Our CORE program is your direct path to a cyber security career. This 400-hour immersive curriculum includes six courses with certification exams, extensive hands-on skill building, guided product training, career prep and project portfolio. Cyber Security Core Technical students graduate with the sought after knowledge and trade-craft for immediate employment as tier 1+ security engineers, ethical hackers, network analysts and more. The evolution from general IT to cyber security can take five to 10 years. The CORE does it in as little as 10 weeks in a full-time program.
CompTIA A+ Certification prepares students to maintain and configure PCs and devices, basics of networking, troubleshooting software and hardware issues, and customer support
CompTIA Network+ Certification teaches the fundamentals of network architecture, network operations, network security, troubleshooting and industry standards, practices and network theory.
Linux Fundamentals provides students with essential skills to be proficient at the Unix of Linux command line. Introduction to Programming teaches students to design, wrtie, debug and run programs encoded in the Python language, and understand the basic concepts of software development technology.
Earn EC-Council Certified Network Defender to protect, detect and respond to threats on a network. Provides a fundamental understanding of the true construct of data transfer, network technologies, software technologies to learn how networks operate, understand what software is automating and how to analyze the subject material. Network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDs, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning. Learn to design network security policies and successful incident response plans.
Immerse yourself into the hacker mindset to earn EC-Council Certified Ethical Hacker. Learn to defend against future attacks. Scan, test, hack and secure systems through the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time. Reconnaissance, Gaining Access, Enumeration, Maintaining Access and covering your tracks.