Cybersecurity Academy Evening CORE Program

Overview

The Evening CORE Program provides aspiring individuals possessing basic networking and programming experience with an accelerated path to cybersecurity career options. The evolution from a general IT to a cybersecurity specialty typically takes five to ten years. The Evening CORE Program enables this transition in 42 weeks.

  • The Evening CORE is a 42-week cybersecurity skills and theory educational program. Classes are held two evenings per week from 5:30p - 8:30p.The Evening CORE provides 576 hours of skills-based instruction, including 288 hours of hands-on lab time.
  • We prepare our students for an entry-level position in a cybersecurity related role as a security analyst, security threat analyst, security engineer or security consultant.
  • Our curriculum is designed in conjunction with industry partners and employers to satisfy current hiring requirements.
  • Our training emphasizes hands-on exercises to build skills across the products currently in use by the industry.
  • The Evening CORE includes CISSP (or CISSP Associate) and Security+ certifications.
  • Scholarships and Financing are Available 

Application Deadlines:
1/2/17 for Winter 2017 Session 
(Colorado Springs, CO)

Target Audience

The primary target audience for this Academy is:

  • Network Engineers and/or Programmers

Prerequisites

It is recommended that, prior to enrollment, students have adequate knowledge in the fundamentals of networking and/or programming. No prior security experience is required.

Course Objectives

The Evening CORE Program is a 42-week intensive program designed to give you the tools to get a job, or a better job, in cybersecurity. We're educating a group of highly skilled people that will make meaningful contributions to the field of information security for years to come. Your instructors will be top technical experts from the region. 

The Evening CORE includes hands on instruction in state-of-the-art labs, guided product training and essential certifications. Skills are taught on an array of the products currently used in security operations. Upon graduation you’ll be ready to begin or resume your security career with a decided edge.
 

Course Outline

Below are the six courses included in the Evening CORE Program curriculum:

COURSE 1: NETWORK SECURITY
This course will focus on core ideas in network security.  The first portion of the class will review basic network protocols: Ethernet, 802.11 (wifi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, etc.  Then we will introduce attacks on these basic technologies: TCP hijacking, ARP cache poisoning and domain spoofing, as well as countermeasures.  We will then explain sniffing and port scanning, firewalls, IDSes and NIDSes.  We will cover wireless protocols and their security.  Then we will segue into AppSec with a focus on web security.  Finally we will look at denial of service and attack payloads.

COURSE 2: SYSTEM SECURITY
This course will focus on core ideas in system security.  The first portion of the class will review the three central desktop OSes: Windows, OS X, and Linux, along with the two preeminent mobile OSes: Android and iOS.  We will cover basic configuration of standard services and what happens when this is not done correctly.  We will study Windows Security, then Linux Security.  We will cover standard attacks such as buffer and heap overflows, heap spraying, format string exploits and race conditions.  Finally we will talk about payloads and persistent access.

COURSE 3: APPLIED CRYPTOGRAPHY
This course will focus on core primitives of cryptography (block ciphers, public key algorithms, and hashing), and then work upwards toward modes-of-operation, encryption and authentication primitives.  Finally we will understand high level secure protocols built from these underlying components; this includes SSL/TLS, SSH, Electronic Voting, and Crypto Currencies.  We will also study vulnerabilities and misconfigurations of these technologies to best understand where practitioners often go wrong during an implementation.

COURSE 4: DECTECTION & LOG MANAGEMENT
This course will instruct students on computer information systems security monitoring, intrusion detection, and crisis management. It includes topics such as alarm management, signature configuration, sensor configuration, and troubleshooting components. It also emphasizes identifying, resolving, and documenting network crises and activating the response team. 

COURSE 5: STRATEGY & ANALYSIS
This course will cover a wide range of topics consisting of security culture, ethics, security economics, security professionalism, psychology of analysis, criminal psychology, threat intelligence and much more.  The purpose of this course is to help students gain an appreciation of what it means to be a security professional and how to operate in the profession ethically and effectively.

COURSE 6: POLICY & REGULATIONS
This course is designed to teach students how to engage all functional levels within the enterprise to deliver information system security. To this end, the course will address a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity. Each piece of the puzzle must be in place for the enterprise to achieve its security goals; adversaries will invariably find and exploit weak links.
 

SLI Main Menu