AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Course Overviews

UMBC Training Centers’ Cybersecurity Academy offerings were designed to meet the Department of Defense’s training standards. Whether you are new to the field, already working in IT or cybersecurity, or are looking to prepare your workforce for the cyber mission, UMBC Training Centers has world-class cybersecurity training to meet your needs. View upcoming cybersecurity Courses

Certificate Programs

  • Certificate in Cyber Foundations

    This program provides candidates with the skills, knowledge and credentials required to successfully begin a career in the field of Information Technology. This program was designed by UMBC Training Centers in collaboration with senior executives and technical staff from the Department of Defense, leading Government Contractors, and Fortune 500 companies. Click for more information

  • Certificate in Cybersecurity

    There is a severe shortage of information technology professionals with the credentials and capabilities needed to meet the nation’s many cybersecurity challenges. This shortage is expected to persist for years, representing a tremendous career opportunity for IT professionals who possess the aptitude and the passion to succeed in the field of cybersecurity. Click for more information

  • Certificate in Cyber Operations

    The Certificate in Cyber Operations prepares students for a career in cybersecurity analysis, network defense, vulnerability assessment or penetration testing. It builds upon the knowledge and skills gained in our Certificate in Cybersecurity. Click for more information

  • Certified Cyber Analyst/Operator

    In recent years, the demand for cybersecurity professionals has soared.  Interest in cyber defenses has grown in every economic sector, from retail to healthcare.  Government organizations such as the Central Intelligence Agency (CIA) and the International Information Systems Security Certification Consortium (ISC)2 have reported that the market growth potential for cybersecurity will continue to rise in a country that is experiencing a “security talent crunch,” generating both a gap in technical skills and tremendous opportunity for those with the right skillset. Click for more information

Industry and DoD 8570/8140 Certifications

  • CompTIA A+

    If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA A+ Certification course is the first step in your preparation. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. A+ Certification Prep is the first course in the Certificate in Computer & Network Technology program. Click for more information

  • CompTIA Network+

    CompTIA Network+ is a vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. CompTIA Network+ certified individuals are in-demand worldwide. With a CompTIA Network+ certification, you will possess the key skills to troubleshoot, configure and manage these systems and keep your company productive. Click for more information

  • CompTIA Security+

    CompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic and your organization as a whole including the physical security elements and operational security measures. It is also the main course you will take to prepare for the CompTIA Security+ Certification examination. Click for more information

  • CompTIA PenTest+

    PenTest+ is unique because it requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. The course provides the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Click for more information

  • CompTIA Cybersecurity Analyst (CySA+)

    CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats. Click for more information

  • CompTIA Advanced Security Practitioner (CASP)

    CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments. Click for more information

  • Cisco Certified Network Associate (CCNA)

    The widely respected Cisco Career Certifications bring valuable, measurable rewards to network professionals, their managers, and the organizations that employ them. Cisco Certified Network Associate (CCNA) is one of the most valued certifications in the IT industry. Anyone seeking to pursue or advance their career as a network technician, network administrator, or information security specialist will benefit from the range of theoretical and practical skills covered by the CCNA certification course of study. Click for more information

  • CCNA Security

    Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. Click for more information

  • Red Hat System Administration II with Exam (RH135)

    Red Hat System Administration II (RH135) focuses on the key tasks needed to become a full time Linux administrator. This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator exam (EX200), which is included in this version of the course. Click for more information

  • EC-Council Certified Ethical Hacker (CEH)

    The most effective cybersecurity professionals are able to predict attacks before they happen.  Training in Ethical Hacking provides professionals with the expertise and insight necessary to prepare for and react to malicious intrusion. Click for more information

  • Certified Information Systems Security Professional (CISSP)

    Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. Certification can enhance a professional’s career and provide added credibility. CISSP is an approved certification for certain job classifications identified within DoD Directive 8570. Click for more information

  • Certified Network Defender (CND)

    Organizational focus on cyber defense is more important than ever as cyber breaches now have a far greater financial impact and can cause broad reputational damage.  Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore, organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Click for more information

