We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details >

AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers


Accelerated Cybersecurity Program

Group Training + View more dates & times


In recent years, the demand for cybersecurity professionals has soared. Increasingly, cyber employers are seeking talent from non-traditional sources to fill their workforce. At the same time, many in the workforce want to enter the cybersecurity industry but do not have the necessary skills or certifications for entry-level positions. The Certified Cybersecurity Analyst Program meets the need for cybersecurity talent by training motivated candidates and connecting them with employers in the industry.

Military Transition Eligible
Preparing to transition out of the military? This program is an approved Career Skills Program for transitioning service members to participate in in their final 180 days of service. Please reach out to admissions@umbctraining.com to learn more!

Part-time Option

Students seeking part-time training beginning at a more advanced level, and who have the necessary prerequisites, may enroll in the Certified Cybersecurity Analyst Program.

The Accelerated Cybersecurity Program is an intensive, hands-on training program designed to provide students with the technical skills and certifications required for a career in cybersecurity. Students will gain hands-on experience in offensive and defensive cybersecurity. Students who successfully complete the program will be prepared for a variety of entry-level cybersecurity roles. The program includes:

Accelerated Cybersecurity Program

CompTIA A+ (Will not include exam vouchers)

CompTIA Net+ (Exam voucher included)

CompTIA Sec+ (Exam voucher included)

Exam Prep: Net+, Sec+

Study Period I – Sec+, Net+ Hands-on, CCAP Prep

Linux for Cyber Fundamentals & Linux for Cyber System Administration (Exam voucher included)

Linux Hands-On and CCAP Prep

Defensive Cybersecurity Operations (Exam voucher included)

Study Period II – Catchup or CyberOps Cert Prep

Network & Packet Analysis

Shell Scripting (Bash and PowerShell)

Network Penetration Testing Methodology

Review and Capstone

  • Exam Vouchers will not be included for A+
  • Exam Vouchers will be included for:
    • Net+
    • Sec+
    • Linux+
    • Cyber Ops

Why You Should Take This Course

Certified Cybersecurity Analyst Program Certificate 

Graduates of the Certified Cybersecurity Analyst Program who complete the program in good academic standing and score a comprehensive grade of 80% or higher will receive the Certified Cybersecurity Analyst Program Certificate by UMBC Training Centers.

Industry Certifications

The content areas in the Certified Cybersecurity Analyst Program align with industry recognized certifications. The program will help prepare students to sit for the following exams:

College Credit Recommendation 

For students pursuing a degree, this program has been approved by the American Council on Education’s (ACE) College Credit Recommendation Service for 16 semester hours in Information Systems or Computer Science at the baccalaureate level.

Hands-on Hours 

UMBC Training Centers follows the practitioner-scholar model. Up to 50% of classroom hours are hands-on interactive labs and projects. 

CAREER Resources

While the core focus of this program is to prepare students with the technical skills and credentials required to begin a career in information technology or cybersecurity, throughout the program there are also career resources made available to students, such as:

  • Career Workshops 
  • Career Resource Days 
  • Connections with regional employers and recruiters 
  • Invitations to local career events put on by program partners 


The Certified Cybersecurity Analyst Program is designed for candidates with a variety of professional experiences, including both those with and without any technical experience. Students include those who want a foothold in a growing industry and those with IT experience who want to accelerate their career in a meaningful way. 70% of our students are employed within 6 months of graduating from the program and others continue on to advanced industry degrees. Our students come from diverse backgrounds and with a variety of professional experiences. 

This program prepares candidates for the following cybersecurity job roles, as defined by the National Initiative for Cybersecurity Education (NICE):

Student Testimonials


“In addition to the training and industry certifications, my experience in the Certified Cybersecurity Analyst Program provided me with the knowledge and practical experience to find employment in the cyber security industry. One of the most valuable aspects of the program was the availability of instructors. They were a key resource throughout the program. You could easily revisit a topic with the instructor that taught the material and review or follow up with additional questions while you continued to learn more about other things.” (2019 Student)

“The UMBC staff, which included the instructors and institutional staff, provided an environment where we could grow, make mistakes, and learn from those mistakes. The instructors would continuously instruct and educate us not only through the study material in the course, but through real time personal experience. This was vital in understanding and translating the book material from words, into real-time execution of the material. These things are priceless for entry level type student. It’s already provided me a good foundation moving forward. I built relationships/networks in the IT world, and developed skills that have already help me advance my career moving forward. The future looks really bright, and most of it has to do with the Certified Cybersecurity Analyst Program.

Now I’m Security + certified (working on several others), with a security clearance. Currently I have a good job, but it’s only the start. As I look forward, there will be challenges ahead, but their exciting ones. The UMBC Training Center Cybersecurity program has provided myself and my classmates the opportunities to succeed in today’s cybersecurity and IT world. In addition, the staff and instructors have kept the door open for each student to come back and utilize their facilities, training sessions, mentorship and more to advance our career.” – (2019 Student)

Employer Testimonials

“I could not be more pleased with having a Certified Cybersecurity Analyst Program apprentice. He came to us with enough knowledge to jump in and start helping right away. His newly learned skills coupled with his ability and willingness to learn additional systems and processes quickly significantly lowered the burden often felt when training a new teammate. He quickly integrated into the team and became the person everyone wanted to interact with for help. We hired him full time after his apprenticeship and he continues to learn, grow, and consistently add value to the team.” – (2019 Employer)

“Our experience with the UMBC Training Center has been an overall positive experience. As soon as we presented the need for a qualified candidate, the Training Center reached out to connect with us, and we were able to recruit one of our best employees. By partnering with the Training Center, we were able to not only hire qualified talent, but also minimize our time frame when directly sourcing for talent thereby reducing the associated cost with having an open position. As we continue to recruit for several roles within the company, we know we can depend upon UMBC Training Center to identify promising and qualified talent for years to come.” – (Decisions Oriented, 2019 Employer)

Course Outline

CompTIA A+ Certified IT Technician

Lesson 1: Installing Motherboards and Connectors

  • Explain cable types and connectors
  • Install and configure motherboards
  • Explain legacy cable types

Lesson 2: Installing System Devices

  • Install and configure power supplies and cooling.
  • Select and install storage devices.
  • Install and configure system memory.
  • Install and configure CPUs.

Lesson 3: Troubleshooting PC Hardware

  • Apply troubleshooting methodology.
  • Configure BIOS/UEFI.
  • Troubleshoot power and disk issues.
  • Troubleshoot system and display issues.

Lesson 4: Comparing Local Networking Hardware

  • Compare network types.
  • Compare networking hardware.
  • Explain network cable types.
  • Compare wireless networking types.

Lesson 5: Configuring Network Addressing and Internet Connections

  • Compare Internet connection types.
  • Use basic TCP/IP concepts.
  • Compare protocols and ports.
  • Compare network configuration concepts.

Lesson 7: Summarizing Virtualization and Cloud Concepts

  • Summarize client-side virtualization.
  • Summarize cloud concepts.

Lesson 8: Supporting Mobile Devices

  • Set up mobile devices and peripherals.
  • Configure mobile device apps.
  • Install and configure laptop hardware.
  • Troubleshoot mobile device issues.

Lesson 9: Supporting Print Devices

  • Deploy printer and multifunction devices.
  • Replace print device consumables.
  • Troubleshoot print device issues.

Lesson 10: Configuring Windows

  • Configure Windows user settings.
  • Configure Windows system settings.

Lesson 11: Managing Windows

  • Use management consoles.
  • Use performance and troubleshooting tools.
  • Use command-line tools.

Lesson 12: Identifying OS Types and Features

  • Explain OS types.
  • Compare Windows editions.

