Accelerated Cybersecurity Program

In recent years, the demand for cybersecurity professionals has soared. Increasingly, cyber employers are seeking talent from non-traditional sources to fill their workforce. At the same time, many in the workforce want to enter the cybersecurity industry but do not have the necessary skills or certifications for entry-level positions. The Certified Cybersecurity Analyst Program meets the need for cybersecurity talent by training motivated candidates and connecting them with employers in the industry.
Military Transition Eligible
Preparing to transition out of the military? This program is an approved Career Skills Program for transitioning service members to participate in in their final 180 days of service. Please reach out to admissions@umbctraining.com to learn more!
Part-time Option
Students seeking part-time training beginning at a more advanced level, and who have the necessary prerequisites, may enroll in the Certified Cybersecurity Analyst Program.
The Accelerated Cybersecurity Program is an intensive, hands-on training program designed to provide students with the technical skills and certifications required for a career in cybersecurity. Students will gain hands-on experience in offensive and defensive cybersecurity. Students who successfully complete the program will be prepared for a variety of entry-level cybersecurity roles. The program includes:
Accelerated Cybersecurity Program
CompTIA A+ (Will not include exam vouchers)
CompTIA Net+ (Exam voucher included)
CompTIA Sec+ (Exam voucher included)
Exam Prep: Net+, Sec+
Study Period I – Sec+, Net+ Hands-on, CCAP Prep
Linux for Cyber Fundamentals & Linux for Cyber System Administration (Exam voucher included)
Linux Hands-On and CCAP Prep
Defensive Cybersecurity Operations (Exam voucher included)
Study Period II – Catchup or CyberOps Cert Prep
Shell Scripting (Bash and PowerShell)
Network Penetration Testing Methodology
Review and Capstone
- Exam Vouchers will not be included for A+
- Exam Vouchers will be included for:
- Net+
- Sec+
- Linux+
- Cyber Ops
Certified Cybersecurity Analyst Program Certificate
Graduates of the Certified Cybersecurity Analyst Program who complete the program in good academic standing and score a comprehensive grade of 80% or higher will receive the Certified Cybersecurity Analyst Program Certificate by UMBC Training Centers.
Industry Certifications
The content areas in the Certified Cybersecurity Analyst Program align with industry recognized certifications. The program will help prepare students to sit for the following exams:
- CompTIA A+ Certified IT Technician
- CompTIA Network+
- CompTIA Security+
- CompTIA Linux+
- Cisco CCNA Cyber Ops Certification Exams
College Credit Recommendation
For students pursuing a degree, this program has been approved by the American Council on Education’s (ACE) College Credit Recommendation Service for 16 semester hours in Information Systems or Computer Science at the baccalaureate level.
Hands-on Hours
UMBC Training Centers follows the practitioner-scholar model. Up to 50% of classroom hours are hands-on interactive labs and projects.
CAREER Resources
While the core focus of this program is to prepare students with the technical skills and credentials required to begin a career in information technology or cybersecurity, throughout the program there are also career resources made available to students, such as:
- Career Workshops
- Career Resource Days
- Connections with regional employers and recruiters
- Invitations to local career events put on by program partners
Experience
The Certified Cybersecurity Analyst Program is designed for candidates with a variety of professional experiences, including both those with and without any technical experience. Students include those who want a foothold in a growing industry and those with IT experience who want to accelerate their career in a meaningful way. 70% of our students are employed within 6 months of graduating from the program and others continue on to advanced industry degrees. Our students come from diverse backgrounds and with a variety of professional experiences.
This program prepares candidates for the following cybersecurity job roles, as defined by the National Initiative for Cybersecurity Education (NICE):
- Incident Analyst/Responder
- Cybersecurity Specialist/Technician
- Cybersecurity Analyst
- Penetration & Vulnerability Tester
Student Testimonials
“In addition to the training and industry certifications, my experience in the Certified Cybersecurity Analyst Program provided me with the knowledge and practical experience to find employment in the cyber security industry. One of the most valuable aspects of the program was the availability of instructors. They were a key resource throughout the program. You could easily revisit a topic with the instructor that taught the material and review or follow up with additional questions while you continued to learn more about other things.” – (2019 Student)
“The UMBC staff, which included the instructors and institutional staff, provided an environment where we could grow, make mistakes, and learn from those mistakes. The instructors would continuously instruct and educate us not only through the study material in the course, but through real time personal experience. This was vital in understanding and translating the book material from words, into real-time execution of the material. These things are priceless for entry level type student. It’s already provided me a good foundation moving forward. I built relationships/networks in the IT world, and developed skills that have already help me advance my career moving forward. The future looks really bright, and most of it has to do with the Certified Cybersecurity Analyst Program.
