fbpx
Part-time

Cyber Security with Artificial Intelligence

Cybersecurity is a comprehensive set of methods designed to protect networks and systems from digital threats. Cybersecurity specialists are responsible for identifying threats, developing data protection strategies, and mitigating vulnerabilities. Of particular importance is the Security Operations Center (SOC), whose staff analyzes security events in real-time, manages incidents, and ensures a rapid response to various cyber threats, preventing their spread and minimizing damage.

  • 4027€
    Cybersecurity specialist salary in Europe
  • 3 mln.
    Global shortage of cybersecurity professionals
  • 351%
    Projected growth in cybersecurity work between 2021 and 2031

Employment opportunities

Programme

  • 1 theme
  • 2 theme
  • 3 theme
  • 4 theme
  • 5 theme
  • 6 theme
  • 7 theme
  • 8 theme
  • 9 theme
  • 10 theme
  • 11 theme
  • 12 theme
  • 13 theme
  • 14 theme
  • 15 theme
  • 16 theme
  • 17 theme
  • 18 theme
  • 19 theme
  • 20 theme
  • 21 theme
  • 22 theme
  • 23 theme
  • 24 theme
  • 25 theme
  • 26 theme
  • 27 theme
  • 28 theme
  • 29 theme
  • 30 theme
  • 31 theme
  • 32 theme

Exploration of the Basics and Importance of Cybersecurity, Cybersecurity Concepts including the CIA Triad, Types of Cyber Threats and Attack Vectors, and the Development and Implementation of Key Security Policies and Best Practices 16 hours

Basics and Importance of Cybersecurity, Cybersecurity Concepts including the CIA Triad, Types of Cyber Threats and Attack Vectors, Development and Implementation of Key Security Policies and Best Practices. This provides a broad exposure to essential cybersecurity topics, enabling students to become familiar with fundamental concepts and practices, and to explore areas they may not yet be comfortable with.

Skills/Tools/Technology:
Cybersecurity controls, frameworks, benchmarks, virtual machines, threat identification, vulnerability assessment, defenses, secure software development, testing methodologies, and cryptography. This course dives deep into these areas, offering practical experience and comprehensive understanding critical for cybersecurity professionals.

Exploration of network fundamentals including concepts and devices, analysis of network models such as OSI and TCP/IP, understanding of IP addressing and basics of subnetting, along with an introduction to DNS and DHCP systems 16 hours

Exploration of network fundamentals, including key concepts and devices. Analysis of network models such as OSI and TCP/IP, understanding IP addressing and the basics of subnetting, and an introduction to DNS and DHCP systems. This provides students with a comprehensive foundation in networking principles and practical knowledge necessary for configuring and managing network infrastructures.

Skills/Tools/Technology:
Network devices, OSI model, TCP/IP model, IP addressing, subnetting techniques, DNS configuration, DHCP setup, and network analysis tools. This course offers hands-on experience and in-depth understanding of essential networking technologies.

Introduction to operating system security, focusing on the fundamentals of Windows security, basics of Linux security, and management of user rights and privileges 16 hours

Introduction to operating system security, focusing on the fundamentals of Windows security, basics of Linux security, and management of user rights and privileges. This provides students with a thorough understanding of securing different operating systems and effectively managing user access controls.

Skills/Tools/Technology:
Windows security features, Linux security practices, user rights management, privilege escalation prevention, security configurations, and administrative tools. This course offers practical experience and essential skills for securing operating systems and managing user access.

Introduction to firewalls and IDS/IPS systems, securing connections with VPNs, ensuring wireless network security, and managing network traffic and events through Netflow and network logs 16 hours

Introduction to firewalls and IDS/IPS systems, securing connections with VPNs, ensuring wireless network security, and managing network traffic and events through Netflow and network logs. This course equips students with the knowledge and skills to implement and manage various network security measures and monitor network activities effectively.

Skills/Tools/Technology:
Firewall configuration, IDS/IPS deployment, VPN setup, wireless network security protocols, Netflow analysis, network log management, and traffic monitoring tools. This course provides hands-on experience and comprehensive understanding of key network security technologies and practices.

Understanding of web technologies including Restful API and web technology, introduction to web application security, exploration of OWASP Top 10 vulnerabilities, and implementation of secure programming practices with a focus on PHP fundamentals 16 hours

Understanding of web technologies, including Restful API and web technology, introduction to web application security, exploration of OWASP Top 10 vulnerabilities, and implementation of secure programming practices with a focus on PHP fundamentals. This course provides a comprehensive foundation in web security, focusing on identifying and mitigating common web vulnerabilities.

