NEW IN 2019!Cyber Security Risk Analyst
Make the jump to a new career with our Cybersecurity Risk Analyst career pathway. Industry experts created a curriculum that will take you from novice to subject matter expert. Pay nothing until you land a job. Classes start August 5, 2019!
What is a CyberSecurity Analyst
A Cybersecurity Analyst designs and implements security systems to protect a company or organization’s computer networks from cyber attacks, and help set and maintain security standards. An analyst works in a company to install security measures. They also operate software to protect systems and information infrastructure, including firewalls and data encryption programs. An analyst continuously evaluates communication security, data vulnerability, business continuity and compliance risk to ensure an organization is compliant to national and international standards. Pay for roles in metropolitan Washington, D.C. starts at $70,061.
Our part-time 6 month program is catered to students to have career and familial obligations. This schedule gives you time to learn at a steady pace without the time or financial constraints.
We’ve partnered with job placement specialists so you can land the right role for you.
$0 Upfront Costs
Our income share agreement with Leif ensures that you can complete our program with no financial stress. Only pay once you’ve landed a job making a minimum of $50,000. You’ll pay off $11,000 over the course of 24-36 months.
With over 380 training hours, we consulted with hiring managers to develop a curriculum that will take you from novice to subject matter expert.
Our instructors will cover computng foundations with students. Students will learn about computing hardware and peripheral components, operating systems and security best practices
- Assemble and disassemble basic computing hardware and peripheral components.
- Configure and troubleshoot basic hardware components and Operating System features.
- Detect and protect against cyber threats to the desktop computing environment.
Networks are more than just using your local wi-fi. Students will learn what a network is and it’s global impact, how to create a network and how to mitigate network threats.
- Set up and troubleshoot a small network and wireless network.
- Install computers in a virtual environment.
- Build your own cables for various uses and applications.
- Configure NAT and firewalls.
- Configure DNS.
Not only will students learn cybersecurity terminologies, instructrs will cover how to monitor and asses cybersecurity risks within an IT infrastructure and more.
- Secure wireless routers from unauthorized access.
- Encrypt computers and removable storage devices.
- Perform penetration testing with Kali linux and zen map.
Students will understand the foundations of an organization-wide Information Security Risk Management Program and learn how to prepare appropriate assessments and plans.
- Scan network and cloud infrastructures with Tenable Nessus.
- Prepare SCA, SAR and POAM.
- Use internet and local port scanners.
- Scan for malware and rootkit using a basic and advanced tool.
Computing Support Concepts
As a Helpdesk Specialist, students need to know how to configure, install, and troubleshoot hardware, operating systems, and firmware.
- Assemble and disassemble basic computing hardware and peripheral components
- Build your own computer for various use cases
- Setup a basic wired and wireless network
- Research, purchase, download, install, troubleshoot, upgrade and uninstall Operating systems application
Network Support Concepts
Networks are more than just using your local wi-fi. Students will learn what a network is and its global impact, how to create a network, and how to mitigate network threats.
- Set up and troubleshoot a small network and wireless network
- Install computers in a virtual environment
- Understand network cabling by building your own cables for applications
- Setup remote desktop connectivity to provide and receive support from a remove source/location
- Build a network for a small business from scratch
Technology Security Concepts
Not only will students learn cybersecurity terminologies, instructors will cover how to monitor and assess cybersecurity risks within an IT infrastructure.
- Perform network monitoring using Spiceworks, PRTG and Solarwinds
- Image computers using Clone-zilla and other PC imaging tools
- Secure wireless Routers from unauthorized access
- Encrypt computers and removable storage devices