THE 3 MAIN SECTIONS OF THE CYBERSECURITY ENTRY-LEVEL COURSE
This course is divided into 3 main sections.
Section 1 (Knowledge, skills, abilities): Covers all the fundamentals of cybersecurity including the knowledge, skills, and abilities needed for you to work in the cybersecurity industry.
Section 2 (Hands-on Experience): This section covers the hands-on training aspect of cybersecurity. You will learn how to build your own cybersecurity lab on your laptop. You will have the opportunity to try your hands on popular cybersecurity tools to include vulnerability scanners, packet capture, SIEM, password cracking, social engineering, and many more.
Section 3 (Job Placement Assistance): This section covers job placement assistance. After you have successfully completed the course and passed your CompTIA Security+ exams, we will assist you in finding a cybersecurity job. The job placement process is structured to guide you through the entire job search process such as writing resumes, job selection, mock interviews, identifying your transferable skills, and leveraging your previous experience to make you more competitive.
INTERNSHIP OPPORTUNITY FOR STUDENTS
Upon completion of the this course, students will have the opportunity to work on real-world projects as a cybersecurity interns in one of our partner companies.
COURSE STRUCTURE
This program is a self-paced online course with the option of Instructor-led live tuition. Students have the option to schedule an appointment for live tuition. There are monthly one-on-one live sessions with students to access their progress and to answer any questions they have.
Course Instructor
Dr. Adu is a cybersecurity expert with outstanding military and corporate cybersecurity experience. Dr. Adu is the Chief Executive Officer of Eretmis Inc, a New York based cybersecurity consulting company. He is the founder of Eretmis Academy, a cybersecurity training institute based in New York. Dr. Adu has been in the Information Technology industry for over 21 years. He is a United States Army trained cybersecurity professional.
As a former U.S. Army Captain, Dr. Adu is highly skilled in offensive and defensive security. He held multiple high-profile positions in the U.S. Army, leading various security missions. Dr. Adu is a former professor at the University of Maryland Global Campus (UMGC) and Central Texas College (CTC).
Dr. Adu is an astute information security instructor who simplifies complex cybersecurity concepts and theories with real world examples to enable his students to appreciate and understand information security.
Dr. Adu is an exceptional cybersecurity expert who has trained and mentored several people to jump-start and advance their cybersecurity careers. Dr. Adu’s cybersecurity qualifications include CISSP, CISA, QSA, PCIP, Security+, Cybersecurity Analyst (CySA+), Pentest+, AWS Cloud Practitioner, Security Analytics Professional (CSAP), Security Network Professional (CNSP), Network Vulnerability Assessment (NVA).
What To Expect In This Course
In this course, you will learn the basics of cybersecurity, the different cybersecurity career paths and skills employers are desperately looking for, as well as the duties & responsibilities of cybersecurity professionals. Students will learn identity & access management, networking technologies & tools, threat & vulnerability identification, and assessment.
The course covers cybersecurity risk management, cybersecurity architecture & design, introduction to cloud & cloud security, cryptography & PKI, and cybersecurity frameworks. The course will covers the CompTIA Security+ Certification Exams objectives with over 200 Security+ practice test.
This course is designed to give you a practical hands-on cybersecurity experience, which will enable you to perform your duties as a cybersecurity professional when you land your first cybersecurity job. At the end of the course, you would have acquired the knowledge, skills, tools, and confidence to perform entry-level cybersecurity duties in any organization.
THIS COURSE IS FOR YOU IF
- You are looking for a stable and successful career.
- You want to get your first cybersecurity certification (CompTIA Security+)
- You want to work in an industry where entry-level positions start as high as $78,000 and is projected to increase over the next 10 years.
- You want to start a career in cybersecurity, but you don’t have any I.T. experience.
- You want to secure your future with a job that can give the financial freedom you want.
- You want to work in an industry with 0% unemployment rate and endless opportunities.
-
You want to start a career in cybersecurity as soon as possible.
WHAT YOU'LL LEARN
You will learn how to install and configure systems to secure applications, networks, and devices, perform threat analysis and respond with appropriate mitigation techniques, participate in risk mitigation activities, and operate with an awareness of applicable policies, laws, and regulations.
You will learn the core knowledge required of any entry-level cybersecurity role and serve as a springboard to intermediate-level cybersecurity jobs. This course incorporates best practices in hands-on troubleshooting to ensure security. You will acquire practical cybersecurity problem-solving skills.
