Drive your career with CyberWarrior Academy

Join the Cybersecurity Next-Generation Learning

The CyberWarrior Program Objectives

Blank
The CyberWarrior Program Objectives

The CyberWarrior Program is a hands-on cybersecurity training in which students gain:

Certifications

  • EC Council: Certified Network Defender (CND)
  • EC Council: Certified Ethical Hacker (CEH)
  • Certified Cyberwarrior (CW)

Fundamentals of Cybersecurity

Technical Knowledge of Cybersecurity Tools and Technologies

  • Malware Analysis
  • Firewalls & IDS Configuration
  • Vulnerability Management
  • Security Monitoring
  • Packet Analysis
  • Incident Response
  • Security Monitoring
  • Security Automation

Consulting Experience

  • Network Security and Penetration Testing Capstone Projects

Career Growth Hacks from Cybersecurity Executives & Subject-Matter Experts

Earn Three Cybersecurity Certifications Around Your Schedule

These Certifications Will Positively Set You Apart From Your Competition in the Cybersecurity Workforce

EC Council – Certified Network Defender (CND)

During weeks 1-4, you will develop a deep understanding of cybersecurity technologies and techniques to defend a network. In this module you will develop a fundamental understanding of the true construct of data transfers, network technologies, and software technologies in order to comprehend how networks operate, how software is automated and how to assess target systems.T

EC Council – Certified Ethical Hacker

During weeks 5-8, you will dive into the types of attacks used by hackers to break into and compromise a network. In this module, you will learn how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of various target systems.

CyberWarrior Certified

During weeks 23-24, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  

Learn More Than Just Technology

IT leaders list the inability to communicate effectively as one of the biggest challenges faced by their cybersecurity personnel. How you collaborate with your peers, how you’re perceived and how you influence the outcomes of the day are critical to your professional advancement. Improving interpersonal skills is just as important as honing technical skills in the profession. The CyberWarrior program offers career development modules to help you become your best self, get noticed, and advance in the competitive field of Information Security.

Personal Brand

  • How to Market Yourself
  • How to Leverage Limited Cybersecurity Experience

Communication Skills

  • Fostering Trust in a Team Environment
  • Conflict Management
  • Communicating with non-technical business leaders

Presentation Skills

  • Bringing Data to Life
  • Critical Thinking and Strategic Planning
  • Board Room Presentation Delivery

Part-Time Curriculum – 9 Months

The 9 month curriculum provides you in-depth, hands-on technical and career development training to support the three certifications you will receive upon completion of the program.

Defend – CND

blank

WEEKS 1-4

  • Module 1: Computer Network and Defense Fundamentals 
  • Module 2: Network Security Threats, Vulnerabilities, and Attacks 
  • Module 3: Network Security Controls, Protocols, and Devices 
  • Module 4: Network Security Policy Design and Implementation 
  • Module 5: Physical Security 
  • Module 6: Host Security 
  • Module 7: Secure Firewall Configuration and Management 
  • Module 8: Secure IDS Configuration and Management 
  • Module 9: Secure VPN Configuration and Management 
  • Module 10: Wireless Network Defense 
  • Module 11: Network Traffic Monitoring and Analysis 
  • Module 12: Network Risk and Vulnerability Management 
  • Module 13: Data Backup and Recovery 
  • Module 14: Network Incident Response and Management

Attack – CEH

blank

WEEKS 5-8

  • Module 00: Student Introduction 
  • Module 01: Introduction to Ethical Hacking 
  • Module 02: Footprinting and Reconnaissance 
  • Module 03: Scanning Networks 
  • Module 04: Enumeration 
  • Module 05: Vulnerability Analysis 
  • Module 06: System Hacking 
  • Module 07: Malware Threats 
  • Module 08: Sniffing 
  • Module 09: Social Engineering 
  • Module 10: Denial-of-Service 
  • Module 11: Session Hijacking 
  • Module 12: Evading IDS, Firewalls, and Honeypots 
  • Module 13: Hacking Web Servers 
  • Module 14: Hacking Web Applications 
  • Module 15: SQL Injection 
  • Module 16: Hacking Wireless Networks 
  • Module 17: Hacking Mobile Platforms 
  • Module 18: IoT Hacking 
  • Module 19: Cloud Computing 
  • Module 20: Cryptography 

Hands-On Training

blank

WEEKS 9-10 (Firewalls & IDS Configuration)

