ETI Program Overview

How we support the Department of Defense?

The Cyberspace Workforce Management mandate aims to unite the overall cyberspace workforce and set up definite workforce parts like cyberspace impacts, cybersecurity, and cyberspace data innovation-to adjust, oversee and normalize cyberspace work jobs, benchmark capabilities, and preparing prerequisites. The Department of Defense outlined the cybersecurity certification requirements for specific job categories. Most DoD-related organizations are required to comply. All said, we better prepare our students to support the cyber front line!

A+

Course Description

The course contains today’s core technologies from security to cloud to data management and more which are industry standard for launching IT careers into today’s digital world.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationA +

Objectives

  • Demonstrate baseline security skills for IT support professional.
  • Configure device operating systems, including Windows, Mac, Linux, Chrome OS, Android and iOS and administer client-based as well as cloud-based (SaaS) software ·
  • Troubleshoot and problem solve core service and support challenges while applying best practices for documentation, change management, and scripting.
  • Support basic IT infrastructure and networking · Configure and support PC, mobile and IoT device hardware ·
  • Implement basic data backup and recovery methods and apply data storage and management best practices

Prerequisite

No prerequisites are necessary, but basic knowledge of computer hardware and operating systems is recommended.

Course Content

Computer Fundamentals: Mobile Devices

Computer Fundamentals: Networking A. What Is Networking?

Computer Fundamentals: Hardware

Computer Fundamentals: Virtualization and Cloud Computing

cbfb

xcf

Network+

Course Description

These courses will help you prepare for exam as they aim to provide a solid understanding of networking concepts, operations, and procedures.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationNetwork +

Objectives

  • Use the OSI model to determine the order protocols interact with each other
  • Examine network configuration on your workstation and clearly understand the different components
  • Identify the most important networking hardware and its purpose in the data network
  • Know the different types of 802.11 wireless networks and where they are used
  • Differentiate cabling types and how fiber optics are categorized for data network use
  • Use the secure mechanism engineers employ to access network hardware
  • Read network documentation
  • Utilize appropriate tools to monitor the state of network devices
  • Maintain a safe environment for networks
  • Troubleshoot and track down network problems

Prerequisite

No prior experience is required, but concepts discussed throughout A+ is an advantage.

Course Content

Networking Concepts and Protocols

Introduction to Enterprise Network Infrastructure

Network Management and Operations

Network Security Basics

Security+

Course Description

This course covers topics on threats, attacks, and vulnerabilities for Security+. It also includes the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. In addition, students will learn the characteristics of the various types of threat actors, the skills they have and the tools they use to defend the cyberspace. Finally, they will acquire knowledge and skills about penetration testing and vulnerability scanning and how they are used to help tighten security and mitigate potential breaches. 

By the end of this ____ week-long course, students will have a solid understanding of the various threats and and likely the tools to be used to mitigate these threats.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationSecurity +

Objectives

  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts 
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security 
  • Implement secure network architecture concepts and systems design 
  • Install and configure identity and access services, as well as management controls 
  • Implement and summarize risk management best practices and the business impact 
  • Install and configure wireless security settings and implement public key infrastructure

Prerequisite

Students must have obtained the Network+ credential and have at least two years of IT administration experience with a security focus. 

Course Content

Threats, Attacks, and Vulnerabilities

Technologies and Tools

Architecture and Design

Identity and Access Management

Risk Management

Cryptography and PKI

CCNA Security

Course Description

CCNA Security equips students with the knowledge and skills needed to prepare for entry-level security specialist careers. This course is a hands-on, career-oriented e-learning solution that emphasizes practical experience.

Various types of hands-on labs provide practical experience, including procedural and troubleshooting labs, skills integration challenges, and model building.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationCCNA Security

Objectives

  • Describe the security threats facing modern network infrastructure · Secure network device access
  • Implement AAA on network devices
  • Mitigate threats to networks using ACLs
  • Implement secure network management and reporting
  • Mitigate common Layer 2 attacks
  • Implement the Cisco IOS firewall feature set
  • Implement an ASA
  • Implement the Cisco IOS IPS feature set
  • Implement site-to-site IPSec VPNs
  • Administer effective security policies

Prerequisite

Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1), working knowledge of the Windows operating system and working knowledge of Cisco IOS networking and concepts

Course Content

Introduction to Network Security Principles

Perimeter Security

Computer Fundamentals: Hardware

Network Security Using Cisco IOS Firewalls

Site-to-Site VPNs

Network Security Using Cisco IOS IPS

Network Security Using Cisco IOS IPSLAN, SAN, Voice, and Endpoint Security Overview

cbfb

xcf

Cyber Security Analyst (CySA+)

Course Description

This certification covers the skills and knowledge that are associated with Firewall Technology, Critical examination of Cybersecurity based analytics (for example, reviewing log files from servers), the ability to conduct various kinds of data analysis to positively confirm any security weaknesses, threats, or vulnerabilities that are posed to a business or a corporation, the ability to configure and deploy various kinds of network-based, threat detection tools, and the know-how in securing software-based applications in the entity.

This course will help prepare students for the CySA+ Certification examination.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationCySA+

Objectives

  • Apply environmental reconnaissance techniques using appropriate tools and processes
  • Analyze the results of a network reconnaissance
  • Implement or recommend appropriate response and countermeasures
  • Explain the purpose of practices used to secure a corporate environment
  • Implement information security vulnerability management processes
  • Analyze the output resulting from a vulnerability scan
  • Compare and contrast common vulnerabilities found within an organization
  • Analyze threat data or behavior to determine the impact of an incident
  • Prepare a toolkit and use appropriate forensics tools during an investigation
  • Explain the importance of communication during the incident response process
  • Analyze common symptoms to select the best course of action to support incident response
  • Summarize the incident recovery and post-incident response processes
  • Explain the relationship between frameworks, common policies, controls, and procedures
  • Use data to recommend remediation of security issues related to identity and access management
  • Review security architecture and make recommendations to implement compensating controls
  • Use application security best practices while participating in the software development life cycle
  • Compare and contrast the general purpose and reasons for using various security tools and technologies

Prerequisite

It is recommended that CySA+ candidates must have a minimum of 3-4 years of hands-on information/cybersecurity or related experience.

Course Content

Enterprise Security: Policies, Practices, and Procedures

Computer Fundamentals: Networking A. What Is Networking?

The Issues of Identity and Access Management (IAM)

Secure Software Development

Performing and Analyzing Network Reconnaissance

Implementing and Performing Vulnerability Management

cbfb

xcf

GICSP

Course Description

GICSP (Global Industrial Cyber Security Professional) is the newest certification in the GIAC family and focuses on the essential knowledge of securing critical infrastructure assets. GICSP is the only certification in the world that focuses on the cybersecurity aspects of Industrial Control Systems (ICS). GICSP is a certification for engineers, ICS security professionals, and ICS technology specialists.

The course provides the opportunity to learn and discuss the newest and most challenging cybersecurity risks to control systems and the most effective defenses. The training is designed in such a way that you will leave with newly gained knowledge, tools, and techniques you can put to work immediately in your daily practice.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationGICSP

Objectives

  • Acquire knowledge about standards and regulations for Industrial Control Systems (ICS)
  • Understand the threats to the security of process control systems
  • Understand the technologies used to carry out security audits
  • Understand the industrial control system components, purposes, deployments, significant drivers and constraints
  • Experience hands-on lab learning experiences to control system attack surfaces, methods, and tools
  • Demonstrate an understanding of control system approaches to system and network defense architectures and techniques
  • Gain knowledge of how to harden an Industrial Control System (ICS) using end-point protection, securing memorable data or updating systems
  • Develop incident-response skills in control system environments
  • Understand governance models and resources for Industrial Cyber Security Professionals.

Prerequisite

To be successful in completing this course, a good understanding of basic computer networking and security principles, networking protocols, and a CompTIA Network+ certification is recommended.

Course Content

ICS Overview

IT & ICS Differences

Field Devices and Controllers

Supervisory Systems

Workstations and Servers

ICS Security Governance

cbfb

xcf

GSEC

Course Description

This course is the most effective step to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. Students will learn tips and tricks designed to help them win the battle against the wide range of cyber adversaries.

