CYBER SECURITY – BOOT CAMP

 

 

CURRICULUM OVERVIEW
Big data needs big protection. That’s because 90 percent of the world’s data has been created in just the last two years. And as computer networks grow, so too does the quantity of vulnerable information. The 24-week Cyber security Boot Camp is a challenging, part-time program that takes a multidisciplinary approach to attaining proficiency in IT, networking, and modern information security. Throughout the course, you will gain experience with a host of popular tools such as Wireshark, Kali Linux, Metasploit, Nessus, and more. In addition, students will learn skills applicable to certifications such as the CompTIA Security+ and CompTIA Network+ which can greatly enhance desirability and employability in today’s job market. You will also learn methods, techniques, and best practices for convincingly conveying the severity of the risks facing an organization’s security posture.

IS THIS PROGRAM RIGHT FOR YOU? IS THIS PROGRAM RIGHT FOR YOU?
If you are eager to become a digital defender and learn how to keep data safe from prying eyes, or if any of
the below describe you, enrolling in this program could help put you on the path to achieving your goals: You are currently working in a technical field and want to expand your cyber knowledge, better understand how to keep data secure, and learn hands-on skills to apply on the job.
You are a part of a company that has urgent cyber security needs to protect the confidentiality, availability, and integrity of data and software.
You understand the growing need for cyber security professionals and want to become a part of making the internet a safer space.
You are a tech enthusiast looking to start your career in tech and get your foot in the door in the world of networking and security.

THE SKILLS YOU’LL GAIN
You will complete the program with a foundation in Cyber security and Networking, including*:
*The material covered in this course is subject to change due to market demand.
Networking
• Packet Analysis
• Wireshark

Systems
• Windows and Linux Administration Techniques
• Windows and Linux Hardening
Cybersecurity Careers
• Digital Forensics Methods
• Penetration Testing
• Vulnerability Assessment
• Security Operations and Analytics

Cyber security
• Secure Network Design and Architecture
• Risk Management
• Cryptography
• Vulnerability Assessment
• Identity and Access Management
• Cloud Security

Ethical Hacking and Penetration
• Kali Linux
• Metasploit
• Hashcat
• Burp Suite
• Web Vulnerabilities and Security

Programing and Scripting
• Bash Scripting

Achieving your goals in Cyber security requires not only deep security knowledge, but also experience with the application of that knowledge.
Our curriculum is designed to give you both the knowledge you need to move toward the cyber security industry and ample experience applying that knowledge to real-world problems. Throughout the program, you will learn tools and technologies vetted by current practitioners, and learn skills applicable to certifications expected of all serious security professionals.

BUILDING ON THE BASICS
REAL WORLD APPLICATION, REAL JOBS
Graduates of the Cyber security Boot Camp will learn critical skills relevant to the following careers:
Cyber Network Defender Systems Security Analyst
Cyber security Analyst Information Assurance Specialist
Vulnerability Assessment Analyst SOC Analyst
Cyber security Operations Specialist Digital Forensics Examiner
Network or System Security Administrator Incident Response Analyst
IT Auditor

WHAT YOU WILL LEARN
By the time you complete the program, you can expect to be able to:
Analyze packet traffic flowing over a network in
order to better troubleshoot issues such as poor
network performance
Perform network, system, and web penetration
testing activities
Understand and implement network theory
Understand cyber security threats, actors,
and methods
Configure machines on a virtual network,
deploy them to the cloud, and investigate
cloud security risks
Perform administrative and security tasks to
Windows and Linux Operating Systems
Conduct vulnerability assessments
using tools like Metasploit to profile an
application for vulnerabilities, and then exploit
those vulnerabilities
Identify suspicious patterns of user behavior to
identify bots, intruders, and other malicious actors
Write Bash scripts to automate security and
operating systems tasks
Gain insight into the important best practices
around password selection and storage to crack
into (mock!) user accounts
Advise on cyber security best practices and risk
management strategies
Implement access control policies as an additional
layer of security over an organization’s private data
Develop best practices in implementing security
strategy policies across an organization

