Bunker Hill Community College

Bunker Hill Community College Mobile and Tablet Version

Cybersecurity Training Certificate

BHCC is pleased to collaborate with Socratic Arts to offer a Cybersecurity Training Certificate program starting March 9, 2021. The program includes three courses, each lasting six weeks.

Spring courses for the 18-week certificate include:

  1. Cyber Attack and Defense: Immediate Immersion (NON-108E) – Thinking like an attacker and network traffic analysis

    This course requires a textbook, which can be purchased at the publisher's website. As soon as you have registered for the course, you will buy the book: https://nostarch.com/packetanalysis3.

  2. Cyber Defender 1 (NON-109E) – Advanced network traffic analysis, log analysis, and triage of malicious activity
  3. Cyber Defender 2 (NON-110E) – Digital forensics and incident response

Course details:

Socratic Arts is one of the leading Cybersecurity training academies. With its Story-Centered, learn-by-doing approach, students will learn the skills they need to succeed in the Cybersecurity field. 

Despite the specter of COVID still looming, professionals with cybersecurity skills are more in demand than ever. Emsi, a national labor analytics firm, recently revealed that the U.S. has less than half of the cybersecurity candidates it needs to keep up with the burgeoning demand.

Student Testimonials

“Before enrolling in the Cyber Academy, I was working as the digital marketing manager for an e-commerce website (and) …had very little understanding of information security. The Cyber Academy has had a resounding impact on my professional career and I was able to secure employment within the information security field in less than one year.

The many skills I developed are sought after by countless employers.”

-- Clif

“For those who might be considering the program, it’s important to know that your success has almost nothing to do with the knowledge you have coming in. If you don’t have a background in IT, it is really not an issue. The most important factor in your success is your commitment, your disposition, and whether you are willing to dig in, teach yourself, and grab onto a problem like a terrier. If you have those qualities and the desire, you will absolutely be great at this.

I highly recommend this program for anyone who is thinking about a career change, wants to build their skills, or wants to go into a diverse and growing field. “

-- Celeste

“It’s hard to express how much Cyber Academy changed my life. It literally turned my life around. When I enrolled, I was dropout who was making a meager living as a massage therapist—I always knew my potential was being squandered, but I didn’t think there was any way to change that without going back to college.

“I discovered that infosec is a field full of intelligent, curiosity-driven people just like me...and not only that, but it’s a field where curiosity is not merely tolerated but prized. I felt I had finally found my people.

“When I enrolled, I wasn’t expecting to make a massive career change within a few months. Within a month of completing Cyber Academy, I had a full-time job with benefits for the first time in my life—and I’ve never felt happier or felt more fulfilled.”

-- Alice

"I like how the class was created around an investigation of cyber security crime. It was cool to learn as if I was solving a real cybercrime."

-- Student

BHCC Cybersecurity Training Certificate information Session

Learn more about the job outlook for cybersecurity professionals and the Cybersecurity Certificate Program

View the Information Session on Zoom

Passcode: 36?m?q8a

Cyber Attack and Defense: Immediate ImmersionNON-108E

Cyber Attack and Defense: Immediate Immersion

Duration: Six weeks working 25 hours per week  $1599

March 9- April 13, 2021 6 weeks

In this six-week "on-ramp" course, you will be working as an analyst at a fictional government agency. First, you will gain experience thinking like an attacker. You will then investigate alerts by analyzing network traffic. We have designed this course to provide you with initial experience analyzing and understanding what alerts mean through realistic hands-on tasks. This course requires the purchase of the following textbook: Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems, 3rd Edition by Chris Sanders The book can be purchased from the publisher's website: https://nostarch.com/packetanalysis3

SectionDatesDays and TimesInstructorFeeRegister
NON-108E-N01Mar 9 - Apr 13
M Tu W Th F at 9 a.m. - 2:30 p.m.
TBA$1,599

Cyber Defender 1NON-109E

Cyber Defender 1

Duration: Six weeks working 25 hours per week  $1999

April 27, 2021 to June 1, 2021

Students will gain more advanced skills of analyzing network traffic at the packet level,  as well as analyzing system and network logs for indicators of malicious activity. They will then learn more complex techniques of log analysis, and static and dynamic analysis of potentially malicious files. 

SectionDatesDays and TimesInstructorFeeRegister
NON-109E-N01Apr 27 - Jun 1
M Tu W Th F at 9 a.m. - 2:30 p.m.
TBA$1,999

Cyber Defender 2NON-110E

Cyber Defender 2

Duration: Six weeks working 25 hours per week  $1999

June 15- July 20, 2021

Students will learn the basic skills of conducting memory and file system forensics guided by a set of indicators of compromise. They will then go on to learn the basic procedures and skills of responding to a security incident. 