Lesson 13: Supporting Windows

  • Perform OS installations and upgrades.
  • Install and configure applications.
  • Troubleshoot Windows OS problems.

Lesson 14: Managing Windows Networking

  • Configure Windows networking.
  • Troubleshoot Windows networking.
  • Configure Windows security settings.
  • Manage Windows shares.

Lesson 15: Managing Linux and macOS

  • Identify features of Linux.
  • Identify features of macOS.

Lesson 16: Configuring SOHO Network Security

  • Explain attacks, threats, and vulnerabilities.
  • Compare wireless security protocols.
  • Configure SOHO router security.
  • Summarize security measures.

Lesson 17: Managing Security Settings

  • Configure workstation security.
  • Configure browser security.
  • Troubleshoot workstation security issues.

Lesson 18: Supporting Mobile Software

  • Configure mobile OS security.
  • Troubleshoot mobile OS and app software.
  • Troubleshoot mobile OS and app security.

Lesson 19: Using Support and Scripting Tools

  • Use remote access technologies.
  • Implement backup and recovery.
  • Explain data handling best practices.
  • Identify basics of scripting.

Lesson 20: Implementing Operational Procedures

  • Implement best practice documentation.
  • Use proper communication techniques.
  • Use common safety and environmental procedures.


Configuring, Managing, and Troubleshooting IT Infrastructure

CompTIA Network+ Certification

Module 1: Topologies and Infrastructure

  • Topologies and the OSI Model
  • Ethernet
  • Hubs, Bridges, and Switches
  • Infrastructure and Design

Module 2: Addressing and Routing

  • Internet Protocol
  • IPv4 Addressing
  • DHCP and APIPA
  • IPv6 Addressing
  • Routing

Module 3: Troubleshooting and Management

  • Transport Protocols
  • Name Resolution
  • Troubleshooting
  • Applications and Services
  • Management and Monitoring
  • Cloud and Virtualization

Module 4: Installation Network Sites

  • Installing Cabling
  • Installing Wireless Networks
  • WAN Technologies
  • Remote Access

Module 5: Security

  • Vulnerabilities and Threats
  • Security Appliances
  • Authentication
  • Incident Response
  • Change and Configuration Management

Information Assurance and IT Security

CompTIA Security+ Certification

Module 1: Security Fundamentals

  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

Module 2: Security Threats and Vulnerabilities

  • Social Engineering
  • Physical Threats and Vulnerabilities
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Software-Based Threats

Module 3: Network Security

  • Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols
  • Apply Network Security Administration Principles
  • Secure Wireless Traffic

Module 4: Managing Application, Data, and Host Security

  • Establish Device/Host Security
  • Application Security
  • Data Security
  • Mobile Security

Module 5: Access Control, Authentication, and Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

Module 6: Managing Certificates

  • Install a CA Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Revoke Certificates
  • Topic F: Back Up and Restore Certificates and Private Keys

Module 7: Compliance and Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training

Module 8: Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

Module 9: Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident

Module 10: Business Continuity and Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute DRPs and Procedures

Linux Operating System Essentials and Administration

CompTIA Linux+ Certification

Module 1: Performing Basic Linux Tasks

  • Identify the Linux Design Philosophy
  • Enter Shell Commands
  • Getting Help with Linux

Module 2: Managing Users and Groups

  • Assume Superuser Privileges
  • Create, Modify, and Delete Users
  • Create, Modify, and Delete Groups
  • Query Users and Groups
  • Configure Account Profiles

Module 3: Managing Permissions and Ownership

  • Modify File and Directory Permissions
  • Modify File and Directory Ownership
  • Configure Special Permissions and Attributes
  • Troubleshoot Permissions Issues

Module 4: Managing Storage

  • Create Partitions
  • Manage Logical Volumes
  • Mount and Manage File Systems
  • Navigate the Linux Directory Structure
  • Troubleshoot Storage Issues

