No prior experience necessary! We will empower you with the critical classroom and lab-driven instruction needed to prepare and qualify you for the cybersecurity industry.

CyberWarrior Academy is proud of our 85% to 93% placement rate, with academy graduates working at companies such as Houghton Mifflin and Partners Healthcare.

CyberWarrior Academy Was Built To Create Opportunity

High-Wage Careers For People Underserved And Underemployed

Cybersecurity represents a significant opportunity for anyone looking for a sustainable, rewarding, and lucrative career. CyberWarrior Academy has created a career pathway program that combines vocational lab-driven training with on the job, competency-based experience. Our program provides the knowledge, tools, and certifications necessary to begin a career in cybersecurity. We also partnered with Ascent so that our students receive financial aid, including living expenses!

"Cybersecurity is the core national security challenge we are facing"

- Joe Biden, 46th. President of the United States.

“3,500,000 open Cybersecurity jobs globally,” including 500,000 openings in USA, of which 160,000 are Security Analysts roles.

“Cybersecurity pros name their price” with salaries that extend into Millions per year for top executives and hundreds of thousands for their reports.

According to ZipRecruiter, the average annual pay for an entry-level Cybersecurity Analyst is $82,565 a year!

Meet The Leadership Team

David LaFond

CTO, CyberWarrior Academy

Jonathan Edwards

COO, CyberWarrior Academy

CyberWarrior Academy Advisory Board

Sue Bergamo

CISO, Episerver

Bill Brown

CIO, Abacus Insights

Sonia Arista

CISO, Everbridge

Steve MacLellan

Strategic Advisor, SAP

Corey Thomas

Chairman & CEO at Rapid7

Steve Vinter

Sr. Director, Broad Institute of MIT and Harvard

Keith Hillis

VP Enterprise IT Risk & InfoSec, Akamai

Mark Arnold

VP Advisory Services, LARES

Houghton Mifflin Harcourt

What Our Corporate Partners Are Saying

“Thanks to CyberWarrior Academy for guiding people and also manufacturing the talent that our organization needs.” – “The cybersecurity profession is always exciting because the threat landscape keeps changing, there are always new things. I haven’t seen one cybersecurity professional who says “oh, my job is boring” because they always have something new. It’s always exciting.”

Houghton Mifflin Harcourt Top 10 Publishing Company in USA

What Will You Learn?

Our Full and Part-Time programs (Online with a LIVE Instructor) will prepare you for success in Cybersecurity, a field where salaries are growing fast and career opportunities are unlimited. This workforce training program combines vocational lab-driven exercises, delivered by ethical hackers and industry experts, with a competency-based model. We empower you with the hands-on knowledge, tools, and certifications necessary to launch a career in Cybersecurity.

Tools and Technologies

Firewalls & IDPS , Vulnerability Management, Packet Analysis, Security Monitoring, Malware Analysis, ​Incident Response, and Security Automation.

Soft Skills

Our innovative “Career Hacks” module delivers the soft skills to engage in the “business” of cybersecurity and is an integral part of the curriculum.

Consulting Experience

Our Capstone Projects build upon extensive lab exercises and LIVE instruction to empower you to engage in both Network Defense and Penetration Testing.

Our Training Is The Real Thing

We Bridge The Gap Between Student Experience And Employer Expectations

Our training utilizes cloud-based labs, built to practice on the same tools that companies depend on to protect their networks. This creates alignment between the student experience and employer expectations.

800+ Hours – Full and Part Time – LIVE Online

Here’s What We Teach You

CompTIA Network+ (Certification)

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. This certification covers how to install, maintain, troubleshoot, and support a network, understanding different aspects of networking technologies, including TCP/IP and the OSI model. It also tests knowledge of network components and where they function in association with the OSI model, network cabling, network security, and network troubleshooting.

CompTIA Security+ (Certification)

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. This course covers everything from how to install and configure systems to secure applications, networks, and devices, through performing threat analysis responding with appropriate mitigation techniques.

Firewalls & IDPS

Students will create and implement firewalls and IDPS using opensource software. They will learn Cisco ACLs using packet simulators like PacketTracer, Linux IP Tables, Opensource firewall Pfsense, implementing Snort IDPS and creating customized rules, Suricata, BRO and connecting it to SecurityOnion using an NSM tool. This module will allow them to build the confidence to feel comfortable working with any Firewall or IDPS system in the market.

Vulnerability Management

Students learn to create an inventory of assets using discovery tools and domain controller queries, and how to use basic vulnerability scanning capabilities of tools like NMAP. Students will create their own NMAP scripts and learn popular industry tools like Tenable Nessus Vulnerability Management, Rapid7 InsightVM, OpenVAS, among others. To culminate the class, students learn how to make an executive report and design remediation strategies.

Packet Analysis

This course teaches how to analyze packets and perform network forensic investigations effectively, using open-source software. Participants also learn how to differentiate between normal vs. abnormal protocols & behaviors. We cover tools like tcpdump, Wireshark & Tshark, Snort, Bro, NetworkMinner, and others. Students learn to create simple scripts using Python Scapy, and use these skills for detecting network sniffing attacks. This module will provide students with the skills to work with raw data and have a better understanding of the underlying technologies used in their networks.

Security Monitoring

Students learn to implement a customized security monitoring service using opensource software from scratch. We start with implementing a Syslog server in Linux using Rsyslog and integrate it with the famous ELK Stack (Elasticsearch, Logstash, and Kibana) for quick insights of data. Students also learn popular tools Graylog, Splunk, and how to perform Threat Intelligence to enrich logs

Malware Analysis

This course teaches participants everything from malware analysis fundamentals to the use of the latest reverse engineering tools to combat malware. Participants learn to break down potential malware threats and create solutions to combat them. We teach how to protect against malware in the future, performing dynamic and static analysis on all major file types. We guide students on carving malicious executables from documents, to recognize common malware tactics, and to debug and disassemble malicious binaries.

Incident Response

Students will learn to identify potentially harmful events and the difference between an incident response policy and an incident response plan. Participants will learn the best practices to build an incident response plan: prepare, identify, containment, eradication, recovery, and lessons learned. They will also develop a strong foundation on how to handle a cybersecurity incident.

Security Automation

Students will learn the necessary skills to automate security tasks by using the Python programming language. For analysts and other security professionals, automation is a fundamental tool that helps them keep up with the volume of threats and individual activities to defend the enterprise. They will learn automated data analysis, policy validation, and customized scanning. Participants will also be trained on how to use Python to automate offensive activities as a penetration tester and better understand modern-day attacks.

EC-Council Certified Ethical Hacker (Certification)

The Certified Ethical Hacker (CEH) certification teaches students to systematically attempt to inspect network infrastructures (with the consent of its owner) to find security vulnerabilities which a malicious hacker could potentially exploit. This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

EC-Council Certified Network Defender (Certification)

The Certified Network Defender (CND) trains entry-level network security administrators on defense-in-depth network security and the "protect, detect, and respond" approach to network security. Students gain a detailed understanding and the hands-on ability to act in real-life situations involving network defense.

Career Hacks

An important part of the CyberWarrior training program is also in the area of professional development and enhanced soft skills that will help a new cybersecurity professional realize success in their new workplace. In response to employer feedback and demand, our program focuses on soft/professional skill training that enhances a student’s “confidence” with their newfound skills. To expand the student’s overall core “competence” in cybersecurity, we embed skills such as critical thinking, communication, and presentation into our everyday curriculum. In each module, CWA introduces a skill through a company scenario/case study. In turn, the student uses the practical application of soft skills to reinforce and sustain both the technical and interpersonal learning.

Capstone Project I

Red Team exercise (Offense) – during this one-week capstone project, students use the hacking strategies they learned to assemble and execute an offensive plan on a given target. They develop a Penetration Test Report to present it to our board in an executive presentation. For evaluation purposes, we will bring CISOs and experts in the field to score the project outcome. The judges are hiring managers from our employer partners and other industry stakeholders.

Capstone Project II

Blue Team exercise (Defense) – during this one-week capstone project, students demonstrate they know how to handle defensive strategies from a technical standpoint. Subsequently they develop a post incident report and present it to our board as an executive presentation. For evaluation purposes, we will bring CISOs and experts in the field to score the project outcome. The judges are hiring managers from our employer partners and other industry stakeholders.

Graduate Testimonials

CyberWarrior Academy Changes Lives

Rodley Rene

What Our Graduates Are Saying

“It was a major key to my development and in helping me to get the position. I definitely recommend CyberWarrior Academy! My training prepared me by giving me insight into what the industry is looking for and what things they’re doing currently. One of the things that I liked best about the program is that we had people from the industry come in each week and tells about what they do and what they are looking for.”

Rodley Rene Information Security Engineer Partners Healthcare

What Our Graduates Are Saying

“I definitely recommend CyberWarrior Academy! My training prepared me by giving me insight into what the industry is looking for and what things they’re doing currently.”

– Eddy Milcette Information Security Analyst, Houghton Mifflin Harcourt

Eddy Milcette

Tuition for 6 Months of Training

$23,500 USD

World-class curriculum. World-class instructors. Tailored Financial Aid options for U.S. citizens.

Start Dates

Our upcoming dates enable you to start at CyberWarrior Academy.

November 1st, 2021

January 10th, 2022

Apprenticeship Track

We offer an optional Apprenticeship Track for students already accepted into our training bootcamp. This competitive program is an add-on and has the same curriculum as the non-apprenticeship track. Candidate selection is at the discretion of our corporate partners. If selected, the candidate is hired immediately by CYBERWARRIOR ACADEMY and is paid to learn. Upon completion of the program, the candidate enters a structured 12-month up-skilling process in partnership with the company that is sponsoring the candidate. Upon completion of the apprenticeship, the candidate is hired by the sponsoring company.

Why we are different?

A Broader and Deeper Approach to Learning

CyberWarrior Academy understands private industry needs better than legacy training organizations – we are the industry. We have credibility when talking to employers and the human capital to be current and relevant. As practitioners, we live the realities and challenges of protecting sensitive data and critical infrastructure for some of the world’s top enterprises.

Looking to learn more about our program?

Please contact us and one of our counselors will be in touch!