Security Operations Management Immersive WD :: Oct 3rd – Dec 16th
In this 20-week / 400-hour program, our classes run from 9 am – 6 pm, every week Monday – Friday.
Last dat to enroll: Sep 28th
3
160
240
Course overview
Rather than doors, locks and vaults, IT departments rely on a combination of strategies, technologies and user education to protect an enterprise against cybersecurity attacks that can compromise systems, steal data and other valuable company information, and damage an enterprise’s reputation. As the volume and severity of cyber attacks grow, the need for cybersecurity risk management grows with it. Cybersecurity risk management involves identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
In this course, Cybersecurity Risk Management, you’ll learn how to assess a company’s risk across each area within IT. First, you’ll explore the various methods used to assess risk like SLE, ALE, and ARO. Next, you’ll learn the fundamentals of computer forensics, including maintaining chain of custody, legal holds, and data acquisition techniques. Finally, you’ll discover the principals of disaster recovery, maintaining highly available infrastructure, and business continuity basics. By the end of the course, you’ll understand what’s required to assess an organization’s operational risk, the methods used to conduct a forensic investigation, and how to keep a business operational leveraging disaster recovery and business continuity concepts.
This course is offered as a 20-weekend program from Sat-Sun 8:00 AM-6:00 PM . Each course includes 200 hrs of theory and 200 hrs of hands-on labs.
Expert-Led Instruction That Gets You Job-Ready: Become an elite ethical hacker. Gain skills and collaborate with leading professionals through lectures, research exercises, and real-world simulations.
Exclusive Access to Leaders in Security: Our program offers countless opportunities to learn and engage with security professionals from around the world through guest speakers, alumni gatherings, and topical community events.
Gain a Valuable Professional Network: Transform and grow your career alongside peers (and potential collaborators) on campus and in our Connected Classroom. The DA community is a priceless resource — just ask our alumni.
Manage Information Systems Security: Learn the management of domains in the Information Systems security which include Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.
Monitor Zero-Trust Systems: Explore the principles of Zero Trust – Verify explicitly, Use least privileged access, and Assume breach. Apply the principles through hands-on use cases and technology labs using modern cloud-enabled Security Incident and Event Management (SIEM), and Security Orchestration, Automation and Response (SOAR) platforms. Contemporary security operations teams use both SIEM and SOAR to optimize the Security Operations Center.
Manage CMMC Compliance : The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. The CMMC is the DoD’s response to significant compromises of sensitive defense information located on contractors’ information systems. Prepare through theory and hands-on use cases to Manage the risk with Federal Supply Chain, ensure compliance through implementing and evaluating CMMC Level 1-5, and Prepare an organization for an Assessment.
Perform Assessment Capstone: This module serves as the capstone for the 8 weeks of learning through integration of management techniques into an organization assessment. The assessment will include Information systems risk, Zero-Trust posture, and application of CMMC. The goal of this this module is to help a learner to develop an effective LinkedIn Profile, showcase project portfolio, prepare for interviews by revisiting their capstone problem, and share capstone project results.
Certifications: By the end of this course you will have the skills needed to acquire Certified Information Systems Security Professional (CISSP), and Azure Fundamentals (AZ-900).
Security Jobs: Equip yourself to succeed in a career such as an Cyber Intel Planner, Cyber Ops Planner, IT Program Auditor, Product Support Manager, Collection Manager, Requirements Manager.
Our instructors represent the brightest professionals from companies like Microsoft, Amazon Web Services, and Sabre. They bring in-depth experience from the field to the classroom each day, providing invaluable insights into succeeding on the job.
Shane Walker, Dallas, Cybersecurity Instructor
James Anderson, Dallas, Cybersecurity Instructor
Kevin Koyle, Dallas, Cybersecurity Instructor
Xerxes Cama, Dallas, Cybersecurity Instructor
Logan Hillard, Cybersecurity Instructor
Strategy and Accountability: Our Career Services team works with you to individualize your path to a new career. Stay on track and motivated from the first day of class!
Resume Review: Learn how to design and tailor your resume to land the career you are looking for. Remember: every word counts.
LinkedIn Optimization: LinkedIn profiles are now mandatory extensions of our resumes. Setting up a thoughtful, well-written profile is the make or break for many inquiring employers. Using industry tips and tricks, we’ll work with you to spruce up yours.
Interview Preparation: Set up mock interviews to nail the real thing. Learn to develop effective interview strategies, get detailed feedback, and reduce stress before actual interviews.
Networking Opportunities: Learn how to navigate uncharted networking waters, tap into our expanding Divergence Alumni network, and watch your support and contacts grow!
Calendar
In this 20-week / 400-hour program, our classes run from 9 am – 6 pm, every week Monday – Friday.
Last dat to enroll: Sep 28th
For U.S. veterans, military spouses, and dependents of veterans.
GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government website.
Apply for grants with your local Workforce Solutions Office, that provide career services to underrepresented communities in tech.
Apply for a loan from one of our high-quality lender – Skills.Fund.
Financing as low as $450 a month
Divide tuition into three payments.
Currently only available in select U.S. markets.
Industry leaders who've hired our students
Admissions Tour
Schedule an Admissions tour with our team to explore our new 10,000 sq ft space. Grab a coffee and meet Bear (our reigning, four-legged Chief Happiness Officer), step into a classroom, or find a comfy lounge and chat with one of our many helpful staff, alumni, or students about their experience here at Divergence Academy.
Step 1
So you want to be an ethical hacker, social engineer, data analyst, data scientist, or data visualizer? Maybe you've heard the cloud is where it's at, or you're an industry veteran that needs a skills refresh. Ask Google, do some research, search profiles on LinkedIn, and ask questions. Curiosity and a knack for research are essential skills for a technologist. Spend some time and bring your questions to the next step.
Step 2
Let's talk through it: your background, chosen path, weekday or weekend schedule, funding options, and more. Schedule an appointment with our Admissions Team.
Step 3
Curious folks, we will not make you wait to get started on your learning journey. You'll be enrolled from the get-go in either Data or Cyber Wookie. Each provides valuable resources to help our future data scientists or ethical hackers prep for the first day of class.
Step 4
Congrats! Your funding has been verified and you are accepted into the program. Be on the lookout for a personalized Acceptance Letter via e-mail. You can always call us at 833-DIVERGE.
Step 5
Experiencing first day jitters? Here's how we can help.
A week before your program starts, our Community Manager will get you onboarded to the learning platform, walk you through TWC enrollment paperwork, and connect you with future classmates.
Step 6
"Besides technology skills, what else will help me land a solid job?"
Soft Skills.
And guess what? You can start practicing TODAY.
Divergence Academy follows a 16:1 student to teacher ratio. Classrooms are equipped with six foot training tables, swivel ergonomic chairs and computers for each student. Instructors have flexible desk for standing or sitting, big screen TVs to display, whiteboards and the same capabilities for remote delivery.
“The Army’s COOL (Credentialing Opportunities On-Line), also known as Credentialing Assistance (CA) helps soldiers find information on certifications and licenses related to their jobs. The program can pay for courses and exams that lead to industry-recognized civilian credentials in an occupational area of your choice.”
“Civilian credentials are important for two reasons:
Career Advancement Civilian credentialing can contribute to military career development, and may be accepted for self-development requirements and in performance evaluations.
Smoother Transitions When you transition back to civilian employment, credentials help you translate your military training and experience into something civilian employers can easily recognize. That can help you get hired, get a better job, or be promoted sooner!”
“CA is subject to the same funding ceiling as Tuition Assistance (TA). A Soldier may use both TA and CA; however, you can’t get more than $4,000 total from both programs per fiscal year.”
“Eligible Soldiers include those who are: Regular Army, Active Guard/Reserve (AGR) pursuant to Title 10 and Title 32, U.S. Army Reserve (USAR), and Army National Guard (ARNG) in an active drilling status with a designation as satisfactory.”