Cyber Security Analyst Bootcamp
Class description: Cybersecurity is in demand growing cyber-attacks, demand for safe and secure data, and other concerns mean that companies need professionals to keep their information safe. The market for cybersecurity professionals requires new entrants. Reports like this software company plans to pay tens of millions in ransom to hackers who crippled car dealerships across North America. We identified Cybersecurity as the area most in need of skilled personnel.
Artificial Intelligence & Cybersecurity Solutions helps to address the demand for entry-level cybersecurity professionals. AICS Solutions provides training that helps our students to become entry-level Cybersecurity Professionals.
Schedule
Daily schedule:
-
The 12-week Full -Time Cybersecurity program schedule operates Monday through Friday from time from 6:00 pm to 9:30 pm. All students must attend the program at AICS and sign-in and sign-out each day they are in the classroom.
-
The pair programming formative assessment task block places two students together to work on an assignment. This enhances the learning by forcing the two students to interact regarding the assignment they are mutually working on together. A teaching assistant is also available during this time to help student pairs with any problems they are experiencing.
-
Students are rotated through different pairs throughout the program to enable everyone to work with each other as a team and experience different levels of diversity.
-
The teaching assistant intervention block for re-teaching and extensions allows students to schedule time with mentors or mentors may seek out students experiencing specific problems with specific concepts from either student feedback or observation of the student’s assignments and/or projects. This allows students to address problems as early as possible to help them keep place with the other students in the program.
-
Whole group classroom direct instruction block includes all lectures and videos on Cybersecurity techniques, Computer fundamentals, Kali Linux, Networking, Splunk tools and Security Information Event management (SIEM) Penetration Testing, and all other classroom components listed in the syllabus.
Learning Objectives:
To become properly prepared to perform the functions of a security analyst or security engineer, it will be necessary to develop requisite skills. These include CompTIA A+ CompTIA Network+, CompTIA Security+ Splunk Cloud, Splunk Enterprise, Security Information Event Management (SIEM) and Security Operation Center (SOC) fundamentals. The tiered approach to learning designed in this course will provide you with the opportunity to demonstrate a mastery of these skills.
At the conclusion of this program, you will be able to demonstrate the following knowledge, skills, and abilities to a minimum level of 80 percent proficiency.
CompTIA A+
Week 1: CompTIA A+ 220 (1101- 1102)
-
Lesson 1: Installing Motherboards and Connectors
-
Lesson 2: Installing System Devices
-
Lesson 3: Troubleshooting PC Hardware
-
Lesson 4: Comparing Local Networking Hardware
-
Lesson 5: Configuring Network Addressing and Internet Connections
-
Lesson 6: Supporting Network Services
-
Lesson 7: Summarizing Virtualization and Cloud Concepts
-
Lesson 8: Supporting Mobile Devices
-
Lesson 9: Supporting Print Devices
-
Lesson 10: Configuring Window
-
Lesson 11: Managing Windows
-
Lesson 12: Identifying OS Types and Features
-
Lesson 13: Supporting Window
-
Lesson 14: Managing Windows Networking
-
Lesson 15: Managing Linux and macOS
-
Lesson 16: Configuring SOHO Network Security
-
Lesson 17: Managing Security Settings
-
Lesson 18: Supporting Mobile Software
-
Lesson 19: Using Support and Scripting Tools
-
Lesson 20: Implementing Operational Procedures
Splunk Enterprise, Splunk Cloud and SIEM
Week 3: Splunk Enterprise and Splunk Cloud
-
Lesson 1: What is Splunk
-
Lesson 2: Introduction to Splunk
-
Lesson 3: Using Field
-
Lesson 4: Introduction to dashboard
-
Lesson 5: Scheduling Reports Alerts
-
Lesson 6: Visualization
-
Lesson 7: Introduction to Knowledge Objects
Week 4: Introduction to Security Information and Event management (SIEM)
-
Lesson 1: The Threat Landscape Evolution and Rise of SIEM Solutions
-
Lesson 2: Navigating Security Operations with SIEM
-
Lesson 3: The need for Security Consolidation
-
Lesson 4: Exploring Net-Gen SIEM Capabilities
-
Lesson 5: Elevating the Entire SOC Team
-
windows Server Examination
CompTIA Network+
Week 5: Network (CompTIA Network+ N10-009)
-
Lesson 1: Explaining the OSI and TCP/IP Models
-
Lesson 2: Explaining Properties of Network Traffic
-
Lesson 3: Installing and Configuring Switched
-
Lesson 4: Configuring IP Networks
-
Lesson 5: Installing and Configuring Routed Networks
-
Lesson 6: Configuring and Monitoring Ports and
-
Lesson 7: Explaining Network Application and Storage Issues
-
Lesson 8: Monitoring and Troubleshooting
Week 6: Network (Continued)
-
Lesson 9: Explaining Networking Attacks and Mitigations
-
Lesson 10: Installing and Configuring Security Devices
-
Lesson 11: Explaining Authentication and Access Controls
-
Lesson 12: Deploying and Troubleshooting Cabling Solutions
-
Lesson 13: Implementing and Troubleshooting
-
Lesson 14: Comparing and Contrasting WAN Technologies
-
Lesson 15: Using Remote Access Methods
-
Lesson 16: Identifying Site Policies and Best Practices
-
Network Design and Administration Review
Week 7: Network (Continued)
-
Network Design and Administration Review
-
Network Design and Administration Examination
CompTIA Security+
Week 8: Security (CompTIA Security+ SY0-701)
-
Lesson 1: Comparing Security Role and Security Controls
-
Lesson 2: Explaining Threat Actors and Threat Intelligence
-
Lesson 3: Performing Security Assessments
-
Lesson 4: Identifying Social Engineering and Malware
-
Lesson 5: Summarizing Basic Cryptographic Concepts
-
Lesson 6: Implementing Public Key Infrastructure
Week 9: Security (Continued)
-
Lesson 7: Implementing Authentication Controls
-
Lesson 8: Implementing Identity and Account Management Controls
-
Lesson 9: Implementing Secure Network Designs
-
Lesson 10: Implementing Network Security Appliances
-
Lesson 11: Implementing Secure Network Protocols
-
Lesson 12: Implementing Host Security Solutions
-
Lesson 13: Implementing Secure Mobile Solutions
-
Lesson 14: Summarizing Secure Application Concepts
Week 10: Security (Continued)
-
Lesson 15: Implementing Secure Cloud Solutions
-
Lesson 16: Explaining Data Privacy and Protection Concepts
-
Lesson 17: Performing Incident Response
-
Lesson 18: Explaining Digital Forensics
-
Lesson 19: Summarizing Risk Management Concepts
-
Lesson 20: Implementing Cybersecurity Resilience
-
Lesson 21: Explaining Physical Security
-
Security Design and Administration Review
Week 11: Security (Continued)
-
Security Design Review
-
Security Design Exam
Cybersecurity Test Tools
Week 12: Cybersecurity Test Tools
Kali Linux
-
INSTALLATION & CONFIGURATION
-
INFORMATION GATHERING TOOLS
-
VULNERABILITY ANALYZES TOOLS
-
WIRELESS ATTACKS
-
WEBSITE PENETRATION TESTING
-
EXPLOITATION TOOLS
-
SNIFFING & SPOOFING
-
PASSWORD CRACKING TOOLS
-
MAINTAINING ACCESS
Cursos de formación
Inteligencia artificial
AbiertoAI
IA y Cybersecurity Solutions Inc. es una empresa líder en inteligencia artificial y ciberseguridad comprometida a brindar soluciones efectivas e innovadoras que ayuden a los clientes a mantenerse a la vanguardia de las amenazas cibernéticas en constante evolución. Creemos firmemente que aplicando los últimos avances tecnológicos y las mejores prácticas en IA y ciberseguridad, podemos hacer del mundo un lugar más seguro. Nuestro equipo de expertos se dedica a desarrollar algoritmos de IA de código abierto que ayuden a nuestros clientes a alcanzar sus objetivos de manera más eficiente y con mayor precisión.