Now I’m Security + certified (working on several others), with a security clearance. Currently I have a good job, but it’s only the start. As I look forward, there will be challenges ahead, but their exciting ones. The UMBC Training Center Cybersecurity program has provided myself and my classmates the opportunities to succeed in today’s cybersecurity and IT world. In addition, the staff and instructors have kept the door open for each student to come back and utilize their facilities, training sessions, mentorship and more to advance our career.” – (2019 Student)
Employer Testimonials
“I could not be more pleased with having a Certified Cybersecurity Analyst Program apprentice. He came to us with enough knowledge to jump in and start helping right away. His newly learned skills coupled with his ability and willingness to learn additional systems and processes quickly significantly lowered the burden often felt when training a new teammate. He quickly integrated into the team and became the person everyone wanted to interact with for help. We hired him full time after his apprenticeship and he continues to learn, grow, and consistently add value to the team.” – (2019 Employer)
“Our experience with the UMBC Training Center has been an overall positive experience. As soon as we presented the need for a qualified candidate, the Training Center reached out to connect with us, and we were able to recruit one of our best employees. By partnering with the Training Center, we were able to not only hire qualified talent, but also minimize our time frame when directly sourcing for talent thereby reducing the associated cost with having an open position. As we continue to recruit for several roles within the company, we know we can depend upon UMBC Training Center to identify promising and qualified talent for years to come.” – (Decisions Oriented, 2019 Employer)
CompTIA A+ Certified IT Technician
Lesson 1: Installing Motherboards and Connectors
- Explain cable types and connectors
- Install and configure motherboards
- Explain legacy cable types
Lesson 2: Installing System Devices
- Install and configure power supplies and cooling.
- Select and install storage devices.
- Install and configure system memory.
- Install and configure CPUs.
Lesson 3: Troubleshooting PC Hardware
- Apply troubleshooting methodology.
- Configure BIOS/UEFI.
- Troubleshoot power and disk issues.
- Troubleshoot system and display issues.
Lesson 4: Comparing Local Networking Hardware
- Compare network types.
- Compare networking hardware.
- Explain network cable types.
- Compare wireless networking types.
Lesson 5: Configuring Network Addressing and Internet Connections
- Compare Internet connection types.
- Use basic TCP/IP concepts.
- Compare protocols and ports.
- Compare network configuration concepts.
Lesson 7: Summarizing Virtualization and Cloud Concepts
- Summarize client-side virtualization.
- Summarize cloud concepts.
Lesson 8: Supporting Mobile Devices
- Set up mobile devices and peripherals.
- Configure mobile device apps.
- Install and configure laptop hardware.
- Troubleshoot mobile device issues.
Lesson 9: Supporting Print Devices
- Deploy printer and multifunction devices.
- Replace print device consumables.
- Troubleshoot print device issues.
Lesson 10: Configuring Windows
- Configure Windows user settings.
- Configure Windows system settings.
Lesson 11: Managing Windows
- Use management consoles.
- Use performance and troubleshooting tools.
- Use command-line tools.
Lesson 12: Identifying OS Types and Features
- Explain OS types.
- Compare Windows editions.
Lesson 13: Supporting Windows
- Perform OS installations and upgrades.
- Install and configure applications.
- Troubleshoot Windows OS problems.
Lesson 14: Managing Windows Networking
- Configure Windows networking.
- Troubleshoot Windows networking.
- Configure Windows security settings.
- Manage Windows shares.
Lesson 15: Managing Linux and macOS
- Identify features of Linux.
- Identify features of macOS.
Lesson 16: Configuring SOHO Network Security
- Explain attacks, threats, and vulnerabilities.
- Compare wireless security protocols.
- Configure SOHO router security.
- Summarize security measures.
Lesson 17: Managing Security Settings
- Configure workstation security.
- Configure browser security.
- Troubleshoot workstation security issues.
Lesson 18: Supporting Mobile Software
- Configure mobile OS security.
- Troubleshoot mobile OS and app software.
- Troubleshoot mobile OS and app security.
Lesson 19: Using Support and Scripting Tools
- Use remote access technologies.
- Implement backup and recovery.
- Explain data handling best practices.
- Identify basics of scripting.
Lesson 20: Implementing Operational Procedures
- Implement best practice documentation.
- Use proper communication techniques.
- Use common safety and environmental procedures.
Configuring, Managing, and Troubleshooting IT Infrastructure
CompTIA Network+ Certification
Module 1: Topologies and Infrastructure
- Topologies and the OSI Model
- Ethernet
- Hubs, Bridges, and Switches
- Infrastructure and Design
Module 2: Addressing and Routing
- Internet Protocol
- IPv4 Addressing
- DHCP and APIPA
- IPv6 Addressing
- Routing
Module 3: Troubleshooting and Management
- Transport Protocols
- Name Resolution
- Troubleshooting
- Applications and Services
- Management and Monitoring
- Cloud and Virtualization
Module 4: Installation Network Sites
- Installing Cabling
- Installing Wireless Networks
- WAN Technologies
- Remote Access
Module 5: Security
- Vulnerabilities and Threats
- Security Appliances
- Authentication
- Incident Response
- Change and Configuration Management
Information Assurance and IT Security
CompTIA Security+ Certification
Module 1: Security Fundamentals
- The Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
Module 2: Security Threats and Vulnerabilities
- Social Engineering
- Physical Threats and Vulnerabilities
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Software-Based Threats
Module 3: Network Security
- Network Devices and Technologies
- Network Design Elements and Components
- Implement Networking Protocols
- Apply Network Security Administration Principles
- Secure Wireless Traffic
Module 4: Managing Application, Data, and Host Security
- Establish Device/Host Security
- Application Security
- Data Security
- Mobile Security
Module 5: Access Control, Authentication, and Account Management
- Access Control and Authentication Services
- Implement Account Management Security Controls
Module 6: Managing Certificates
- Install a CA Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Revoke Certificates
- Topic F: Back Up and Restore Certificates and Private Keys
Module 7: Compliance and Operational Security
- Physical Security
- Legal Compliance
- Security Awareness and Training
Module 8: Risk Management
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
Module 9: Managing Security Incidents
- Respond to Security Incidents
- Recover from a Security Incident
Module 10: Business Continuity and Disaster Recovery Planning
- Business Continuity
- Plan for Disaster Recovery
- Execute DRPs and Procedures
Linux Operating System Essentials and Administration
CompTIA Linux+ Certification
Module 1: Performing Basic Linux Tasks
- Identify the Linux Design Philosophy
- Enter Shell Commands
- Getting Help with Linux
Module 2: Managing Users and Groups
- Assume Superuser Privileges
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
Module 3: Managing Permissions and Ownership
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
Module 4: Managing Storage
- Create Partitions
- Manage Logical Volumes
- Mount and Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
Module 5: Managing Files and Directories
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
Module 6: Managing Kernel Modules
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- Configure Linux Boot Components
- Configure GRUB2
Module 8: Managing System Components
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
Module 9: Managing Devices
- Identify the Types of Linux Devices
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
Module 10: Managing Networking
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- Implement Cybersecurity Best Practices
- Implement Identity and Access Management Methods
- Configure SELinux or AppArmor
- Configure Firewalls
- Implement Logging Services
- Back Up, Restore, and Verify Data
Module 13: Working with Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
Module 15: Installing Linux
- Prepare for Linux Installation
- Perform the Installation
Network and Packet Analysis
Module 1: Refresher of Networking
- Network Review
- Sniffers
- OSI Model
- DNS Review
- Routing and Traffic Type Review
- Network Hardware Review
Module 2: Sniffing Basics
- Sniffing through Hubs and Switches
- TCPDump Basics
- Basic TCP Analysis Labs
Module 3: Evaluating Address Resolution Protocol
- The Ethernet Header
- ARP Packets
- ARP Analysis Labs
Module 4: Evaluating Internet Protocol
- IP Version 4 Header Evaluation
- IP Analysis Labs
Module 5: Evaluating Internet Control Message Protocol
- ICMP Header Evaluation
- ICMP Types and Codes
- ICMP Analysis Labs
Module 6: Evaluating User Datagram Protocol
- UDP Header Evaluation
- UDP Analysis Lab
Module 7: Evaluating Transmission Control Protocol
- TCP Header Evaluation
- TCP Analysis Labs
Module 8: Evaluating Domain Name System
- DNS Protocol Structure
- DNS Header Evaluation
- DNS Analysis Labs
Module 9: Evaluating Dynamic Host Configuration Protocol
- DHCP Scenerios
- DHCP Header Evaluation
- DHCP Discover Options
- DHCP Analysis Lab
Module 10: Advanced Filtering and Wireshark
- Berkley Packet Filter Types
- Integrated Analysis Labs on Filter Types
- Wireshark Protocol Analyzer
Module 11: Exercises
- Exercises on Packet Evaluation using TCPdump
- Exercises on Packet Evaluation using Wireshark
Defensive Cybersecurity Operations
Cisco Certified CyberOps Associate Certification
Module 1: The Danger
- War Stories
- Threat Actors
- Threat Impact
- The Danger Summary
Module 2: Fighters in the War Against Cybercrime
- The Modern Security Operations Center
- Becoming a Defender
- Fighters in the War Against Cybercrime Summary
- Module 3: The Windows Operating System
- Introduction
- Windows History
- Windows Architecture and Operations
- Windows Configuration and Monitoring
- Windows Security
- The Windows Operating System Summary
Module 4: Linux Overview
- Linux Basics
- Working in the Linux Shell
- Linux Servers and Clients
- Basic Server Administration
- The Linux File System
- Working with the Linux GUI
- Working on a Linux Host
- Linux Basics Summary
Module 5: Network Protocols
- Network Communication Process
- Communication Protocols
- Data Encapsulation
- Network Protocols
Module 6: Ethernet and Internet Protocol (IP)
- Ethernet
- IPv4
- IP Addressing Basics
- Types of IPv4 Addresses
- The Default Gateway
- IPv6 Prefix Length
- Ethernet and IP Protocol Summary
Module 7: Principles of Network Security
- ICMP.
- Ping and Traceroute Utilities
- Connectivity Verification Summary
Module 8: Address Resolution Protocol
- MAC and IP
- ARP
- ARP Issues
- Address Resolution Protocol Summary
Module 9: The Transport Layer
- Transport Layer Characteristics
- Transport Layer Session Establishment
- Transport Layer Reliability
- The Transport Layer Summary
Module 10: Network Services
- DHCP
- DNS
- NAT
- File Transfer and Sharing Services
- HTTP
- Network Services Summary
Module 11: Network Communication Devices
- Network Devices
- Wireless Communications
- Network Communication
- Devices Summary
Module 12: Network Security Infrastructure
- Network Topologies
- Security Devices
- Security Services
- Network Security
- Infrastructure Summary
Module 13: Attackers and Their Tools
- Who is Attacking Our Network?
- Threat Actor Tools
- Attackers and Their Tools Summary
Module 14: Common Threats and Attacks
- Malware
- Common Network Attacks – Reconnaissance, Access, and Social Engineering
- Network Attacks – Denial of Service, Buffer Overflows, and Evasion
- Common Threats and Attacks Summary
Module 15: Observing Network Operation
- Introduction to Network Monitoring
- Introduction to Network Monitoring Tools
- Network Monitoring and Tools Summary
Module 16: Attacking the Foundation
- IP PDU Details
- IP Vulnerabilities
- TCP and UDP Vulnerabilities
- Attacking the Foundation Summary
Module 17: Attacking What We Do
- IP Services
- Enterprise Services
- Attacking What We Do Summary
Module 18: Understanding Defense
- Defense-in-Depth
- Security Policies, Regulations, and Standards
- Understanding Defense Summary
Module 19: Access Control
- Access Control Concepts
- AAA usage and operation
- Access Control Summary
Module 20: Threat Intelligence
- Information Sources
- Threat Intelligence Services
- Threat Intelligence Summary
Module 21: Cryptography
- Integrity and Authenticity
- Confidentiality
- Public Key Cryptography
- Authorities and the PKI Trust System
- Applications and Impacts of Cryptography
- Cryptography Summary
Module 22: Endpoint Protection
- Antimalware Protection
- Host-based Intrusion
- Prevention Application Security
- Endpoint Protection Summary
Module 23: Endpoint Vulnerability Assessment
- Network and Server Profiling
- Common Vulnerability Scoring System (CVSS)
- Secure Device Management
- Information Security Management Systems
- Endpoint Vulnerability Assessment Summary
Module 24: Technologies and Protocols
- Monitoring Common Protocols
- Security Technologies
- Technologies and Protocols Summary
Module 25: Network Security Data
- Types of Security Data
- End Device Logs
- Network Logs
- Network Security Data Summary
Module 26: Evaluating Alerts
- Source of Alerts
- Overview of Alert Evaluation
- Evaluating Alerts Summary
Module 27: Working with Network Security Data
- A Common Data Platform
- Investigating Network Data
- Enhancing the Work of the Cybersecurity Analyst
- Working with Network Security Data Summary
Module 28: Digital Forensics and Incident Analysis and Response
- Evidence Handling and Attack Attribution
- The Cyber Kill Chain
- The Diamond Model of Intrusion Analysis
- Incident Response
- Digital Forensics and Incident Analysis and Response Summary
Shell Scripting – Bash and PowerShell
The Bash Shell
- The Shell Basics
- What is a Bash Script?
- Executing Scripts
Bash Script Basics
- Variables
- I/O and Error Redirect
- Bash Functions
Bash Conditionals and Control Flow
- Comparison Operators
- Script Conditionals
- if, then, else, fi
Bash Looping Constructs
- for do
- while do
- until do
Bash Positional Parameters
- $1, $2, …
Windows Orientation and Background
- Windows Command Prompt
- Registration
- Registry
- Registry Commands
- Windows Services
- File and Directory Management
- File Permissions
Windows PowerShell
- Getting Help
- Cmdlets
- Syntax
- Syntax Parameters
- PowerShell Providers
- Navigation and Item Interaction
PowerShell Objects
- Sorting and Selecting
- Pipelines
- Parameter Binding
- ByPropertyName
- Parenthese Usage
PowerShell Filtering
- Sorting and Selecting
- Pipelines
- Parameter Binding
- ByPropertyName
- Parenthese Usage
PowerShell Remoting
- Authentication
- Profiles
- Second Hop Chaining
- Remote to Many at Once
- Trusted Hosts
- Execution
- Code Signing
PowerShell Variables
- Properties
- Methods
- Conditionals and Control Flow
- Script Conditionals
- if, elseif, else
- switch
- Comprehensions as Generator Expressions
Looping Constructs
- for
- foreach
- while
Penetration Testing Methodology and Malware Analysis
Module 1: Introduction to CNE Methodology
- Tradecraft Methodology
- Legal Framework
Module 2: Metasploit Framework
- Overview Installation
- Console Commands
Module 3: Vulnerability Identification
- Footprinting
- Scanning
- Enumeration
- Vulnerability Analysis and Exploit Selection
Module 4: Exploitation and Immediate Actions
- Exploitation Privilege
- Escalation
- Covering Your Tracks
- Situational Awareness Checks
Module 5: Post-Exploitation
- Persistence
- Implants and Listeners
- Pilfering
- Password Defeat
Module 6: Advanced Topics
- Pivoting Armitage
Module 7: Malware
- Introduction and Types of Malware
- Advanced Persistent Threats (APT)
- Types of Analysis
- Creating a Malware Analysis Lab
Module 8: Malware Analysis
- Malware Report
- Portable Executable
- Packed Binaries
- Rootkits
Module 9: Malware Identification
- Research Persistence
Program Capstone
Part One: Penetration Testing and Hacker Methodologies Module 1: Planning and Scoping
- Types of Assessments
- Deliverables
- Rules of Engagement
- Team Documentation Standards
Module 2: Information Gathering and Reconnaissance
- Open Source Intelligence
- Public IP Addresses
- Internet Web Presence
- Physical Locations
- Personnel and Email
Module 3: Scanning
- Host Discovery
- Port Discovery
- Service Enumeration
- Vulnerability Scanning Research
Module 4: Gaining Access
- Situational Awareness Checks
- Privilege Escalation
- Migration
- Impersonation and Token Stealing
Module 5: Maintaining Access
- Password Compromise or Defeat
- Account Creation
- Registry Persistence
- Services
- WMI Event Subscription
Module 6: Pilfering
- Goals and Objectives
- Proof of Your Efforts
Module 7: Covering Tracks
- Time Stomping
- Log Cleaning
Module 8: Analysis and Reporting
- Mitigation Recommendations
- Vulnerabilities Detected and Exploited
- Sensitive Data Accessed
- Suggestions to Counter Vulnerabilities
Part Two: Tool Review and Usage
- Secure Shell and Secure Copy
- Ping and Traceroute Time-to-Live
- NMAP
- NCat
- Nikto
- OpenVAS
- Password Defeat
- Wireshark
- Linux Crontab
- Metasploit Framework
Part Three: Tradecraft Considerations
- Network Sockets
- Process Names
- Migration
- Masquerading
- Files and Directories
- Callbacks
- To Persist or Not
Part Four: Team Preparation
- Documentation and Operations Notes
- Communications Channels
- Collaboration Workspaces
- Shared Resources
Am I guaranteed a job after completing this program? No. While periodically throughout the program there are career resources made available to students, the core focus of this program is to provide students with the technical skills and credentials required to begin a career in information technology or cybersecurity. We continuously work to build the network of employers interested in hiring our graduates and facilitate connections to those employers, however, employment is not guaranteed and it should be expected that students will need to put in their own effort in their pursuit of new career opportunities.
Do I need a degree to get a job in cybersecurity? While many roles in cybersecurity currently do require a technical degree, employers are unable to fill the vast demand for cybersecurity talent by recruiting college graduates alone. Increasingly, employers are looking for cyber talent from non-traditional sources such as applied training programs like this.
What’s the difference between certifications and a degree? Certifications are earned by passing exams through industry organizations such as CompTIA and vendor-specific companies like Cisco. Passing these exams indicates to potential employers that you have the abilities associated with the skill set you are tested on. These certifications can be earned in a shorter period of time than to a degree program. Degree programs focus more on the theoretical aspect of cybersecurity, with less skills-based application of how to perform various operational and analytical tasks.
How much do cybersecurity professionals make? Cybersecurity professionals are paid salaries commensurate with their education and experience – salary ranges for entry level positions can start at $40,000 up to $70,000, while after several years of experience this figure is closer to $80,000, increasing from that point with additional experience and expertise. For more information on the pay-scale for various roles in cybersecurity, please refer to https://www.cyberseek.org
Do I need a clearance? You do not need a clearance to obtain a job in cybersecurity. Cybersecurity professionals work across all industries, with many not requiring clearances. However, if you do have a clearance, it can help open up more opportunities with government and contract positions.
What are the requirements for admission? There are two different pathways for students to be accepted into the Certified Cybersecurity Analyst Program. Applicants are either evaluated on previous educational and professional experience or on the results of a technical assessment administered to those without an IT background. We provide resources for test prep are provided, and the assessment is focused on computational logic and problem solving rather than specific IT knowledge. Additionally, an interview may be required for some applicants based on the criteria above.
How much does the program cost? What funding options are available? The total cost of the program is $10,995 for the part-time option without entry-level training, and $15,995 for our full-time, most comprehensive version of this course. There are multiple financing options available, including SallieMae Smart Option Student Loans, in-house payment plans, and state grants awarded to qualified candidates. We are also approved to accept VA funding for retired and transitioning service members.
What is included in the program? In addition to training, the cost of this program covers exam vouchers for all industry certification exams, 1-year audit privileges for this course, and all course materials.