HANDS-ON EXERCISES CERTIFICATION
KNOWLEDGE BUILDING DISCUSSION
Throughout the course, you will apply
the skills you’ve learned in labs and
in other practical scenarios. By the
completion of the program, these
assignments will give you a vast array of
first-hand cyber security and networking
experience.
Gain valuable experience and learn skills
applicable to top certifications in the
cyber security industry including: The
Network+ and Security+ Certifications.
Industry professionals lead lectures and
class discussions on the background,
history, and applications of a new
technology or concept.
The program will consist of both insightful lectures and individual and group exercises, meant to
reinforce the tools and ideas introduced in class. The skills covered in the course are also applicable
to in-demand certifications, such as Security+ and CEH. Better yet, you’ll learn how to apply these
technologies in the real world.

COURSE STRUCTURE
As you move up the learning curve, you’re likely to have questions around some of the concepts covered in
class. We’re here to help—through in-person and virtual office hours, as well as a dedicated #slack channel
where you can get assistance from instructors, support staff and your fellow students. In addition to learning
cyber security and network security, you will have access to career services that will help you prepare for
technical roles after graduation such as:

WE’RE HERE TO HELP
Career Content and Practice Sessions Online Career Events With Industry
Professionals
Database of Customizable Tools and Templates
• Multiple Technical Resume Templates
• Github Best Practices
• Guidelines To Building A Portfolio
• Creating an Elevator Pitch
• Developing a Bio
Soft Skills Training
One-on-One Career Coaching

MEETING EMPLOYER EXPECTATIONS
It’s a fact: companies care about what you can do, not what you say you can do. For that reason, our
curriculum teaches you how to apply what you’ve learned to simulated and lab based environments.
The curriculum emphasizes in-depth exploratory labs, ranging from conducting intrusion detection to attacking and securing a vulnerable web application. Students will use personal laptops to practice the skills and abilities included in this course.

SAMPLE PROJECTS
Network Analysis &
Troubleshooting
A substantial part of modern cyber security
requires monitoring and analyzing the data
flowing over networks. Familiarity with
patterns at the packet level is essential
for both basic troubleshooting and more
intensive tasks. In this activity, you will
monitor the packets being transmitted over
a network to gain insight into problems
such as dropped packets and explore other
patterns apparent only at the packet-level.
Network Security
Monitoring and Logging
The modern IT landscape is defined by the
sheer amount of data it’s responsible for.
There is far more data than can be examined
directly, but it all must be protected.
Monitoring and logging can help security
specialists identify suspicious trends in
data, thereby identifying potential incidents
and informing future intrusion detection
efforts. You’ll analyze log data, identify and
characterize intrusion evident from the data,
and perform incident response.
Skills Needed
• Network monitoring
• Packet analysis
• SIEMs configuration

Objectives
• Use Wireshark to analyze packets and identify transmission patterns
associated with poor network performance
• Articulate the relationships between different network protocols
such as TCP/IP and HTTP
• Identify suspicious patterns of network activity to hone in on
malicious users

Objectives
• Configure logging and monitoring systems and periodically collect
and analyze data they capture
Skills Needed
• Wireshark
• Packet and protocol analysis
• Familiarity with TCP/IP, HTTP, and other protocols
• Tapping into networks

SAMPLE PROJECTS (CONTINUED)
Attacking a Web
Application
The modern web is one of the most popular
places for people to spend their time and
store their data. Because of this popularity,
websites are common avenues of attack.
In this activity, you will explore, attack, and
profile a vulnerable website with tools like
Burp Suite. Then, you will summarize the site’s
vulnerabilities with policy recommendations
for managers and leadership.
Cracking and Securing
Password-Protected Data
Most of the web’s user-provided data is
secured by little more than a password.
Since users often reuse passwords between
accounts and/or use easily-guessed
passwords, the onus is on the cybersecurity
professional to enforce best practices
around password creation, storage, and
database management. In this activity, you’ll
gain experience with password cracking
strategies, and write a report suggesting
technical, governance, and UX policies
effective for minimizing vulnerability to such
attacks.
Skills Needed
• Hashing algorithms
• Password storage best practices
• Hashcat
• Dictionary attacks
• Brute-force attacks
• Rainbow Tables

