Training Courses

CCNA: IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (COA-14235) – 5 DAY

Overview

The Implementing and Administering Cisco Solutions (CCNA) training gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lectures, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks.

Prerequisites

It is recommended to have the following skills and knowledge before attending this course: basic computer literacy, basic PC operating system navigation skills, basic Internet usage skills, and basic IP address knowledge.

Certification

This course prepares students to sit for the Cisco 200-301 exam.

COMPTIA A+ CERTIFICATION (COA-14305) – 5 DAY

Overview

This course provides students with the fundamental knowledge on basic personal computer hardware and is a starting point for a career in IT. CompTIA A+ is the foundation for further study in security, networking, and programming.

Prerequisites

End-user skills with Windows®- based personal computers.

Certification

This course prepares students to sit for the CompTIA A+ 220-1001 (Core 1) and 220-1002 (Core 2) exams.

COMPTIA NETWORK+ CERTIFICATION (COA-14325) – 5 DAY

Overview

Network+ builds on existing user-level knowledge with personal computer operating systems and networks to present fundamental skills and concepts that you will use on the job in any type of networking career. This course includes topics such as network technologies, installation and configuration, media and topologies, management and security.

Prerequisites

Basic Windows skills and a fundamental understanding of computer concepts are required.

Certification

This course prepares students to sit for the CompTIA Network+ N10-008 exam.

COMPTIA SECURITY+ CERTIFICATION (COA-14345) – 5 DAY

Overview

CompTIA Security+ provides foundational principles and broad-based knowledge necessary to implement and monitor security on networks, applications, and operating systems, and respond to security breaches. Security+ covers topics including foundational principles for securing a network, managing risk, access control, identity management, and cryptography.

Prerequisites

CompTIA Network+ or equivalent knowledge. Two years of experience in IT administration with a security focus is a plus.

Certification

This course prepares students to sit for the CompTIA Security+ SYO-601 exam.

COMPTIA PENTEST+ (COA-14350) – 5 DAY

Overview

This course verifies the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

Prerequisites

Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Certification

This course prepares students to sit for the CompTIA PenTest+ PTO-002 exam.

COMPTIA CYSA+ (COA-14360) – 5 DAY

Overview

CompTIA Cybersecurity Analyst (CySA+) applies behavioral analytics to networks and devices to prevent, detect, and combat cybersecurity threats. CompTIA CySA+ meets the ISO 17024 standard and is approved by the DoD to fulfill Directive 8750.01-M requirements.

Prerequisites

Network+, Security+, or equivalent knowledge. A minimum of 3-4 years of hands-on information security or related experience. CompTIA CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Certification

This course prepares students to sit for the CompTIA CySA+ CS0-003 exam.

COMPTIA CASP+ (COA-14355) – 5 DAY

Overview

CompTIA Advanced Security Practitioner (CASP) is intended to expose IT professionals to advanced security concepts, principles, and implementations that pertain to enterprise- level security. Upon completion of the course students will gain the knowledge and skills necessary to conceptualize, design, and engineer secure solutions across advanced enterprise environments.

Prerequisites

CompTIA intends the CASP+ certification to serve as an add-on to the CompTIA® Security+® certification, or equivalent technical experience. A minimum of ten years of experience in IT administration, including at least five years of hands-on technical security experience is recommended.

Certification

This course prepares students to sit for the CompTIA CASP+ CAS-004 exam.

CERTIFIED ETHICAL HACKER – CEH (COA-14505) – 5 DAY

Overview

Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks via
virtual labs. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also
learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Prerequisites

Prior to attending this course, you will be asked to sign an agreement stating that you will not use newly acquired skills for illegal or
malicious intent.

Certification

This course prepares students to sit for the EC-Council CEH 312-50 v10 exam.

CERTIFIED HACKING FORENSICS INVESTIGATOR – C|HFI (COA-18004) – 5 DAY

Overview

C|HFI covers the detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for
identification of intruder’s footprints and gathering necessary evidence for its prosecution. C|HFI is now recognized as a baseline
certification for Cybersecurity Service Provider Infrastructure Support (CSSP-IS) and Cybersecurity Service Provider Auditor (CSSPA) under DoD 8140.

Prerequisites

IT/Forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response. Prior completion of
CEH training would be an advantage

Certification

This course prepares students to sit for the EC-Council EC0 312-49 exam.

