UZT Funding Advanced course

Cyber Security (223003232)

504 hours

Cyber Security is the set of methods designed to protect networks and systems from digital threats. Specialists in this field are responsible for identifying threats, developing data protection strategies, and addressing security vulnerabilities. The Security Operations Center (SOC) is especially important, where employees analyze security events in real-time, manage incidents, and ensure a rapid response to various cyber threats, preventing their spread and minimizing damage.

  • 6660€
    Cybersecurity specialist salary in Lithuania
  • 3 mln.
    Global shortage of cybersecurity professionals
  • 351%
    Projected growth in cybersecurity work between 2021 and 2031

Employment opportunities

Programme

  • 1 theme
  • 2 theme
  • 3 theme
  • 4 theme
  • 5 theme
  • 6 theme

Beginner: Introduction to Cyber Security 140 hours

  • Importance of Cybersecurity; Key Concepts; Threat Detection and Security Strategies; Essential Aspects of Network Architecture, including Network Models, IP Addressing; DNS and DHCP Systems.
  • Security of Windows and Linux Systems; Management of Rights and Privileges; Aspects of Firewalls, VPNs, and Wireless Network Security; Event Monitoring.
  • Web Technologies; Security Vulnerabilities and Programming Security Practices; Cryptographic Principles; Encryption Methods; Hash Functions and SSL/TLS Protocols; and Malware Detection; Antivirus Strategies and Vulnerability Management Practices.

Intermediate: 140 hours

  • Identity and Access Management; Password Security; MFA, RBAC, SSO, and Federation Technologies.
  • Principles of Secure Development Life Cycle; Threat Modeling; Risk Assessment and Application Security Testing.
  • Incident Response Strategies and Digital Forensics; Fundamentals of Cloud Security; Service Models and Data Security Management.
  • Legal and Ethical Aspects, including Privacy Laws and Compliance Strategies.
  • Penetration Testing; Ethical Hacking; Security Operations Center Operations, including SIEM Tools; Incident Handling; Threat Hunting.

Advanced: 60 hours

  • Vulnerability Assessment Methods, including Detection Techniques, Assessment Tools, Effective Management, and Reporting.
  • Cybersecurity Policy and Strategy, including Policy Development, Setting Security Objectives, Compliance, and Implementation Challenges.
  • Principles of Encryption; Technologies; Data Storage and Transmission; and Encryption Policy.
  • Advanced Techniques; Use of Automated Tools; Adapting Methods to Various Environments; Ethical and Legal Aspects.
  • Understanding the Digital Identity Ecosystem; Integration of IAM Systems; SSO Solutions and Protection Strategies; ISO 27001 Standard; ISMS Planning; Internal Audits and Certification Processes.
  • Principles of Cyber Intelligence; Open Source Intelligence; Threat Intelligence Platforms and Data Analysis.
  • Development of Security Awareness and Training Programs; Training Methodologies; Interactive Training; and Program Evaluation and Improvement.

Professional: 140 hours

  • Advanced Threat Analysis (APT); Threat Intelligence; Development of Detection, Analysis, and Effective Defense Strategies.
  • Threat Modeling Techniques, including STRIDE, PASTA, and TRIKE, and their Application in the Development Cycle.
  • Integration of Security into DevOps Processes; Automation Practices and Tools.
  • Infrastructure as Code Principles; Configuration Management Tools and Automation Security Strategies.
  • Docker and Kubernetes Security Practices.
  • Security Aspects and Strategies for AWS, Azure, and Google Cloud.
  • Network Design Principles; VLAN Configuration and Microsegmentation.
  • Red Team and Blue Team Scenarios; Incident Response Procedures and Improvement Methods.

Soft skills: 16 hours

  • CV.
  • LinkedIn.
  • Job interview workshops.
  • Selft – employment and fees.
  • IT specialist competencies.

AI basics: 8 hours

  • Information search with AI.
  • Answers generation with AI.
Download programme

Lecturers

Our team of lecturers is a mixture of different IT specialists. Some, like superheroes 🦸, take Top positions in their companies during the day and respond to student calls in the evenings, while others work as freelancers, juggling between clients and students on a daily basis. But they are all 100% ready with the knowledge and experience to help you!🧑‍🎓

Justinas Misiunas

Festo Lietuva

Ernestas Mickus

Information Security Officer @Western Shipyard group

Course calendar

Period

2 December - 15 July

Time

18:00 - 22:00

Duration

504 hours

Price

4617.93 €, UŽT Funded

Calculator

Payment options

We offer so many different payout options and benefits that we have created a fee calculator for you to calculate your abilities yourself - just like in a bank. 💸

CodeAcademy Financing

  • Pay by installments – 50 €/month

100% UZT funding

  • Funding from the Employment Service allows retraining for those working and acquiring new competencies for those not working! 🚀
  • Extracurricular scholarships can be awarded to studying students.

Pay when you get employed!

  • Monthly fee – 10% of Net income, with the possibility of a payment holiday of up to 5 months.

Frequently asked questions

We recommend using your personal computer, as some tasks have to be done at home and it is easier to work with equipment you are already used to. For those who do not have this opportunity, CodeAcademy provides a desktop computer for the training period. The most common practice is that students use their personal computers in lectures and additionally connect a monitor in the classroom.  

All software and licenses required for training are provided to the students of the Academy FREE OF CHARGE. 

Contact us!








    Download programme




      Cookie settings

      This website uses various cookies. Your choices will be remembered during future visits. By clicking “Accept all”, you are agreeing with the use of cookies (including for analytical, functional, and marketing purposes). If you would like to see more information, please visit our Privacy Policy.