CyberWarrior Academy

Certification Programs

Certified Ethical Hacker Training

Live Online

Class Description

Designed by cybersecurity professionals, this course prepares you for EC-Council Certified Ethical Hacker Exam 312-50, which certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.​ Content design is lab-driven and will provide a working knowledge of the tools and technologies required to penetrate and defend a network. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Certified Network Defender Training

Live Online

Class Description

Designed by cybersecurity professionals, this course prepares you for the EC-Council Certified Network Defender Exam 312-49, which certifies individuals in the specific network security discipline of Network Defense from a vendor-neutral perspective.​ Content design is lab-driven and will provide a working knowledge of the tools and technologies required to defend a network and ensure continuity of operations during attacks. Labs are instructor-led and the live classes are led by practicing white-hat hackers.

Fundamentals

This module covers the core skills needed to enter into the cyber security world. By practicing with hands-on exercises, this course will build the foundations and will prepare the professional for the next certified modules. The fundamentals module provides essential skills for all professionals who want to be prepared to protect networks, systems, and information from the threats of the digital and connected environment.

Hands-On Modules

Firewall Configuration
and IDPS

Live Online

Class Description

This module will allow you to practice how to implement a firewall using opensource software. You will learn from basic Cisco ACL’s using packet simulators like PacketTracert, the popular Linux Iptables, Opensource firewall Pfsense, implementing Snort IDPS and creating your own customized rules, Suricata, BRO and connecting it to a SecurityOnion as your NSM tool. You will also learn best practices and strategies to implement network security. This module will allow you to build the confidence to feel comfortable working with any other Firewalls or Intrusion detection/prevention systems in the market.

Malware Analysis and Incident Response

Live Online

Class Description

This module focuses on performing malware analysis also called reverse malware engineer to be able to understand how malware works and how to prevent it. This module ties to the incident response steps to handle an incident and how to get ready for it. You will build the expertise on how to handle a cyber security incident.

Packet Analysis

Live Online

Class Description

By taking this module you will learn how to effectively analyze packets and how to perform a network forensic investigation with it. We will cover tools like TCPDUMP, Wireshark & TSHARK, BRO, NetworkMinner. You will also learn how to create simple scripts using Python Scapy, a very powerful tool for packet analysis and then how can you use these skills for network sniffing attacks. This module will provide you with the skills to work with raw data and have a better understanding of the underlaying technologies used in your network.  

Security Automation

Live Online

Class Description

For cybersecurity professionals, automation became a fundamental tool that will help you keep up with the volume of threats and individual’s activities to both attack and defend the modern enterprise. You will learn the fundamentals on how to use Python as a tool to perform automation related with data analysis, policy validations and customized scanning, but also how to use python as a tool to automate the hacking process as a penetration tester.

Vulnerability Management

Live Online

Class Description

In this module, you will learn the necessary skills to be able to manage vulnerabilities for a company. We will go from creating an inventory of assets using discovery tools and domain controller queries, then use basic vulnerability scanning capabilities of tools like NMAP and create your own scripts on NMAP, to the most advanced tools used in the industry like Tenable Nessus Vulnerability Management and Rapid7 InsightVM. We will also cover how to use OpenVAS Opensource vulnerability scanner and some of the latest Opensource Web Application vulnerability scanners. By the end of the module, we will focus on how to do reporting and remediation strategies.

Security Monitoring

Live Online

Class Description

This training was highly demanded by different cybersecurity professionals looking for solutions on how to create a security monitoring solution from scratch. We will cover all the fundamental tools you need to master to be able to create your personalized security monitoring environment. We will start with how to implement a syslog server in Linux using Rsyslog and then how to integrate it with the famous ELK Stack (Elasticsearch, Logstash and Kibana) for quick insights of your data. We will also cover how to use the security monitoring tool Graylog, Splunk and implementing SecurityOnion. You will learn the different ways how you can perform Threat Intelligence to enrich your logs and the best strategies on the implementation of a customized security monitoring solution for your company.

Career Hacks

Cyberwarrior Academy provides not only highly relevant technical skills but interpersonal skills that are critical to achieving success in the cybersecurity industry.  This module will help you improve your professional skills by teaching you communication, presentation and critical thinking skills enabling you to more effectively communicate risks to upper management.  The design of the programs provides opportunities to hone these important skills by applying theory to real life cases and scenarios.

CyberWarrior Program

Full-time Program

Full-time Program – In Person | 16 weeks

Class Description

This immersive curriculum includes hands-on skills development, instructor-led labs and tools to help you manage your career. CyberWarrior students graduate with the sought after knowledge and credentials for immediate employment in roles such as Security Analysts and Information Security Engineers. Tuition includes the learning platform, certification exam vouchers, professional development for cybersecurity professionals, access to events featuring renown cybersecurity experts, and more.

Part-time Program

Part-time Program – Live Online | 10 months

Class Description

The program consists of hands-on classroom training including technical training in cybersecurity methods and procedures as well as professional and business tools. Training is facilitated by technical security practitioners and experts in emotional intelligence and leadership development. Boston-area executives within the IT field will participate to discuss opportunities and provide guidance and coaching for students to help navigate their careers.

Learn More

15 + 13 =

2 + 14 =