Training Courses
CCNA: IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (COA-14235) – 5 DAY
Overview
The Implementing and Administering Cisco Solutions (CCNA) training gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lectures, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.
Prerequisites
It is recommended to have the following skills and knowledge before attending this course: basic computer literacy, basic PC operating system navigation skills, basic Internet usage skills, and basic IP address knowledge.
Certification
This course prepares students to sit for the Cisco 200-301 exam.
COMPTIA A+ CERTIFICATION (COA-14305) – 5 DAY
Overview
This course provides students with the fundamental knowledge on basic personal computer hardware and is a starting point for a career in IT. CompTIA A+ is the foundation for further study in security, networking, and programming.
Prerequisites
End-user skills with Windows®- based personal computers.
Certification
This course prepares students to sit for the CompTIA A+ 220-1001 (Core 1) and 220-1002 (Core 2) exams.
COMPTIA NETWORK+ CERTIFICATION (COA-14325) – 5 DAY
Overview
Network+ builds on existing user-level knowledge with personal computer operating systems and networks to present fundamental skills and concepts that you will use on the job in any type of networking career. This course includes topics such as network technologies, installation and configuration, media and topologies, management and security.
Prerequisites
Basic Windows skills and a fundamental understanding of computer concepts are required.
Certification
This course prepares students to sit for the CompTIA Network+ N10-008 exam.
COMPTIA SECURITY+ CERTIFICATION (COA-14345) – 5 DAY
CompTIA Security+ Exam #601 Will Be Retiring on July 31st 2024
Overview
CompTIA Security+ provides foundational principles and broad-based knowledge necessary to implement and monitor security on networks, applications, and operating systems, and respond to security breaches. Security+ covers topics including foundational principles for securing a network, managing risk, access control, identity management, and cryptography.
Prerequisites
CompTIA Network+ or equivalent knowledge. Two years of experience in IT administration with a security focus is a plus.
Certification
This course prepares students to sit for the CompTIA Security+ SYO-601 exam.
COMPTIA PENTEST+ (COA-14350) – 5 DAY
Overview
This course verifies the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.
Prerequisites
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
Certification
This course prepares students to sit for the CompTIA PenTest+ PTO-002 exam.
COMPTIA CYSA+ (COA-14360) – 5 DAY
Overview
CompTIA Cybersecurity Analyst (CySA+) applies behavioral analytics to networks and devices to prevent, detect, and combat cybersecurity threats. CompTIA CySA+ meets the ISO 17024 standard and is approved by the DoD to fulfill Directive 8750.01-M requirements.
Prerequisites
Network+, Security+, or equivalent knowledge. A minimum of 3-4 years of hands-on information security or related experience. CompTIA CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
Certification
This course prepares students to sit for the CompTIA CySA+ CS0-003 exam.
COMPTIA CASP+ (COA-14355) – 5 DAY
Overview
CompTIA Advanced Security Practitioner (CASP) is intended to expose IT professionals to advanced security concepts, principles, and implementations that pertain to enterprise- level security. Upon completion of the course students will gain the knowledge and skills necessary to conceptualize, design, and engineer secure solutions across advanced enterprise environments.
Prerequisites
CompTIA intends the CASP+ certification to serve as an add-on to the CompTIA® Security+® certification, or equivalent technical experience. A minimum of ten years of experience in IT administration, including at least five years of hands-on technical security experience is recommended.
Certification
This course prepares students to sit for the CompTIA CASP+ CAS-004 exam.
CERTIFIED ETHICAL HACKER – CEH (COA-14505) – 5 DAY
Overview
Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks via
virtual labs. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also
learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Prerequisites
Prior to attending this course, you will be asked to sign an agreement stating that you will not use newly acquired skills for illegal or
malicious intent.
Certification
This course prepares students to sit for the EC-Council CEH 312-50 v10 exam.
CERTIFIED HACKING FORENSICS INVESTIGATOR – C|HFI (COA-18004) – 5 DAY
Overview
C|HFI covers the detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for
identification of intruder’s footprints and gathering necessary evidence for its prosecution. C|HFI is now recognized as a baseline
certification for Cybersecurity Service Provider Infrastructure Support (CSSP-IS) and Cybersecurity Service Provider Auditor (CSSPA) under DoD 8140.
Prerequisites
IT/Forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response. Prior completion of
CEH training would be an advantage
Certification
This course prepares students to sit for the EC-Council EC0 312-49 exam.
CERTIFIED CHIEF INFORMATION SECURITY OFFICER – C|CISO (COA-18005) – 5 DAY5
Overview
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. C|CISO is now recognized as a baseline certification for DoD IAM Level II, IAM Level III, and CSSP Manager, all specialized cyber management personnel classifications within the DoD’s information assurance workforce under DoD 8140.
Prerequisites
To sit for the exam after taking training, candidates must have 5 years of experience in 3 of the 5 CCISO Domains verified through EC- Council’s Exam Eligibility Application.
Certification
This course prepares students to sit for the EC-Council C|CISO exam.
CERTIFIED GOVERNANCE, RISK, AND COMPLIANCE – CGRC (COA-14503) – 5 DAY
Overview
Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification. The CGRC
is a proven way to demonstrate your knowledge and skills to integrate governance, performance management, risk management and
regulatory compliance within your organization.
CGRC professionals utilize frameworks to integrate security and privacy within organizational objectives, better enabling stakeholders
to make informed decisions regarding data security, compliance, supply chain risk management and more.
Prerequisites
The CGRC is ideal for IT, information security and information assurance practitioners who work in Governance, Risk and
Compliance (GRC) roles and have a need to understand, apply and/or implement a risk management program for IT systems within an
organization. To qualify for CGRC you must have a minimum of two years of cumulative paid work experience in one or more of the
seven domains of the CGRC Common Body of Knowledge (CBK).
Certification
This course prepares students to sit for the ISC
2CGRC exam.
CISSP CERTIFICATION PREPARATION (COA-14510) – 8 DAY
Overview
This course will teach and apply concepts of confidentiality, integrity, and availability of security governance principles. An
understanding of legal and regulatory issues that pertain to information security in a global context will be obtained. Threat
recognition and management will be covered along with development and implementation of documented security policy, standards,
procedures, and guidelines.
Prerequisites
Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP
CBK.
Certification
This course prepares students to sit for the ISC
2CISSP exam.
CERTIFIED INFORMATION SYSTEMS AUDITOR – CISA (COA-14525) – 5 DAY
Overview
In this course, students will perform evaluations of organizational policies, procedures, and processes to ensure that an organization’s information systems align with overall business goals and objectives. CISA certification demonstrates audit experience and capability to assess vulnerabilities, report on compliance and institute controls within the enterprise.
Prerequisites
Experience in the following areas: IS Audit Process, IT Governance, Systems and Infrastructure Lifecycle Management, IT Service Delivery and Support, Protection of Information Assets, and/or Business Continuity and Disaster Recovery.
Certification
This course prepares students to sit for the ISACA® CISA exam.
CERTIFIED INFORMATION SECURITY MANAGER – CISM (COA-14524) – 5 DAY
Overview
This course is focused to train students on the knowledge and skills to design, build and manage enterprise information security programs. CISM certification opens the door for recognition of the individual who manages, designs, and supervises/assesses an organization’s information security.
Prerequisites
Experience in the following areas: Information Security Governance, Information Risk Management, Information Security Program Development, Information Security Program Management, and/or Incident Management and Response.
Certification
This course prepares students to sit for the ISACA® CISM exam.
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL – CRISC (COA-14535) – 3 DAY
Overview
This course covers the four domains of the CRISC exam (IT Risk Identification, IT Risk Assessment, Risk Response and Mitigation, & Risk and Control Monitoring and Reporting) and is designed to help students gain the knowledge and skills required to obtain the CRISC certification. CRISC certification affirms your ability to plan and implement appropriate control measures and frameworks that further mitigate enterprise risk without stifling innovation.
Prerequisites
Three years of work experience managing IT risk by designing and implementing IS controls, including experience across at least two CRISC domains; of which one must be in Domain 1 or 2, is required for certification.
Certification
This course prepares students to sit for the ISACA® CRISC exam.
RED HAT SYSTEM ADMINISTRATION I (RH-124) – 5 DAY
Overview
Red Hat System Administration I relates to Red Hat® Enterprise Linux® 8 and is designed for IT professionals without previous
Linux administration experience. The course focuses on providing students with Linux administration “survival skills” by focusing on
core administration tasks.
Prerequisites
There are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.
Certification
This course prepares students to take the Red Hat System Administration II (RH-134/135) course. Upon completion of both courses,
students are prepared to sit for the Red Hat Certified System Administrator Exam (EX200).
RED HAT SYSTEM ADMINISTRATION II (RH-134/135) – 4 DAY
Overview
Red Hat System Administration I relates to Red Hat® Enterprise Linux® 8 and is designed for IT professionals without previous Linux administration experience. The course focuses on providing students with Linux administration “survival skills” by focusing on core administration tasks.
Prerequisites
Completion of Red Hat System Administration I (RH-124).
Certification
This course prepares students to sit for the Red Hat Certified System Administrator Exam (EX200).
VMWARE VSPHERE®: INSTALL, CONFIGURE, AND MANAGE (COA-14605) – 5 DAY
Overview
VMware vSphere: ICM explores installation, configuration, and management of VMware vSphere®, which consists of VMware
ESXiTM and VMware® vCenter ServerTM. This course is based on versions of ESXi 6.7 and vCenter Server 6.7. Completion of this
course satisfies the prerequisite for taking the VMware® Certified Professional 6.7 exam (VCP-DCV).
Prerequisites
System administration experience on Microsoft Windows or Linux operating systems.
Certification
This course prepares students to sit for the VMware Certified Professional 6.5 – Data Center Virtualization (VCP6.5-DCV) exam.
VMWARE VSPHERE®: OPTIMIZE AND SCALE (COA-14635) – 5 DAY
Overview
This course teaches students advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, students configure and optimize the VMware vSphere® 6.7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect.
Prerequisites
VMware vSphere®: Install, Configure, and Manage. Equivalent knowledge and administration experience with ESXi and vCenter Server.
Certification
This course prepares students to sit for the VMware Certified Professional 6.5 – Data Center Virtualization (VCP6.5-DCV) exam.
PROJECT MANAGEMENT PROFESSIONAL BOOT CAMP WITH
(PMP)® PREP (COA-14125) – 5 DAY
Overview
This boot camp provides an immersive overview of project management and key best practices. Provides practice with tools,
techniques, skills, and experiences that you can immediately apply to your projects and programs.
Prerequisites
A working knowledge of project management practice is recommended.
Certification
This course prepares students to sit for the Project + PK0-005 exam.
INTRODUCTION TO PROGRAMMING (COA-14701) – 5 DAY
Overview
This course takes a slow and steady path to learn the basic concepts of programming utilizing the Python programming language.
Prerequisites
There are no prerequisites.
Certification
This is a skills-based course.
INTRODUCTION TO COMMAND LINE (COA-14901) – 3 DAY
Overview
This course acts as an introduction to the Linux shell and basic Linux commands.
Prerequisites
There are no prerequisites s required for this course.
Certification
This is a skills-based course.
PYTHON PROGRAMMING (COA-14715) – 5 DAY
Overview
This hands-on course shows how to rapidly develop and maintain effective Python programs; including a practical approach to creating and organizing Python programs using functions, packages, modules, and classes as part of Python’s object- oriented paradigm.
Prerequisites
Prior scripting experience or knowledge of fundamental programming concepts.
Certification
This is a skills-based course.
CYBER FIRST RESPONDER (COA-14725) – 5 DAY
Overview
The training will prepare security professionals to become the first responders who defend against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cyber security incidents. A CyberSec First Responder is the first line of defense against cyber-attacks that can cost an organization valuable time and money.
Prerequisites
There are no prerequisites required for this course.
Certification
This course prepares students to sit for the CertNexus Cyber First Responder Certification.
CYBER INTELLIGENCE OPERATIONS (COA-14726) – 10 DAY
Overview
This course provides an immersive overview of cyber intelligence operations. Provides practice with tools, techniques, skills, and experiences that you can immediately apply to daily operations and programs.
Prerequisites
This is an entry-level course.
Certification
There are no certifications for this course.
Hands-on
The hands-on portion will result in the development of an intelligence operations profile of the organization.
Cyber Jedburgh specialized training is a comprehensive course designed to produce an individualized skill set to conduct Offensive Cyber Operations (OCO). It consists of three Phases, Prepare, Execute, and Vanish. Each Phase consists of courses supporting activities normally found in threat actor Tactics, Techniques, and Procedures (TTPs). All courses include extensive hands-on course work. This course is presented on an as needed basis and is a 5 person team course. Arrangements for this course can be made by contacting Cyber Ops Academy.
Prepare Phase
Cyber Jedburgh specialized training is a comprehensive course designed to produce an individualized skill set to conduct Offensive Cyber Operations (OCO). It consists of three Phases, Prepare, Execute, and Vanish. Each Phase consists of courses supporting activities normally found in threat actor Tactics, Techniques, and Procedures (TTPs). All courses include extensive hands-on course work. This course is presented on an as needed basis and is a 5 person team course. Arrangements for this course can be made by contacting Cyber Ops Academy.
