Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Chesapeake Cyber Institute
  4. Audit of Cyber Bootcamp course part 1

Audit of Cyber Bootcamp course part 1

This a self paced 12 week audit course that provides a hands on comprehensive course that combines the concepts covered in all the courses. It allows students to complete a project on a Linux platform with a local area network architecture. One virtual machine will be the attacking device configured with necessary tools to launch attacks whereas a second device will host exploitable OS. Introduction to mainstream cyber security tools such as sniffers, Intrusion Detection, Attack tools, Firewalls, and forensics.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

Motivated people from diverse backgrounds who want to work in this field. Some knowledge of programming languages, as well as familiarity with Windows, Linux or Unix operating systems, will help with the Cyber Security Engineering Program. Detail-oriented problem-solvers with a technical background are a good fit for the program. We place a higher value on technical ability over formal education. Networking engineering certifications and degrees in technology, science, and mathematics are helpful. Undergraduate Degree or equivalent life experience

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

Self Study in Cyber Security

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Training, Education, and Awareness
  • Test and Evaluation
  • Network Services
  • Exploitation Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: