We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details >

AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers


Accelerated Cybersecurity Program

Group Training + View more dates & times
  • Overview

    In recent years, the demand for cybersecurity professionals has soared. Forbes magazine reports that there may be as many as 3.5 million unfilled positions in the industry by 2021. Increasingly, cyber employers are seeking talent from non-traditional sources to fill their workforce. At the same time, many in the workforce want to enter the cybersecurity industry but do not have the necessary skills or certifications for entry-level positions. The Certified Cybersecurity Analyst Program meets the need for cybersecurity talent by training motivated candidates and connecting them with employers in the industry.

    Military Transition Eligible
    Preparing to transition out of the military? This program is an approved Career Skills Program for transitioning service members to participate in in their final 180 days of service. Please reach out to admissions@umbctraining.com to learn more!

    Part-time Option

    Students seeking part-time training beginning at a more advanced level, and who have the necessary prerequisites, may enroll in the Certified Cybersecurity Analyst Program.

    The Accelerated Cybersecurity Program is an intensive, hands-on training program designed to provide students with the technical skills and certifications required for a career in cybersecurity. Students will gain hands-on experience in offensive and defensive cybersecurity. Students who successfully complete the program will be prepared for a variety of entry-level cybersecurity roles. The program includes:

    Accelerated Cybersecurity Program

    CompTIA IT Fundamentals+ – (ITF+)

    CompTIA Network+ – Configuring, Managing, and Troubleshooting IT Infrastructure

    CompTIA Security+ – Information Assurance and IT Security

    Linux Operating System Essentials and Administration 

    Network and Packet Analysis

    Defensive Cybersecurity Operations 

    Introduction to System Automation and Programming 

    Network Penetration Testing Methodology

    Fundamentals of Windows: PowerShell


  • Why You Should Take This Course

    Certified Cybersecurity Analyst Program Certificate 

    Graduates of the Certified Cybersecurity Analyst Program who complete the program in good academic standing and score a comprehensive grade of 80% or higher will receive the Certified Cybersecurity Analyst Program Certificate by UMBC Training Centers.

    Industry Certifications

    The content areas in the Certified Cybersecurity Analyst Program align with industry recognized certifications. The program will help prepare students to sit for the following exams:

    College Credit Recommendation 

    For students pursuing a degree, this program has been approved by the American Council on Education’s (ACE) College Credit Recommendation Service for 15 semester hours in Information Systems or Computer Science at the baccalaureate level.

    Hands-on Hours 

    UMBC Training Centers follows the practitioner-scholar model. Up to 50% of classroom hours are hands-on interactive labs and projects. 

    CAREER Resources

    While the core focus of this program is to prepare students with the technical skills and credentials required to begin a career in information technology or cybersecurity, throughout the program there are also career resources made available to students, such as:

    • Career Workshops 
    • Career Resource Days 
    • Connections with regional employers and recruiters 
    • Invitations to local career events put on by program partners 


    The Certified Cybersecurity Analyst Program is designed for candidates with a variety of professional experiences, including both those with and without any technical experience. Students include those who want a foothold in a growing industry and those with IT experience who want to accelerate their career in a meaningful way. 70% of our students are employed within 6 months of graduating from the program and others continue on to advanced industry degrees. Our students come from diverse backgrounds and with a variety of professional experiences. 

    This program prepares candidates for the following cybersecurity job roles, as defined by the National Initiative for Cybersecurity Education (NICE):

    Student Testimonials


    “In addition to the training and industry certifications, my experience in the Certified Cybersecurity Analyst Program provided me with the knowledge and practical experience to find employment in the cyber security industry. One of the most valuable aspects of the program was the availability of instructors. They were a key resource throughout the program. You could easily revisit a topic with the instructor that taught the material and review or follow up with additional questions while you continued to learn more about other things.” (2019 Student)

    “The UMBC staff, which included the instructors and institutional staff, provided an environment where we could grow, make mistakes, and learn from those mistakes. The instructors would continuously instruct and educate us not only through the study material in the course, but through real time personal experience. This was vital in understanding and translating the book material from words, into real-time execution of the material. These things are priceless for entry level type student. It’s already provided me a good foundation moving forward. I built relationships/networks in the IT world, and developed skills that have already help me advance my career moving forward. The future looks really bright, and most of it has to do with the Certified Cybersecurity Analyst Program.

    Now I’m Security + certified (working on several others), with a security clearance. Currently I have a good job, but it’s only the start. As I look forward, there will be challenges ahead, but their exciting ones. The UMBC Training Center Cybersecurity program has provided myself and my classmates the opportunities to succeed in today’s cybersecurity and IT world. In addition, the staff and instructors have kept the door open for each student to come back and utilize their facilities, training sessions, mentorship and more to advance our career.” – (2019 Student)

    Employer Testimonials

    “I could not be more pleased with having a Certified Cybersecurity Analyst Program apprentice. He came to us with enough knowledge to jump in and start helping right away. His newly learned skills coupled with his ability and willingness to learn additional systems and processes quickly significantly lowered the burden often felt when training a new teammate. He quickly integrated into the team and became the person everyone wanted to interact with for help. We hired him full time after his apprenticeship and he continues to learn, grow, and consistently add value to the team.” – (2019 Employer)

    “Our experience with the UMBC Training Center has been an overall positive experience. As soon as we presented the need for a qualified candidate, the Training Center reached out to connect with us, and we were able to recruit one of our best employees. By partnering with the Training Center, we were able to not only hire qualified talent, but also minimize our time frame when directly sourcing for talent thereby reducing the associated cost with having an open position. As we continue to recruit for several roles within the company, we know we can depend upon UMBC Training Center to identify promising and qualified talent for years to come.” – (Decisions Oriented, 2019 Employer)

  • Schedule
  • Course Outline

    IT Fundamentals

    CompTIA IT Fundamentals+ Certification

    Module 1: Using Computers

    • Common Computing Devices
    • Using a Workstation
    • Using an Operating System
    • Managing an Operating System
    • Troubleshooting and Support

    Module 2: Using Applications and Databases

    • Data Types and Units Using Applications
    • Programming and Application
    • Development Using Databases

    Module 3: Using Computer Hardware

    • System Components Using Device Interfaces
    • Using Peripheral Devices
    • Using Storage Devices
    • Using Filesystems

    Module 4: Using Networks

    • Networking Concepts
    • Connecting to a Network
    • Secure Web Browsing
    • Using Shared Storage
    • Using Mobile Devices

    Module 5: Security Concepts

    • Security Concerns
    • Using Best Practices
    • Using Access Controls
    • Behavioral Security Concepts


    Configuring, Managing, and Troubleshooting IT Infrastructure

    CompTIA Network+ Certification

    Module 1: Topologies and Infrastructure

    • Topologies and the OSI Model
    • Ethernet
    • Hubs, Bridges, and Switches
    • Infrastructure and Design

    Module 2: Addressing and Routing

    • Internet Protocol
    • IPv4 Addressing
    • DHCP and APIPA
    • IPv6 Addressing
    • Routing

    Module 3: Troubleshooting and Management

    • Transport Protocols
    • Name Resolution
    • Troubleshooting
    • Applications and Services
    • Management and Monitoring
    • Cloud and Virtualization

    Module 4: Installation Network Sites

    • Installing Cabling
    • Installing Wireless Networks
    • WAN Technologies
    • Remote Access

    Module 5: Security

    • Vulnerabilities and Threats
    • Security Appliances
    • Authentication
    • Incident Response
    • Change and Configuration Management

    Information Assurance and IT Security

    CompTIA Security+ Certification

    Module 1: Security Fundamentals

    • The Information Security Cycle
    • Information Security Controls
    • Authentication Methods
    • Cryptography Fundamentals
    • Security Policy Fundamentals

    Module 2: Security Threats and Vulnerabilities

    • Social Engineering
    • Physical Threats and Vulnerabilities
    • Network-Based Threats
    • Wireless Threats and Vulnerabilities
    • Software-Based Threats

    Module 3: Network Security

    • Network Devices and Technologies
    • Network Design Elements and Components
    • Implement Networking Protocols
    • Apply Network Security Administration Principles
    • Secure Wireless Traffic

    Module 4: Managing Application, Data, and Host Security

    • Establish Device/Host Security
    • Application Security
    • Data Security
    • Mobile Security

    Module 5: Access Control, Authentication, and Account Management

    • Access Control and Authentication Services
    • Implement Account Management Security Controls

    Module 6: Managing Certificates

    • Install a CA Hierarchy
    • Enroll Certificates
    • Secure Network Traffic by Using Certificates
    • Renew Certificates
    • Revoke Certificates
    • Topic F: Back Up and Restore Certificates and Private Keys

    Module 7: Compliance and Operational Security

    • Physical Security
    • Legal Compliance
    • Security Awareness and Training

    Module 8: Risk Management

    • Risk Analysis
    • Implement Vulnerability Assessment Tools and Techniques
    • Scan for Vulnerabilities
    • Mitigation and Deterrent Techniques