Module 5: Managing Files and Directories

  • Create and Edit Text Files
  • Search for Files
  • Perform Operations on Files and Directories
  • Process Text Files
  • Manipulate File Output

Module 6: Managing Kernel Modules

  • Explore the Linux Kernel
  • Install and Configure Kernel Modules
  • Monitor Kernel Modules

Module 7: Managing the Linux Boot Process

  • Configure Linux Boot Components
  • Configure GRUB2

Module 8: Managing System Components

  • Configure Localization Options
  • Configure GUIs
  • Manage Services
  • Troubleshoot Process Issues
  • Troubleshoot CPU and Memory Issues

Module 9: Managing Devices

  • Identify the Types of Linux Devices
  • Configure Devices
  • Monitor Devices
  • Troubleshoot Hardware Issues

Module 10: Managing Networking

  • Identify TCP/IP Fundamentals
  • Identify Linux Server Roles
  • Connect to a Network
  • Configure DHCP and DNS Client Services
  • Configure Cloud and Virtualization Technologies
  • Troubleshoot Networking Issues

Module 11: Managing Packages and Software

  • Identify Package Managers
  • Manage RPM Packages with YUM
  • Manage Debian Packages with APT Configure Repositories
  • Acquire Software
  • Build Software from Source Code
  • Troubleshoot Software Dependency Issues

Module 12: Securing Linux Systems

  • Implement Cybersecurity Best Practices
  • Implement Identity and Access Management Methods
  • Configure SELinux or AppArmor
  • Configure Firewalls
  • Implement Logging Services
  • Back Up, Restore, and Verify Data

Module 13: Working with Bash Scripts

  • Customize the Bash Shell Environment
  • Identify Scripting and Programming Fundamentals
  • Write and Execute a Simple Bash Script
  • Incorporate Control Statements in Bash Scripts

Module 14: Automating Tasks

  • Schedule Jobs
  • Implement Version Control Using Git
  • Identify Orchestration Concepts

Module 15: Installing Linux

  • Prepare for Linux Installation
  • Perform the Installation

Network and Packet Analysis

Module 1: Refresher of Networking

  • Network Review
  • Sniffers
  • OSI Model
  • DNS Review
  • Routing and Traffic Type Review
  • Network Hardware Review

Module 2: Sniffing Basics

  • Sniffing through Hubs and Switches
  • TCPDump Basics
  • Basic TCP Analysis Labs

Module 3: Evaluating Address Resolution Protocol

  • The Ethernet Header
  • ARP Packets
  • ARP Analysis Labs

Module 4: Evaluating Internet Protocol

  • IP Version 4 Header Evaluation
  • IP Analysis Labs

Module 5: Evaluating Internet Control Message Protocol

  • ICMP Header Evaluation
  • ICMP Types and Codes
  • ICMP Analysis Labs

Module 6: Evaluating User Datagram Protocol

  • UDP Header Evaluation
  • UDP Analysis Lab

Module 7: Evaluating Transmission Control Protocol

  • TCP Header Evaluation
  • TCP Analysis Labs

Module 8: Evaluating Domain Name System

  • DNS Protocol Structure
  • DNS Header Evaluation
  • DNS Analysis Labs

Module 9: Evaluating Dynamic Host Configuration Protocol

  • DHCP Scenerios
  • DHCP Header Evaluation
  • DHCP Discover Options
  • DHCP Analysis Lab

Module 10: Advanced Filtering and Wireshark

  • Berkley Packet Filter Types
  • Integrated Analysis Labs on Filter Types
  • Wireshark Protocol Analyzer

Module 11: Exercises

  • Exercises on Packet Evaluation using TCPdump
  • Exercises on Packet Evaluation using Wireshark

