Drive your career with CyberWarrior Academy

Join the Cybersecurity Next-Generation Learning

The CyberWarrior Program Objectives

Blank
The CyberWarrior Program Objectives

The CyberWarrior Program is a hands-on cybersecurity training in which students gain:

Certifications

  • EC Council: Certified Network Defender (CND)
  • EC Council: Certified Ethical Hacker (CEH)
  • Certified Cyberwarrior (CW)

Fundamentals of Cybersecurity

Technical Knowledge of Cybersecurity Tools and Technologies

  • Malware Analysis
  • Firewalls & IDS Configuration
  • Vulnerability Management
  • Security Monitoring
  • Packet Analysis
  • Incident Response
  • Security Monitoring
  • Security Automation

Consulting Experience

  • Network Security and Penetration Testing Capstone Projects

Career Growth Hacks from Cybersecurity Executives & Subject-Matter Experts

Earn Three Cybersecurity Certifications Around Your Schedule

These Certifications Will Positively Set You Apart From Your Competition in the Cybersecurity Workforce

EC Council – Certified Network Defender (CND)

During weeks 1-4, you will develop a deep understanding of cybersecurity technologies and techniques to defend a network. In this module you will develop a fundamental understanding of the true construct of data transfers, network technologies, and software technologies in order to comprehend how networks operate, how software is automated and how to assess target systems.T

EC Council – Certified Ethical Hacker

During weeks 5-8, you will dive into the types of attacks used by hackers to break into and compromise a network. In this module, you will learn how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of various target systems.

CyberWarrior Certified

During weeks 23-24, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  

EC Council – Certified Network Defender (CND)

During weeks 1-4, you will develop a deep understanding of cybersecurity technologies and techniques to defend a network. In this module you will develop a fundamental understanding of the true construct of data transfers, network technologies, and software technologies in order to comprehend how networks operate, how software is automated and how to assess target systems.T

EC Council – Certified Ethical Hacker

During weeks 5-8, you will dive into the types of attacks used by hackers to break into and compromise a network. In this module, you will learn how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of various target systems.

CyberWarrior Certified

During weeks 23-24, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  

Career Hacks

Learn More Than Just Technology

IT leaders list the inability to communicate effectively as one of the biggest challenges faced by their cybersecurity personnel. How you collaborate with your peers, how you’re perceived and how you influence the outcomes of the day are critical to your professional advancement. Improving interpersonal skills is just as important as honing technical skills in the profession. The CyberWarrior program offers career development modules to help you become your best self, get noticed, and advance in the competitive field of Information Security.

Personal Brand

  • How to Market Yourself
  • How to Leverage Limited Cybersecurity Experience

Communication Skills

  • Fostering Trust in a Team Environment
  • Conflict Management
  • Communicating with non-technical business leaders

Presentation Skills

  • Bringing Data to Life
  • Critical Thinking and Strategic Planning
  • Board Room Presentation Delivery

Part-Time Curriculum – 9 Months

This is the perfect option for those who wants to change the career and also for companies that wants to invest in their talents to either improve their skills or change their functions. Out part time program happens twice during weekdays’ evenings and some modules include alternate Saturdays, allowing workers to keep their current positions and prepare for cyber security roles. The program runs over 40 weeks (10 months) with in person and online lectures.

Full-Time Curriculum – 14 Weeks

Our full program delivered in a full-time training over 16 weeks (4 months) for people who can invest their full week in an immersive training. Our program is designed to alternate hands-on skills development, instructor-led labs and tools to help the student manage her/his learning and career. After the EC-Council modules, the student may apply for the corresponding certification.

Career Opportunities

Gain New Knowledge, Skills, and Abilities

CyberWarriors Academy Cybersecurity training aligns its curriculum to the National Initiative for Cybersecurity Education (NICE) Framework. This allows you to understand the knowledge, skills, and abilities (KSAs) that are valued by employers for in-demand cybersecurity jobs and positions.

Security Provision:

  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer

Analyze:

  • Threat Analyst

Protect and Defend:

  • Cybersecurity Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst

Operate and Maintain:

  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst

Admission Requirements

Program Prerequisites: 

  • Good understanding of different numeral systems like binary, decimal and hexadecimal numbers
  • Good understanding of computer components, memory, disk space, CPU, etc
  • Good understanding of how to install/uninstall a Windows and Linux operating system
  • Basic understanding of how to use virtualization environments like VMware or VirtualBox
  • Basic understanding of fundamental network protocols like ICMP, DNS, DHCP, HTTP
  • Ability to convert between numeral systems

Program Prerequisites: 

  • Good understanding of different numeral systems like binary, decimal and hexadecimal numbers
  • Good understanding of computer components, memory, disk space, CPU, etc
  • Good understanding of how to install/uninstall a Windows and Linux operating system
  • Basic understanding of how to use virtualization environments like VMware or VirtualBox
  • Basic understanding of fundamental network protocols like ICMP, DNS, DHCP, HTTP
  • Ability to convert between numeral systems

The CyberWarrior program is a combination of hands-on technical modules that prepare you for a career in cybersecurity. The training is intensive and is delivered by white-hat hackers with day-to-day exposure to the rapidly changing threat landscape.