CERTIFIED CHIEF INFORMATION SECURITY OFFICER – C|CISO (COA-18005) – 5 DAY5

Overview

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. C|CISO is now recognized as a baseline certification for DoD IAM Level II, IAM Level III, and CSSP Manager, all specialized cyber management personnel classifications within the DoD’s information assurance workforce under DoD 8140.

Prerequisites

To sit for the exam after taking training, candidates must have 5 years of experience in 3 of the 5 CCISO Domains verified through EC- Council’s Exam Eligibility Application.

Certification

This course prepares students to sit for the EC-Council C|CISO exam.

CERTIFIED GOVERNANCE, RISK, AND COMPLIANCE – CGRC (COA-14503) – 5 DAY

Overview

Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification. The CGRC
is a proven way to demonstrate your knowledge and skills to integrate governance, performance management, risk management and
regulatory compliance within your organization.

CGRC professionals utilize frameworks to integrate security and privacy within organizational objectives, better enabling stakeholders
to make informed decisions regarding data security, compliance, supply chain risk management and more.

Prerequisites

The CGRC is ideal for IT, information security and information assurance practitioners who work in Governance, Risk and
Compliance (GRC) roles and have a need to understand, apply and/or implement a risk management program for IT systems within an
organization. To qualify for CGRC you must have a minimum of two years of cumulative paid work experience in one or more of the
seven domains of the CGRC Common Body of Knowledge (CBK).

Certification

This course prepares students to sit for the ISC
2CGRC exam.

CISSP CERTIFICATION PREPARATION (COA-14510) – 8 DAY

Overview

This course will teach and apply concepts of confidentiality, integrity, and availability of security governance principles. An
understanding of legal and regulatory issues that pertain to information security in a global context will be obtained. Threat
recognition and management will be covered along with development and implementation of documented security policy, standards,
procedures, and guidelines.

Prerequisites

Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP
CBK.

Certification

This course prepares students to sit for the ISC
2CISSP exam.

CERTIFIED INFORMATION SYSTEMS AUDITOR – CISA (COA-14525) – 5 DAY

Overview

In this course, students will perform evaluations of organizational policies, procedures, and processes to ensure that an organization’s information systems align with overall business goals and objectives. CISA certification demonstrates audit experience and capability to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Prerequisites

Experience in the following areas: IS Audit Process, IT Governance, Systems and Infrastructure Lifecycle Management, IT Service Delivery and Support, Protection of Information Assets, and/or Business Continuity and Disaster Recovery.

Certification

This course prepares students to sit for the ISACA® CISA exam.

CERTIFIED INFORMATION SECURITY MANAGER – CISM (COA-14524) – 5 DAY

Overview

This course is focused to train students on the knowledge and skills to design, build and manage enterprise information security programs. CISM certification opens the door for recognition of the individual who manages, designs, and supervises/assesses an organization’s information security.

Prerequisites

Experience in the following areas: Information Security Governance, Information Risk Management, Information Security Program Development, Information Security Program Management, and/or Incident Management and Response.

Certification

This course prepares students to sit for the ISACA® CISM exam.

CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL – CRISC (COA-14535) – 3 DAY

Overview

This course covers the four domains of the CRISC exam (IT Risk Identification, IT Risk Assessment, Risk Response and Mitigation, & Risk and Control Monitoring and Reporting) and is designed to help students gain the knowledge and skills required to obtain the CRISC certification. CRISC certification affirms your ability to plan and implement appropriate control measures and frameworks that further mitigate enterprise risk without stifling innovation.

Prerequisites

Three years of work experience managing IT risk by designing and implementing IS controls, including experience across at least two CRISC domains; of which one must be in Domain 1 or 2, is required for certification.

Certification

This course prepares students to sit for the ISACA® CRISC exam.

RED HAT SYSTEM ADMINISTRATION I (RH-124) – 5 DAY

Overview

Red Hat System Administration I relates to Red Hat® Enterprise Linux® 8 and is designed for IT professionals without previous
Linux administration experience. The course focuses on providing students with Linux administration “survival skills” by focusing on
core administration tasks.

Prerequisites

There are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.

Certification

This course prepares students to take the Red Hat System Administration II (RH-134/135) course. Upon completion of both courses,
students are prepared to sit for the Red Hat Certified System Administrator Exam (EX200).

RED HAT SYSTEM ADMINISTRATION II (RH-134/135) – 4 DAY

Overview

Red Hat System Administration I relates to Red Hat® Enterprise Linux® 8 and is designed for IT professionals without previous Linux administration experience. The course focuses on providing students with Linux administration “survival skills” by focusing on core administration tasks.

