🏢 Viewing Workforce-Eligible Courses
You're in Workforce Development mode. Only courses eligible for WIOA funding are shown. Need help? Visit CT Department of Labor
Workforce Eligible
Duration
Delivery Mode
Skill Level
Certified Ethical Hacker With AI (CEH)
Course Outline: Certified Ethical Hacker With AI (CEH)
Course: Certified Ethical Hacker (CEH)
Course Overview
This comprehensive five-day boot camp immerses IT security professionals in the mindset of a malicious actor to systematically identify and fortify vulnerabilities within a network infrastructure. Think of this training as a \"stress test\" for a digital fortress, where you learn to bypass your own defenses only to build them back stronger and more resilient against real-world threats. Participants will gain mastery over the latest hacking tools and methodologies required to secure enterprise environments and successfully pass the EC-Council CEH certification exam.
Key Objectives & Skills:
- Vulnerability & Attack Vectors: Identify weaknesses across diverse target systems by mastering footprinting, scanning networks, and performing advanced enumeration.
- Exploitation & System Hacking: Gain hands-on experience in executing buffer overflows, SQL injections, and session hijacking to understand how unauthorized access is achieved.
- Malware & Threat Analysis: Analyze the mechanics of Trojans, viruses, and worms while implementing robust countermeasures to neutralize evolving malware threats.
- Perimeter Defense Evasion: Learn sophisticated techniques for evading IDS, firewalls, and honeypots to better configure and monitor defensive security controls.
- Emerging Tech Security: Apply specialized hacking methodologies to secure Cloud Computing, IoT, and Operational Technology (OT) environments.
Certified Information Security Manager (CISM)
Course Outline: Certified Information Security Manager (CISM)
Course: CISM (Certified Information Security Manager)
Course Overview
This five-day, advanced certification boot camp provides a common body of knowledge for information security management, with a primary focus on risk management as the foundation of organizational security. Managing an enterprise security program is much like being the captain of a large vessel; you must not only understand the technical mechanics of the engine but also navigate the strategic waters of governance, risk, and incident response to ensure a safe arrival at your destination.
Key Objectives & Skills:
- Information Security Governance: Establish and maintain an information security governance framework that aligns with organizational goals and compliance requirements.
- Information Risk Management: Implement a robust risk assessment process to identify assets, assess business impacts, and manage vulnerabilities effectively.
- Security Program Development: Design and manage a comprehensive security architecture that integrates security awareness, training, and lifecycle activities.
- Incident Management & Response: Develop and implement response and recovery plans to ensure business continuity and minimize the impact of security incidents.
- Strategic Alignment: Align the information security program with other business functions to ensure a cohesive approach to enterprise-wide risk management.
Certified Information Systems Auditor (CISA)
Course Outline: Certified Information Systems Auditor (CISA)
Course: Certified Information Systems Auditor (CISA)
Course Overview
This comprehensive five-day certification preparation course provides IT audit and security professionals with the essential expertise to assess, control, and ensure the integrity of an organization’s information systems. Mastering the CISA domains is much like conducting a thorough structural inspection of a high-security facility; you must verify that every lock, support beam, and surveillance system functions exactly as intended to protect the assets within and comply with safety regulations.
Key Objectives & Skills:
- Information Systems Auditing Process: Master the standards and guidelines for planning and executing risk-based audits, including data analytics and evidence collection techniques.
- Governance and Management of IT: Evaluate organizational structures, enterprise architecture, and risk management policies to ensure IT strategy aligns with business goals.
- Systems Acquisition and Implementation: Assess the methodologies for acquiring, developing, and testing new systems to ensure they meet feasibility and control requirements.
- Operations and Business Resilience: Monitor system performance and process automation while developing robust business continuity and disaster recovery plans.
- Protection of Information Assets: Implement advanced security frameworks, including identity and access management, encryption, and incident response management, to safeguard digital infrastructure.
Certified Information Systems Security Professional (CISSP)
Course Outline: Certified Information Systems Security Professional (CISSP)
Course: CISSP (Certified Information Systems Security Professional)
Course Overview
This five-day, instructor-led certification boot camp provides a comprehensive review of the eight domains within the (ISC)² Common Body of Knowledge (CBK), focusing on the design, engineering, and management of an organization\'s overall security posture. Mastery of these domains is much like gaining a 360-degree view from the command center of a global infrastructure, ensuring that every layer—from physical assets to software code—is synchronized and defended against sophisticated threats.
Key Objectives & Skills:
- Security & Risk Management: Apply foundational concepts of confidentiality, integrity, and availability (CIA) to govern information security in alignment with business strategies.
- Security Architecture & Engineering: Implement and manage secure design principles, cryptographic solutions, and physical security controls to protect logical and physical assets.
- Communication & Network Security: Secure network components, protocols, and architectural characteristics across the OSI model to ensure safe data transmission.
- Identity & Access Management (IAM): Control and manage the lifecycle of human and non-human identities, including the role of authentication, authorization, and accounting (AAA).