Skills/Tools/Technology:
Restful API design, web application security principles, OWASP Top 10 vulnerabilities, secure coding practices, PHP programming, web security testing tools, and vulnerability assessment techniques. This course offers practical experience in developing and securing web applications.

Introduction to cryptography, covering symmetric and asymmetric encryption, hash functions and digital signatures, and SSL/TLS protocols 16 hours

Introduction to cryptography, covering symmetric and asymmetric encryption, hash functions and digital signatures, and SSL/TLS protocols. This course provides students with a thorough understanding of cryptographic principles and practices essential for securing data in various applications.

Skills/Tools/Technology:
Symmetric encryption algorithms, asymmetric encryption techniques, hash functions, digital signatures, SSL/TLS configuration, cryptographic tools, and protocols. This course offers practical experience and in-depth knowledge of key cryptographic methods and their applications in cybersecurity.

Introduction to endpoint security, focusing on types of malware, detection, and prevention techniques, exploring antivirus and EDR solutions, and discussing vulnerability management and system updates 16 hours

Introduction to endpoint security, focusing on types of malware, detection, and prevention techniques, exploring antivirus and EDR solutions, and discussing vulnerability management and system updates. This course equips students with the knowledge and skills to protect endpoint devices from various threats and ensure their security through effective management practices.

Skills/Tools/Technology:
Malware identification, detection and prevention techniques, antivirus software, Endpoint Detection and Response (EDR) solutions, vulnerability assessment, patch management, and system update strategies. This course offers hands-on experience and comprehensive understanding of endpoint security measures and tools

Exploration of IAM fundamentals, password security, and multi-factor authentication, role-based access control (RBAC) and policy management, alongside single sign-on (SSO) and federation techniques 16 hours

Exploration of IAM fundamentals, password security, and multi-factor authentication, role-based access control (RBAC) and policy management, alongside single sign-on (SSO) and federation techniques. This course provides students with a comprehensive understanding of identity and access management practices critical for securing user access and managing identities.

Skills/Tools/Technology:
Identity and Access Management (IAM) systems, password security practices, multi-factor authentication (MFA) implementation, role-based access control (RBAC), policy management, single sign-on (SSO) solutions, and federation techniques. This course offers practical experience in deploying and managing IAM solutions to enhance organizational security.

Introduction to the Secure Development Life Cycle (SDLC), threat modeling and risk assessment, application security testing, and securing dependencies and third-party libraries 16 hours

Introduction to the Secure Development Life Cycle (SDLC), threat modeling and risk assessment, application security testing, and securing dependencies and third-party libraries. This course provides students with a detailed understanding of integrating security into the software development process to build robust and secure applications.

Skills/Tools/Technology:
Secure Development Life Cycle (SDLC) methodologies, threat modeling techniques, risk assessment frameworks, application security testing tools, dependency management, and securing third-party libraries. This course offers practical experience in implementing secure development practices and tools to ensure the security of software applications.

Introduction to incident response, preparation and identification stages, isolation, eradication, and recovery strategies, and an overview of digital forensics 16 hours

Introduction to incident response, preparation and identification stages, isolation, eradication, and recovery strategies, and an overview of digital forensics. This course equips students with the knowledge and skills to effectively manage and respond to security incidents, and to understand the basics of digital forensics.

Skills/Tools/Technology:
Incident response planning, identification and detection techniques, isolation and containment methods, eradication and recovery procedures, digital forensics fundamentals, forensic analysis tools, and incident documentation. This course offers practical experience in handling security incidents and conducting forensic investigations.

Exploration of cloud computing fundamentals, security considerations for cloud service models (IaaS, PaaS, SaaS), best practices and tools for cloud security, and management of cloud access and data security 16 hours

Exploration of cloud computing fundamentals, security considerations for cloud service models (IaaS, PaaS, SaaS), best practices and tools for cloud security, and management of cloud access and data security. This course provides students with a comprehensive understanding of securing cloud environments and effectively managing cloud-based resources.

Skills/Tools/Technology:
Cloud computing concepts, security measures for IaaS, PaaS, and SaaS models, cloud security best practices, cloud security tools, access management, data protection strategies, and cloud security compliance. This course offers practical experience in implementing and managing security in cloud computing environments.

Overview of cyber laws and regulations, principles and practices of ethical hacking, privacy laws and data protection (GDPR, HIPAA), and development of compliance strategies 16 hours

Overview of cyber laws and regulations, principles and practices of ethical hacking, privacy laws and data protection (GDPR, HIPAA), and development of compliance strategies. This course provides students with a detailed understanding of the legal and ethical aspects of cybersecurity, along with strategies to ensure compliance with relevant laws and regulations.

