Course curriculum

  • 2

    Getting Started

    • Required resources

      FREE PREVIEW
    • Gateway to Cybersecurity Accelerator Program (Overview PDF)

    • Resume Submission

    • Baseline Cybersecurity Assessment

    • Private Community and Assistance

    • Weekly Group Sessions (Zoom Details Enclosed)

  • 3

    Week 1: Security Risk Assessment

    • Security risk assessment overview

    • The Why

    • Our Case Study

    • Security Assessment Plan Template

    • Complete & submit your Security Assessment Plan

    • Security Risk Assessment Overview

  • 4

    Week 2: Vulnerability Scanning

    • Running vulnerability scans & generating reports

    • Qualys account access

    • Running vulnerability scans (exercise)

    • Submit your vulnerability scan report

    • Vulnerability Scanning Overview

  • 5

    Week 3: Phishing Attacks & Social Engineering

    • What is phishing & social engineering?

    • Phishing Video Analysis

    • How to help companies avoid falling victim to these attacks

    • Sample Security Awareness Presentation

    • Phishing Examples

    • Phishing Quiz

    • Social Engineering Video

    • BONUS: Security+ Notes for Threats, Attacks, & Vulnerabilities

  • 6

    Week 4: Data Security & Protection

    • Why is data security & protection important?

    • Data security, protection methods & recommendations

    • Assessment Considerations

    • Assessment Data

    • Data Security & Protection Quiz

  • 7

    Week 5: Incident Response

    • What is incident response & how to prepare?

    • Sample Incident Response Plan Overview

    • Sample Incident Response Plan

    • Submit Your Incident Response Log

    • Incident Response Survey

    • Look Ahead: Client Security Assessment Report Template

  • 8

    Week 6: Security Assessment Report

    • Security assessment report overview

    • Security Assessment Report Template

    • Submit your Security Assessment Report (exercise)

  • 9

    Week 7: The Cyber Boss Advantage

    • IT Security Certifications

    • Tools & Tactics to become more marketable in Cybersecurity

    • Job descriptions and what hiring managers want

    • Negotiating salary and ensuring pay equality

  • 10

    Week 8: Resume Critique & Interview Preparation

    • How to set yourself apart from your competition

    • How to properly prepare for interviews and impress the audience

    • Recap your journey

    • Baseline Cybersecurity Assessment (assess your progress)

    • Accelerator program feedback

    • What's next?