Career Training

Online

6 Months

Instructor-Facilitated Format

Continuous

Price: $13,000.00
Quantity:

Course Description

This mentor-led bootcamp offers a progressive learning journey from fundamental cybersecurity principles to advanced tactical skills. You’ll start with basic cybersecurity principles, learning about vulnerabilities and the tools used in ethical hacking to identify and exploit them. You will acquire essential knowledge in access control policies, incident response procedures, and digital forensics.

As the bootcamp progresses, you will advance to more specialized areas of cybersecurity. You’ll gain expertise in network perimeter security, mastering techniques to protect and defend against external threats. Additionally, the program delves into the intricacies of cryptography, understanding encryption algorithms, secure communication protocols, and data protection methods.

Throughout the bootcamp, you will engage in hands-on exercises, real-world simulations, and practical projects to reinforce learning. You will develop the skills necessary to effectively secure networks, identify potential threats, and respond to incidents. Graduates emerge well-prepared for a variety of cybersecurity roles, such as security analysts, network administrators, penetration testers, or incident response specialists.

Learning Objectives

  • Working with Linux Operating System
  • Creating & Managing Users and Groups
  • Managing Filesystem and Directory Permissions
  • Installing and Managing Linux Services and Process
  • Configuring Network Services
  • Backup and Restore Linux Systems
  • Centralized Logging and Monitoring
  • Planning, Designing, and implementing Network
  • Designing and implementing Logical Networks
  • Installing and Configuring Routers
  • Analyzing and Troubleshooting Network Traffic & Connectivity
  • Detecting an Attack in Progress
  • Identifying and exploiting operating system
  • Exploiting Web Application
  • Performing Pivoting and Escalation
  • Exploiting Network Based Vulnerability
  • Identify and Exploit Wireless Network
  • Identify and Exploit Network Hardware Vulnerabilities
  • Identify & Mitigate Common Configurational Vulnerabilities
  • Implementing access control Policies
  • Implementing Network perimeter security
  • Designing and Implementing Cryptography
  • Preparing incident policy and Managing incidents
  • Implementing forensics technologies
 

Contact Us

Email: lifetimelearning@bsu.edu
Phone: 765-285-8565

Materials Provided

All materials are included within the course.

Measure of Performance

Professional Certification Opportunity

Course Requirements

High School Diploma or GED

No prior experience is required to pursue this bootcamp however students must have a high-school diploma or degree equivalent and be fluent English speakers.

If you need course adaptations or accommodations because of a disability, please fill out the self-disclosure form. The Office of Disability Services coordinates services for students with disabilities. Documentation of a disability needs to be on file in that office before any accommodations can be provided.

Price: $13,000.00
Quantity: