13
CYBER SECURITY BOOT CAMP Enroll today in our virtual Boot Camp! Increase your knowledge of cyber security Learn from experienced instructors Practice real-world scenarios Get started on the path to a career in IT Contact Us Today! [email protected] www.panitechacademy.com 240-200-6474 10610 Rhode Island avenue, Suite 111 Beltsville, MD 20705

CYBER SECURITY BOOT CAMP - panitechacademy.com

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

CYBER SECURITY BOOT CAMP

Enroll today in our virtual Boot Camp!

Increase your knowledge of cyber securityLearn from experienced instructorsPractice real-world scenariosGet started on the path to a career in IT

Contact Us [email protected]

240-200-647410610 Rhode Island avenue, Suite 111 Beltsville, MD 20705

WHAT WE OFFER

High Quality Training◆

We offer a comprehensive curriculum highlighted by interactive and intense training, real-world scenario exercises, and networking capabilities. Learn via remote access or at our state-of-the-art training center.

One-On-One Coaching◆

Enjoy hands-on instruction from a team of talented and experienced faculty members. Each instructor is directly qualified to teach cyber security and information technology to the novice or the expert.

Flexible Payment Plans◆

Our team will work with you to ensure you can take the course without having to break your monthly budget - or your wallet! Take advantage of one our flexible payment plans to help keep your finances in order and still have access to the Boot Camp.

www.panitechacademy.com | [email protected]

Enjoy hands-on instruction from a team of talented and experienced faculty members. Each instructor is directly qualified to teach cyber security and information technology to the novice or the expert.

Highlight What You’ve Learned In Your Resume◆

We’ll work directly with you to add new skills to your resume in anticipation of applying for a position in the IT field. There’s nothing wrong with showing off your knowledge to earn the career you’re looking for!

Job Search Assistance◆

Need to land an IT job fast? Or looking to improve your present position by adding cyber security to your skill set? Our team will lend a hand with resume building, landing an interview, and presenting yourself as a qualified candidate.

Certificate of Completion◆

After you’ve completed the Boot Camp, you’ll get a certificate proving your mastery of Cyber Security, which you can add to the education and courses section of your resume!

If security were all that mattered, computers would neverbe turned on, let alone hooked into a network with

literally millions of potential intruders

“”

Dan Farmer

www.panitechacademy.com | [email protected]

After you’ve completed the Boot Camp, you’ll get a certificate proving your mastery of Cyber Security, which you can add to the education and courses section of your resume!

WHY CYBER SECURITY?

The Fastest Growing Field In IT◆

According to the Bureau of Labor Statistics, the job outlook for cyber security positions is expected to grow to 32% by the year 2028, which is considered much faster than the average job growth. It’s also becoming increasingly popular and more important, as there is greater potential than ever for cyber hacking, phishing, and other threats to confidential and personal information.

More Jobs Available Than Qualified Candidates◆

As the cyber security field continues to grow, more companies are investing time and money into protecting their IT assets, in turn leading to more job availability in the field, and eventually creating more positions than there are qualified candidates. This makes now the ideal time to pursue a position in cyber security and information technology, especially with the knowledge and experience you’ll gain from this Cyber Security Boot Camp!

www.panitechacademy.com | [email protected]

As the cyber security field continues to grow, more companies are investing time and money into protecting their IT assets, in turn leading to more job availability in the field, and eventually creating more positions than there are qualified candidates. This makes now the ideal time to pursue a position in cyber security and information technology, especially with the knowledge and experience you’ll gain from this Cyber Security Boot Camp!

High Salary◆

The Bureau of Labor Statistics also reports the median pay in 2019 for Information Security Analysts was over �99,000. Even entry level positions have excellent salaries, in excess of �65,000 for a qualified candidate right out of college or with only a couple years of experience under their belt.

Room For Growth◆

An Information Technology Systems Analyst is often able to move up quickly as they add to their skill set. Just adding a cyber security background to your portfolio of knowledge can be a huge gain when trying to attain a promotion, going for a higher-paying position, or looking to land a managerial position.

There’s no silver bullet solution with cyber security,a layered defense is the only viable defense

“”

Dan Farmer

www.panitechacademy.com | [email protected]

The Bureau of Labor Statistics also reports the median pay in 2019 for Information Security Analysts was over �99,000. Even entry level positions have excellent salaries, in excess of �65,000 for a qualified candidate right out of college or with only a couple years of experience under their belt.

ABOUT OUR INSTRUCTORS

Experience In IT◆

Our staff of instructors boasts a wealth of first-hand knowledge and are all college graduates. Combining decades of experience in IT, they’ll provide you with professionalism, patience, and the intensive training you need to succeed. They also work in the field that they teach, so you can trust they know what they’re talking about!

A Passion For Sharing Knowledge◆

The Boot Camp faculty boasts extensive practical experience that has led to a dedication and passion that’s evident in their teaching methods. From sharing personal work stories to guiding you along the same journey they’ve taken in their careers, our instructors’ love for Information Technology always shines through!

www.panitechacademy.com | [email protected]

The Boot Camp faculty boasts extensive practical experience that has led to a dedication and passion that’s evident in their teaching methods. From sharing personal work stories to guiding you along the same journey they’ve taken in their careers, our instructors’ love for Information Technology always shines through!

ABOUT OUR TRAINING

Hands-On Training, Real World Scenarios◆

Our Cyber Security Boot Camp curriculum is full of true-to-life scenarios in order to prepare you for what’s in store with a career in IT. Including cyber security threats, best practices for winning strategies, and more, you’ll know how to protect an organization’s technology assets in real time.

Practical & Useful Experience ◆

The lesson plans taught by our faculty come straight from their years of first-hand knowledge of the IT field. Learn how to apply the skills you will gain in your future career, or towards landing a higher-paying position at your present company. Either way, this interactive training will help you grow to the highest potential!

www.panitechacademy.com | [email protected]

Our Cyber Security Boot Camp curriculum is full of true-to-life scenarios in order to prepare you for what’s in store with a career in IT. Including cyber security threats, best practices for winning strategies, and more, you’ll know how to protect an organization’s technology assets in real time.

Team Work & Group Projects◆

Break into teams and combine your efforts to solve real-world cyber security problems and more. Thanks to our well-planned curriculum, group exercises help foster teamwork and prepare you for departmental brainstorming and company-wide situations that may arise as an IT analyst.

Networking With Other Students◆

Interacting with your fellow students is a great way to prepare for what may happen in a real-life situation. In addition, you’ll learn from your peers about their impressions of the course, as well as how they perceive the very idea of cyber security. And you’ll also gain valuable contacts for your future in IT!

As we've come to realize, the idea thatsecurity starts and ends with the purchase of a prepackaged

firewall is simply misguided

“”

Art Wittmann

www.panitechacademy.com | [email protected]

BOOT CAMP PRICING

Affordable Pricing ◆

Enrolling in Cyber Security Boot Camp doesn’t have to break the bank! Pani Tech Academy offers low pricing for a full course, and provides a flexible payment plan to help with financial planning. We want you to be able to take and complete the training platform!

No Compromise On Training Quality◆

Even though our pricing is low, this Boot Camp won’t skimp on the results! You’ll experience high-quality training from start to finish, with experienced instructors, a state-of-the-art training center and premium online instruction.

If you spend more on coffee than on IT security,you will be hacked. What's more,

you deserve to be hacked.

“”

Richard Clarke

www.panitechacademy.com | [email protected]

Even though our pricing is low, this Boot Camp won’t skimp on the results! You’ll experience high-quality training from start to finish, with experienced instructors, a state-of-the-art training center and premium online instruction.

WHO IS CYBER SECURITY BOOT CAMP FOR?

Anyone Trying To Get Into IT◆

If you’re a college graduate looking to use your education to land a job in Information Technology, or someone in a different field thinking about moving into cyber security, our Boot Camp prepares you for the job search process! Even if you have no IT background at all, you’ll learn the skills necessary to jump into this ever-growing field.

