Cybersecurity Boot Camp

For more information, go to the UNC Charlotte Employer Solutions website or browse the Employer Solutions Online Catalog.

Blended
In Person: The Dubois Center
On-site at Organization
Online

Program Tabs

Program

Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. - U.S. Department of Homeland of Homeland Security The frequency of data and security breaches in the news grows almost daily, and as a result, there is tremendous job demand for cybersecurity professionals. It’s important now, more than ever, to have trained, skilled professionals securing our data and personal information. The Cybersecurity Boot Camp at UNC Charlotte is a challenging, program that takes a multidisciplinary approach to attaining proficiency in IT, networking, and modern information security. Throughout the program, participants will gain experience with a host of popular tools such as Wireshark, Kali Linux, Metasploit, Nessus, and more. In addition, participants will learn skills applicable to certifications such as the CompTIA Security+ and Certified Ethical Hacker (CEH), in addition to gaining access to CompTIA’s CertMaster Practice test prep platform for Security+ and a free exam voucher for the Security+ exam, which can greatly enhance desirability and employability in today’s job market. Participants will also learn methods, techniques, and best practices for convincingly conveying the severity of the risks facing an organization’s security posture.

What Participants Will Learn
  • Understand the structure of and prepare for the Security+ and CEH exams
  • Analyze packet traffic flowing over a network in order to better troubleshoot issues and monitor users browsing habits
  • Utilize penetration testing to examine network, system, and web vulnerabilities
  • Identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
  • Explore and implement network theory
  • Recognize cybersecurity threats, actors, and methods
  • Conduct vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities
  • Configure machines on a virtual network, deploy them to the cloud, and investigate cloud security risks
  • Perform administrative and security tasks to Windows and Linux Operating Systems
  • Write Bash scripts to automate security and operating systems tasks
  • Articulate important best practices around password selection and storage to crack into (mock!) user accounts
  • Advise on cybersecurity best practices and risk management strategies
  • Implement access control policies as an additional layer of security over an organization’s private data
  • Develop best practices in implementing security strategy policies across an organization