- Security Operations: Effectively assess security data, manage change, and implement incident response and recovery plans to maintain operational resilience.
CompTIA Advanced Security Practitioner (SecurityX)
CompTIA Cybersecurity Analyst (CySA+)
Course Outline: CompTIA Cybersecurity Analyst (CySA+)
Course: CompTIA Cybersecurity Analyst (CySA+)
Course Overview
This five-day, intermediate-level certification boot camp focuses on applying behavioral analytics and threat intelligence to detect and mitigate cybersecurity threats within an organization. Much like a high-tech surveillance system that not only records events but also predicts suspicious activity based on patterns, this training equips analysts with the tools to proactively defend network infrastructures.
Key Objectives & Skills:
- Threat Intelligence & Analysis: Leverage advanced data analysis techniques to identify, prioritize, and neutralize emerging cyber threats before they penetrate the network.
- Vulnerability Management: Implement comprehensive vulnerability management programs, including assessment, remediation, and reporting, to minimize the organizational attack surface.
- Incident Response & Digital Forensics: Develop and execute precise incident response procedures and utilize digital forensic tools to investigate and recover from security breaches.
- Security Operations (SecOps): Master the application of security tools and automation to continuously monitor and protect host and network infrastructures.
- Compliance & Reporting: Apply regulatory requirements and organizational policies to produce clear, actionable security reports for stakeholders and management.
CompTIA PenTest+
Course Outline: CompTIA PenTest+
Course: CompTIA PenTest+
Course Overview
This five-day intermediate-level certification course provides cybersecurity professionals with the technical proficiency to plan, scope, and execute comprehensive penetration tests. Participants learn to identify and exploit vulnerabilities across network infrastructures, applications, and cloud environments while developing effective communication strategies to report findings and remediation steps.
Key Objectives & Skills:
- Engagement Scoping & Planning: Master the legal and technical requirements for defining assessment boundaries and managing the documentation required for professional security engagements.
- Vulnerability Identification: Utilize advanced reconnaissance and scanning techniques, including OSINT and active network probes, to detect and categorize security weaknesses.
- Attack & Exploitation Methodologies: Execute targeted attacks against host systems, wireless networks, and web applications to validate the severity of identified vulnerabilities.
- Tool & Scripting Proficiency: Leverage industry-standard penetration testing tools and basic scripting (Python, PowerShell, Bash) to automate vulnerability assessment and post-exploitation tasks.
- Strategic Reporting: Compile technical findings into professional remediation reports that assist organizations in prioritizing and mitigating critical security risks.
CompTIA Security+ Certification (Exam SY0-701)
Course Outline: CompTIA Security+ Certification (Exam SY0-701)
Course: CompTIA Security+
Course Overview
This accelerated five-day certification boot camp provides a comprehensive foundation in baseline cybersecurity skills, preparing participants to secure networks, devices, and data against modern threats. Think of this course as the \"universal building code\" for information security; it ensures that every practitioner has the essential blueprint and standardized tools required to construct a safe and resilient digital environment.
Key Objectives & Skills:
- Threat & Vulnerability Mitigation: Identify and analyze common security threats and vulnerabilities to implement proactive countermeasures and strengthen the organizational attack surface.
- Security Architecture & Engineering: Design and deploy secure network architectures using standardized protocols, hardware hardening, and cryptographic principles.
- Security Operations (SecOps): Master the application of specialized security tools to monitor systems, detect suspicious activity, and execute effective incident response and recovery procedures.
- Identity & Access Management (IAM): Implement robust authentication and authorization frameworks to ensure that only verified users can access sensitive digital assets.
- Governance & Risk Management: Navigate the complexities of organizational security policies and compliance requirements to ensure all security measures align with broader enterprise goals.
CompTIA SecurityX (CAS-005)
Course Outline: CompTIA SecurityX (CAS-005)
Course: CompTIA SecurityX
Course Overview
This advanced five-day certification course prepares experienced security professionals to architect, engineer, and implement secure solutions across complex enterprise environments. Navigating this level of cybersecurity is much like serving as the lead engineer on a global communications satellite; you must ensure every internal component is resilient against failure while simultaneously shielding the entire system from a barrage of external environmental pressures.
Key Objectives & Skills:
- Enterprise Security Architecture: Design and implement resilient, advanced security architectures that integrate zero-trust models and adaptive security strategies across hybrid and cloud environments.
- Complex Risk Management: Analyze and mitigate sophisticated cyber risks by balancing stringent security requirements with critical organizational business objectives.
- Security Engineering & Automation: Master the integration of automation and orchestration within identity management, endpoint security, and network troubleshooting to enhance system responsiveness.
- Advanced Operations & Forensic Analysis: Conduct deep-dive vulnerability assessments, threat hunting, and digital forensic investigations to neutralize advanced persistent threats (APTs).
- Governance & Compliance Strategy: Ensure all technical implementations align with overarching cybersecurity governance frameworks, legal requirements, and risk management policies.
No courses match your filters
Try adjusting your search or filter criteria