Launch your Cybersecurity career in Four Months!
No prior experience necessary! We will empower you with the critical classroom and lab-driven instruction needed to prepare and qualify you for the cybersecurity industry. 
CyberWarrior Academy was built to Create Opportunity
High-wage careers for People underserved and underemployed
 Cybersecurity represents a significant opportunity for anyone looking for a sustainable, rewarding, and lucrative career.
 3,500,000 open Cybersecurity jobs globally,
including 500,000 openings in USA, of which 160,000 are Security Analysts roles.
 
 Chief Information Security Officers get paid as much as $6,500,000 USD per year
and their direct reports get paid around $1,000,000 USD – Cybersecurity pros name their price.
 According to ZipRecruiter, the average annual pay for an entry-level Cybersecurity Analyst is $82,565 a year!
Meet The Leadership Team:
Reinier Moquete
CEO, CyberWarrior Consulting & CyberWarrior Academy
Omar Alvarado
CISO, CyberWarrior Consulting & CyberWarrior Academy
Jonathan Edwards
COO, CyberWarrior Academy 
Sue Bergamo
CISO, Episerver
CWA Board of Advisors
Bill Stone
CIO, Abacus Insights
CWA Board Of Advisors
Sonia Arista
Field CISO, Fortinet
CWA Board Of Advisors
Steve MacLellan
Fomer CISO, Fidelity 
CWA Board Of Advisors
What will you learn?
Our 18-week program (Full-Time Online with a LIVE Instructor) will prepare you for success in Cybersecurity, a field where salaries are growing fast and career opportunities are unlimited. This workforce training program combines vocational lab-driven exercises, delivered by ethical hackers and industry experts, with a competency-based model. We empower you with the hands-on knowledge, tools, and certifications necessary to launch a career in Cybersecurity.
 Tools and Technologies
Firewalls & IDPS , Vulnerability Management, Packet Analysis, Security Monitoring, Malware Analysis, ​Incident Response, and Security Automation.
 Soft Skills
Our innovative "Career Hacks" module delivers the soft skills to engage in the “business” of cybersecurity and is an integral part of the curriculum. 
 Consulting Experience
Our Capstone Projects build upon extensive lab exercises and LIVE instruction to empower you to engage in both Network Defense and Penetration Testing.
Our Training Is The Real Thing
We Bridge The Gap Between Student Experience And Employer Expectations
Our training with fused with cloud-based labs, which are built to practice on the same tools that companies depend on to protect their networks. This creates alignment between the student experience and employer expectations.
720+ Hours  -  18 Weeks  -  Full Time  -  LIVE Online
Here's What We Teach You To Master and get you certified on
Week #1: CompTIA A+ (Certification)
CompTIA A+ is the industry standard for launching IT careers into today’s digital world. This training session covers a baseline technology overview for IT support professionals, including configuring Operating Systems (OS), troubleshooting, basic data backup/recovery methods, and problem-solving. A+ is designed as an entry-level computer accreditation.
Week #2: CompTIA Network+
(Certification)
CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. This certification covers how to install, maintain, troubleshoot, and support a network, understanding different aspects of networking technologies, including TCP/IP and the OSI model. It also tests knowledge of network components and where they function in association with the OSI model, network cabling, network security, and network troubleshooting.
Week #2: CompTIA Network+ (Certification)
CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. This certification covers how to install, maintain, troubleshoot, and support a network, understanding different aspects of networking technologies, including TCP/IP and the OSI model. It also tests knowledge of network components and where they function in association with the OSI model, network cabling, network security, and network troubleshooting. Network+ is a mid-level certification for network techs.
Week #3: CompTIA Security+ (Certification)
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. This course covers everything from how to install and configure systems to secure applications, networks, and devices, through performing threat analysis responding with appropriate mitigation techniques.
Week #4: EC-Council Certified Network Defender (Certification)
The Certified Network Defender (CND) certification course focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate.
Week #4: EC-Council Certified Network Defender (Certification)
The Certified Network Defender (CND) certification course focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate.
Week #5: End of Module #1
(Review & Catch up Week)
Our program is divided into three modules of four weeks each. At the end of each module we have a one-week “Review and Catch-up” period to review what we have covered during the module. This time is to clarify subject matter that either individually or as group has been difficult to digest and learn. The review week also gives students time to re-energize and solidify skills with less pressure.
Week #6: Firewalls & IDPS
Students will create and implement firewalls and IDPS using opensource software. They will learn Cisco ACLs using packet simulators like PacketTracer, Linux IP Tables, Opensource firewall Pfsense, implementing Snort IDPS and creating customized rules, Suricata, BRO and connecting it to SecurityOnion using an NSM tool. This module will allow them to build the confidence to feel comfortable working with any Firewall or IDPS system in the market. 
Week #6: Firewalls & IDPS
Students will create and implement firewalls and IDPS using opensource software. They will learn Cisco ACLs using packet simulators like PacketTracer, Linux IP Tables, Opensource firewall Pfsense, implementing Snort IDPS and creating customized rules, Suricata, BRO and connecting it to SecurityOnion using an NSM tool. This module will allow them to build the confidence to feel comfortable working with any Firewall or IDPS system in the market. 
Week #7: Vulnerability Management
Students learn to create an inventory of assets using discovery tools and domain controller queries, and how to use basic vulnerability scanning capabilities of tools like NMAP. Students will create their own NMAP scripts and learn popular industry tools like Tenable Nessus Vulnerability Management, Rapid7 InsightVM, OpenVAS, among others. To culminate the class, students learn how to make an executive report and design remediation strategies.  
Week #8: Packet Analysis
This course teaches how to analyze packets and perform network forensic investigations effectively, using open-source software. Participants also learn how to differentiate between normal vs. abnormal protocols & behaviors. We cover tools like tcpdump, Wireshark & Tshark, Snort, Bro, NetworkMinner, and others. Students learn to create simple scripts using Python Scapy, and use these skills for detecting network sniffing attacks. This module will provide students with the skills to work with raw data and have a better understanding of the underlying technologies used in their networks. 
Week #8: Packet Analysis
This course teaches how to analyze packets and perform network forensic investigations effectively, using open-source software. Participants also learn how to differentiate between normal vs. abnormal protocols & behaviors. We cover tools like tcpdump, Wireshark & Tshark, Snort, Bro, NetworkMinner, and others. Students learn to create simple scripts using Python Scapy, and use these skills for detecting network sniffing attacks. This module will provide students with the skills to work with raw data and have a better understanding of the underlying technologies used in their networks. 
Week #9: EC-Council Certified Ethical Hacker (Certification)
The Certified Ethical Hacker (CEH) certification teaches students to systematically attempt to inspect network infrastructures (with the consent of its owner) to find security vulnerabilities which a malicious hacker could potentially exploit. This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.
Week #10: End of Module #2 
(Review & Catch up)
Our program is divided into three modules of four weeks each. At the end of each module we have a one-week “Review and Catch-up” period to review what we have covered during the module. This time is to clarify subject matter that either individually or as group has been difficult to digest and learn. The review week also gives students time to re-energize and solidify skills with less pressure.
Week #10: End of Module #1(Review & Catch up Week)
Our program is divided into three modules of four weeks each. At the end of each module we have a one-week “Review and Catch-up” period to review what we have covered during the module. This time is to clarify subject matter that either individually or as group has been difficult to digest and learn. The review week also gives students time to re-energize and solidify skills with less pressure.
Week #11: Security Monitoring
Students learn to implement a customized security monitoring service using opensource software from scratch. We start with implementing a Syslog server in Linux using Rsyslog and integrate it with the famous ELK Stack (Elasticsearch, Logstash, and Kibana) for quick insights of data. Students also learn popular tools Graylog, Splunk, and how to perform Threat Intelligence to enrich logs
Week #12: Malware Analysis
This course teaches participants everything from malware analysis fundamentals to the use of the latest reverse engineering tools to combat malware. Participants learn to break down potential malware threats and create solutions to combat them. We teach how to protect against malware in the future, performing dynamic and static analysis on all major file types. We guide students on carving malicious executables from documents, to recognize common malware tactics, and to debug and disassemble malicious binaries. 
Week #12: Malware Analysis
This course teaches participants everything from malware analysis fundamentals to the use of the latest reverse engineering tools to combat malware. Participants learn to break down potential malware threats and create solutions to combat them. We teach how to protect against malware in the future, performing dynamic and static analysis on all major file types. We guide students on carving malicious executables from documents, to recognize common malware tactics, and to debug and disassemble malicious binaries. 
Week #13: Incident Response
Students will learn to identify potentially harmful events and the difference between an incident response policy and an incident response plan. Participants will learn the best practices to build an incident response plan: prepare, identify, containment, eradication, recovery, and lessons learned. They will also develop a strong foundation on how to handle a cybersecurity incident. 
Week #14: Security Automation
Students will learn the necessary skills to automate security tasks by using the Python programming language. For analysts and other security professionals, automation is a fundamental tool that helps them keep up with the volume of threats and individual activities to defend the enterprise. They will learn automated data analysis, policy validation, and customized scanning. Participants will also be trained on how to use Python to automate offensive activities as a penetration tester and better understand modern-day attacks.
Week #14: Security Automation
Students will learn the necessary skills to automate security tasks by using the Python programming language. For analysts and other security professionals, automation is a fundamental tool that helps them keep up with the volume of threats and individual activities to defend the enterprise. They will learn automated data analysis, policy validation, and customized scanning. Participants will also be trained on how to use Python to automate offensive activities as a penetration tester and better understand modern-day attacks.
Week #15: End of Module #3 
(Review & Catch up Week)
Our program is divided into three modules of four weeks each. At the end of each module we have a one-week “Review and Catch-up” period to review what we have covered during the module. This time is to clarify subject matter that either individually or as group has been difficult to digest and learn. The review week also gives students time to re-energize and solidify skills with less pressure.
Week #16: Career Hacks
An important part of the CyberWarrior training program is also in the area of professional development and enhanced soft skills that will help a new cybersecurity professional realize success in their new workplace. In response to employer feedback and demand, our program focuses on soft/professional skill training that enhances a student's "confidence" with their newfound skills. 

To expand the student's overall core "competence" in cybersecurity, we embed skills such as critical thinking, communication, and presentation into our everyday curriculum. In each module, CWA introduces a skill through a company scenario/case study. In turn, the student uses the practical application of soft skills to reinforce and sustain both the technical and interpersonal learning.
Week #16: Career Hacks
An important part of the CWA training program is also in the area of professional development and enhanced soft skills that will help a new cybersecurity professional realize success in their new workplace. In response to employer feedback and demand, our program focuses on soft/professional skill training that enhances a student's "confidence" with their new found skills. 

To expand the students overall core "competence" in cybersecurity, we embed skills such as critical thinking, communication and presentation into our everyday curriculum. In each module, CWA introduces a skill through a company scenario/case study. In turn, the student uses the practical application of soft skills to reinforce and sustain both the technical and interpersonal learning.
Week #17: Capstone Project I
Red Team exercise (Offense) - during this one-week capstone project, students use the hacking strategies they learned to assemble and execute an offensive
plan on a given target. They develop a Penetration Test Report to present it to our board in an executive presentation. For evaluation purposes, we will bring CISOs and experts in the field to score the project outcome. The judges are hiring managers from our employer partners and other industry stakeholders.
Week #18: Capstone Project II
Blue Team exercise (Defense) – during this one-week capstone project, students demonstrate they know how to handle defensive strategies from a technical standpoint. Subsequently they develop a post incident report and present it to our board as an executive presentation. 

For evaluation purposes, we will bring CISOs and experts in the field to score the project outcome. The judges are hiring managers from our employer partners and other industry stakeholders. 
Week #18: Capstone Project II
Blue Team exercise (Defense) – during this one-week capstone project, students demonstrate they know how to handle defensive strategies from a technical standpoint. Subsequently they develop a post incident report and present it to our board as an executive presentation. 

For evaluation purposes, we will bring CISOs and experts in the field to score the project outcome. The judges are hiring managers from our employer partners and other industry stakeholders. 
Graduate Testimonials
CyberWarrior academy changes lives
"It was a major key to my development and in helping me to get the position. I definitely recommend CyberWarrior Academy! - My training prepared me by giving me insight into what the (security) industry is looking for and what things they’re doing currently. One of the things that I liked best about the program is that we had people from the industry come in each week and tells about what they do and what they are looking for.”
- Rodley Rene
Information Security Engineer, Partners Healthcare
"I highly recommend CyberWarrior Academy's security engineering program because it covers an incredible amount of material and the trainer’s knowledge and teaching strategy are excellent. Thanks to CWA, I learned how to address real-world threats and vulnerabilities. I also learned the importance of having a secure IT infrastructure in both personal and work environments"
- Rodley Rene
Information Security Engineer, 
Partners Healthcare
“CyberWarrior Academy provided a foundation to build on with certification training and also bringing in all the Subject Matter Experts to provide their experience and tips and advice on how to perform in Security.” - “CWA provides hands-on support and relationships in the area so that you are more connected to the Cybersecurity community.”
- Eddy Milcette
Information Security Analyst, 
Houghton Mifflin Harcourt 

Why we are different?

A BROADER AND DEEPER APPROACH TO LEARNING

CyberWarrior Academy understands private industry needs better than legacy training organizations – we are the industry. We have credibility when talking to employers and the human capital to be current and relevant. As practitioners, we live the realities and challenges of protecting sensitive data and critical infrastructure for some of the world's top enterprises.
Copyright 2020 | CyberWarrior, Inc
All Rights Reserved
Powered By ClickFunnels.com