Slim Prep

Cyber Ready Bootcamp: Launch Your Career in Cybersecurity

$2,000.00

Internship available

 

Day 1: Familiarity with core security terms and principles. By the time you leave the classroom after the first section, you will fully understand:

  • Principles of least Privilege.
  • Confidentiality, Integrity, and Availability (CIA), and you’ll see why those principles drive all security discussions.
  • Risk management, security policy, and authentication/ authorization/accountability fundamentals.

Day 2:

  • Computer Functions and Networking 
  • The networking discussion begins with a non-technical explanation of how data move across a network. From there we move to fundamental terminology dealing with network types and standards. You’ll learn about common network hardware such as switches and routers, and terms like “protocol” and “encapsulation.”
  • We’ll give a very basic introduction to network addressing and port numbers and then work our way up the Open Systems Interconnection (OSI) protocol stack, introducing more detail only as we proceed to the next layer. In other words, we explain networking starting in non-technical terms and gradually progress to more technical detail as students are ready to take the next step.
  • By the end of our discussions, you’ll have a fundamental grasp of any number of critical technical networking acronyms that you’ve often heard but never quite understood, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.

 

Day 3: Crypto, Cybersecurity attacks, Vulnerability Management: 

  • Symmetric and asymmetric key cryptography and “cryptographic hash,” and why do you need to know? How are those concepts used together in the real world to create cryptographic systems
  • Basic cybersecurity tech: We begin with LAN, WAN, wireless network security (WiFi), virtualization and introduction to cloud technologies and mobile device security (i.e., cell phones).
  • We follow that with a brief look at some common attacks:
  • malware and anti-malware technologies.
  • Phishing
  • DNS poisoning
  • DoS/DDoS
  • Vulnerability management

 

Day 4: Cybersecurity, Defensive/Detective Technologies –  Part 1 Our fourth section in the classroom begins our exploration of cybersecurity technologies. We end the section with an examination of:

– email security

– Secure remote access & Virtual Private Network (VPN) technologies.

– secure web access (HTTPS)

– secure file transfer

– firewalls, Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS), sniffers, content filters, etc. We end the section with a look at system security to include hardening operating systems, patching, virtual machines, cloud computing, and backup.

 

Day 5: Cybersecurity Proactive Technologies –

  • We will explore the OWASP Top 10 vulnerabilities
  • WEB App Sec
  • Shift Left
  • Browser, web security, cloud and the difficulties of securing the web environment.
  • We also explore cloud best practices such as shared responsibility model,
  • Secrets management, dependency vulnerabilities, containerization, orchestration and cloud security posture management.

 

Day 6 Agile Project Management 

Category:

100 % Virtual | Instructor-led| 8 weeks

 

Schedule

Monday 8-10pm EST

SAT 1-3pm EST

Scroll to Top
Scroll to Top