Skip to main content

Advanced Series: Advanced Cyber Operations

Overview

Course Details

Schedule

Program Length: 45 weeks 

Class schedule

Weekday Classes Length: 6 hours

Weekend Classes Length: 4 hours

Academy Courses Pricing

Lectures Details

Lectures

Lectures: 45 + Final Project

Schedule

Lectures Length: 450 hours

Class schedule

Classes Schedule:  

  • Monday – 2 hours
  • Tuesday – 2 hours
  • Thursday – 2 hours
  • Saturday – 4 hours 

Outcomes

  • Learn basics of information security.
  • Gain knowledge on how to perform cyber risk analysis.
  • Familiarize with security frameworks and compliance.
  • Practical experience with cryptographic techniques for protecting data at rest and in transit.
  • Hands-on with data loss prevention (DLP) tools.
  • Security incident response lifecycle.
  • Discover best practices for Cloud security in AWS.
  • Apply cyber threat intelligence concepts to hunt for adversary activities.
  • OWASP Top 10, scanning vulnerabilities in web applications and IT systems.
  • Deploy ethical hacking to expose weaknesses.

In-Course Career Coaching

Being knowledgeable in your field is not the only requirement for launching your tech career. It takes much more than passing your exams to land a dream job or get the promotion you have been looking for. And that’s where we step in. Starting from Level 2 all the way to Level 4, you will gain in-depth career coaching to help you prepare for the next step after graduation.

We will prepare you for everything, from planning your job search and updating your resume to discovering how to stand out in your interviews. All this will be covered in four essential steps:

Researching the Industry

Start your research by finding the best sources for countless job ads in your field of study.

CV and LinkedIn Updates

Build a LinkedIn Profile that will pop up first for your dream job. Give your CV a makeover to fit the industry standards.

Interview Preparation

Discover what to expect from a tech interview and how best to handle the most asked questions and scenarios.

Define Your Career Path

Pave your own career path with the help of industry professionals based on your personal aspirations.

  • Ease in navigating and using a computer interface.
  • High-speed internet connection.
  • Familiarity with algebra concepts.
  • A computer that meets the specified requirements:
    • Supported operating systems: macOS, Linux, or Windows (Pro edition required)  
    • Latest OS version, fully up to date  
    • All security updates installed  
    • Free of viruses  
    • At least 100GB of free space on the hard drive  
    • At least 16GB of RAM, 32GB RAM is strongly preferred  
    • Support for video conferencing and screen-sharing, with a reliable webcam and microphone  
  • CompTIA Security+ Study Guide: Exam SY0-601 (Sybex Study Guide)
  • Completed Level 4: Networking and Systems Administration.
    • Students with previous experience have the option to test-in straight to the Advanced Series. If you’d like to test-in, please make sure to have experience with all the topics covered in Level 3: Foundations of Computer Ops and Security and Level 4: Networking and Systems Administration.
  • All students are required to complete the prework for this course ahead of day one.
All Ops & Cybersecurity students are required to make a one-time, non-refundable purchase of an Ops Lab Kit with predefined specifications. The purchased equipment can be either new or secondhand, but it should be in a functional state for the lab work. Once you purchase your Ops Lab Kit, you should ensure to set it up at least one day before the first lecture. It can be used for all levels of the Ops & Cybersecurity Program, and it is specifically built to help you gain practical, hands-on experience while following the Ops lectures.

 

For more information of the Ops Lab Kit requirements, click here.

Cybersecurity engineering with AI tools

Governance, Risk, and Compliance (GRC)

  • Cybersecurity frameworks (e.g. SOC2)
  • CIA triad
  • Systems hardening
  • Risk analysis, assessment, and reporting
  • Security compliance and auditing

Data Security

  • Data classification
  • Data loss prevention (DLP)
  • Data privacy concepts and regulation (GDPR, CCPA)
  • Encryption standards
  • Password security
  • Protecting data at rest and in transit
  • Public Key Infrastructure (PKI)
  • SSL/TLS

SecOps Foundations

  • Threat detection with IDS, SIEM
  • Incident response lifecycle
  • Indicators of compromise (IOC)
  • SIEM deployment and operation
  • SIEM log and event analysis
  • SIEM troubleshooting, data ingestion, query writing
  • Threat hunting techniques

Cloud Security

  • Cloud identity and access management
  • Cloud security in AWS
  • Data loss prevention (DLP)
  • Intrusion detection & prevention systems (IDS/IPS, Snort)
  • Network traffic analysis
  • Virtual private cloud (VPC)
  • AWS native tooling (e.g. AWS CloudTrail)

Threat Modeling and Analysis

  • Tactics, techniques, and procedures (TTPs)
  • Cyber Kill-Chain
  • MITRE ATT&CK
  • OWASP
  • STRIDE
  • Threat Modeling
  • Data flow diagrams

SecOps: Threat Hunting

  • Malware detection with YARA rules, VirusTotal API
  • Malware traffic analysis
  • Forensic investigation
  • Threat hunting with Zeek, RITA

AppSec and Vulnerability Analysis

  • Web app scanning and exploitation with Burp Suite, w3af, OWASP ZAP
  • CVE, CVSS
  • Vulnerability scanning tools, e.g. Nessus
  • Network and application vulnerability scans and assessments
  • Scanner output handling, false positives, prioritization
  • Vulnerability risk rating
  • Vulnerability types and concepts

Penetration Testing

  • Enumeration
  • Exploitation
  • Impact analysis
  • Investigation and intelligence collection
  • Legal considerations in pentest scoping
  • Nmap, metasploit, datasploit
  • OSINT
  • Penetration test lifecycle
  • Planning
  • Scoping
  • Target profiling and evaluation
We’ve created a flexible environment which will enable you to have the best learning experience from the comfort of your own home. That said, to successfully pass the class, students should aim to reach at least 90% of the available points.
In accordance with our Code of Conduct, punctuality, participation in discussions, completion of assignments, and demonstration of professional courtesy to others are required. Attendance will be recorded at the start of the class. Passing requires attendance on the full course.
Building a career is more than just learning a skill. In tandem with your software development education, you will receive powerful career-building strategic training so you can confidently start your job search as soon as (or even before!) you graduate. Moreover, our Career Catalyst Program provides additional training, mentoring, leadership, and introductions to industry partners to help you become a more well-rounded software developer and a leader in your field. These services, which start after graduation, involve a series of events, workshops, and assignments that help you think holistically about your new career and take actionable steps towards success.