IT Analysts Switching To Cyber Security◆

Already have a position in IT but want to concentrate more on cyber security? The Boot Camp helps you exercise your knowledge and gain greater skill that can get your foot in the virtual door. With more jobs opening up in cyber security every year, completing this course could be your first step towards success!

www.panitechacademy.com | [email protected]

If you’re a college graduate looking to use your education to land a job in Information Technology, or someone in a different field thinking about moving into cyber security, our Boot Camp prepares you for the job search process! Even if you have no IT background at all, you’ll learn the skills necessary to jump into this ever-growing field.

◆◆◆◆◆

Cryptography ConceptSecurity ControlsRisk Management FrameworkAdvanced Attacks ProtectionCommon Threats

◆◆◆◆

System HardeningNetwork & Application SecurityNetwork ToolsPolicy and Risk Mitigation

CURRICULUM

PaniTech Academy CYBERSECURITY ANALYST : COURSE SYLLABUS

This syllabus is constucted as an aid and starting point to instructors who use Comptia Cybersecurity Analyst (cysa+) Cert Guide as a text in introducing students to cybersecurity analysis . This example syllabus provides a format for a 15-week (30-session) course. Each session is presumed to be 90 minutes in length, and to be devoted partly to lecture and partly to lab exercises; however, you might choose to shift labs entirely to the second session of each week or pick some other variant. If so, you should adjust the section break points appropriately. Each chapter of the text is covered in three sessions, with time in the third session devoted for chapter review purposes.

The Comptia Cybersecurity Analyst (cysa+) course is designed for individuals with some practical experience with security. As a practical matter, students are likely to have a wide range of qualifications. Some students may have very little practical experience with sdcurity. Some may have used other computer skills, and many of these skills will transfer well to tis course. Other students will have extensive, if informal, experience with security, and will need the course as a refresher and to fill out their skill sets. Some students will know a great deal about computer hardware and networking generally, but others will lack much of this knowledge.

Teaching a diverse range of students presents challenges—teaching to the least experienced students will bore the more advanced ones, and teaching for the advanced students will mystify the beginners. You must strike a balance and work to engage all the students. When a beginner asks a question that’s not challenging to more advanced students, consider passing it on to the class as a whole (“Does anybody know the answer to this question?”). This will help keep the more advanced students engaged. When a student asks a particularly advanced question, try quickly laying out at least the basics needed to understand the question and restating it in a simplified manner so that the less experienced students can better understand it.

Learning about security requires hands-on experience. Most chapters of Comptia Cybersecurity Analyst (cysa+) Cert Guide provide step-by-step instructions for accomplishing specific tasks. You should encourage your students to experiment with security tools, whether in the classroom or on their own systems.

Most chapters of the book consume two sessions Thus, instead of devoting 20 minutes of each session to lab time, you could eliminate the lab from most sessions and place a longer lab in the final session for each chapter, adjusting the lecture portion of other sessions appropriately. This approach will require changing the text sessions covered in each session from those presented in this syllabus, though.

Learning about security requires hands-on experience, and the hands-on experience works best soon after formal presentation of the material. This means that you should try to intersperse lectures and labs. A typical class will be 90 minutes long, broken down roughly as follows:

General Class Format

Course Description

10 minutes50 minutes10 minutes20 minutes

— Review of previous lecture’s material— Lecture— Review and questions— Lab

Of course, you may have your own preferred structure, and some days will require changes.

SECURITY + CERTIFICATION : COURSE SYLLABUS

www.panitechacademy.com | [email protected]

Course Schedule

Session 1Introductions and course overview. Be sure to take some time to get to know your students. Pay particular attention to their relative skill levels—ask them to introduce themselves and discuss their experience with networking and with Cisco devices. This knowledge will help you plan the level of your lecture material for your class.

Session 2 Chapter 1, “Applying environmental reconnaissance techniques”Text sections: “Procedures/common tasks” through “ Tools”

Session 4 Chapter 2, “Analyzing the results of network reconnaissance” Text sections: “Point-in-time data analysis” through “Event logs”

Session 5 Chapter 2 “Analyzing the results of network reconnaissance” (continued)Text sections:” Event logs” through “Summary”Chapter review and Review Questions

Session 6 Chapter 3, “Recommending and implementing the appropriate response and countermeasure”Text sections: “Network segmentation” through “Compensating controls”