Curiosity: The desire to explore new things and different ways of using common items.

Resilience: Ability to push through a steep learning curve and handle the frustration of guiding through undefined situations.

Autodidactic Ability: The ability to self-teach…people with this ability want to spend their time learning and as such their brain is wired to absorb information.

Frequently Asked Questions

blank

What sets CyberWarrior Academy apart from other training programs?

CWA is a social enterprise and workforce development program providing cybersecurity training and career advancement services. The training is intensive, hands-on and delivered by practicing white-hat hackers. Our students graduate with 3 certifications (EC Council – Ethical Hacker, EC Council – Network Defender, and CyberWarrior Academy Certified), develop the technical competency to deliver immediate value to leading corporations, and learn how to constantly investigate new innovations.

What is the total investment?

Tuition is $16,500 USD for the entire program (full or part time) including instruction, courseware, certification exams, learning platform, and ilabs.

Certifications ($2,500) and hands-on modules ($2,200) can be purchased separately.

Is cybersecurity experience a prerequisite for the training program?

No. While certain IT skills and/or experience are required for the CWA program, cybersecurity experience is not a prerequisite. Examples of the types of backgrounds we recruit from are: Technical Support, Network and Systems Administrators, Applications Support, Help Desk Analyst and Developers.

Do you have an online program?

Yes, the CWA Part-Time program is a live online training. Classes are led by a practicing penetration tester with over 10 years of international cybersecurity consulting experience. Lectures are not pre-recorded.

Who is an ideal candidate for the training program?

CWA caters to any and all IT professionals who are passionate about becoming cybersecurity experts and are willing to work hard – there is no one ideal candidate.

Our most successful students are IT professionals with at least 2 years of experience who are interested in launching a career in Cybersecurity. Another very successful group is Cybersecurity professionals who are interested in deepening their knowledge of: ethical hacking, network security, vulnerability management, security monitoring, automation, packet analysis, malware analysis, and/or incident response.

What are the outcomes of this training?

Training outcomes include the following: 

 

  • In-depth understanding of hacker mentality and technical threats  
  • In-depth understanding of defensive techniques in the cybersecurity space 
  • Hands-on experience implementing and using vulnerability management tools 
  • Hands-on experience implementing and configuring firewalls and intrusion detection/prevention systems. 
  • Hands-on experience implementing and configuring security monitoring tools.  
  • Hands-on experience performing raw packet analysis and network forensics. 
  • Hands-on experience performing malware analysis and incident response. 
  • Hands-on experience using python to perform automations in cybersecurity. 
  • Knowledge and practical experience applying critical thinking, communication and presentation skills in cybersecurity. 

blank

What is the admission process for the program?

The admission process starts with an online application found here. Qualified candidates will then be provided with a technical test to measure the IT knowledge of the participant in areas like computer networking, use of commands and troubleshooting on Windows and Linux Oss. Students can prepare for this test by reading books for CompTIA Network+ and A+ certifications. Prospective students who pass the technical test, will then take a cognitive exam that measures each student’s mental performance and learning capacity. Candidates can prepare for this test by having a good night of sleep and keep their minds sharp for the day of the test. Those who pass the cognitive exam will then have an in-person interview. After the interview, the admissions committee chooses the incoming CyberWarrior class and admitted students are notified via email.

Students are recommended to have a solid understanding of IT technologies, network TCP/IP protocol stack, operative systems and system administration, to be capable of understanding the advanced concepts part of this training.   Programming skills are not required. 

Can I reapply in the future if declined?

Yes, we encourage participants to re-apply when they feel their IT knowledge and experience have increased.

Does CWA accept International Students?

Yes, we do. International students can participate by paying for the full training in advance.

What does a typical day look like?

The training was designed to be 40% lecture, 40% practical exercises, and 20% workshops and open discussion. Students are expected to invest at least 5 more hours outside class time reading the material, preparing for class and/or practicing on their own.

How did we develop the program?

The program consists of both Technical and Professional Development modules. The Technical program was developed by cybersecurity professionals with extensive field experience. They prioritized the knowledge and skills necessary to fill in-demand cybersecurity positions that align with the NICE Framework. The Professional Development program was developed by an industry-recognized business development coach with 20 years of experience in organizational performance. This program equips students with the social and professional tools they need to drive enterprise value in a corporate environment. The Professional Development program focuses on skills like emotional intelligence, personal brand, communication, executive presentations, and more. The CyberWarrior Program’s mission is two-fold: to ensure students have the knowledge to earn highly sought-after cybersecurity certifications and to graduate professionals with the technical expertise to solve real-world security threats.

I'm an employer, and I'm interested in hiring some Data Security Analysts. How do I get in touch with you?

CyberWarrior Academy has various models for engaging corporate sponsors and meeting their talent needs. If you’re interested in hiring our graduates, sending your staff to our trainings, or want to learn more, please contact our Executive Director Carol Roby at [email protected] 617.320.9283

Learn More

15 + 15 =

9 + 3 =