Prerequisites

Completion of Red Hat System Administration I (RH-124).

Certification

This course prepares students to sit for the Red Hat Certified System Administrator Exam (EX200).

VMWARE VSPHERE®: INSTALL, CONFIGURE, AND MANAGE (COA-14605) – 5 DAY

Overview

VMware vSphere: ICM explores installation, configuration, and management of VMware vSphere®, which consists of VMware
ESXiTM and VMware® vCenter ServerTM. This course is based on versions of ESXi 6.7 and vCenter Server 6.7. Completion of this
course satisfies the prerequisite for taking the VMware® Certified Professional 6.7 exam (VCP-DCV).

Prerequisites

System administration experience on Microsoft Windows or Linux operating systems.

Certification

This course prepares students to sit for the VMware Certified Professional 6.5 – Data Center Virtualization (VCP6.5-DCV) exam.

VMWARE VSPHERE®: OPTIMIZE AND SCALE (COA-14635) – 5 DAY

Overview

This course teaches students advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, students configure and optimize the VMware vSphere® 6.7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect.

Prerequisites

VMware vSphere®: Install, Configure, and Manage. Equivalent knowledge and administration experience with ESXi and vCenter Server.

Certification

This course prepares students to sit for the VMware Certified Professional 6.5 – Data Center Virtualization (VCP6.5-DCV) exam.

PROJECT MANAGEMENT PROFESSIONAL BOOT CAMP WITH
(PMP)® PREP (COA-14125) – 5 DAY

Overview

This boot camp provides an immersive overview of project management and key best practices. Provides practice with tools,
techniques, skills, and experiences that you can immediately apply to your projects and programs.

Prerequisites

A working knowledge of project management practice is recommended.

Certification

This course prepares students to sit for the Project + PK0-005 exam.

INTRODUCTION TO PROGRAMMING (COA-14701) – 5 DAY

Overview

This course takes a slow and steady path to learn the basic concepts of programming utilizing the Python programming language.

Prerequisites

There are no prerequisites.

Certification

This is a skills-based course.

INTRODUCTION TO COMMAND LINE (COA-14901) – 3 DAY

Overview

This course acts as an introduction to the Linux shell and basic Linux commands.

Prerequisites

There are no prerequisites s required for this course.

Certification

This is a skills-based course.

PYTHON PROGRAMMING (COA-14715) – 5 DAY

Overview

This hands-on course shows how to rapidly develop and maintain effective Python programs; including a practical approach to creating and organizing Python programs using functions, packages, modules, and classes as part of Python’s object- oriented paradigm.

Prerequisites

Prior scripting experience or knowledge of fundamental programming concepts.

Certification

This is a skills-based course.

CYBER FIRST RESPONDER (COA-14725) – 5 DAY

Overview

The training will prepare security professionals to become the first responders who defend against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cyber security incidents. A CyberSec First Responder is the first line of defense against cyber-attacks that can cost an organization valuable time and money.

Prerequisites

There are no prerequisites required for this course.

Certification

This course prepares students to sit for the CertNexus Cyber First Responder Certification.

CYBER INTELLIGENCE OPERATIONS (COA-14726) – 10 DAY

Overview

This course provides an immersive overview of cyber intelligence operations. Provides practice with tools, techniques, skills, and experiences that you can immediately apply to daily operations and programs.

Prerequisites

This is an entry-level course.

Certification

There are no certifications for this course.

Hands-on

The hands-on portion will result in the development of an intelligence operations profile of the organization.

Cyber Jedburgh specialized training is a comprehensive course designed to produce an individualized skill set to conduct Offensive Cyber Operations (OCO). It consists of three Phases, Prepare, Execute, and Vanish. Each Phase consists of courses supporting activities normally found in threat actor Tactics, Techniques, and Procedures (TTPs). All courses include extensive hands-on course work. This course is presented on an as needed basis and is a 5 person team course. Arrangements for this course can be made by contacting Cyber Ops Academy.

Prepare Phase

Cyber Jedburgh specialized training is a comprehensive course designed to produce an individualized skill set to conduct Offensive Cyber Operations (OCO). It consists of three Phases, Prepare, Execute, and Vanish. Each Phase consists of courses supporting activities normally found in threat actor Tactics, Techniques, and Procedures (TTPs). All courses include extensive hands-on course work. This course is presented on an as needed basis and is a 5 person team course. Arrangements for this course can be made by contacting Cyber Ops Academy.

CYBER OPERATIONS PLAN DEVELOPMENT (COA-CJ00P) – 10 DAY

Overview

This course is designed to enable the development of an OCO plan against a specific target. This step adapts the Military Decision Making Process (MDMP) to identify all the components necessary to be successful.

Prerequisites

This is an entry-level course.

Certification

There are no certifications for this course.

Hands-on

The hands-on portion will result in the development of a required mission plan.

CYBER INTELLIGENCE OPERATIONS (COA-CJ001) – 10 DAY

Overview

This course provides an immersive overview of cyber intelligence operations. Provides practice with tools, techniques, skills, and experiences that you can immediately apply to daily operations and programs.

Prerequisites

This is an entry-level course.

Certification

There are no certifications for this course.

Hands-on

The hands-on portion will result in the development of a Cyber Intelligence Collection Management Plan.

CYBER COUNTERINTELLIGENCE COURSE (COA-CJ002) – 10 DAY

Overview

This course provides a unique approach to intelligence support to cyber operations. It is an intense course consisting of both theory and a hands-on practical.

Prerequisites

Previous attendance in Cyber Intelligence Operations (COA-15100).

Certification

There are no certifications for this course.

Hands-on

The hands-on portion will include the development of a Cyber Intelligence Preparation of the Environment (CIPE) and the basis for preparing a cyber defensive plan.

RECONNAISSANCE (COA-CJ003) – 10 DAY

Overview

Using the products from the previous three course topics, students will conduct a detailed reconnaissance activity to answer.

Prerequisites

Completion of COA-CJ00P, COA-CJ001, AND COA-CJ002.

Certification

There are no certifications for this course.

Hands-on

The hands-on portion will result in answering the requirements listed in the Cyber Intelligence Collection Management Plan.

MISSION ANALYSIS (COA-CJ004) – 20 DAY

Overview

Using the products from the previous four course topics, students will conduct a detailed analysis to develop the Capstone Project.

Prerequisites

Completion of COA-CJ00P, COA-CJ001, COA-CJ002, and COA-CJ003.

Certification

There are no certifications for this course.

Hands-on

The hands-on portion will result in answering the requirements listed in the Cyber Intelligence Collection Management Plan.

CAPSTONE PROJECT (COA-CJ005) – 15 DAY

Overview

The Capstone Project is a dry rehearsal of the Cyber Operation during which time operational changes will be made to identified offensive signatures.

Prerequisites

Completion of COA-CJ00P, COA-CJ001, COA-CJ002, COA-CJ003, and COA-CJ004.

Certification

There are no certifications for this course.

Hands-on

This is entirely a hands-on exercise.

Execute Phase

The Execute Phase is a hands-on timed execution of the final Capstone Project against a network with security controls implemented. There is a Capture-the-Flag component to this, a set of documents to be exfiltrated without detection. There are two steps to this Phase, infiltration and exploitation.

NETWORK INFILTRATION (COA-CJ006) – 5 DAY

Overview

The Infiltration step is the Cyber Jedburgh’s attack against the network. The Team will be successful if it is able to access the network without detection.

Prerequisites

Completion of the Prepare Phase.

Certification

There are no certifications for this course.

Hands-on

This is entirely a hands-on exercise.

NETWORK EXPLOITATION (COA-CJ007) – 5 DAY

Overview

The Exploitation step is the Cyber Jedburgh’s internal reconnaissance and exfiltration of sensitive data. The Team will be successful if it is able to exfiltrate data from the network without detection.

Prerequisites

Completion of the Network Infiltration Step.

Certification

There are no certifications for this course.

Hands-on

This is entirely a hands-on exercise.

Vanish Phase

The Vanish Phase is a hands-on timed execution of the final Capstone Project against a network with security controls implemented. The purpose is to leave the targeted network as outlined in the Mission Plan.

NETWORK INFILTRATION (COA-CJ008) – 2 DAY

Overview

The Vanish Phase is conducted based on the Mission Plan. Dependent on the results outlined in the Mission Plan, a number of different scenarios may be implemented.

Prerequisites

Completion of the Execute Phase.

Certification

There are no certifications for this course.

Hands-on

This is entirely a hands-on exercise.

After Action Review (AAR)

On completion of the Cyber Jedburgh Training Exercise, an in-depth AAR will be conducted to identify areas of success, potential additional activities, recommendations for changes.

For additional information or questions please contact cmcclister@def-logix.com

Still have questions on why you should join the Cyber Ops Training Academy? Check out our FAQ for more info.

Resources

Cybersecurity career forcast
Reskilling vs. Upskilling