Skills/Tools/Technology:
Cyber law frameworks, ethical hacking techniques, GDPR and HIPAA compliance requirements, data protection strategies, compliance management tools, and legal aspects of cybersecurity operations. This course offers practical experience in navigating the complex legal and ethical landscape of cybersecurity.

Exploration of penetration testing methodologies and planning, intelligence gathering and footprinting techniques, vulnerability assessment and exploitation, followed by post-exploitation tactics and report preparation 40 hours

Exploration of penetration testing methodologies and planning, intelligence gathering and footprinting techniques, vulnerability assessment and exploitation, followed by post-exploitation tactics and report preparation. This course equips students with the skills to conduct comprehensive penetration tests and effectively document their findings.

Skills/Tools/Technology:
Penetration testing frameworks, planning and scoping, intelligence gathering, footprinting methods, vulnerability assessment tools, exploitation techniques, post-exploitation strategies, and report writing. This course offers hands-on experience in executing and documenting penetration testing activities.

Introduction to SOC roles and responsibilities, utilization of Security Information and Event Management (SIEM) tools, incident management and response in a SOC environment, and threat hunting with Indicators of Compromise (IoC) 40 hours

Introduction to SOC roles and responsibilities, utilization of Security Information and Event Management (SIEM) tools, incident management and response in a SOC environment, and threat hunting with Indicators of Compromise (IoC). This course provides students with a comprehensive understanding of Security Operations Center (SOC) operations and the tools and techniques used to manage and respond to security incidents.

Skills/Tools/Technology:
SOC roles and responsibilities, SIEM tool implementation and management, incident management procedures, threat hunting techniques, and identification and analysis of Indicators of Compromise (IoC). This course offers practical experience in operating within a SOC environment and managing security incidents effectively.

Exploration of Advanced Persistent Threats (APT) concepts and examples, threat intelligence and information sources, recognition and analysis of APTs, and defense strategies against APTs, including threat hunting and Indicators of Compromise (IoC) 40 hours

Exploration of Advanced Persistent Threats (APT) concepts and examples, threat intelligence and information sources, recognition and analysis of APTs, and defense strategies against APTs, including threat hunting and Indicators of Compromise (IoC). This course equips students with the knowledge and skills to identify, analyze, and defend against sophisticated cyber threats.

Skills/Tools/Technology:
APT concepts, threat intelligence gathering, information sources, APT recognition techniques, defense strategies, threat hunting methods, and analysis of Indicators of Compromise (IoC). This course offers practical experience in understanding and mitigating Advanced Persistent Threats.

Examination of threat modeling principles, exploration of various threat modeling methods such as STRIDE, PASTA, and TRIKE, practical examples of threat modeling, and integration of threat modeling into the software development lifecycle 20 hours

Examination of threat modeling principles, exploration of various threat modeling methods such as STRIDE, PASTA, and TRIKE, practical examples of threat modeling, and integration of threat modeling into the software development lifecycle. This course provides students with a comprehensive understanding of how to identify and mitigate potential threats throughout the development process.

Skills/Tools/Technology:
Threat modeling principles, STRIDE, PASTA, TRIKE methodologies, practical threat modeling exercises, and integration techniques for the software development lifecycle (SDLC). This course offers hands-on experience in applying threat modeling to enhance software security.

Exploration of DevSecOps culture and principles, implementation of security automation within the DevOps cycle, examination of tools and technologies for DevSecOps, and analysis of case studies and best practice 40 hours

Exploration of DevSecOps culture and principles, implementation of security automation within the DevOps cycle, examination of tools and technologies for DevSecOps, and analysis of case studies and best practices. This course provides students with an in-depth understanding of integrating security into the DevOps workflow to ensure continuous security throughout the development process.

Skills/Tools/Technology:
DevSecOps culture and principles, security automation techniques, DevOps cycle integration, DevSecOps tools and technologies, case study analysis, and best practice methodologies. This course offers practical experience in implementing DevSecOps to enhance security in development operations.

Introduction to Infrastructure as Code (IaC), exploration of configuration management tools such as Ansible, Chef, and Puppet, security considerations in configuration management, and strategies for secure automation 20 hours

Introduction to Infrastructure as Code (IaC), exploration of configuration management tools such as Ansible, Chef, and Puppet, security considerations in configuration management, and strategies for secure automation. This course provides students with a comprehensive understanding of automating infrastructure deployment and management while ensuring security best practices.

