Cybersecurity Curriculum
The Case Western Reserve University Cybersecurity Boot Camp curriculum is designed to give you both the knowledge you need to move toward the cybersecurity industry and ample experience applying that knowledge to real-world problems.
Throughout the program, you will learn tools and technologies vetted by current practitioners, and learn skills applicable to certifications expected of all serious security professionals.
Cybersecurity Part-Time
Description:
Learn to think like a cybersecurity professional by assessing threats and mitigating risks. Understand the differences between Artificial Intelligence (AI) and Machine Learning (ML) concepts, and their importance in cybersecurity.
What You Will Learn:
- CIA triad
- Threat detection
- Mitigating risks
- Artificial intelligence
- Machine learning
Description:
Gain hands-on experience working with the command line and bash commands that are prominent in IT roles. You will configure and audit servers, as well as harden and secure them from malicious attacks.
What You Will Learn:
- Linux server configuration
- Logging
- Kerberos
- Windows server configuration
- Bash scripting and programming
- Tar, cron, and cron jobs
- Active directory
Description:
Dive into network configuration, design, protocols, and data communication. Study cryptography, network security, and web development as it relates to cybersecurity.
What You Will Learn:
- Network architecture, operations, and security
- Wireless security
- Wireshark and traffic analysis
- Cryptography and encryption
- Email security
- Port scanning
Description:
You will gain a thorough understanding of web applications, databases, and the vulnerabilities and hardening associated with them. You will dive into penetration testing using tools like Metasploit to attack and compromise networks and servers.
What You Will Learn:
- Burp Suite
- XSS Vulnerabilities and Payloads
- SQL Injection
- Webshells
- File Inclusion and Command Injection Vulnerabilities
- Penetration Testing Execution Standard
- Searchsploit and Metasploit
- Zenmap
- Pivoting Networks
Description:
Dive into SIEMs and network security monitoring, practice the Incident Response framework to respond to different breaches and attacks, and learn digital forensic how to recover deleted data as part of preparing evidence for a legal case.
What You Will Learn:
- Splunk
- Forensics
- Monitoring and logging
- Data extraction and recovery
- Incident response
Description:
Learn how security controls impact an organization and its employees. Focus on certification prep for the Security+ and conclude the program with a final group project presented in a mock cyber conference event.
What You Will Learn:
- Governance
- Compliance
- Business continuity planning
- Disaster recovery
- Certifications
- CompTIA Security +
- Research and technical demonstration