GIAC Security Essentials (GSEC) is one of the top certifications on the market for professionals who want to prove their IT skills on security-related tasks.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationGSEC

Objectives

  • Develop effective security metrics that provide a focused playbook that the IT department can implement, auditors can validate, and executives can understand
  • Analyze the risk to your environment to drive the creation of a security roadmap that focuses on the right areas of security.
  • Understand practical tips and tricks that focus on addressing high-priority security problems within your organization and doing the right things that lead to security solutions that work.
  • Learn why some organizations win and why some lose when it comes to security and, most importantly, how to be on the winning side.
  • Understand the core areas of security and how to create a security program that is built on a foundation of Detection, Response, and Prevention

Prerequisite

GSE prerequisite baseline is GSEC, GCIH, GCIA with two Gold certifications. The GSEC prerequisite is unique because of dual Windows and Unix coverage.

Course Content

Network Security Essentials

Defense-in-Depth

Vulnerability Management and Response

Data Security Technologies

Windows Security

Linux, Mac, and Smartphone Security

cbfb

xcf

Security+ CE

Course Description

This course covers Domain 1 of the Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for Security+, you’ll learn about the various types of threats and attacks every company faces. First, the ins and outs of Malware, ransomware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks will be discussed.

Next is the characteristics of the various types of threat actors, the skills they have, and the tools they use. Finally, the penetration testing and vulnerability scanning and how they’re used to help tighten security and mitigate potential breaches will follow.

By the end of this course, you’ll have a solid understanding of the various threats you’re likely to face and what tools are available to mitigate these threats.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationSecurity+ CE

Objectives

  • Assess the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security failures
  • Critique and assess the strengths and weaknesses of general cybersecurity models, including the CIA triad
  • Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people
  • Assess how all domains of security interact to achieve effective system-wide security at the enterprise level.
  • Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security domains (IT, physical, classification, personnel, and so on)
  • Assess the role of strategy and policy in determining the success of information security
  • Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans
  • Design a notional information security plan that incorporates relevant principles of the lifecycle management
  • Evaluate the principles of risk and conduct a notional risk management exercise
  • Assess the role of good metrics and key performance indicators (KPIs) in security assessment and governance
  • Create a good set of information security metrics
  • Critique the current legal and regulatory environment as it applies to cybersecurity
  • Identify and contrast the most common security standards and associated catalogs of security controls
  • Contrast the various approaches to security training and formulate a simple training agenda
  • Justify the need for business continuity planning and propose how to implement such a plan successfully within a modern enterprise
  • Compare and contrast logical and physical security
  • Appraise the current structure of cybersecurity roles across the DoD enterprise, including the roles and responsibilities of the relevant organizations
  • Assess the strengths and weaknesses of the certification and accreditation approach to cybersecurity
  • Evaluate the trends and patterns that will determine the future state of cybersecurity.

Prerequisite

This course is intended for DoD civilians and military personnel who perform security leadership and management duties. All students will be required to have achieved the Security Fundamentals Professional Certification (SFPC) under the DoD Security Professional Education Development Program (SPēD) or to have a comparable fundamental knowledge of DoD security programs.

Course Content

The Security Environment

Principles of Cybersecurity

Cybersecurity Management Concepts

Enterprise Roles and Structures

Strategy and Strategic Planning

Security Plans and Policies

Laws and Regulatory Requirements

Security Standards and Controls

Risk Management

Security Metrics and Key Performance Indicators (KPIs)

Physical Security and Environmental Events

Contingency Planning

Security Education, Training, and Awareness

Managing information security across the DoD enterprise (1)

Managing information security across the DoD enterprise (2)

The future of cybersecurity

cbfb

xcf

SSCP

Course Description

The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor, and administer IT infrastructure under information security policies and procedures that ensure data confidentiality, integrity, and availability.

The broad spectrum of topics included in the SSCP Common Body of Knowledge (CBK) ensures its relevance across all disciplines in the field of information security. Successful candidates are competent in the following 7 domains:

• Access Controls
• Security Operations and Administration
• Risk Identification, Monitoring, and Analysis
• Incident Response and Recovery
• Cryptography
• Network and Communications Security
• Systems and Application Security

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationSSCP

Objectives

  • Implement and maintain authentication methods
  • Comply with (ISC)² Code of Ethics
  • Understand security concepts
  • Document, implement and maintain functional security controls
  • Implement security controls and assess compliance
  • Understand the risk management process
  • Perform security assessment activities
  • Operate and maintain monitoring systems
  • Understand and support forensic investigations
  • Learn the fundamental concepts of cryptography and requirements for cryptography
  • Understand and support secure protocols and Public Key Infrastructure (PKI) systems
  • Apply fundamental concepts of networking
  • Understand network attacks and countermeasures
  • Manage network access controls and network security
  • Operate and configure network-based security devices and wireless technologies
  • Identify and analyze malicious code and activity
  • Implement and operate endpoint device security
  • Operate and configure cloud security
  • Operate and secure virtual environments

Prerequisite

Candidates must have a minimum of 1-year cumulative work experience in 1 or more of the 7 domains of the SSCP CBK. A 1-year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.

A candidate that doesn’t have the required experience to become an SSCP may become an Associate of (ISC)² by successfully passing the SSCP examination. The Associate of (ISC)² will then have 2 years to earn the 1-year required experience.

Course Content

Domain 1: Access Controls

Domain 2: Security Operations and Administration

Domain 3: Risk Identification, monitoring, and analysis

Domain 4: Incident Response and Recovery

Domain 5: Crytograhpy

Domain 6: Network and Communications Security

Domain 7: System and Application Security

cbfb

xcf

Certified Network Defender (CND)

Course Description

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators.

The program prepares network administrators on how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond, and predict an approach to network security.

More than 50% of the CND course contains hands-on labs dedicated to helping students learn practical skills in live ranges designed to cover domains such as Network Defense Management, Network Perimeter Protection, Endpoint Protection, Application, and Data Protection, Enterprise Virtual, Cloud, and Wireless Network Protection, Incident Detection and Response and Threat Prediction which will provide network administrators real-world expertise that can be applied to current network security technologies and operations.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationCND

Objectives

CND certification exams cover all critical aspects of the information and network security and help the participants gain an in-depth understanding of:

  • Core essentials of networking and modernistic defense techniques
  • Security threats and identifying vulnerabilities
  • Implementation of various network security protocols and controls
  • Defining and implementing security policies in a network infrastructure
  • Establishing physical security controls and deploying foolproof authentication techniques
  • Configuring the host security and process of encrypting the file systems
  • Implementation and management of the Firewall
  • Configuring and managing Intrusion Detection and Prevention Systems
  • VPN security management
  • Wireless networks security
  • Monitoring and analyzing the network traffic
  • Network security risks and vulnerability identification
  • Network Incident Response and Management

Prerequisite

Knowledge of Networking is needed to successfully complete this course.

Course Content

Computer Network and Defense Fundamentals

Network Security Threats, Vulnerabilities, and Attacks

Network Security Controls, Protocols, and Devices

Network Security Policy Design and Implementation

Physical Security

Host Security

Secure Firewall Configuration and Management

Secure IDS Configuration and Management

Secure VPN Configuration and Management

Wireless Network Defense

Network Traffic Monitoring and Analysis

Network Risk and Vulnerability Management

Data Backup and Recovery

cbfb

xcf

cbfb

xcf

Something awesome here.

Something awesome here.

Something awesome here.

Something awesome here.

Something awesome here.

Something awesome here.

A day in the life

Cybersecurity professionals are trained to detect and implement quick solutions to cyber threats against the data network of an organization. Their primary responsibility is to assure the security and integrity of the system at any given time. This is most crucial especially now that criminality in cyberspace has morphed into a more vicious and expanding enterprise.

The work of an online security expert is not easy for the hesitant but the rewards are magnificent for achievers who consider the cybersecurity profession as a terrific career path. 

As of 2019, a Cybersecurity Engineer’s annual income ranges from $120,000 to $200,000. An Application Security Engineer’s income is not far having an average between $120,000 to $180,000. Cybersecurity Analysts and Network Security Engineers also enjoy huge salaries at $90,000 to $160,000 and $125,000 to $185,000 respectively. At the top of the list is the Information Security Manager who earns an average of $125,000 to $215,000.