Skills/Tools/Technology:
Infrastructure as Code (IaC) principles, Ansible, Chef, Puppet, configuration management techniques, security in configuration management, and secure automation strategies. This course offers practical experience in leveraging configuration management tools and automating infrastructure securely.

Exploration of container technology fundamentals, basics of Docker security, security practices for Kubernetes, and container scanning and vulnerability management 20 hours

Exploration of container technology fundamentals, basics of Docker security, security practices for Kubernetes, and container scanning and vulnerability management. This course equips students with the knowledge and skills to secure containerized environments effectively.

Skills/Tools/Technology:
Container technology basics, Docker security practices, Kubernetes security measures, container scanning tools, and vulnerability management strategies. This course offers practical experience in securing and managing containerized applications.

Examination of AWS security best practices, security features of Azure, security aspects of Google Cloud Platform, and strategies for multi-cloud security 16 hours

Examination of AWS security best practices, security features of Azure, security aspects of Google Cloud Platform, and strategies for multi-cloud security. This course provides students with comprehensive knowledge of securing different cloud environments and implementing effective multi-cloud security strategies.

Skills/Tools/Technology:
AWS security best practices, Azure security features, Google Cloud Platform security aspects, multi-cloud security strategies, cloud security tools, and compliance management. This course offers practical experience in managing and securing cloud-based infrastructures across multiple platforms.

Exploration of network design principles for security, configuration and application of VLANs, understanding of green and red zones in network environments, and the implementation of microsegmentation for enhanced security 16 hours

Exploration of network design principles for security, configuration and application of VLANs, understanding of green and red zones in network environments, and the implementation of microsegmentation for enhanced security. This course provides students with a thorough understanding of designing and securing network infrastructures.

Skills/Tools/Technology:
Network design principles, VLAN configuration and application, green and red zones, microsegmentation techniques, network security best practices, and network segmentation tools. This course offers practical experience in creating secure network architectures.

Exploration of Red Team vs. Blue Team exercises, planning and implementation of security drills, incident recovery procedures, and analysis of lessons learned and continuous improvement 40 hours

Exploration of Red Team vs. Blue Team exercises, planning and implementation of security drills, incident recovery procedures, and analysis of lessons learned and continuous improvement. This course equips students with practical skills in simulating and responding to security incidents to enhance organizational resilience.

Skills/Tools/Technology:
Red Team vs. Blue Team methodologies, security drill planning and execution, incident recovery strategies, post-incident analysis, and continuous improvement practices. This course offers hands-on experience in conducting security exercises and improving incident response capabilities

Exploration of vulnerability detection methodologies, assessment tools, effective vulnerability management practices, and methods and practices for preparing comprehensive reports 40 hours

Exploration of vulnerability detection methodologies, assessment tools, effective vulnerability management practices, and methods and practices for preparing comprehensive reports. This course provides students with the skills to identify, assess, manage, and document vulnerabilities in information systems.

Skills/Tools/Technology:
Vulnerability detection techniques, assessment tools, vulnerability management strategies, reporting methods, and best practices for comprehensive documentation. This course offers practical experience in conducting vulnerability assessments and managing the remediation process.

Development of cybersecurity policies, setting security strategies and objectives, compliance with regulations and standards, and addressing challenges in implementing security policies 20 hours

Development of cybersecurity policies, setting security strategies and objectives, compliance with regulations and standards, and addressing challenges in implementing security policies. This course provides students with the knowledge and skills to create effective cybersecurity policies and ensure their successful implementation and compliance.

Skills/Tools/Technology:
Cybersecurity policy development, strategic planning, regulatory compliance (e.g., GDPR, HIPAA), implementation challenges, and policy enforcement. This course offers practical experience in formulating and executing cybersecurity policies to meet organizational and regulatory requirements.

Exploration of data encryption principles, encryption technologies and protocols, secure data storage and transmission, and management of encryption policies 16 hours

Exploration of data encryption principles, encryption technologies and protocols, secure data storage and transmission, and management of encryption policies. This course provides students with a comprehensive understanding of how to protect data through encryption and manage encryption strategies effectively.

Skills/Tools/Technology:
Encryption algorithms (symmetric and asymmetric), encryption protocols (e.g., SSL/TLS), secure data storage techniques, data transmission security, encryption policy management, and cryptographic tools. This course offers practical experience in implementing and managing data encryption to ensure data confidentiality and integrity.

Exploration of high-level penetration testing techniques, use of automated tools and scripts, adaptation of testing methods in various environments, and the ethical and legal aspects of penetration testing 16 hours

Exploration of high-level penetration testing techniques, use of automated tools and scripts, adaptation of testing methods in various environments, and the ethical and legal aspects of penetration testing. This course equips students with advanced skills in conducting penetration tests while adhering to ethical and legal standards.

Skills/Tools/Technology:
Advanced penetration testing techniques, automated testing tools and scripts, environment-specific testing adaptations, ethical hacking principles, and legal considerations in penetration testing. This course offers practical experience in executing sophisticated penetration tests and understanding the associated ethical and legal implications.

Exploration of digital identity ecosystems, integration of Identity and Access Management (IAM) systems, implementation of Single Sign-On (SSO) solutions, and strategies for protecting digital identities 16 hours

Exploration of digital identity ecosystems, integration of Identity and Access Management (IAM) systems, implementation of Single Sign-On (SSO) solutions, and strategies for protecting digital identities. This course provides students with the knowledge and skills to manage digital identities securely and efficiently.

Skills/Tools/Technology:
Digital identity ecosystems, IAM systems integration, SSO implementation, identity protection strategies, access control mechanisms, and security tools for identity management. This course offers practical experience in safeguarding digital identities and ensuring secure access management.

Overview of the ISO 27001 standard, planning and implementation of an ISMS, internal auditing and continuous improvement processes, and the ISMS certification process 16 hours

Overview of the ISO 27001 standard, planning and implementation of an Information Security Management System (ISMS), internal auditing and continuous improvement processes, and the ISMS certification process. This course equips students with the knowledge and skills to develop, implement, and maintain a robust ISMS in accordance with ISO 27001 requirements.

Skills/Tools/Technology:
ISO 27001 standard, ISMS planning and implementation, internal audit techniques, continuous improvement methods, and certification process management. This course offers practical experience in establishing and managing an ISMS to meet international security standards.

Exploration of cyber threat intelligence principles, open source intelligence (OSINT) sources, threat intelligence platforms, and analysis and application of intelligence data 16 hours

Exploration of cyber threat intelligence principles, open source intelligence (OSINT) sources, threat intelligence platforms, and analysis and application of intelligence data. This course provides students with the skills to gather, analyze, and utilize threat intelligence to enhance cybersecurity posture.

Skills/Tools/Technology:
Cyber threat intelligence principles, OSINT techniques, threat intelligence platforms, data analysis methods, and application of intelligence insights. This course offers practical experience in leveraging threat intelligence to identify and mitigate cyber threats effectively.

Development of security awareness programs, training methodologies and tools, interactive training and simulations, and evaluation and improvement of security training programs 16 hours

Development of security awareness programs, training methodologies and tools, interactive training and simulations, and evaluation and improvement of security training programs. This course equips students with the skills to create, implement, and enhance effective security awareness training initiatives.

Skills/Tools/Technology:
Security awareness program development, training methodologies, educational tools, interactive training techniques, simulation exercises, and program evaluation and improvement strategies. This course offers practical experience in designing and delivering comprehensive security awareness training programs.

Soft skills 16 hours

CV, LinkedIn, job interview workshops, individual activities and fees, IT specialist competencies.

AI basics 8 hours

Information search with AI
Answers generation with AI

Lecturers

Our team of lecturers is a mixture of different IT specialists. Some, like superheroes 🦸, take Top positions in their companies during the day and respond to student calls in the evenings, while others work as freelancers, juggling between clients and students on a daily basis. But they are all 100% ready with the knowledge and experience to help you!🧑‍🎓

Justinas Misiunas

Festo Lietuva

Course calendar

Period

25 November - 8 July

Time

17:00-20:45

Duration

664 hours

Price

8500

Calculator

Payment options

We offer so many different payout options and benefits that we have created a fee calculator for you to calculate your abilities yourself - just like in a bank. 💸

CodeAcademy Financing

  • Pay by installments for all courses – ONLY 100 €/month

Income share agreement

  • Pay 10% of your Net monthly Income / per month only AFTER SECURING  your dream career!

Full price

  • Pay in full and SAVE up to 1000 €

Frequently asked questions

We recommend using your personal computer, as some tasks have to be done at home and it is easier to work with equipment you are already used to.

All software and licenses required for training are provided to the students of the Academy FREE OF CHARGE. 

Contact us!








    Download programme




      Bezahlen Sie, nachdem Sie einen Job bekommen haben! 🥳

      Finden Sie die für Sie am besten geeigneten Kurse. Mehr