    Module 9: Managing Security Incidents

    • Respond to Security Incidents
    • Recover from a Security Incident

    Module 10: Business Continuity and Disaster Recovery Planning

    • Business Continuity
    • Plan for Disaster Recovery
    • Execute DRPs and Procedures

    Linux Operating System Essentials and Administration

    CompTIA Linux+ Certification

    Module 1: Performing Basic Linux Tasks

    • Identify the Linux Design Philosophy
    • Enter Shell Commands
    • Getting Help with Linux

    Module 2: Managing Users and Groups

    • Assume Superuser Privileges
    • Create, Modify, and Delete Users
    • Create, Modify, and Delete Groups
    • Query Users and Groups
    • Configure Account Profiles

    Module 3: Managing Permissions and Ownership

    • Modify File and Directory Permissions
    • Modify File and Directory Ownership
    • Configure Special Permissions and Attributes
    • Troubleshoot Permissions Issues

    Module 4: Managing Storage

    • Create Partitions
    • Manage Logical Volumes
    • Mount and Manage File Systems
    • Navigate the Linux Directory Structure
    • Troubleshoot Storage Issues

    Module 5: Managing Files and Directories

    • Create and Edit Text Files
    • Search for Files
    • Perform Operations on Files and Directories
    • Process Text Files
    • Manipulate File Output

    Module 6: Managing Kernel Modules

    • Explore the Linux Kernel
    • Install and Configure Kernel Modules
    • Monitor Kernel Modules

    Module 7: Managing the Linux Boot Process

    • Configure Linux Boot Components
    • Configure GRUB2

    Module 8: Managing System Components

    • Configure Localization Options
    • Configure GUIs
    • Manage Services
    • Troubleshoot Process Issues
    • Troubleshoot CPU and Memory Issues

    Module 9: Managing Devices

    • Identify the Types of Linux Devices
    • Configure Devices
    • Monitor Devices
    • Troubleshoot Hardware Issues

    Module 10: Managing Networking

    • Identify TCP/IP Fundamentals
    • Identify Linux Server Roles
    • Connect to a Network
    • Configure DHCP and DNS Client Services
    • Configure Cloud and Virtualization Technologies
    • Troubleshoot Networking Issues

    Module 11: Managing Packages and Software

    • Identify Package Managers
    • Manage RPM Packages with YUM
    • Manage Debian Packages with APT Configure Repositories
    • Acquire Software
    • Build Software from Source Code
    • Troubleshoot Software Dependency Issues

    Module 12: Securing Linux Systems

    • Implement Cybersecurity Best Practices
    • Implement Identity and Access Management Methods
    • Configure SELinux or AppArmor
    • Configure Firewalls
    • Implement Logging Services
    • Back Up, Restore, and Verify Data

    Module 13: Working with Bash Scripts

    • Customize the Bash Shell Environment
    • Identify Scripting and Programming Fundamentals
    • Write and Execute a Simple Bash Script
    • Incorporate Control Statements in Bash Scripts

    Module 14: Automating Tasks

    • Schedule Jobs
    • Implement Version Control Using Git
    • Identify Orchestration Concepts

    Module 15: Installing Linux

    • Prepare for Linux Installation
    • Perform the Installation

    Network and Packet Analysis

    Module 1: Refresher of Networking

    • Network Review
    • Sniffers
    • OSI Model
    • DNS Review
    • Routing and Traffic Type Review
    • Network Hardware Review

    Module 2: Sniffing Basics

    • Sniffing through Hubs and Switches
    • TCPDump Basics
    • Basic TCP Analysis Labs

    Module 3: Evaluating Address Resolution Protocol

    • The Ethernet Header
    • ARP Packets
    • ARP Analysis Labs

    Module 4: Evaluating Internet Protocol

    • IP Version 4 Header Evaluation
    • IP Analysis Labs

    Module 5: Evaluating Internet Control Message Protocol

    • ICMP Header Evaluation
    • ICMP Types and Codes
    • ICMP Analysis Labs

    Module 6: Evaluating User Datagram Protocol

    • UDP Header Evaluation
    • UDP Analysis Lab

    Module 7: Evaluating Transmission Control Protocol

    • TCP Header Evaluation
    • TCP Analysis Labs

    Module 8: Evaluating Domain Name System

    • DNS Protocol Structure
    • DNS Header Evaluation
    • DNS Analysis Labs

    Module 9: Evaluating Dynamic Host Configuration Protocol

    • DHCP Scenerios
    • DHCP Header Evaluation
    • DHCP Discover Options
    • DHCP Analysis Lab

    Module 10: Advanced Filtering and Wireshark

    • Berkley Packet Filter Types
    • Integrated Analysis Labs on Filter Types
    • Wireshark Protocol Analyzer

    Module 11: Exercises

    • Exercises on Packet Evaluation using TCPdump
    • Exercises on Packet Evaluation using Wireshark

    Defensive Cybersecurity Operations

    Cisco Certified CyberOps Associate Certification

    Module 1: The Danger

    • War Stories
    • Threat Actors
    • Threat Impact
    • The Danger Summary

    Module 2: Fighters in the War Against Cybercrime

    • The Modern Security Operations Center
    • Becoming a Defender
    • Fighters in the War Against Cybercrime Summary
    • Module 3: The Windows Operating System
    • Introduction
    • Windows History
    • Windows Architecture and Operations
    • Windows Configuration and Monitoring
    • Windows Security
    • The Windows Operating System Summary

    Module 4: Linux Overview

    • Linux Basics
    • Working in the Linux Shell
    • Linux Servers and Clients
    • Basic Server Administration
    • The Linux File System
    • Working with the Linux GUI
    • Working on a Linux Host
    • Linux Basics Summary

    Module 5: Network Protocols

    • Network Communication Process
    • Communication Protocols
    • Data Encapsulation
    • Network Protocols

    Module 6: Ethernet and Internet Protocol (IP)

    • Ethernet
    • IPv4
    • IP Addressing Basics
    • Types of IPv4 Addresses
    • The Default Gateway
    • IPv6 Prefix Length
    • Ethernet and IP Protocol Summary

    Module 7: Principles of Network Security

    • ICMP.
    • Ping and Traceroute Utilities
    • Connectivity Verification Summary

    Module 8: Address Resolution Protocol

    • MAC and IP
    • ARP
    • ARP Issues
    • Address Resolution Protocol Summary

    Module 9: The Transport Layer

    • Transport Layer Characteristics
    • Transport Layer Session Establishment
    • Transport Layer Reliability
    • The Transport Layer Summary

    Module 10: Network Services

    • DHCP
    • DNS
    • NAT
    • File Transfer and Sharing Services
    • Email
    • HTTP
    • Network Services Summary

    Module 11: Network Communication Devices

    • Network  Devices
    • Wireless Communications
    • Network Communication
    • Devices Summary

    Module 12: Network Security Infrastructure

    • Network Topologies
    • Security Devices
    • Security Services
    • Network Security
    • Infrastructure Summary

    Module 13: Attackers and Their Tools

    • Who is Attacking Our Network?
    • Threat Actor Tools
    • Attackers and Their Tools Summary

    Module 14: Common Threats and Attacks

    • Malware
    • Common Network Attacks – Reconnaissance, Access, and Social Engineering
    • Network Attacks – Denial of Service, Buffer Overflows, and Evasion
    • Common Threats and Attacks Summary

    Module 15: Observing Network Operation

    • Introduction to Network Monitoring
    • Introduction to Network Monitoring Tools
    • Network Monitoring and Tools Summary

    Module 16: Attacking the Foundation

    • IP PDU Details
    • IP Vulnerabilities
    • TCP and UDP Vulnerabilities
    • Attacking the Foundation Summary

    Module 17: Attacking What We Do

    • IP Services
    • Enterprise Services
    • Attacking What We Do Summary

    Module 18: Understanding Defense

    • Defense-in-Depth
    • Security Policies, Regulations, and Standards
    • Understanding Defense Summary

    Module 19: Access Control

    • Access Control Concepts
    • AAA usage and operation
    • Access Control Summary

    Module 20: Threat Intelligence

    • Information Sources
    • Threat Intelligence Services
    • Threat Intelligence Summary

    Module 21: Cryptography

    • Integrity and Authenticity
    • Confidentiality
    • Public Key Cryptography
    • Authorities and the PKI Trust System
    • Applications and Impacts of Cryptography
    • Cryptography Summary

    Module 22: Endpoint Protection

    • Antimalware Protection
    • Host-based Intrusion
    • Prevention Application Security
    • Endpoint Protection Summary

    Module 23: Endpoint Vulnerability Assessment

    • Network and Server Profiling
    • Common Vulnerability Scoring System (CVSS)
    • Secure Device Management
    • Information Security Management Systems
    • Endpoint Vulnerability Assessment Summary