Defensive Cybersecurity Operations

Cisco Certified CyberOps Associate Certification

Module 1: The Danger

  • War Stories
  • Threat Actors
  • Threat Impact
  • The Danger Summary

Module 2: Fighters in the War Against Cybercrime

  • The Modern Security Operations Center
  • Becoming a Defender
  • Fighters in the War Against Cybercrime Summary
  • Module 3: The Windows Operating System
  • Introduction
  • Windows History
  • Windows Architecture and Operations
  • Windows Configuration and Monitoring
  • Windows Security
  • The Windows Operating System Summary

Module 4: Linux Overview

  • Linux Basics
  • Working in the Linux Shell
  • Linux Servers and Clients
  • Basic Server Administration
  • The Linux File System
  • Working with the Linux GUI
  • Working on a Linux Host
  • Linux Basics Summary

Module 5: Network Protocols

  • Network Communication Process
  • Communication Protocols
  • Data Encapsulation
  • Network Protocols

Module 6: Ethernet and Internet Protocol (IP)

  • Ethernet
  • IPv4
  • IP Addressing Basics
  • Types of IPv4 Addresses
  • The Default Gateway
  • IPv6 Prefix Length
  • Ethernet and IP Protocol Summary

Module 7: Principles of Network Security

  • ICMP.
  • Ping and Traceroute Utilities
  • Connectivity Verification Summary

Module 8: Address Resolution Protocol

  • MAC and IP
  • ARP
  • ARP Issues
  • Address Resolution Protocol Summary

Module 9: The Transport Layer

  • Transport Layer Characteristics
  • Transport Layer Session Establishment
  • Transport Layer Reliability
  • The Transport Layer Summary

Module 10: Network Services

  • DHCP
  • DNS
  • NAT
  • File Transfer and Sharing Services
  • Email
  • HTTP
  • Network Services Summary

Module 11: Network Communication Devices

  • Network  Devices
  • Wireless Communications
  • Network Communication
  • Devices Summary

Module 12: Network Security Infrastructure

  • Network Topologies
  • Security Devices
  • Security Services
  • Network Security
  • Infrastructure Summary

Module 13: Attackers and Their Tools

  • Who is Attacking Our Network?
  • Threat Actor Tools
  • Attackers and Their Tools Summary

Module 14: Common Threats and Attacks

  • Malware
  • Common Network Attacks – Reconnaissance, Access, and Social Engineering
  • Network Attacks – Denial of Service, Buffer Overflows, and Evasion
  • Common Threats and Attacks Summary

Module 15: Observing Network Operation

  • Introduction to Network Monitoring
  • Introduction to Network Monitoring Tools
  • Network Monitoring and Tools Summary

Module 16: Attacking the Foundation

  • IP PDU Details
  • IP Vulnerabilities
  • TCP and UDP Vulnerabilities
  • Attacking the Foundation Summary

Module 17: Attacking What We Do

  • IP Services
  • Enterprise Services
  • Attacking What We Do Summary

Module 18: Understanding Defense

  • Defense-in-Depth
  • Security Policies, Regulations, and Standards
  • Understanding Defense Summary

Module 19: Access Control

  • Access Control Concepts
  • AAA usage and operation
  • Access Control Summary

Module 20: Threat Intelligence

  • Information Sources
  • Threat Intelligence Services
  • Threat Intelligence Summary

Module 21: Cryptography

  • Integrity and Authenticity
  • Confidentiality
  • Public Key Cryptography
  • Authorities and the PKI Trust System
  • Applications and Impacts of Cryptography
  • Cryptography Summary

Module 22: Endpoint Protection

  • Antimalware Protection
  • Host-based Intrusion
  • Prevention Application Security
  • Endpoint Protection Summary

Module 23: Endpoint Vulnerability Assessment

  • Network and Server Profiling
  • Common Vulnerability Scoring System (CVSS)
  • Secure Device Management
  • Information Security Management Systems
  • Endpoint Vulnerability Assessment Summary

Module 24: Technologies and Protocols

  • Monitoring Common Protocols
  • Security Technologies
  • Technologies and Protocols Summary

