UZT Funding

Introduction to Cybersecurity: Theory and Practice (223003474)

644 hours

The goal of the Cybersecurity program is to prepare professionals by providing them with essential knowledge and practical skills related to cybersecurity principles and technologies. The course offers an in-depth exploration of three main areas of cybersecurity: Network security, which includes the configuration and management of firewalls, VPNs, and IDS/IPS systems; Operating system security, which focuses on designing and implementing security strategies for Windows and Linux systems, as well as managing user permissions and access control; Application security, which covers the analysis of OWASP Top 10 vulnerabilities, secure coding practices, and the basics of cryptography. Throughout the course, participants develop the practical skills needed to effectively protect information systems and data from a wide range of cyber threats and attacks.

CodeAcademy students use the TryHackMe platform for hands-on cybersecurity practice. Through this platform, they complete real-world exercises, strengthen their skills, and solve practical security challenges. This experience helps them better prepare for careers in the cybersecurity field. Access to the TryHackMe platform is provided free of charge during the course.

  • 6660€
    Cybersecurity specialist salary in Lithuania
  • 3 mln.
    Global shortage of cybersecurity professionals
  • 351%
    Projected growth in cybersecurity work between 2021 and 2031

Employment opportunities

Programme

  • 1 theme
  • 2 theme
  • 3 theme
  • 4 theme
  • 5 theme

Beginner: Introduction to Cyber Security 208 hours

Students will gain knowledge about the importance of cybersecurity, key concepts, threat recognition, and security strategies, as well as become familiar with essential aspects of network architecture, including network models, IP addressing, DNS, and DHCP systems. The security of Windows and Linux systems, management of rights and privileges, as well as the security aspects of firewalls, VPNs, and wireless networks, and event monitoring will be examined. The course will further cover web technologies, security vulnerabilities, and secure programming practices, principles of cryptography, encryption methods, hashing functions, and SSL/TLS protocols, as well as malware detection, antivirus strategies, and vulnerability management practices.

Intermediate: 140 hours

The course will cover identity and access management, password security, MFA, RBAC, SSO, and federation technologies. It will examine secure development lifecycle principles, threat modeling, risk assessment, and application security testing. Focus will be given to incident response strategies and digital forensics, fundamentals of cloud security, service models, and data security management. Legal and ethical aspects, including privacy laws and compliance strategies, will also be discussed. The course will conclude with penetration testing, ethical hacking, Security Operations Center operations, including SIEM tools, incident handling, and threat hunting.

Advanced: 140 hours

Students will thoroughly examine vulnerability research methods, including detection techniques, assessment tools, effective management, and reporting. The course will also cover cybersecurity policy and strategy, including policy development, setting security objectives, regulatory compliance, and challenges in policy implementation. The data encryption strategies module will cover encryption principles, technologies, data storage and transmission, and encryption policies. The advanced strategies for penetration testing section will teach high-level techniques, the use of automated tools, method application in various environments, as well as ethical and legal aspects. The digital identity management segment will encompass understanding the digital identity ecosystem, IAM system integration, SSO solutions, and protection strategies. The information security management system course will introduce the ISO27001 standard, ISMS planning, internal auditing, and certification process. The cyber intelligence and information  sources module will review cyber intelligence principles, open sources, threat intelligence platforms, and data analysis. The final module will cover the development of security awareness and training programs, training methodologies, interactive training sessions, and program evaluation and improvement.

Professional: 140 hours

Students will delve into advanced threat analysis (APT), learning about threat intelligence, detection, analysis, and the development of effective defense strategies. Threat modeling techniques, including STRIDE, PASTA,
and TRIKE, and their application in the software development lifecycle will also be discussed. The DevSecOps section will explore the integration of security into DevOps processes, automation practices, and tools. Configuration management and automation sessions will cover infrastructure as code principles, configuration management tools, and security strategies in automation. The container security component will focus on security practices for Docker and Kubernetes. The cloud security platforms segment will examine security aspects and strategies for AWS, Azure, and Google Cloud. The network segregation and segmentation module will address network design principles, VLAN configuration, and micro-segmentation. Finally, the course will conclude with security incident simulations and exercises, including Red Team and Blue Team scenarios, incident recovery procedures, and improvement methods.

Soft skills: 16 hours

  • CV.
  • LinkedIn.
  • Job interview workshops.
  • Selft – employment and fees.
  • IT specialist competencies.
Download programme

Lecturers

Our team of lecturers is a mixture of different IT specialists. Some, like superheroes 🦸, take Top positions in their companies during the day and respond to student calls in the evenings, while others work as freelancers, juggling between clients and students on a daily basis. But they are all 100% ready with the knowledge and experience to help you!🧑‍🎓

Justinas Misiunas

Festo Lietuva

Ernestas Mickus

Information Security Officer @Western Shipyard group

Course calendar

Period

28 April - 3 February

Time

18:00 - 22:00

Duration

644 hours

Price

4118,74 €, UŽT Funded

Calculator

Payment options

We offer so many different payout options and benefits that we have created a fee calculator for you to calculate your abilities yourself - just like in a bank. 💸

CodeAcademy Financing

  • Pay by installments – 50 €/month

100% UZT funding

  • Funding from the Employment Service allows retraining for those working and acquiring new competencies for those not working! 🚀
  • Extracurricular scholarships can be awarded to studying students.

Pay when you get employed!

  • Monthly fee – 10% of Net income, with the possibility of a payment holiday of up to 5 months.

Frequently asked questions

We recommend using your personal computer, as some tasks have to be done at home and it is easier to work with equipment you are already used to. For those who do not have this opportunity, CodeAcademy provides a desktop computer for the training period. The most common practice is that students use their personal computers in lectures and additionally connect a monitor in the classroom.  

All software and licenses required for training are provided to the students of the Academy FREE OF CHARGE. 

Contact us!








    Download programme




      Cookie settings

      This website uses various cookies. Your choices will be remembered during future visits. By clicking “Accept all”, you are agreeing with the use of cookies (including for analytical, functional, and marketing purposes). If you would like to see more information, please visit our Privacy Policy.