    Module 24: Technologies and Protocols

    • Monitoring Common Protocols
    • Security Technologies
    • Technologies and Protocols Summary

    Module 25: Network Security Data

    • Types of Security Data
    • End Device Logs
    • Network Logs
    • Network Security Data Summary

    Module 26: Evaluating Alerts

    • Source of Alerts
    • Overview of Alert Evaluation
    • Evaluating Alerts Summary

    Module 27: Working with Network Security Data

    • A Common Data Platform
    • Investigating Network Data
    • Enhancing the Work of the Cybersecurity Analyst
    • Working with Network Security Data Summary

    Module 28: Digital Forensics and Incident Analysis and Response

    • Evidence Handling and Attack Attribution
    • The Cyber Kill Chain
    • The Diamond Model of Intrusion Analysis
    • Incident Response
    • Digital Forensics and Incident Analysis and Response Summary

    Introduction to Scripting with Python

    Module 1: An Overview of Python

    • Python Versions
    • Installing Python
    • Executing Python from the Command Line
    • Executing Python from an Interactive Python
    • Shell IDLE
    • Additional Editors and IDEs
    • Python Documentation
    • Getting Help
    • Python Keywords
    • Naming Conventions
    • Dynamic Types

    Module 2: Basic Python Syntax

    • Basic Syntax
    • Comments
    • Numbers
    • Strings
    • String Methods
    • Formatting Strings
    • Sequence Operations
    • Indexing and Slicing
    • Conversion Functions
    • Simple Output
    • Simple Input

    Module 3: Language Components

    • Indenting Requirements
    • The if Statement
    • Relational and Logical Operators
    • Bitwise Operators
    • The While Loop
    • Break and Continue
    • The For Loop

    Module 4: Collections

    • Lists
    • Tuples
    • Sets
    • Dictionaries
    • Sorting Collections

    Module 5: Functions

    • Defining Your Own Functions
    • Parameters and Arguments
    • Function Documentation
    • Named and Optional Parameters
    • Passing Collections to a Function
    • Scope
    • Functions – “First Class Citizens”

    Module 6: Modules

    • What is a Module
    • Modules
    • The dir Function
    • The sys Module
    • Numeric and Mathematical Modules

    Module 7: Input and Output

    • Creating Your Own Data Streams
    • Writing to a Text File
    • Reading From a Text File

    Module 8: Network Programming

    • Networking Fundamentals
    • The Client/Server Model
    • The socket Module
    • A Client Program
    • A Server Program
    • An Echo Client and Server
    • A Threaded Server

    Penetration Testing Methodology and Malware Analysis

    Module 1: Introduction to CNE Methodology

    • Tradecraft Methodology
    • Legal Framework

    Module 2: Metasploit Framework

    • Overview Installation
    • Console Commands

    Module 3: Vulnerability Identification

    • Footprinting
    • Scanning
    • Enumeration
    • Vulnerability Analysis and Exploit Selection

    Module 4: Exploitation and Immediate Actions

    • Exploitation Privilege
    • Escalation
    • Covering Your Tracks
    • Situational Awareness Checks

    Module 5: Post-Exploitation

    • Persistence
    • Implants and Listeners
    • Pilfering
    • Password Defeat

    Module 6: Advanced Topics

    • Pivoting Armitage

    Module 7: Malware

    • Introduction and Types of Malware
    • Advanced Persistent Threats (APT)
    • Types of Analysis
    • Creating a Malware Analysis Lab

    Module 8: Malware Analysis

    • Malware Report
    • Portable Executable
    • Packed Binaries
    • Rootkits

    Module 9: Malware Identification

    • Research Persistence

    Fundamentals of Windows: Powershell

    Module 1: Intro to PowerShell

    • Design Goals
    • Starting PowerShell
    • PowerShell Concepts
    • PowerShell Components

    Module 2: Getting Started with PowerShell

    • PowerShell Naming Conventions
    • Cmdlets and Parameters
    • Conventional cmd.exe
    • Commands and Aliases
    • Getting Help and Information

    Module 3: PowerShell Basics for End Users

    • PowerShell Environment and Variables
    • Pipelines
    • Working with Objects
    • Working with Input and Output
    • PowerShell Scripting

    Module 4: Running PowerShell Remotely

    • Interactive Sessions
    • Remote Command
    • Execution Running Scripts
    • Persistent Connections
    • PowerShell over SSH

    Module 5: PowerShell for Administrators

    • Managing Computers
    • Managing Processes and Services
    • Managing Drives and Files
    • Working with the Registry Managing Users
    • PowerShell Modules

    Program Capstone

    Part One: Penetration Testing and Hacker Methodologies Module 1: Planning and Scoping

    • Types of Assessments
    • Deliverables
    • Rules of Engagement
    • Team Documentation Standards

    Module 2: Information Gathering and Reconnaissance

    • Open Source Intelligence
    • Public IP Addresses
    • Internet Web Presence
    • Physical Locations
    • Personnel and Email

    Module 3: Scanning

    • Host Discovery
    • Port Discovery
    • Service Enumeration
    • Vulnerability Scanning Research

    Module 4: Gaining Access

    • Situational Awareness Checks
    • Privilege Escalation
    • Migration
    • Impersonation and Token Stealing

    Module 5: Maintaining Access

    • Password Compromise or Defeat
    • Account Creation
    • Registry Persistence
    • Services
    • WMI Event Subscription

    Module 6: Pilfering

    • Goals and Objectives
    • Proof of Your Efforts

    Module 7: Covering Tracks

    • Time Stomping
    • Log Cleaning

    Module 8: Analysis and Reporting

    • Mitigation Recommendations
    • Vulnerabilities Detected and Exploited
    • Sensitive Data Accessed
    • Suggestions to Counter Vulnerabilities

    Part Two: Tool Review and Usage

    • Secure Shell and Secure Copy
    • Ping and Traceroute Time-to-Live
    • NMAP
    • NCat
    • Nikto
    • OpenVAS
    • Password Defeat
    • Wireshark
    • Linux Crontab
    • Metasploit Framework

    Part Three: Tradecraft Considerations

    • Network Sockets
    • Process Names
    • Migration
    • Masquerading
    • Files and Directories
    • Callbacks
    • To Persist or Not

    Part Four: Team Preparation

    • Documentation and Operations Notes
    • Communications Channels
    • Collaboration Workspaces
    • Shared Resources
  • FAQs

    Am I guaranteed a job after completing this program? No. While periodically throughout the program there are career resources made available to students, the core focus of this program is to provide students with the technical skills and credentials required to begin a career in information technology or cybersecurity. We continuously work to build the network of employers interested in hiring our graduates and facilitate connections to those employers, however, employment is not guaranteed and it should be expected that students will need to put in their own effort in their pursuit of new career opportunities.

    Do I need a degree to get a job in cybersecurity? While many roles in cybersecurity currently do require a technical degree, employers are unable to fill the vast demand for cybersecurity talent by recruiting college graduates alone. Increasingly, employers are looking for cyber talent from non-traditional sources such as applied training programs like this.

    What’s the difference between certifications and a degree? Certifications are earned by passing exams through industry organizations such as CompTIA and vendor-specific companies like Cisco. Passing these exams indicates to potential employers that you have the abilities associated with the skill set you are tested on. These certifications can be earned in a shorter period of time than to a degree program. Degree programs focus more on the theoretical aspect of cybersecurity, with less skills-based application of how to perform various operational and analytical tasks.

    How much do cybersecurity professionals make? Cybersecurity professionals are paid salaries commensurate with their education and experience – salary ranges for entry level positions can start at $40,000 up to $70,000, while after several years of experience this figure is closer to $80,000, increasing from that point with additional experience and expertise. For more information on the pay-scale for various roles in cybersecurity, please refer to https://www.cyberseek.org

    Do I need a clearance? You do not need a clearance to obtain a job in cybersecurity. Cybersecurity professionals work across all industries, with many not requiring clearances. However, if you do have a clearance, it can help open up more opportunities with government and contract positions.

    What are the requirements for admission? There are two different pathways for students to be accepted into the Certified Cybersecurity Analyst Program. Applicants are either evaluated on previous educational and professional experience or on the results of a technical assessment administered to those without an IT background. We provide resources for test prep are provided, and the assessment is focused on computational logic and problem solving rather than specific IT knowledge. Additionally, an interview may be required for some applicants based on the criteria above.

    How much does the program cost? What funding options are available? The total cost of the program is $10,995 for the part-time option without entry-level training, and $15,995 for our full-time, most comprehensive version of this course. There are multiple financing options available, including SallieMae Smart Option Student Loansin-house payment plans, and state grants awarded to qualified candidates. We are also approved to accept VA funding for retired and transitioning service members.

    What is included in the program? In addition to training, the cost of this program covers exam vouchers for all industry certification exams, 1-year audit privileges for this course, and all course materials.

Contact Us