170 likes | 196 Views
AIT Analytics academy. Cybersecurity Program. Why study cybersecurity?. The job outlook is incredible -- now and for the foreseeable future:
E N D
AIT Analytics academy Cybersecurity Program
Why study cybersecurity? The job outlook is incredible -- now and for the foreseeable future: • Cisco's 2014 Annual Cyber Security Report said there were 1M cyber security job openings in 2014 and demand was expected to reach 6M globally by 2019. Michael Brown, the CEO of Symantec, added that they project 1.5M of those 6M jobs will go unfilled in 2019. • “Recruiting cybersecurity talent has never been more difficult. Cybersecurity Ventures predicts there will be 3.5 million unfilled cybersecurity jobs by 2021, and the unemployment rate is holding steady at zero percent.” – CSO • U.S. News and World Report ranked Infosec #8 in a list of 100 best jobs for 2015. They claimed the profession would grow by 36.5% through 2022.
Is the Program Right for You? Are you… • intensely curious about how things work? • unwilling to give up on a problem no matter how difficult it is? • pre-disposed to independent learning? Do you have basic computer skills? Can you devote an honest 25 hours per week?
How the Program Works The Cyber Academy is: • 100% project-based, learn-by-doing • A series of 2 online courses that provide real-world, skills-based training • Online mentors who coach students, rather than lecturing, and evaluate based on the work produced If you complete both courses, you will leave the program with end-to-end experience working in all key areas of information security.
Register for the Courses Cyber Academy Certificate Program, consisting of two courses: • Cybersecurity: Immediate Immersion (4 weeks). An introductory course, open to anyone • Cybersecurity Defense (11 weeks). Approval is required to advance to Course 2
Cybersecurity: Immediate Immersion Tasks: • Exploit a website and fix its vulnerabilities • Analyze malicious web traffic
Cybersecurity Defense Tasks: • Analyze a remote intrusion attempt • Investigate an incident using a SIEM • Begin to understand malware • Examine a compromised host’s memory • Conduct a forensic disk examination • Close your investigation
Building Real-World Skills • Story-Centered Curricula-- proven highly effective in skill-building programs • Student’s work is situated in a realistic narrative of professional practice in a realistic environment • Students receive feedback on interim deliverables and then iterate to achieve skill mastery • Students reflect on lessons learned from their experiences, then they go on to the next “scene” in the story, which links to and builds on what they have done • Faculty mentors enhance the online experience • One-on-one coaching nurtures excellence through mentoring tailored to individual needs • Strong emphasis on skills beyond the technical • Analytical thinking, confidence and ability to research and solve unknown complex technical problems, verbal and written communication, and self-directed learning
What Graduates Say: “Before enrolling in the Cyber Academy, I was working as the digital marketing manager for an e-commerce website (and) …had very little understanding of information security. The Cyber Academy has had a resounding impact on my professional career and I was able to secure employment within the information security field in less than one year. From reverse engineering binary files and developing software exploits to analyzing malware and responding to targeted cyber attacks, the many skills I developed are sought after by countless employers.” -- Clif
And Another Former Student: “It’s hard to express how much Cyber Academy changed my life. It literally turned my life around. When I enrolled, I was a dropout who was making a meager living as a massage therapist—I always knew my potential was being squandered, but I didn’t think there was any way to change that without going back to college. “I discovered that infosec is a field full of intelligent, curiosity-driven people just like me...and not only that, but it’s a field where curiosity is not merely tolerated but prized. I felt I had finally found my people. “When I enrolled, I wasn’t expecting to make a massive career change within a few months. Within a month of completing Cyber Academy, I had a full-time job with benefits for the first time in my life—and I’ve never felt happier or felt more fulfilled.” -- Alice
Program Requirements Prerequisites: • A reasonable level of computer literacy • You must successfully complete Cybersecurity: Immediate Immersion to be permitted to enroll in Cybersecurity Defense. Computer requirements: • Modern laptop or desktop computer with high-speed internet connection
Recommended Pre-Work We strongly recommend acquiring a basic understanding of computer networks and protocols before beginning the program. 1. Download Wireshark from http://www.wireshark.org/download.html and independently complete at least the following labs from: http://www-net.cs.umass.edu/wireshark-labs/: • Getting started, v7.0 • HTTP, v7.0 • DNS, v7.01 2. Learning resources: • Chapters 1, 7, 8, & 9 of Practical Packet Analysis: Using Wireshark to solve real-world network problems by Chris Sanders (3rd edition). 2017. No Starch Press. • Videos 1-3 of https://www.youtube.com/watch?v=n2D1o-aM-2s&feature=youtu.be 3. Information on starting a cybersecurity career: https://tisiphone.net/2015/10/12/starting-an-infosec-career-the-megamix-chapters-1-3/ Note: links to the “Pre-work” and “Tips for Success” documents will be sent in a follow-up email tomorrow.
Registration and Start Date • A registration portal will be available shortly online at: http://www.yunuscenter.ait.asia/ • Course dates: • Cybersecurity: Immediate Immersion, 18/09/2019 • Cybersecurity Defense, 30/10/2019
Cost Program Cost – Immediate Immersion
Cost Program Cost – Cybersecurity Defense
Payment Plan Options • Immediate Immersion – 50% of the tuition is required at the time of registration. The remaining 50% is due midway through the course • Cybersecurity Defense - A 30% deposit is required upon registration. The next month, ½ of the remaining balance is due. The third month, the remaining balance is due.