Module 25: Network Security Data

  • Types of Security Data
  • End Device Logs
  • Network Logs
  • Network Security Data Summary

Module 26: Evaluating Alerts

  • Source of Alerts
  • Overview of Alert Evaluation
  • Evaluating Alerts Summary

Module 27: Working with Network Security Data

  • A Common Data Platform
  • Investigating Network Data
  • Enhancing the Work of the Cybersecurity Analyst
  • Working with Network Security Data Summary

Module 28: Digital Forensics and Incident Analysis and Response

  • Evidence Handling and Attack Attribution
  • The Cyber Kill Chain
  • The Diamond Model of Intrusion Analysis
  • Incident Response
  • Digital Forensics and Incident Analysis and Response Summary

Shell Scripting – Bash and PowerShell

The Bash Shell

  • The Shell Basics
  • What is a Bash Script?
  • Executing Scripts

Bash Script Basics

  • Variables
  • I/O and Error Redirect
  • Bash Functions

Bash Conditionals and Control Flow

  • Comparison Operators
  • Script Conditionals
  • if, then, else, fi

Bash Looping Constructs

  • for do
  • while do
  • until do

Bash Positional Parameters

  • $1, $2, …

Windows Orientation and Background

  • Windows Command Prompt
  • Registration
  • Registry
  • Registry Commands
  • Windows Services
  • File and Directory Management
  • File Permissions

Windows PowerShell

  • Getting Help
  • Cmdlets
  • Syntax
  • Syntax Parameters
  • PowerShell Providers
  • Navigation and Item Interaction

PowerShell Objects

  • Sorting and Selecting
  • Pipelines
  • Parameter Binding
  • ByPropertyName
  • Parenthese Usage

PowerShell Filtering

  • Sorting and Selecting
  • Pipelines
  • Parameter Binding
  • ByPropertyName
  • Parenthese Usage

PowerShell Remoting

  • Authentication
  • Profiles
  • Second Hop Chaining
  • Remote to Many at Once
  • Trusted Hosts
  • Execution
  • Code Signing

PowerShell Variables

  • Properties
  • Methods
  • Conditionals and Control Flow
  • Script Conditionals
  • if, elseif, else
  • switch
  • Comprehensions as Generator Expressions

Looping Constructs

  • for
  • foreach
  • while

Penetration Testing Methodology and Malware Analysis

Module 1: Introduction to CNE Methodology

  • Tradecraft Methodology
  • Legal Framework

Module 2: Metasploit Framework

  • Overview Installation
  • Console Commands

Module 3: Vulnerability Identification

  • Footprinting
  • Scanning
  • Enumeration
  • Vulnerability Analysis and Exploit Selection

Module 4: Exploitation and Immediate Actions

  • Exploitation Privilege
  • Escalation
  • Covering Your Tracks
  • Situational Awareness Checks

Module 5: Post-Exploitation

  • Persistence
  • Implants and Listeners
  • Pilfering
  • Password Defeat

Module 6: Advanced Topics

  • Pivoting Armitage

Module 7: Malware

  • Introduction and Types of Malware
  • Advanced Persistent Threats (APT)
  • Types of Analysis
  • Creating a Malware Analysis Lab

Module 8: Malware Analysis

  • Malware Report
  • Portable Executable
  • Packed Binaries
  • Rootkits

Module 9: Malware Identification

  • Research Persistence

Program Capstone

Part One: Penetration Testing and Hacker Methodologies Module 1: Planning and Scoping

  • Types of Assessments
  • Deliverables
  • Rules of Engagement
  • Team Documentation Standards

Module 2: Information Gathering and Reconnaissance

  • Open Source Intelligence
  • Public IP Addresses
  • Internet Web Presence
  • Physical Locations
  • Personnel and Email

Module 3: Scanning

  • Host Discovery
  • Port Discovery
  • Service Enumeration
  • Vulnerability Scanning Research

Module 4: Gaining Access

  • Situational Awareness Checks
  • Privilege Escalation
  • Migration
  • Impersonation and Token Stealing

Module 5: Maintaining Access

  • Password Compromise or Defeat
  • Account Creation
  • Registry Persistence
  • Services
  • WMI Event Subscription

Module 6: Pilfering

  • Goals and Objectives
  • Proof of Your Efforts

Module 7: Covering Tracks

  • Time Stomping
  • Log Cleaning

Module 8: Analysis and Reporting

  • Mitigation Recommendations
  • Vulnerabilities Detected and Exploited
  • Sensitive Data Accessed
  • Suggestions to Counter Vulnerabilities

Part Two: Tool Review and Usage

  • Secure Shell and Secure Copy
  • Ping and Traceroute Time-to-Live
  • NMAP
  • NCat
  • Nikto
  • OpenVAS
  • Password Defeat
  • Wireshark
  • Linux Crontab
  • Metasploit Framework

Part Three: Tradecraft Considerations

  • Network Sockets
  • Process Names
  • Migration
  • Masquerading
  • Files and Directories
  • Callbacks
  • To Persist or Not

Part Four: Team Preparation

  • Documentation and Operations Notes
  • Communications Channels
  • Collaboration Workspaces
  • Shared Resources

Am I guaranteed a job after completing this program? No. While periodically throughout the program there are career resources made available to students, the core focus of this program is to provide students with the technical skills and credentials required to begin a career in information technology or cybersecurity. We continuously work to build the network of employers interested in hiring our graduates and facilitate connections to those employers, however, employment is not guaranteed and it should be expected that students will need to put in their own effort in their pursuit of new career opportunities.

Do I need a degree to get a job in cybersecurity? While many roles in cybersecurity currently do require a technical degree, employers are unable to fill the vast demand for cybersecurity talent by recruiting college graduates alone. Increasingly, employers are looking for cyber talent from non-traditional sources such as applied training programs like this.

What’s the difference between certifications and a degree? Certifications are earned by passing exams through industry organizations such as CompTIA and vendor-specific companies like Cisco. Passing these exams indicates to potential employers that you have the abilities associated with the skill set you are tested on. These certifications can be earned in a shorter period of time than to a degree program. Degree programs focus more on the theoretical aspect of cybersecurity, with less skills-based application of how to perform various operational and analytical tasks.

How much do cybersecurity professionals make? Cybersecurity professionals are paid salaries commensurate with their education and experience – salary ranges for entry level positions can start at $40,000 up to $70,000, while after several years of experience this figure is closer to $80,000, increasing from that point with additional experience and expertise. For more information on the pay-scale for various roles in cybersecurity, please refer to https://www.cyberseek.org

Do I need a clearance? You do not need a clearance to obtain a job in cybersecurity. Cybersecurity professionals work across all industries, with many not requiring clearances. However, if you do have a clearance, it can help open up more opportunities with government and contract positions.

What are the requirements for admission? There are two different pathways for students to be accepted into the Certified Cybersecurity Analyst Program. Applicants are either evaluated on previous educational and professional experience or on the results of a technical assessment administered to those without an IT background. We provide resources for test prep are provided, and the assessment is focused on computational logic and problem solving rather than specific IT knowledge. Additionally, an interview may be required for some applicants based on the criteria above.

How much does the program cost? What funding options are available? The total cost of the program is $10,995 for the part-time option without entry-level training, and $15,995 for our full-time, most comprehensive version of this course. There are multiple financing options available, including SallieMae Smart Option Student Loansin-house payment plans, and state grants awarded to qualified candidates. We are also approved to accept VA funding for retired and transitioning service members.

What is included in the program? In addition to training, the cost of this program covers exam vouchers for all industry certification exams, 1-year audit privileges for this course, and all course materials.

Contact Us