Cyber Security Bootcamp

Best Live Courses Out There!

  • DATE: Regular Intakes
  • TIME: Varies
  • DAY: Weekday evenings or Weekends
  • DURATION: 240 Hours, 6 months
  • PRICE: Please contact registrar
  • MODEL: Instructor-led
  • CLASS SIZE: Under 15 students

Talented instructor team

 

Learn from our top minds

All of our instructors have mastered their craft and are experienced mentors and teachers. More importantly, they're passionate about sharing their knowledge with you.

With the subjects in this bootcamp, you will gain a deep knowledge in the areas of cybersecurity. You can master the skills and strategies required to defend and protect businesses from the increasing threats of cyber attack.

Students completing the Cybersecurity bootcamp can apply in various multi-national companies, technology firms, leading banks, large consulting firms, etc. for various roles in cybersecurity including:

  • Cybersecurity Analyst
  • Cybersecurity Specialist
  • Cybersecurity Technician
  • Cybersecurity Incident Analyst

JOIN US LIVE!

Who should take this course

Students who have no computing experience, however understand the basics of computer (internet, MS Office, Social media sites, etc.) and enthusiastic to gain newer skills required to start a career in the promising field of cybersecurity.

Students who have a background of computer programming and web applications and want to leverage their programming experience to explore new job opportunities in the growing and dynamic field of cybersecurity.

Course Content

 

Computer Network Security

This course introduces students to the fundamentals of computer network security. The course focuses on security threats, vulnerabilities and available defense mechanisms. Students are exposed to ethical hacking, use of hacking methods for computer network vulnerability assessment and penetration testing. Various protection methods will be presented including auditing systems, monitoring techniques, and various Intrusion Detection Processes and technologies used for discovery of hackers and advance notice of cyber threats.

 

Computer Cryptography & Digital Steganography

The course introduces students to the fundamentals of modern cryptography and steganography. Various cipher systems will be presented in the course, with the emphasis on those recommended by related standards. Watermarking and steganography will also be described with emphasis on how these techniques are used in conjunction with encryption systems to protect data. Students will learn both the theory of cryptographic protection and the practicalities of properly implementing crypto protection in the field, as well as how forensics experts deal with encrypted information.

 

Digital Forensic Systems

This course introduces students to digital forensic concepts, techniques and addresses ethical considerations. Students will gain an understanding and legal awareness of computer security and forensics. Topics include the collection and rules of evidence, forensic methodologies and techniques, and includes best practices in securing, processing, acquiring, examining and reporting on digital evidence. Students will also gain an understanding of computer incident response and IT system protection.

 

Security Architecture & Design

This course introduces student to the fundamentals of security architecture and design. Topics that are covered include security architecture concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, network, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability. An understanding of the fundamentals of security architecture will provide students guidance in order to designing secure products and systems and provide adequate levels of protection, it will also allow for the development of security models and policies that can be used to mitigate systems' security shortcomings identified or exploited.

 

Certified Information Systems Security Professional (CISSP)

This course focuses on eight domains as outlined by the International Information Systems Security Certification Consortium (ISC)2. The domains are Security and Risk Management, Asset Security, Security Architecture and Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. This course will assist students to prepare for the Certified Information Systems Security Professional (CISSP) exam.

 

Cyber Security Capstone Project

The Cyber Security capstone will provide students a hands-on opportunity to utilize what has been learned throughout the program: identifying vulnerable system resources; devising security controls, policies, and procedures within the context of a security architecture and design; selecting and deploying appropriate hardware/software controls and countermeasures to reduce exposure; and implementing a cohesive security environment which includes monitoring, feedback, and metrics.