SectionDatesDays and TimesInstructorFeeRegister
NON-110E-N01Jun 15 - Jul 20
M Tu W Th F at 9 a.m. - 2:30 p.m.
TBA$1,999

 Skills and Traits of the Ideal Cybersecurity Student

Useful technical skills:

  • Experience with the command-line interface
  • Experience installing and using complex software packages

Essential general skills:

  • Ability to do independent research (on technical issues) and put the results into practice
  • Proficiency using search engines

Essential traits:

  • Intense curiosity
  • Unwillingness to give up
  • Attention to detail
  • Predisposition for self-directed learning
  • Willingness to experiment (e.g., when instructions are unclear)
  • Openness to failing and trying again
  • Adequate time to devote to the program (Absent the time necessary to do the work, the skills and traits enumerated about will not be enough to result in success.)
 

 Cybersecurity Training Certificate Frequently Asked Questions

You need not have an IT or computer science background to succeed in this field. That being said, you should have strong basic computer skills, such as the ability to install and run complex applications. If you are unfamiliar with computer networks and protocols, we also recommend that you review the basics before beginning the program. Several online tutorials are available including some good Youtube tutorials.

Broadly speaking, there are three categories of prerequisites:

Although you need not be an IT professional or programmer, you should have strong basic computer skills.

You should have the right personality; specifically, you should be:
   - intensely curious about how things work
   - unwilling to give up on a problem no matter how difficult it is
   - highly attentive to detail
   - predisposed to independent learning.

You should be able to devote an honest 25 hours/week to the program.

If you are unsure of your computer skills, we will be glad to provide a pre-assessment which should take 1-2 hours to complete.

You must successfully complete all three courses to earn the Cybersecurity Training Certificate.

A career switcher should certainly take all three courses. A working IT professional, who is specifically interested only in the security operations center role might opt to take only Immediate Immersion and Defender 1; that being said it would still be much better for that person to broaden his or her knowledge and skills by taking all three courses.

Cyber Attack and Defense: Immediate Immersion is primarily to enable a person to self-assess if they like the work and believe they will be good at it and also to allow us to assess their likelihood of professional success. It also teaches the basic skills of network traffic analysis.

Cyber Defender 1 focuses on security operations center analyst skills, specifically more advanced network traffic analysis, log analysis, and "lightweight" malware analysis.

Cyber Defender 2 focuses on digital forensics and incident response -- skills that are employed after a breach is discovered.

The three courses build on each other, so they must be taken in order. 

Rather than being a progression of typical lecture courses, the Cybersecurity Training Certificate is 100% project-based learning by doing. Students work through a progression of realistic tasks online in a private cloud environment, learning the necessary knowledge and skills just in time as the knowledge and skills are relevant to what the student is trying to accomplish. As they work, students are supported by help, advice, and feedback from a knowledgeable mentor and extensive online learning resources.

The courses run in cohort form with specific start and end dates. There will be one or two weekly meetings while a course is running that students are required to attend. The course instructor will work with the cohort to determine the meeting dates and times. The meetings are required because we believe there are significant benefits to peer-to-peer experience sharing that will only be achieved if students are going through a course together. That being said, the majority of a student's time during the week is self-scheduled.

The scheduled meetings will take 1-2 hours/week; they are typically held on weekday evenings.

The total time commitment required is 25 hours/week including scheduled mentor meetings and independent work. (Some students opt to spend more time than this.)

Each course is six weeks long. At 25 hours/week, the duration of a course is approximately 150 hours. 

The deadline to register is one week prior to the class start date. This gives us time to set up your accounts to access the curriculum website and the private cloud environment in which you will do your work. This also gives you time to complete some recommended prework which will be sent to you after you register.

Go to the registration on this page and click register next to the course you wish to enroll. Keep in mind that you must first take the Cyber Attack and Defense: Immediate Immersion course, so initially, you should only register for this course.

Wendy Lehnert, a retired professor from UMass Amherst, is the senior mentor for the program and mentors the Immediate Immersion course. Two other mentors are cybersecurity professionals whose only job is to help you to succeed in the program.

Only the Immediate Immersion course has a required textbook: Practical Packet Analysis: Using Wireshark to Solve Real-world Network Problems (3rd edition) by Chris Sanders. The book is available in printed and electronic form from the publisher, No Starch Press, and from Amazon. You are required to purchase this book, and we suggest that you purchase it from the publisher because the Amazon Kindle version does not have page numbers (which the Immediate Immersion course references) and also because the author receives a higher royalty if you buy the book from the publisher.

There is significant regional variation in salaries, but speaking generally, the average salary is $89,000. The salary increases as you move up in a cybersecurity career.

You will gain extensive experience with a wide range of professional tools. These include:

  • NetworkMiner
  • Wireshark
  • Splunk
  • Snort
  • Volatility
  • Autopsy
  • Burp Suite
  • HybridAnalysis
  • VirusTotal
  • Any.run

The focus of our program is to give you job-ready skills for an entry-level position, not to teach you to pass a multiple-choice test. If a graduate of the program wants to obtain a certification, we recommend CompTIA Security+ and an inexpensive (~$15) online course to cram for the test. After completing our program, you should have no trouble passing the test after a few days of cramming.

We will provide assistance in crafting an effective resume and LinkedIn profile. We will also provide advice on effective networking, which provides a much better route to an entry-level job than simply sending a resume to "the black hole of HR."