Cybersecurity Academy


Check out our full list of training locations and learning formats. Please note that the location you choose may be an Established HD-ILT location.


The Academy was founded and designed specifically to provide aspiring individuals with basic networking and programming experience with a high quality, direct path to cybersecurity career options in a minimum amount of time. Outside the Academy, the evolution from a general IT to a cybersecurity specialty typically takes five to ten years of on the job experience and self-teaching. The Academy enables this transition in five months.

  • The Academy is a full time, five-month cybersecurity skills and theory educational program. 
  • We prepare our students for an entry-level position in a cybersecurity related field as a security analyst or an engineer.
  • Our curriculum is designed in conjunction with industry partners and potential employers of our graduates to satisfy current hiring requirements.
  • Our training emphasizes hands-on exercises to build skills across the products currently in use by the industry.
  • The Academy course includes CISSP (or CISSP Associate) and Security+ certifications.
Scholarships and Financing Is Available 

Target Audience

The primary target audience for this Academy is:

  • Network Engineers and/or Programmers


It is recommended that prior to enrollment, that a student will have adequate knowledge in the fundamentals of networking and/or programming.

Course Objectives

The Academy is a five-month intensive program designed to give you the tools to get a job, or a better job, in cybersecurity. We're educating a group of well-trained people that will make meaningful contributions to the field of cybersecurity for years to come. Your instructors are the best technical experts from across the country. 

The Academy includes hands on instruction in our state-of-the-art labs, guided production training and essential certifications. There is remarkable access to an array of the products used in security operations. At the end of five months you’ll be ready to begin or resume your cybersecurity career with a decided edge.

Full Course Outline

SecureSet Academy employs world class instructors who are at the top of their game who educate according to our industry-vetted, proprietary curriculum.  We understand that cybersecurity is a broad field with multiple domains.  This makes is difficult for anyone person to have mastered them all.  As a result, we find domain experts who not only excel in their individual domains, but can also relate their expertise back to the broader field. In this manner we are able to offer a comprehensive curriculum in cybersecurity from top level experts. Below are six modules that are part of our broader curriculum for our Academy program.

This course will focus on core ideas in network security.  The first portion of the class will review basic network protocols: Ethernet, 802.11 (wifi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, etc.  Then we will introduce attacks on these basic technologies: TCP hijacking, ARP cache poisoning and domain spoofing, as well as countermeasures.  We will then explain sniffing and port scanning, firewalls, IDSes and NIDSes.  We will cover wireless protocols and their security.  Then we will segue into AppSec with a focus on web security.  Finally we will look at denial of service and attack payloads.  

This course will focus on core ideas in system security.  The first portion of the class will review the three central desktop OSes: Windows, OS X, and Linux, along with the two preeminent mobile OSes: Android and iOS.  We will cover basic configuration of standard services and what happens when this is not done correctly.  We will study Windows Security, then Linux Security.  We will cover standard attacks such as buffer and heap overflows, heap spraying, format string exploits and race conditions.  Finally we will talk about payloads and persistent access. 

This course will cover a wide range of topics consisting of security culture, ethics, security economics, security professionalism, psychology of analysis, criminal psychology, threat intelligence and much more.  The purpose of this course is to help students gain an appreciation of what it means to be a security professional and how to operate in the profession ethically and effectively. 

This course will focus on core primitives of cryptography (block ciphers, public key algorithms, and hashing), and then work upwards toward modes-of-operation, encryption and authentication primitives.  Finally we will understand high level secure protocols built from these underlying components; this includes SSL/TLS, SSH, Electronic Voting, and Crypto Currencies.  We will also study vulnerabilities and misconfigurations of these technologies to best understand where practitioners often go wrong during an implementation.

This course will instruct students on computer information systems security monitoring, intrusion detection, and crisis management. It includes topics such as alarm management, signature configuration, sensor configuration, and troubleshooting components. It also emphasizes identifying, resolving, and documenting network crises and activating the response team.  

This course is designed to teach students how to engage all functional levels within the enterprise to deliver information system security. To this end, the course will address a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity. Each piece of the puzzle must be in place for the enterprise to achieve its security goals; adversaries will invariably find and exploit weak links.
SLI Main Menu