  • Module 1: Firewall & IDPS concepts 
  • Module 2: CISCO Access Control Lists (ACLs) 
  • Module 3: Linux IPTABLE 
  • Module 4: PFSense 
  • Module 5: Snort 
  • Module 6: Suricata  
  • Module 7: BRO 
  • Module 8: SecurityOnion 
  • Module 9: Infrastructure security, best practices & strategies 

WEEKS 11-12 (Vulnerability Management)

  • Module 1: Vulnerability scanning concepts 
  • Module 2: Dynamic asset inventory 
  • Module 3: NMAP vulnerability scanning and NSE 
  • Module 4: Nessus vulnerability scanning tool 
  • Module 5: Nexpose/InsightVM vulnerability management tool 
  • Module 6: OpenVAS Opensource vulnerability scanning 
  • Module 7: Web Application Vulnerability Scanning 
  • Module 8: Open Threat Intelligence 
  • Module 9: Effective vulnerability reporting 
  • Module 10: Vulnerability remediation strategies 

WEEKS 13-14 (Security Monitoring)

  • Module 1: Concepts, components and log sources 
  • Module 2: RSYSLOG 
  • Module 3: ELK (Elasticsearch, Logstash and Kibana) 
  • Module 4: GrayLog 
  • Module 5: Splunk 
  • Module 6: SecurityOnion 
  • Module 7: Open Threat Intelligence Integration 
  • Module 8: Strategies for effective security monitoring 

WEEKS 15-16 (Packet Analysis)

  • Module 1: Network and protocols concepts 
  • Module 2: Tcpdump 
  • Module 3: Wireshark & Tshark 
  • Module 4: Packet analysis automation with Python Scapy 
  • Module 5: Network sniffing attacks 
  • Module 6: Network forensic investigations 
  •  

WEEKS 17-18 (Malware Analysis & Incident Response)

  • Incident handling steps 
  • Linux SIFT Virtual Machine 
  • Logs analysis 
  • Network evidence acquisition 
  • Forensic malware analysis 
  • Triage process 
  • Incident reporting 
  • Situation handling 
  •  

WEEK 19-20 (Security Automation)

  • Python fundamentals 
  • Defending with Python 
  • Attacking with Python 

Career Hacks

blank

WEEKS 21-22

  • Personal Branding
  • Communication and Resource Management skills 
  • Critical Thinking and Presentation skills 

Prove

blank

WEEKS 23-24

In the Capstone module, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  

Learn More about CyberWarrior Program

Full-Time Curriculum – 14 Weeks

The 14 week curriculum provides you in-depth, hands-on technical and career development training to support the three certifications you will receive upon completion of the program.

Fundamentals Module

blank

WEEK 1-4

  • Module 1: The Python Language
  • Module 2: Penetration Testing with Python
  • Module 3: Forensic Investigations with Python
  • Module 4: Network Traffic Analysis
  • Module 5: Wireless Hacking with Python
  • Module 6: Web Hacking with Python
  • Module 7: Python vulnerability scanning automation
  • Module 8: Python security monitoring 

Defend – CND

blank

WEEKS 5

  • Module 1: Computer Network and Defense Fundamentals 
  • Module 2: Network Security Threats, Vulnerabilities, and Attacks 
  • Module 3: Network Security Controls, Protocols, and Devices 
  • Module 4: Network Security Policy Design and Implementation 
  • Module 5: Physical Security 
  • Module 6: Host Security 
  • Module 7: Secure Firewall Configuration and Management 
  • Module 8: Secure IDS Configuration and Management 
  • Module 9: Secure VPN Configuration and Management 
  • Module 10: Wireless Network Defense 
  • Module 11: Network Traffic Monitoring and Analysis 
  • Module 12: Network Risk and Vulnerability Management 
  • Module 13: Data Backup and Recovery 
  • Module 14: Network Incident Response and Management

Firewall & IDPS

blank

WEEK 6

  • Module 01: Firewall & IDPS concepts
  • Module 02: Cisco Access Control Lists
  • Module 03: Linux IPTABLE
  • Module 04: Pfsense
  • Module 05: Snort
  • Module 06: Suricata
  • Module 07: BRO
  • Module 08: P0F
  • Module 09: SecurityOnion
  • Module 10: Infrastructure security, best practices & strategies