CYBER OPERATIONS PLAN DEVELOPMENT (COA-CJ00P) – 10 DAY
Overview
This course is designed to enable the development of an OCO plan against a specific target. This step adapts the Military Decision Making Process (MDMP) to identify all the components necessary to be successful.
Prerequisites
This is an entry-level course.
Certification
There are no certifications for this course.
Hands-on
The hands-on portion will result in the development of a required mission plan.
CYBER INTELLIGENCE OPERATIONS (COA-CJ001) – 10 DAY
Overview
This course provides an immersive overview of cyber intelligence operations. Provides practice with tools, techniques, skills, and experiences that you can immediately apply to daily operations and programs.
Prerequisites
This is an entry-level course.
Certification
There are no certifications for this course.
Hands-on
The hands-on portion will result in the development of a Cyber Intelligence Collection Management Plan.
CYBER COUNTERINTELLIGENCE COURSE (COA-CJ002) – 10 DAY
Overview
This course provides a unique approach to intelligence support to cyber operations. It is an intense course consisting of both theory and a hands-on practical.
Prerequisites
Previous attendance in Cyber Intelligence Operations (COA-15100).
Certification
There are no certifications for this course.
Hands-on
The hands-on portion will include the development of a Cyber Intelligence Preparation of the Environment (CIPE) and the basis for preparing a cyber defensive plan.
RECONNAISSANCE (COA-CJ003) – 10 DAY
Overview
Using the products from the previous three course topics, students will conduct a detailed reconnaissance activity to answer.
Prerequisites
Completion of COA-CJ00P, COA-CJ001, AND COA-CJ002.
Certification
There are no certifications for this course.
Hands-on
The hands-on portion will result in answering the requirements listed in the Cyber Intelligence Collection Management Plan.
MISSION ANALYSIS (COA-CJ004) – 20 DAY
Overview
Using the products from the previous four course topics, students will conduct a detailed analysis to develop the Capstone Project.
Prerequisites
Completion of COA-CJ00P, COA-CJ001, COA-CJ002, and COA-CJ003.
Certification
There are no certifications for this course.
Hands-on
The hands-on portion will result in answering the requirements listed in the Cyber Intelligence Collection Management Plan.
CAPSTONE PROJECT (COA-CJ005) – 15 DAY
Overview
The Capstone Project is a dry rehearsal of the Cyber Operation during which time operational changes will be made to identified offensive signatures.
Prerequisites
Completion of COA-CJ00P, COA-CJ001, COA-CJ002, COA-CJ003, and COA-CJ004.
Certification
There are no certifications for this course.
Hands-on
This is entirely a hands-on exercise.
Execute Phase
The Execute Phase is a hands-on timed execution of the final Capstone Project against a network with security controls implemented. There is a Capture-the-Flag component to this, a set of documents to be exfiltrated without detection. There are two steps to this Phase, infiltration and exploitation.
NETWORK INFILTRATION (COA-CJ006) – 5 DAY
Overview
The Infiltration step is the Cyber Jedburgh’s attack against the network. The Team will be successful if it is able to access the network without detection.
Prerequisites
Completion of the Prepare Phase.
Certification
There are no certifications for this course.
Hands-on
This is entirely a hands-on exercise.
NETWORK EXPLOITATION (COA-CJ007) – 5 DAY
Overview
The Exploitation step is the Cyber Jedburgh’s internal reconnaissance and exfiltration of sensitive data. The Team will be successful if it is able to exfiltrate data from the network without detection.
Prerequisites
Completion of the Network Infiltration Step.
Certification
There are no certifications for this course.
Hands-on
This is entirely a hands-on exercise.
Vanish Phase
The Vanish Phase is a hands-on timed execution of the final Capstone Project against a network with security controls implemented. The purpose is to leave the targeted network as outlined in the Mission Plan.
NETWORK INFILTRATION (COA-CJ008) – 2 DAY
Overview
The Vanish Phase is conducted based on the Mission Plan. Dependent on the results outlined in the Mission Plan, a number of different scenarios may be implemented.
Prerequisites
Completion of the Execute Phase.
Certification
There are no certifications for this course.
Hands-on
This is entirely a hands-on exercise.
After Action Review (AAR)
On completion of the Cyber Jedburgh Training Exercise, an in-depth AAR will be conducted to identify areas of success, potential additional activities, recommendations for changes.