performing network forensic investigations. This training covers tools like TCPDUMP, Wireshark TShark, BRO, NetworkMinner. You will also learn how to create simple scripts using Python Scapy, a very powerful tool for packet analysis and then how can you use these skills for network sniffing attacks. This module will provide you with the skills to work with raw data and have a better understanding of the underlaying technologies used in your network.

Dates

TBD

Schedule

TBD

Security Automation

Live Online | 2 Weeks​

Blank
Class Description

Advoqt Academy’s Security Automation Training was created to equip IT professionals with the knowledge and experience of using python to attack target systems, defend networks, and automate security-related tasks. This training will cover how to use automatic systems to detect and prevent cyber attacks, while contributing to the overall threat intelligence of an organization in order to plan and defend against future threats. In 2 weeks, Advoqt Academy will teach you how to improve and simplify security operations by leveraging the power of automation.

Content design is lab-driven and will provide a working knowledge of the tools and technologies required to automate manual, time-intensive security tasks. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Dates

TBD

Schedule

TBD

Security Monitoring

Live Online | 2 Weeks​

Blank
Class Description

Advoqt Academy’s Security Monitoring Training was created to teach IT professionals how to create a security monitoring solution from scratch. In this training, you will master some fundamental tools to create a personalized security monitoring environment. We will start with how to implement a syslog server in Linux using Rsyslog and then how to integrate it with the famous ELK Stack (Elasticsearch, Logstash and Kibana) for quick insights of your data. We will also cover how to use the security monitoring tool Graylog, Splunk and implementing SecurityOnion. You will learn the different ways how you can perform Threat Intelligence to enrich your logs and the best strategies on the implementation of a customized security monitoring solution for your company.

Dates

TBD

Schedule

TBD

Vulnerability Management

Live Online | 2 Weeks​

Blank
Class Description

Advoqt Academy’s Vulnerability Management Training was created to equip IT professionals with knowledge and hands-on experience in the areas of: vulnerability scanning, dynamic asset inventory, effective vulnerability reporting, vulnerability remediation strategies, and more. In this training, you will create an inventory of assets using discovery tools and domain controller queries, then use NMAP to create your own scripts. We will also cover how to use tools such as Tenable Nessus Vulnerability Management, Rapid7 InsightVM, OpenVAS Opensource vulnerability scanner, and some of the latest Opensource Web Application vulnerability scanners. The module will close with reporting and remediation strategies.

Dates

TBD

Schedule

TBD

Contact Us

 

If you have any questions or concerns about the program, please do not hesitate to contact us.

11 + 8 =