CEH

Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks via virtual labs. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Python 1000

This hands-on course shows how to rapidly develop and maintain effective Python programs; including a practical approach to creating and organizing Python programs using functions, packages, modules, and classes as part of Python’s object- oriented paradigm.

CySA+

CompTIA Cybersecurity Analyst (CySA+) applies behavioral analytics to networks and devices to prevent, detect, and combat cybersecurity threats. CompTIA CySA+ meets the ISO 17024 standard and is approved by the DoD to fulfill Directive 8750.01-M requirements.

Red Hat RHSA124 (virtual)

Red Hat System Administration I relates to Red Hat® Enterprise Linux® 8 and is designed for IT professionals without previous Linux administration experience. The course focuses on providing students with Linux administration “survival skills” by focusing on core administration tasks.

Security+

CompTIA Security+ provides foundational principles and broad-based knowledge necessary to implement and monitor security on networks, applications, and operating systems, and respond to security breaches. Security+ covers topics including foundational principles for securing a network, managing risk, access control, identity management, and cryptography.

Red Hat RHSA134 (virtual)

Red Hat System Administration I relates to Red Hat® Enterprise Linux® 8 and is designed for IT professionals without previous Linux administration experience. The course focuses on providing students with Linux administration “survival skills” by focusing on core administration tasks.

CCNA

The Implementing and Administering Cisco Solutions (CCNA) training gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lectures, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.

Pentest+

This course verifies the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

VMware-Vsphere: Install, Configure, Manage 8.0 (virtual)

VMware vSphere: ICM explores installation, configuration, and management of VMware vSphere®, which consists of VMware ESXiTM and VMware® vCenter ServerTM. This course is based on versions of ESXi 6.7 and vCenter Server 6.7. Completion of this course satisfies the prerequisite for taking the VMware® Certified Professional 6.7 exam (VCP-DCV).

CISSP

This course will teach and apply concepts of confidentiality, integrity, and availability of security governance principles. An understanding of legal and regulatory issues that pertain to information security in a global context will be obtained. Threat recognition and management will be covered along with development and implementation of documented security policy, standards, procedures, and guidelines.

CySA+

CompTIA Cybersecurity Analyst (CySA+) applies behavioral analytics to networks and devices to prevent, detect, and combat cybersecurity threats. CompTIA CySA+ meets the ISO 17024 standard and is approved by the DoD to fulfill Directive 8750.01-M requirements.

Still have questions on why you should join the Cyber Ops Training Academy? Check out our FAQ for more info.

Resources

Cybersecurity career forcast
Reskilling vs. Upskilling