At the end of this course, you will know how to identify and address security incidents. You will learn the various methods that hackers use to break into computer networks. You will also learn how to use different cybersecurity tools to identify and mitigate vulnerabilities.
WHO SHOULD TAKE THIS COURSE?
Most people want to get into I.T. & cybersecurity, but they do not know how or where to start. Getting into the I.T. & cybersecurity field can be difficult for beginners who do not have over $80,000 for a four-year college degree. The beauty of the I.T. & cybersecurity field is that you do not need a college degree to start; all you need to start is a certification.
This course is designed for anyone who wants to start a new career with entry-level positions starting as high as $85,000 per year. Professionals such as doctors, nurses, engineers, police, teacher, taxi drivers, home care workers, hotel workers, etc. can all take this course. This course can help you move into the cybersecurity field of your current profession. This course is designed for people with or without I.T. & cybersecurity background.
This course is invaluable to beginners, regardless of your experience or your current job. Cybersecurity has become an inevitable part of all industries. All you need for this course is readiness and willingness to study.
TECHNICAL REQUIREMENTS FOR THIS COURSE
BASIC REQUIREMENTS
You should be familiar with using a computer and accessing the internet. You will need to have a current email account to enroll in this course.
BROWSER REQUIREMENTS
Google Chrome is the recommended browser when attending the online live class. You can use any browser like Windows Edge or Explorer or Firefox.
ADDITIONAL REQUIREMENTS
Some of the hands-on performance activities may require downloading additional software or programs. The course instructors will assist students in downloading and installing these programs.
ENROLL NOW PAY LATER
New Financing Option Available for Students
Students enrolled in Eretmis Academy who need tuition or financial assistance will now have access to an innovative new financing option to pay for their courses, thanks to our partnership with the Meritize platform.
Unlike traditional lenders that rely solely on FICO scores, and other financial records to determine whether to lend to an individual. the Meritize platform considers the full depth of an individual’s academic or military achievements to enhance credit evaluation and potentially improve loan options.
Because the new financing option considers previous academic or military experiences, merit-based financing may provide a significant source of financial and credit assistance for students who are self-financing their cybersecurity training.
How To Apply for Financial Assistance
Click on the video below for a walkthrough of the financial assistance application process.
Entry-Level Course Curriculum
- Introduction To Module One (0:45)
- Download Module1 Lesson Notes
- Lesson One: Introduction To Cybersecurity (25:03)
- Lesson Two: Cybersecurity Career Path (36:35)
- Lesson Three: Certificate Vs. Degree (21:20)
- Lesson Four: Cybersecurity Competency Model (16:46)
- Lesson Five: Cybersecurity Language (16:24)
- Download Cybersecurity Language Cheat Sheet
- Introduction to Module Two (0:59)
- Download Module2 Lesson Notes
- Lesson 1: Cybersecurity CIA (92:18)
- Lesson 2: Cybersecurity Definitions (10:54)
- Lesson 3: Cybersecurity Controls (22:00)
- Lesson 4: Types of Vulnerabilities (41:55)
- Lesson 5: Identification of Vulnerabilities (13:27)
- Lesson 6: Penetration Testing (36:46)
- Lesson 7: Indicators of Compromise (27:21)
- Lesson 8: Types of attacks (77:04)
- ASSIGNMENT-Hands-On Exercise
- Introduction to Module Three (0:50)
- Download Module3 Lesson Notes
- Lesson1: Introduction to Risk Management (64:58)
- Lesson 2: Security Policies, Plans, and Procedures (14:07)
- Lesson 3: Personnel Management (42:16)
- Lesson 4: Business Impact Analysis Concepts (23:38)
- Lesson 5: Incident Response Procedures (27:42)
- Lesson 6: Basic Concepts of Forensics (22:50)
- Lesson 7: Disaster Recovery and Continuity (40:57)
- Lesson 8: Data Security and Privacy Practices (17:40)
- Quiz/Practice Test
- Introduction To Module Four (1:26)
- Download Module 4 Lesson Notes
- Lesson One: Computer Networking Basics (33:02)
- Lesson Two: Install and configure network components, both hardware and software (137:58)
- Lesson Three: Network Security (103:58)
- Lesson Four: How to use appropriate software tools to assess the security posture of an organization (23:13)
- Lesson Five: Troubleshoot common security issues (13:36)
- Lesson Six: Deploy Mobile Devices Securely (34:51)
- Lesson Seven: Implement Secure Protocols (6:30)
- Quiz/Practice Test
- Introduction to Module Six (1:15)
- Download Module 6 Lesson Notes
- Lesson 1: Introduction to Cybersecurity Architecture and Design (10:08)
- Lesson 2: Cybersecurity Frameworks, best practices, secure configuration guides (18:45)
- Lesson 3: Secure Network Architecture Concepts (7:59)
- Lesson 4: Secure Systems Design (36:37)
- Lesson 5: Secure Staging Deployment Concepts (9:41)
- Lesson 6: Embedded Systems and associated security implications (22:50)
- Lesson 7: Secure Application Development and Deployment Concepts (60:02)
- Lesson 8: Cloud and Virtualization Concepts (44:25)
- Lesson 9: Resiliency and Automation Strategies to Reduce Risk (17:16)
- Lesson 10: Importance of Physical Security Controls (17:04)
- Quiz/ Practice Test
- Module Introduction (0:46)
- Download Module7 Lesson Notes
- Lesson 1: Basic Concepts of Cryptography (31:30)
- Lesson 2: Cryptography Algorithms and their Basic Characteristics (66:50)
- Lesson 3: Install and Configure Wireless Security Settings (23:16)
- Lesson 4: Implement Public Key Infrastructure (44:30)
- Quiz/ Practice Test
- Module Introduction (0:53)
- Download Module 8 Lesson Notes
- Lesson One: Identity and Access Management Concepts (30:03)
- Lesson Two: Install and Configure Identity and Access Services (30:51)
- Lesson Three: Implement Identity And Access Management Controls (19:45)
- Lesson Four: Common Account Management Practices (30:32)
- Quiz/Practice Test
- Introduction to Hands-on Performance Training (1:43)
- Lesson One: Introduction to Virtual Machines (VMs) (26:47)
- Lesson Two: Risk Associated With Virtual Machine (5:36)
- Lesson Three: Installation of Hypervisors and Virtual Machines (40:26)
- Installation of Metasploitable 3 (17:16)
- Installation of Parrot OS(Similar Kali Linux) (8:38)
- Installation of Windows 10 Virtual Machine (8:38)
- Installation of Windows 8 Virtual Machine (11:27)
- Windows Command Line Basics (23:09)
- Linux Command Line Basics (27:20)
- Lesson Four: Command Line Tools (54:32)
- Lesson Five: Intro To Popular Cybersecurity Tools (8:48)
- Lesson Six: Cybersecurity Collective Tools (17:14)
- Installation of SIEM Tools -Splunk (10:13)
- Installation of Nessus (14:58)
- Installation of Vulnerability Scanning Tool-Qualys (7:40)
- Lesson Seven: Cybersecurity Preventive Tools (6:48)
- Lesson Eight: Password Cracking Tools (2:10)
- Lesson Nine: Exploitation Tools (8:00)
- Lesson Ten: Social Engineering Attack Simulation (0:59)
- Vulnerability Database-CWE, NVD, CVE, CVSS (19:09)
- LESSON FIVE NOTES
- COMMAND CHEAT SHEET
- Nmap-Port/Network Scanner (35:58)
- How to configure FIREWALL, GROUP POLICY, PASSWORD POLICY (26:00)
- Nikto-Web Vulnerability Scanner (17:36)
- Wireshark and Man-in-the-middle Attack (14:20)
- Wireless Network Configuration (17:40)
- Using Nessus-1 (26:07)
- Using Nessus-2 (31:22)
- Splunk Enterprise 1 (60:12)
- Splunk Enterprise 2 (34:34)
- Hands-On Exercise
- Splunk Security Essentials 1 (39:05)
- Splunk Security Essential 2 (12:53)
- Splunk Enterprise Security (Splunk Cloud) (49:59)
- Nikto -Web Vulnerability Scanner (21:00)
- BurpSuite (Web Application Security Testing) (22:24)
- Social Engineering (How to Detect Phishing Attack) (31:09)
- Social Engineering (Credential Harvester Attack) (19:22)
Courses Offered
Our courses are designed for all levels of professionals (beginners, intermediate, and advanced). Our courses break down complex cybersecurity concepts into simple everyday scenarios that our students can relate to.