Funding

Cyber Security (223003236)

Kickstart your career as a Cyber Security Specialist!

Duration:

15 December - 17 April

Time:

8:00-16:00

Language:

English

Type:

Beginner Courses

Price:

From €89/month

Contact hours:

664 hours

Tools and languages

Splunk
Elastic
Sentinel
Firewall
Log Analysis
Python
CyberKillChain

Future professions

Cybersecurity Analyst
IT Security Consultant
Incident Response Specialist

About the course

Cyber Security is the set of methods designed to protect networks and systems from digital threats. Specialists in this field are responsible for identifying threats, developing data protection strategies, and addressing security vulnerabilities. The Security Operations Center (SOC) is especially important, where employees analyze security events in real-time, manage incidents, and ensure a rapid response to various cyber threats, preventing their spread and minimizing damage.

Cyber Security – what is it?

Cybersecurity is the practice of protecting computers, networks, servers, mobile devices, and data from unauthorized access, attacks, or damage. In a world where nearly everything is connected to the internet, cybersecurity has become one of the most critical aspects of modern life. Its main goal is to ensure the confidentiality, integrity, and availability of information—often referred to as the CIA triad.

Cybersecurity involves a wide range of measures, from simple actions like using strong passwords and updating software to complex systems such as firewalls, encryption, and artificial intelligence-based threat detection. Specialists in this field work to identify vulnerabilities, prevent cyberattacks, and respond quickly if security breaches occur.

Common threats include viruses, phishing attacks, ransomware, identity theft, and data breaches, all of which can cause severe financial and reputational damage to individuals and organizations. As technology evolves, so do cybercriminals—making cybersecurity a constantly changing and demanding discipline.

To stay protected, companies and individuals must combine technology with education and awareness. Regular training helps people recognize suspicious emails or unsafe links, while security tools provide the technical layer of defense.

In essence, cybersecurity is about building a safer digital environment where people can trust the systems they use every day. It’s not only a technical necessity but also a foundation for digital freedom, privacy, and the overall stability of our increasingly connected world.

Employment opportunities

Programme

  • 1 theme
  • 2 theme
  • 3 theme
  • 4 theme
  • 5 theme

Beginner: Introduction to Cyber Security 208 hours

Students will gain knowledge about the importance of cybersecurity, key concepts, threat recognition, and security strategies, as well as become familiar with essential aspects of network architecture, including network models, IP addressing, DNS, and DHCP systems. The security of Windows and Linux systems, management of rights and privileges, as well as the security aspects of firewalls, VPNs, and wireless networks, and event monitoring will be examined. The course will further cover web technologies, security vulnerabilities, and secure programming practices, principles of cryptography, encryption methods, hashing functions, and SSL/TLS protocols, as well as malware detection, antivirus strategies, and vulnerability management practices.

Intermediate 140 hours

The course will cover identity and access management, password security, MFA, RBAC, SSO, and federation technologies. It will examine secure development lifecycle principles, threat modeling, risk assessment, and application security testing. Emphasis will be placed on incident response strategies and digital forensics, as well as the fundamentals of cloud security, service models, and data security management. Legal and ethical aspects, including privacy laws and compliance strategies, will also be discussed. The course will conclude with penetration testing, ethical hacking, Security Operations Center (SOC) operations, including SIEM tools, incident handling, and threat hunting.

Advanced 140 hours

Students will thoroughly examine vulnerability research methods, including detection techniques, assessment tools, effective management, and reporting. The course will also cover cybersecurity policy and strategy, including policy development, setting security objectives, regulatory compliance, and challenges in policy implementation. The data encryption strategies module will cover encryption principles, technologies, data storage and transmission, and encryption policies. The advanced strategies for penetration testing section will teach high-level techniques, the use of automated tools, method application in various environments, as well as ethical and legal aspects. The digital identity management segment will encompass understanding the digital identity ecosystem, IAM system integration, SSO solutions, and protection strategies. The information security management system course will introduce the ISO 27001 standard, ISMS planning, internal auditing, and the certification process. The cyber intelligence and information sources module will review cyber intelligence principles, open sources, threat intelligence platforms, and data analysis. The final module will cover the development of security awareness and training programs, training methodologies, interactive training sessions, and program evaluation and improvement.

Professional 140 hours

Students will delve into advanced threat analysis (APT), learning about threat intelligence, detection, analysis, and the development of effective defense strategies. Threat modeling techniques, including STRIDE, PASTA, and TRIKE, and their application in the software development lifecycle will also be discussed. The DevSecOps section will explore the integration of security into DevOps processes, automation practices, and tools. Configuration management and automation sessions will cover infrastructure as code principles, configuration management tools, and security strategies in automation. The container security component will focus on security practices for Docker and Kubernetes. The cloud security platforms segment will examine security aspects and strategies for AWS, Azure, and Google Cloud. The network segregation and segmentation module will address network design principles, VLAN configuration, and micro-segmentation. Finally, the course will conclude with security incident simulations and exercises, including Red Team and Blue Team scenarios, incident recovery procedures, and improvement methods.

Soft skills: 16 hours

  • CV.
  • LinkedIn.
  • Job interview workshops.
  • Selft – employment and fees.
  • IT specialist competencies.
Download programme

Lecturers

Our team of lecturers is a mixture of different IT specialists. Some, like superheroes 🦸, take Top positions in their companies during the day and respond to student calls in the evenings, while others work as freelancers, juggling between clients and students on a daily basis. But they are all 100% ready with the knowledge and experience to help you!🧑‍🎓

Justinas Misiunas

Senior Cyber Security Specialist

Ernestas Mickus

CEO

Study plan

Duration:

15 December - 17 April

Time:

8:00-16:00

Language:

English

Price:

From €89/month

Contact hours:

664 hours

Program:

Download

Payment options

We offer so many different payout options and benefits that we have created a fee calculator for you to calculate your abilities yourself - just like in a bank. 💸

CodeAcademy Financing

  • Pay by installments – 50 €/month

100% UZT funding

  • Funding from the Employment Service allows retraining for those working and acquiring new competencies for those not working! 🚀
  • Extracurricular scholarships can be awarded to studying students.

Pay when you get employed!

  • Monthly fee – 10% of Net income, with the possibility of a payment holiday of up to 5 months.

Contact us!








    Download programme




      Cookie settings

      This website uses various cookies. Your choices will be remembered during future visits. By clicking “Accept all”, you are agreeing with the use of cookies (including for analytical, functional, and marketing purposes). If you would like to see more information, please visit our Privacy Policy.