Security Monitoring

blank

WEEK 7

  • Module 1: Security Monitoring 101
  • Module 2: RSyslog
  • Module 3: ELK Stack
  • Module 4: Graylog
  • Module 5: Splunk
  • Module 6: Security Onion
  • Module 7: Open threat Intelligence Integration
  • Module 8: Strategy for effective security monitoring

Packet Analysis | Vulnerability Management

blank

 

WEEK 8

Packet Analysis

  • Module 01: Network Protocols 101
  • Module 02: Tcpdump
  • Module 03: Tshark
  • Module 04: Wireshark
  • Module 05: Snort & Bro
  • Module 06: Python Scapy
  • Module 07: Detecting Network Attacks
  • Module 08: Network Forensic Investigation

 

Vulnerability Management

  • Module 01: Vulnerability Management Fundamentals
  • Module 02: Dynamic Asset Inventory
  • Module 03: NMAP Vulnerability Scanning and NSE
  • Module 04: Tenable Nessus Vulnerability Scanner
  • Module 05: Rapid7 Nexpose or InsightVM
  • Module 06: Opensource & Free Vulnerability Scanners
  • Module 07: Web Application Vulnerability Scanning with Opensource Tools
  • Module 08: Vulnerability Research
  • Module 09: Effective Vulnerability Reporting
  • Module 10: Vulnerability Remediation Strategies

Attack – CEH

blank

WEEKS 9

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: Vulnerability Analysis
  • Module 6: System Hacking
  • Module 7: Malware Threats
  • Module 8: Sniffing 
  • Module 9: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Malware analysis & Incident Response

blank

 

WEEK 10

  • Module 01: Revere engineering 101
  • Module 02: Advanced Static Analysis
  • Module 03: Advanced Dynamic Analysis
  • Module 04: Malware Functionality
  • Module 05: Anti-Reverse-Engineering
  • Module 06: Incident Response – Preparation & Detection
  • Module 07: Incident Response – Data Collection & Analysis
  • Module 08: Incident Response – Remediation

Security Automation

blank

WEEK 11-12

  • Module 1: The Python Language
  • Module 2: Penetration Testing with Python
  • Module 3: Forensic Investigations with Python
  • Module 4: Network Traffic Analysis
  • Module 5: Wireless Hacking with Python
  • Module 6: Web Hacking with Python
  • Module 7: Python vulnerability scanning automation
  • Module 8: Python security monitoring 

Capstone

blank

 

WEEK 13-14

  • Module 01: Personal Branding
  • Module 02: Presentation Skills
  • Module 03: Communication Skills
  • Module 04: Social Networking
  • Module 05: Critical thinking
  • Module 06: Problem Solving Techniques
  • Module 07: Introduction to the challenge
  • Module 08: Development time and instructor guidance
  • Module 09: Final presentation

Career Opportunities

Gain New Knowledge, Skills, and Abilities

CyberWarriors Academy Cybersecurity training aligns its curriculum to the National Initiative for Cybersecurity Education (NICE) Framework. This allows you to understand the knowledge, skills, and abilities (KSAs) that are valued by employers for in-demand cybersecurity jobs and positions.

Security Provision:

  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer

Analyze:

  • Threat Analyst

Protect and Defend:

  • Cybersecurity Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst

Operate and Maintain:

  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst

Admission Requirements

Program Prerequisites: 

  • Good understanding of different numeral systems like binary, decimal and hexadecimal numbers
  • Good understanding of computer components, memory, disk space, CPU, etc
  • Good understanding of how to install/uninstall a Windows and Linux operating system
  • Basic understanding of how to use virtualization environments like VMware or VirtualBox
  • Basic understanding of fundamental network protocols like ICMP, DNS, DHCP, HTTP
  • Ability to convert between numeral systems

The CyberWarrior program is a combination of hands-on technical modules that prepare you for a career in cybersecurity. The training is intensive and is delivered by white-hat hackers with day-to-day exposure to the rapidly changing threat landscape.

Curiosity: The desire to explore new things and different ways of using common items.

Resilience: Ability to push through a steep learning curve and handle the frustration of guiding through undefined situations.

Autodidactic Ability: The ability to self-teach…people with this ability want to spend their time learning and as such their brain is wired to absorb information.

Frequently Asked Questions

blank

What sets CyberWarrior Academy apart from other training programs?

CWA is a social enterprise and workforce development program providing cybersecurity training and career advancement services. The training is intensive, hands-on and delivered by practicing white-hat hackers. Our students graduate with 3 certifications (EC Council – Ethical Hacker, EC Council – Network Defender, and CyberWarrior Academy Certified), develop the technical competency to deliver immediate value to leading corporations, and learn how to constantly investigate new innovations.

What is the total investment?

Tuition is $16,500 USD for the entire program (full or part time) including instruction, courseware, certification exams, learning platform, and ilabs.

Certifications ($2,500) and hands-on modules ($2,200) can be purchased separately.

Is cybersecurity experience a prerequisite for the training program?

No. While certain IT skills and/or experience are required for the CWA program, cybersecurity experience is not a prerequisite. Examples of the types of backgrounds we recruit from are: Technical Support, Network and Systems Administrators, Applications Support, Help Desk Analyst and Developers.

Do you have an online program?

Yes, the CWA Part-Time program is a live online training. Classes are led by a practicing penetration tester with over 10 years of international cybersecurity consulting experience. Lectures are not pre-recorded.

Who is an ideal candidate for the training program?

CWA caters to any and all IT professionals who are passionate about becoming cybersecurity experts and are willing to work hard – there is no one ideal candidate.

Our most successful students are IT professionals with at least 2 years of experience who are interested in launching a career in Cybersecurity. Another very successful group is Cybersecurity professionals who are interested in deepening their knowledge of: ethical hacking, network security, vulnerability management, security monitoring, automation, packet analysis, malware analysis, and/or incident response.

What are the outcomes of this training?

Training outcomes include the following: 

 

  • In-depth understanding of hacker mentality and technical threats  
  • In-depth understanding of defensive techniques in the cybersecurity space 
  • Hands-on experience implementing and using vulnerability management tools 
  • Hands-on experience implementing and configuring firewalls and intrusion detection/prevention systems. 
  • Hands-on experience implementing and configuring security monitoring tools.  
  • Hands-on experience performing raw packet analysis and network forensics. 
  • Hands-on experience performing malware analysis and incident response. 
  • Hands-on experience using python to perform automations in cybersecurity. 
  • Knowledge and practical experience applying critical thinking, communication and presentation skills in cybersecurity. 

blank

What is the admission process for the program?

The admission process starts with an online application found here. Qualified candidates will then be provided with a technical test to measure the IT knowledge of the participant in areas like computer networking, use of commands and troubleshooting on Windows and Linux Oss. Students can prepare for this test by reading books for CompTIA Network+ and A+ certifications. Prospective students who pass the technical test, will then take a cognitive exam that measures each student’s mental performance and learning capacity. Candidates can prepare for this test by having a good night of sleep and keep their minds sharp for the day of the test. Those who pass the cognitive exam will then have an in-person interview. After the interview, the admissions committee chooses the incoming CyberWarrior class and admitted students are notified via email.

Students are recommended to have a solid understanding of IT technologies, network TCP/IP protocol stack, operative systems and system administration, to be capable of understanding the advanced concepts part of this training.   Programming skills are not required. 

Can I reapply in the future if declined?

Yes, we encourage participants to re-apply when they feel their IT knowledge and experience have increased.

Does CWA accept International Students?

Yes, we do. International students can participate by paying for the full training in advance.

What does a typical day look like?

The training was designed to be 40% lecture, 40% practical exercises, and 20% workshops and open discussion. Students are expected to invest at least 5 more hours outside class time reading the material, preparing for class and/or practicing on their own.

How did we develop the program?

The program consists of both Technical and Professional Development modules. The Technical program was developed by cybersecurity professionals with extensive field experience. They prioritized the knowledge and skills necessary to fill in-demand cybersecurity positions that align with the NICE Framework. The Professional Development program was developed by an industry-recognized business development coach with 20 years of experience in organizational performance. This program equips students with the social and professional tools they need to drive enterprise value in a corporate environment. The Professional Development program focuses on skills like emotional intelligence, personal brand, communication, executive presentations, and more. The CyberWarrior Program’s mission is two-fold: to ensure students have the knowledge to earn highly sought-after cybersecurity certifications and to graduate professionals with the technical expertise to solve real-world security threats.

I'm an employer, and I'm interested in hiring some Data Security Analysts. How do I get in touch with you?

CyberWarrior Academy has various models for engaging corporate sponsors and meeting their talent needs. If you’re interested in hiring our graduates, sending your staff to our trainings, or want to learn more, please contact our Executive Director Carol Roby at [email protected] 617.320.9283

For answer to questions please contact us

 

14 + 13 =

11 + 6 =