CyberWarrior Academy’s Cybersecurity Bootcamp Courses and Certifications
CompTIA Network+ (Certification)
CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting,
configuring, and managing networks. This certification covers how to install, maintain,
troubleshoot, and support a network, understanding different aspects of networking technologies,
including TCP/IP and the OSI model. It also tests knowledge of network components and where
they function in association with the OSI model, network cabling, network security, and
CompTIA Security+ (Certification)
CompTIA Security+ is the first security certification IT professionals should earn. It
establishes the core knowledge required of any cybersecurity role and provides a springboard
to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on
troubleshooting to ensure security professionals have practical security problem-solving skills.
This course covers everything from how to install and configure systems to secure applications,
networks, and devices, through performing threat analysis responding with appropriate mitigation
Firewalls & IDPS
Students will create and implement firewalls and IDPS using opensource software. They will learn Cisco ACLs using
packet simulators like PacketTracer, Linux IP Tables, Opensource firewall Pfsense, implementing Snort IDPS and creating
customized rules, Suricata, BRO and connecting it to SecurityOnion using an NSM tool. This module will allow them to
build the confidence to feel comfortable working with any Firewall or IDPS system in the market.
Students learn to create an inventory of assets using discovery tools and domain controller queries, and
how to use basic vulnerability scanning capabilities of tools like NMAP. Students will create their own NMAP
scripts and learn popular industry tools like Tenable Nessus Vulnerability Management, Rapid7 InsightVM, OpenVAS,
among others. To culminate the class, students learn how to make an executive report and design remediation strategies.
This course teaches how to analyze packets and perform network forensic investigations effectively, using open-source
software. Participants also learn how to differentiate between normal vs. abnormal protocols & behaviors. We cover
tools like tcpdump, Wireshark & Tshark, Snort, Bro, NetworkMinner, and others. Students learn to create simple scripts
using Python Scapy, and use these skills for detecting network sniffing attacks. This module will provide students with
the skills to work with raw data and have a better understanding of the underlying technologies used in their networks.
Students learn to implement a customized security monitoring service using opensource software from scratch.
We start with implementing a Syslog server in Linux using Rsyslog and integrate it with the famous ELK Stack
(Elasticsearch, Logstash, and Kibana) for quick insights of data. Students also learn popular tools Graylog,
Splunk, and how to perform Threat Intelligence to enrich logs
This course teaches participants everything from malware analysis fundamentals to the use of the latest
reverse engineering tools to combat malware. Participants learn to break down potential malware threats
and create solutions to combat them. We teach how to protect against malware in the future, performing
dynamic and static analysis on all major file types. We guide students on carving malicious executables
from documents, to recognize common malware tactics, and to debug and disassemble malicious binaries.
Students will learn to identify potentially harmful events and the difference between an incident response
policy and an incident response plan. Participants will learn the best practices to build an incident response
plan: prepare, identify, containment, eradication, recovery, and lessons learned. They will also develop a strong
foundation on how to handle a cybersecurity incident.
Students will learn the necessary skills to automate security tasks by using the Python programming
language. For analysts and other security professionals, automation is a fundamental tool that helps
them keep up with the volume of threats and individual activities to defend the enterprise. They will
learn automated data analysis, policy validation, and customized scanning. Participants will also be
trained on how to use Python to automate offensive activities as a penetration tester and better
understand modern-day attacks.
The Certified Ethical Hacker (CEH) certification teaches students to systematically attempt to inspect
network infrastructures (with the consent of its owner) to find security vulnerabilities which a malicious
hacker could potentially exploit. This accredited course provides the advanced hacking tools and techniques
used by hackers and information security professionals alike to break into an organization. As we put it,
“To beat a hacker, you need to think like a hacker”.
The Certified Network Defender (CND) trains entry-level network security administrators on defense-in-depth network security
and the "protect, detect, and respond" approach to network security. Students gain a detailed understanding and the
hands-on ability to act in real-life situations involving network defense.
An important part of the CyberWarrior training program is also in the area of professional development and enhanced
soft skills that will help a new cybersecurity professional realize success in their new workplace. In response to
employer feedback and demand, our program focuses on soft/professional skill training that enhances a student’s
“confidence” with their newfound skills. To expand the student’s overall core “competence” in cybersecurity,
we embed skills such as critical thinking, communication, and presentation into our everyday curriculum. In
each module, CWA introduces a skill through a company scenario/case study. In turn, the student uses the
practical application of soft skills to reinforce and sustain both the technical and interpersonal learning.
Capstone Project I
Red Team exercise (Offense) – during this one-week capstone project, students use the hacking strategies they
learned to assemble and execute an offensive plan on a given target. They develop a Penetration Test Report
to present it to our board in an executive presentation. For evaluation purposes, we will bring CISOs and
experts in the field to score the project outcome. The judges are hiring managers from our employer partners
and other industry stakeholders.
Capstone Project II
Blue Team exercise (Defense) – during this one-week capstone project, students demonstrate they know how to
handle defensive strategies from a technical standpoint. Subsequently they develop a post incident report
and present it to our board as an executive presentation. For evaluation purposes, we will bring CISOs
and experts in the field to score the project outcome. The judges are hiring managers from our employer
partners and other industry stakeholders.
CyberWarrior Academy understands industry needs better than other training organizations. As cybersecurity practitioners, we live the realities and challenges of protecting sensitive data and critical infrastructure every day.
With our Cybersecurity Bootcamp, you will be trained to earn four globally recognized cybersecurity certifications Network+, Security+, CND, and CEH, and have the opportunity to receive 27 college credits, making CyberWarrior Cybersecurity Bootcamp the most comprehensive program on market today!
CyberWarrior Academy exclusively offers Career Ambassador Wednesday, connecting you with industry practitioners (recognized CISOs, security directors, and more) to receive personal mentorship each week.
At CyberWarrior Academy, we believe that you can accomplish your career goals with motivation and hard work. We understand that strength lies in differences, not in similarities, so diversity is our core value, and we actively promote it through the cybersecurity industry.
Learn More About CyberWarrior Academy’s Cybersecurity Bootcamp
Please contact us and one of our counselors will be in touch!