  • Computer Hacking Forensic Investigator (CHFI)

    Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Click for more information

  • Certified Cloud Security Professional (CCSP)

    In the ever-changing world of the cloud, you face unique security challenges every day — from new threats to sensitive data, to uneducated internal teams. Take command with the CCSP: the premier cloud security certification. Click for more information

Specialized Cyber Training

  • Logical Reasoning, Critical Thinking and Structured Analytic Techniques

    The overall objective of this class is to enable students to critically think about their analysis and what they are tasked to analyze.  A secondary objective is to provide students with a set of analytic tools to be used in future analytic scenarios.  At the end of the course, students will be equipped with a “toolbox” of analytic methodologies and skills and have honed their critical thinking skills. Click for more information

  • Network & Packet Analysis

    This course teaches the student the fundamental concepts, methodologies, and tools necessary to analyze network traffic for the purposes of intrusion and threat detection, network defense, and low profile offensive operations. Click for more information

  • Windows Internals and Command Line

    Windows Internals and Command Line prepares students to use the Windows Operating System using the Command Line Interface (CLI).  By emphasizing the CLI, the course prepares students to automate tasks through scripting or using a remote administration tool without a Graphical User Interface (GUI). Click for more information

  • Penetration Testing Methodology

    Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world attacker’s thoughts and actions, all for the purpose of helping to improve the security posture of the organizations they support. Click for more information

  • Metasploit Framework

    The Metasploit Framework course was developed to provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This course provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and shows them how to install it, maneuver within it and maintain it. Click for more information

  • Malware Triage

    Malware Triage was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat it may pose within a system or network. The course includes significant amounts of hands-on practical application of skills learned. Click for more information

  • Wireless Analysis & Exploitation (WAX)

    Wireless Analysis & Exploitation (WAX) is an intensive course that provides a comprehensive view into the methods and mindset used by hackers to compromise wireless networks. Wireless can be complex and effective learning requires mastery of a new set of acronyms and how these technologies fit into the big picture. Click for more information

  • Certified Wireless Network Administrator (CWNA)

    This Enterprise Wireless LAN Administration course, whether in an academic format or a 5-day fast-track format, provides the networking professional a complete foundation of knowledge for entering into or advancing in the wireless networking industry. From basic RF theory to 802.11 frame exchange processes, this course delivers hands-on training that will benefit the novice as well as the experienced network professional. Click for more information

Programs for Organizations

  • Certificate in Cyber Development

    UMBC Training Centers created the Certificate in Cyber Development to address the tremendous need for skilled computer programmers and software developers in the Cyber workforce. The Certificate in Cyber Development is available to organizations who need to prepare their employees for roles as computer programmers and software engineers within government and industry. Click for more information

  • Cybersecurity Fundamentals

    The three-day cybersecurity fundamentals course will provide students with an overview of current networking, information assurance (IA), and cybersecurity theory and application.  The course will consist of lectures and hands-on labs for a multi-faceted learning experience.  This course will provide a good initial foundation for participants wanting to ultimately pursue industry certification like Security + and/or Certified Ethical Hacker (CEH). Click for more information

  • Cyber Insider Threat

    Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis. However, cyber technology creates unique vulnerabilities for both private and public sector users. Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. Cybersecurity seeks to meet this challenge by developing technical measures to detect and deter adversary activity. Click for more information

  • Operational Cybersecurity

    Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis.  However, cyber technology creates unique vulnerabilities for both private and public sector users.  Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. Click for more information

  • Secure Programming Best Practices

    The primary objective of this course is to teach professional computer programmers about the common methods used by hackers to exploit vulnerabilities in computer programs, and how to program defensively to avoid introducing such vulnerabilities into their own programs. Click for more information

  • Software Engineering and Secure Coding

    This course is an introduction to the basic concepts of software engineering including the software lifecycle. Emphasis is placed on the requirements – design – implementation phases of the lifecycle.  Students will use various software development tools and exposed to software development methodologies including waterfall and agile. Best practices in software design and implementation with a view toward recognizing and avoiding weakness and vulnerabilities in software is a key part of this course. Click for more information

Contact Us