Short Course

Essential Python Programming

(40 hours)

Essential Python Programming

Skill Level

Beginner

Prerequisites

None

Overview

Whether you're a beginner to programming or an experienced programmer, this course will help you master the foundational skills and concepts needed to program in Python.

Learn more about working with numbers and string and gain new skills for working with dates and times, dictionaries, recursion, and algorithms. Discover how to design and develop object-oriented programs with graphical user interfaces (GUIs) for real-business scenarios.

BACK TO TOP

Short Course

Python for Data Analysis

(40 hours)

Python for Data Analysis

Skill Level

Beginner, Intermediate

Prerequisites

Essential Python Programming

Overview

The goal of this course is to introduce data analysis with the Python programming language and how to work with different data structuresincluding basic objects, variables, self-defining functions, and control flow. We cover the most popular Python libraries including NumPy, SciPy, Pandas, Matplotlib, Seaborn, and ggplot for data analytics and visualization. Learn how to manipulate functions to make working with structured data fast, easy, and expressive.

BACK TO TOP

Short Course

Python for Pentesting

(40 hours)

Python for Pentesting

Skill Level

Intermediate, Advanced

Prerequisites

Essential Python Programming; cybersecurity domain knowledge; some pentesting experience

Overview

Python for Pentesting is designed for pentesters who want to use Python to build specialized tools.

This challenging course will expose students to target scanning, enumeration, exploit development, web application attacks, and persistence mechanisms through Python scripting. Upon completion, students will have built an arsenal of over 20 penetration testing tools.

This course is designed for students who have basic programming/scripting experience in C or Python, knowledge of networking concepts, and knowledge of penetration testing methods and hacking tools.

BACK TO TOP

Short Course

Data Analysis & Visualization

(40 hours)

Data Analysis & Visualization

Skill Level

Beginner, Intermediate

Prerequisites

Microsoft® Excel®; some Power BI experience; Structured Query Language

Overview

Want to learn how to turn data into thoughtful action? Collecting and accessing data with technology is now ubiquitous in business and in life. The power and storage capabilities of cloud computing have driven organizations of all sorts to capture and store “big data.”

Leveraging that data effectively with Microsoft® Excel® and Power BI can provide timely insights and a competitive advantage. Analyzing data to find issues, insights, and opportunities and presenting them in visually compelling ways is now a critical part of many job roles.

For professionals who are interested in learning new ways to translate their work into effective data visualizations and infographics in order to increase knowledge translation with their desired audience, this is the course for you.

BACK TO TOP

Short Course

Capture the Flag

(40 hours)

Capture the Flag

Skill Level

Intermediate, Advanced

Prerequisites

Cybersecurity Domain Knowledge; some pentesting experience; certs optional - CompTIA Pentest+, Certified Ethical Hacking

Overview

Attack-oriented CTF competitions try to distill the essence of many aspects of professional computer security work into a single short exercise that is objectively measurable.

The focus areas that CTF competitions tend to measure are vulnerability discovery (auditing source, binaries, webapps), exploit creation (binary & webapp exploits), toolkit creation (creation & preparation), and operational tradecraft.

A modern computer security professional should be an expert in at least one of these areas and ideally in all of them. Success in CTF competitions demands that participants be an expert in at least one and ideally all these areas. Therefore, preparing for and competing in CTF represents a way to efficiently merge discrete disciplines in computer science into a focus on computer security.

BACK TO TOP

Short Course

Ethical Hacking & Countermeasures

(40 hours)

Ethical Hacking & Countermeasures

Skill Level

Intermediate, Advanced

Prerequisites

Cybersecurity Domain Knowledge, some Command Line Interface (CLI) experience

Overview

Ethical hacking is the process of testing and validating an Information Technology (IT) system to determine its weaknesses and assess its vulnerabilities.

Businesses and government organizations hire cybersecurity professionals to break past their online security systems so that they can recommend measures that help prevent data theft and fraud, such as improving cryptography standards. Also known as penetration testers or information security analysts, ethical hackers identify potential threats and help mitigate the risk of a real cyber attack.

The purpose of this course is to help individuals master the core concepts of ethical hacking, e.g., vulnerability analysis, social engineering, and exploitation methods. This course will significantly benefit security officers, auditors, security professionals, site administrators, and those interested in becoming a professional penetration tester.

BACK TO TOP

Short Course

CISSP Prep

(40 hours)

CISSP Prep

Skill Level

Intermediate, Advanced

Prerequisites

Working knowledge in Cybersecurity or Information Assurance

Overview

This course will prepare you for CISSP certification—one of the most sought-after infosec certs in the industry. The course curriculum will help professionals demonstrate their understanding of cybersecurity strategy and experience with hands-on implementation.

Obtain the advanced understanding and technical skills to design, develop and manage an organization’s overall security postureskills necessary for roles ranging anywhere from Security Analyst to Chief Information Officer.

To qualify for the CISSP, candidates must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK®).

BACK TO TOP

Immersive Course

Security Operations Management Immersive

(40 hours)

Security Operations Management Immersive

Skill Level

Intermediate, Advanced

Prerequisites

Working knowledge in the security industry

Overview

Thus 400-hr program is tailored to learners who seek both a foundational understanding of organizational risk management as well as cloud security.

First, learn to validate your information and experience to build and manage security architects by preparing for the CISSP. Next, discover how to effectively develop a holistic cloud security program through prep for Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK) and ISACA’s Certificate of Cloud Auditing Knowledge (CCAK). Last, learn to demonstrate your expertise within the risk management framework (RMF) and prepare for the Certified Authorization Professional—a DoD Approved 8570 Baseline Certification that meets DoD 8140/8570 training requirements.

After completion of every module, our learners are expected to deliver a capstone project that mimics real, on-the-job experiences and focuses on certain competencies, such as Organization Cyber Risk Management, Security Environmental Assessment, and Controls & Audit.

BACK TO TOP

Honors & Recognitions

HVMP-gold21
ISC2 Training Provider Logo
Divergence_Academy_Inc_5000_Seal
Newsweek Logo