Being knowledgeable in your field is not the only requirement for launching your tech career. It takes much more than passing your exams to land a dream job or get the promotion you have been looking for. And that’s where we step in. Throughout the courses of Advanced Series, you will gain in-depth career coaching to help you prepare for the next step after graduation. We will prepare you for everything, from planning your job search and updating your resume to how to stand out in your interviews. Moreover, all Advanced Series graduates will get a unique opportunity to enroll in our Career Catalyst Program, further boosting their career growth.
Advanced Series: Advanced Cyber Operations
Overview
With our Advanced Series in Cybersecurity, you will gain the knowledge to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. You will also acquire skills to assess threat analysis and cybersecurity risks, data protection techniques and advanced configuration of DLP tools.
Learn how to prevent, detect, and respond to attacks through experience with hands-on projects. Develop processes for establishing an incident-handling team from start to finish. Gain a solid understanding of the cloud security principles and frameworks. Work with industry leaders who have already been there and done that and learn from their personal experiences.
Moreover, you will understand which threat sources are useful, which specific threats are targeted, and which ones may need minor adjustments to monitor within an organization. You will seamlessly identify, mitigate, and defend against web application attacks by designing and building systems resistant to failure.
But that’s not all. Besides gaining the technical skills needed to succeed in the industry, we will also help you work on your career-building skills. Through comprehensive career coaching sessions and access to a unique Talent Portal that will connect you with the right employers, you will learn everything you need to know about job research, technical interviews and the first day of work.
Course Details
Program Length: 45 weeks
Weekend Class Length: 6 hours
Weekend Class Length: 4 hours
Regional Price: Coming Soon
Outcomes
- Learn basics of information security.
- Gain knowledge on how to perform cyber risk analysis.
- Familiarize with security frameworks and compliance.
- Practical experience with cryptographic techniques for protecting data at rest and in transit.
- Hands-on with data loss prevention (DLP) tools.
- Security incident response lifecycle.
- Discover best practices for Cloud security in AWS.
- Apply cyber threat intelligence concepts to hunt for adversary activities.
- OWASP Top 10, scanning vulnerabilities in web applications and IT systems.
- Deploy ethical hacking to expose weaknesses.
Advanced In-Course Career Coaching
Researching the Industry
Start your research by finding the best sources for countless job ads in your field of study.
CV and LinkedIn Updates
Build a LinkedIn Profile that will pop up first for your dream job. Give your CV a makeover to fit the industry standards.
Interview Preparation
Discover what to expect from a tech interview and how best to handle the most asked questions and scenarios.
Define Your Career Path
Pave your own career path with the help of industry professionals based on your personal aspirations.
- Ease in navigating and using a computer interface.
- High-speed internet connection.
- Familiarity with algebra concepts.
- A computer that meets the specified requirements:
- Supported operating systems: macOS, Linux, or Windows (Pro edition required)
- Latest OS version, fully up to date
- All security updates installed
- Free of viruses
- At least 100GB of free space on the hard drive
- At least 16GB of RAM, 32GB RAM is strongly preferred
- Support for video conferencing and screen-sharing, with a reliable webcam and microphone
- CompTIA Security+ Study Guide: Exam SY0-601 (Sybex Study Guide)
- Completed Level 4: Networking and Systems Administration.
- Students with previous experience have the option to test-in straight to the Advanced Series. If you’d like to test-in, please make sure to have experience with all the topics covered in Level 3: Foundations of Computer Ops and Security and Level 4: Networking and Systems Administration.
- All students are required to complete the prework for this course ahead of day one.
For more information of the Ops Lab Kit requirements, click here.
Cybersecurity engineering with AI tools
Governance, Risk, and Compliance (GRC)
- Cybersecurity frameworks (e.g. SOC2)
- CIA triad
- Systems hardening
- Risk analysis, assessment, and reporting
- Security compliance and auditing
Data Security
- Data classification
- Data loss prevention (DLP)
- Data privacy concepts and regulation (GDPR, CCPA)
- Encryption standards
- Password security
- Protecting data at rest and in transit
- Public Key Infrastructure (PKI)
- SSL/TLS
SecOps Foundations
- Threat detection with IDS, SIEM
- Incident response lifecycle
- Indicators of compromise (IOC)
- SIEM deployment and operation
- SIEM log and event analysis
- SIEM troubleshooting, data ingestion, query writing
- Threat hunting techniques
Cloud Security
- Cloud identity and access management
- Cloud security in AWS
- Data loss prevention (DLP)
- Intrusion detection & prevention systems (IDS/IPS, Snort)
- Network traffic analysis
- Virtual private cloud (VPC)
- AWS native tooling (e.g. AWS CloudTrail)
Threat Modeling and Analysis
- Tactics, techniques, and procedures (TTPs)
- Cyber Kill-Chain
- MITRE ATT&CK
- OWASP
- STRIDE
- Threat Modeling
- Data flow diagrams
SecOps: Threat Hunting
- Malware detection with YARA rules, VirusTotal API
- Malware traffic analysis
- Forensic investigation
- Threat hunting with Zeek, RITA
AppSec and Vulnerability Analysis
- Web app scanning and exploitation with Burp Suite, w3af, OWASP ZAP
- CVE, CVSS
- Vulnerability scanning tools, e.g. Nessus
- Network and application vulnerability scans and assessments
- Scanner output handling, false positives, prioritization
- Vulnerability risk rating
- Vulnerability types and concepts
Penetration Testing
- Enumeration
- Exploitation
- Impact analysis
- Investigation and intelligence collection
- Legal considerations in pentest scoping
- Nmap, metasploit, datasploit
- OSINT
- Penetration test lifecycle
- Planning
- Scoping
- Target profiling and evaluation