Session 7 Chapter 3, “Recommending and implementing the appropriate response and countermeasure” (continued)Text Sections: “Compensating controls” through “Summary”Chapter review and Review Questions

Session 8 Chapter 4, “Practices used to secure a corporate environment” Text sections: “Penetration testing” through “Hardware”

Session 9 Chapter 4, “Practices used to secure a corporate environment” (continued)Text sections: “Hardware” through Summary”Chapter review and Review Questions

Session 10 Chapter 5, “Implementing an information security vulnerability management process”Text sections: “Identification of requirements” through “Tool updates/plug-ins”

Session 12 Chapter 6, “Analyzing scan output and identifying common vulnerabilities”Text sections: “Analyzing output resulting from a vulnerability scan” through “Network infrastructure”

Session 13 Chapter 6, “Analyzing scan output and identifying common vulnerabilities” (continued)Text sections: “Network infrastructure” through “Summary”Chapter review and Review Questions

Session 14 Chapter 7, “Identifying incident impact and assembling a forensic toolkit” Text sections: “Distinguishing threat data or behavior to determine the impact of an incident” through “Preparing a toolkit and using appropriate forensics tools during an investigation.”

Session 15 Chapter 7, “Identifying incident impact and assembling a forensic toolkit” Text sections: “Preparing a toolkit and using appropriate forensics tools during an investigation” through “Summary”

Session 11 Chapter 5, “Implementing an information security vulnerability management process” (continued)Text sections: “Tool updates/plug-ins” through “Summary”Chapter review and Review Questions

Session 3 Chapter 1, “Applying environmental reconnaissance techniques”Text sections: ““ Tools”” through “Summary”Chapter review and Review Questions

www.panitechacademy.com | [email protected]

Introductions and course overview. Be sure to take some time to get to know your students. Pay particular attention to their relative skill levels—ask them to introduce themselves and discuss their experience with networking and with Cisco devices. This knowledge will help you plan the level of your lecture material for your class.

Session 17 Chapter 8, “The Incident response process” (continued)Text sections: “Irregular peer-to-peer communication” through “Summary”Chapter review and Review Questions

Session 18 Chapter 9, “Incident recovery and post-incident response” Text sections: “Containment techniques” through “Corrective actions”

Session 19 Chapter 9, “Incident recovery and post-incident response” (continued)Text sections: “Corrective actions” through “Summary”Chapter review and Review Questions

Session 20 Chapter 10, “Frameworks, policies, controls, and procedures” Text sections: “Regulatory compliance” through “Controls”

Session 21 Chapter 10, “Frameworks, policies, controls, and procedures” (continued)Text sections: “Controls” through “Summary” Chapter review and Review Questions

Session 22 Chapter 11, “Remediating security issues related to identity and access management” Text sections: “Security issues associated with context-based authentication” through “Security issues associated with federation and single sign-on”

Session 23 Chapter 11, “Remediating security issues related to identity and access management” (continued)Text sections: “Security issues associated with federation and single sign-on” through “Summary”Chapter review and Review Questions

Session 24 Chapter 12, “Security architecture and implementing compensating controls”Text sections: “Security data analytics” through “Cryptography”

Session 25 Chapter 12, “Security architecture and implementing compensating controls” (continued)Text sections: “Cryptography” through “Summary”Chapter review and Review Questions

Session 26 Chapter 13 “Application security best practices” Text sections: “Best practices during software development” through “Security regression testing”

Session 27 Chapter 13 “Application security best practices” (continued)Text sections: “Security regression testing” through “Summary”Chapter review and Review Questions

Session 28 Chapter 14, “Using cybersecurity tools and technologies”Text sections: “Preventative tools” through “SIEM”

Session 29 Chapter 14, “Using cybersecurity tools and technologies” (continued)Text sections: “SIEM ”through “Summary”

Session 30 Chapter 16, “Configuring Dynamic Routing Protocols” Text sections: “Understanding routing protocols” through “Summary”Chapter review and Review Questions

Session 31 Course review; may include question-and-answer session, review of Assessment Test questions, or other review practices.

www.panitechacademy.com | [email protected]

Session 16 Chapter 8, “The Incident response process” Text sections: “Communication during incident response process” through “Irregular peer-to-peer communication”