Courses in English

Cyber Security with Artificial Intelligence (223003029)

Within the Cybersecurity program, students will learn the skills necessary to assist in the identification, assessment, reporting, and mitigation of technology and information security risks. The program will also provide students with the knowledge necessary to determine information system vulnerabilities and residual risks based on the analysis of technical artifacts, interviews, and evaluations of IT systems.

The course will also cover the leading approaches to managing cybersecurity, including ‘defense in depth’ and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. The Cybersecurity Bootcamp program includes instruction towards CompTIA Security+ and CySA+ certifications. Through labs with sandboxed virtual machines, the course provides hands-on training in CEH-inspired scenarios, defensive and offensive cybersecurity, networking, systems, web technologies, and databases. Assignments will span PC and server so ware, application, and code with a solid technical background in computer vulnerabilities, attack vectors, exploits, and mitigation controls.

To round out the program, students will conduct event and incident investigations to include computer intrusions, infections, and unauthorized access or usage and provide reports to management and recommend sound remediation and mitigation

  • 4027€
    Cybersecurity specialist salary in Lithuania
  • 3 mln.
    Global shortage of cybersecurity professionals
  • 351%
    Projected growth in cybersecurity work between 2021 and 2031

Įsidarbinimo galimybės

Programa

  • 1 theme
  • 2 theme
  • 3 theme
  • 4 theme
  • 5 theme
  • 6 theme
  • 7 theme
  • 8 theme
  • 9 theme
  • 10 theme
  • 11 theme

Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure So ware, Testing, Cryptography 20 hours

Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure Software, Testing, Cryptography Diving right in with broad exposure to cybersecurity. This is an important opportunity to become comfortable with the list and dig into any areas that the student is not familiar with.

Skills/Tools/Technology: Controls, virtual machines, Windows or Mac, Linux, vulnerability assessment and remediation, penetration testing, packet sniffing, cryptography.

Labs:
VM Setup
Windows Directions Mac Directions
Network Settings!
Scanning Networks Packet Sniffing

Attacks, Physical Security, Vulnerability Scanning, Risk Management, PKI, IAM, Password Cracking, Analysis Tools, SSL 20 hours

Attacks, Physical Security, Vulnerability Scanning, Risk Management, PKI, IAM,
Password Cracking, Analysis Tools, SSL. Continuing the broad exposure adding more major cybersecurity elements. Build out your Kali Linux machine while also learning about networking and data security.

Skills/Tools/Technology:
Forms of a ack, physical security, Nessus, risk management, PKI, IAM, Kali Linux, Linux configuration, Password Cracking, Analysis Tools, SSL.

Labs:
Nessus installation Password Cracking

Access Control, Account Management, Secure Network Design, Policies and Procedures, Firewalls 20 hours

Access Control, Account Management, Secure Network Design, Policies and Procedures, Firewalls Further pieces of the big picture, digging deeper in important places. Hands on administrative controls, designing and configuring.

Skills/Tools/Technology:
Access Control, Account Management, Network Design, Firewall Configuration, Policies and Procedures.

Labs:
Basic ACL
Firewall Configuration Kali Secure
Network Design

Malware, Intrusion Detection, Tools, Control Systems, Secure Shell, Mobile and Endpoint Security 20 hours

Malware, Intrusion Detection, Tools, Control Systems, Secure Shell, Mobile and Endpoint Security Surveying further and digging down. Viruses and Ransomware, intrusion detection, useful tools, introduction to embedded (control) systems, secure shell, mobile and endpoint security.

Skills/Tools/Technology:
Malware, intrusion detection (snort), control systems, secure shell, mobile security, endpoint security.

Labs:
Snort Installation SSH
Endpoint Protection

Virtual Machines, Malicious Code, DR/BC, Powershell 20 hours

More Virtual Machines, Malicious Code, Disaster Recovery and Business Continuity, Powershell. Exposure to more tools, threats, recovery and continuity.

Skills/Tools/Technology:
Virtual Machines, malicious code, Disaster Recovery/Business Continuity, Powershells.