Objectives
• Explore common web application exploits—such as SQL injection XSS
and XSS—from an offensive perspective, to better understand how
hostile parties analyze and assault their targets
• Use Burp Suite to automate web-app vulnerability scanning
• Explore the various available attack vectors and insertion points
relevant to web applications
• Distill the technical results of a penetration test into policy
recommendations bound for management

Objectives
• Guess a user’s password via both dictionary and brute-force attacks
• Articulate the relative strengths and weaknesses of different
password cracking techniques
• Articulate policy recommendations for managers to reduce the
surface area of password-based attacks
Skills Needed
• HTTP
• JavaScript
• SQL
• XSS
• XSRF
• Familiarity with cookie-based
authentication

SAMPLE PROJECTS (CONTINUED)
Penetration Testing
Ultimately, the best indication of a system’s
security is how well it holds up against an
actual attack. Penetration testing is the
cybersecurity professional’s opportunity
to don the proverbial Black Hat, and probe
pre-made systems for vulnerabilities using
tools like Metasploit. You will conclude
your exploration of these systems with
recommendations for mitigating any
vulnerabilities that may have been uncovered
during the pen test.
Digital Forensics
Users often delete data from devices that
they would prefer others not to see—but,
sometimes, organizations find themselves
in need of the very information that was
deleted. You will receive an introduction to
digital forensics investigation and response.
Topics include legal compliance, chain
of custody procedures, procedures for
investigating computer and cybercrime, and
concepts for collecting, analyzing, recovering,
and preserving forensic evidence.
Skills Needed
• Digital forensics
• Electronic discovery
• Data recovery
Objectives
• Use Metasploit to probe an application for vulnerabilities and then
attack the application via a series of pertinent, Metasploit-provided
exploits
• Develop familiarity with the main phases of a penetration test,
including Reconnaissance; Scanning; Access Acquisition; Access
Maintenance; and Clearing Tracks//Erasing Evidence
• Translate the technical results of the penetration test into a document
with actionable policy resources for management
Objectives
• Discuss the rules, laws, policies, and procedures that affect digital
forensics.
• Describe the steps in performing digital forensics from the initial
recognition of an incident through the steps of evidence gathering,
preservation and analysis, through the completion of legal
proceedings.
• Use one or more common tools such as FTK, Sleuthkit, Kali Linux,
Volatility, SNORT.
Skills Needed
• Metasploit
• Ability to perform active and
passive reconnaissance
• Kali Linux
• Vulnerability scanners
• Ability to perform Open
Source Intelligence
gathering
• Network intrusion

COURSE CURRICULUM BY MODULE
MODULE DESCRIPTION WHAT YOU’LL LEARN
Learning Module:
Security Fundamentals
In this module, you will learn to think like a
cyber security professional by assessing threats
and mitigating risks. You will also look at
security from an organizational perspective
as you dive into Governance, Risk, and
Compliance. You will learn how security controls
impact an organization and its employees. This
will enable you to communicate with nonsecurity professionals, work with stakeholders
outside of the security space, and understand
how teams interact in an organization.
» CIA Triad
» Governance
» Risk Analysis and Risk

Mitigation
» Compliance
» Business Continuity Planning
» Disaster Recovery
Learning Module:
Systems Administration
You will cover both Linux and Windows
systems administration. You will gain hands-on
experience working with the command line and
bash commands that are prominent in IT roles.
You will configure and audit servers, as well as
harden and secure them from malicious attacks.
» Linux Server Configuration
» Tar, Cron, and Cronjobs
» Logging
» Bash Scripting and

Programming
» Windows Server Configuration
» Active Directory
» Kerberos

Learning Module:
Networks and Network Security
You will dive into network configuration, design,
protocols and data communication. You will
study cryptography, network security, cloud
security, and virtualization.
» Network Architecture,
Operations, and Security
» Wireshark and Traffic Analysis
» Email Security
» Wireless Security
» Cryptography and Encryption
» Port Scanning
» Cloud Security and

 

Cost: GH¢ 4500.00

Duration: 6 Months