Labs:
Malicious Code
Powershell Security

Incident Response, Forensics 20 hours

Learn Incident Response and Forensics Identifying and responding to incidents, technical and legal elements of forensics.

Skills/Tools/Technology:
Incident response plans and practice, forensic evidence rules and techniques.

Labs:
Configuring an Intrusion Detection
System Incident Response
Digital Forensics

Resiliency and Automation, Backups 20 hours

The Role of Resiliency and Automation, the Critical Importance of Backups, Learn how resiliency, automation, and backups provide essential and fundamental protection.

Skills/Tools/Technology:
Use of redundancy including RAID and clustering, backups.

Labs: Backup

Tabletop Exercises Make up and catch up Career Preparation 20 hours

Tabletop Exercises, Career Information Tabletop exercises are effective for learning, preparing, and solving problems before they happen.

Skills/Tools/Technology:
Open mind, imagination, knowing company and legal policies.

Labs:
Tabletop Exercise Career Preparation
Belt Exam Sec+

Roles and Responsibilities, Controls, IoC, Threat Analysis, Attack Frameworks, Network Protection, A ack Tools, Network Monitoring, Appliance Monitoring 20 hours

Roles and Responsibilities, Controls, Threat Assessments Understanding roles and responsibilities, security controls, indicators of compromise, understanding threats, attack tools, monitoring networks.

Skills/Tools/Technology:
Understand roles and responsibilities, indicators of compromise, attack frameworks, threat analysis, attacker tools, network monitoring.

Labs:
IoC Investigation
Network Group Assignmen

Soft skills

CV, LinkedIn, job interview workshops, individual activities and fees, IT specialist competencies

AI basics

  • Information search with AI
  • Answers generation with AI
Atsisiųsti programą

Dėstytojai

Mūsų dėstytojų komanda – skirtingų IT specialistų mišinys. Vieni, kaip kokie superdidvyriai 🦸, dienomis
užima Top pozicijas savo įmonėse ir vakarais atsiliepia į studentų pagalbos šauksmus, kiti – dirba kaip freelancer’iai, kasdien žongliruodami tarp klientų bei studentų. Tačiau visi jie 100% pasiruošę žiniomis ir patirtimi padėti tau! 🧑‍🎓

Justinas Misiūnas

Festo Lietuva

Ernestas Mickus

Information Security Officer @Western Shipyard group

Mokymosi aplinka

CodeAcademy mokymosi aplinka palengvina mokymosi procesą bei leidžia tau mokytis, kad ir kur būtum. 🌏 Paskaitos dėstytojų vedamos gyvai, o po jų – neribota prieiga prie visų paskaitų įrašų, medžiagos bei užduočių. 🙌

 

Programos kalendorius

Laikotarpis

5 August - 11 March

Laikas

18:00 - 22:00

Trukmė

504 hours

Kaina

4617.93 €, UŽT Funded

Skaičiuoklė

Išsimokėjimo galimybės

Mes siūlome tiek skirtingų išsimokėjimo galimybių ir lengvatų, kad sukūrėme skaičiuoklę savo galimybes pasiskaičiuoti pačiam – visai kaip banke. 💸

CodeAcademy finansavimas

  • Nuo 50 €/mėn.

100% Užimtumo Tarnybos finansavimas

  • Užimtumo Tarnybos finansavimas leidžia persikvalifikuoti dirbantiems ir įgyti naujas kompetencijas nedirbantiems! 🚀
  • Besimokantiems studentams gali būti skiriamos UžT stipendijos, Daugiau informacijos čia.

Mokėk po sėkmingo įsidarbinimo!

  • Mėnesinis mokestis – 10% nuo Neto pajamų, su galimybe turėti mokėjimo atostogas iki 5 mėnesių.

Dažniausiai užduodami klausimai

Taip, organizuojame darbo pokalbio simuliacijas, kurių metu imituojame darbo pokalbį pagal jūsų sritį. Išanalizuojame jums rūpimus klausimus, kartu pasiruošiame atsakymus į klausimus.

Susisiekite su mumis!








    Atsisiųskite programą