Bunker Hill Community College

Bunker Hill Community College Mobile and Tablet Version

Cybersecurity Training Certificate

Cybersecurity Training and CompTIA Security+ Certification

Get the training you need and earn an industry-recognized credential in 18 weeks. Free tuition may be available to those who are unemployed or demonstrate financial need through the Rapid Recovery and Reemployment (R3) program

BHCC is pleased to collaborate with Socratic Arts to offer the Cybersecurity Training Certificate program. If you are interested in a career in Cybersecurity, this program is for you. To determine if you qualify, please review the prerequisite requirement section below.  You may not enroll in the program until you have submitted the required information.

There are two main courses in the program:

  • NON-108E Cybersecurity: Immediate Immersion

    Cyber attacks are considered to be one of the top five risks to businesses globally, and the level of threats from script kiddies, cyber criminals, and even nation-state actors is increasing daily. Businesses experience literally thousands of cyber attacks per day.

    Cybersecurity: Immediate Immersion is designed to impart initial cybersecurity skills in six weeks of study at 25 hours per week to help students determine if careers in cybersecurity are right for them.

    Students work through three online real-life tasks (about two weeks per task).

    Cybersecurity: Immediate Immersion includes the following tasks:
    1. Exploit a website (and fix its vulnerabilities)
    2. Insider threat?
    3. Analyze malicious network traffic
    This course requires a textbook, which can be purchased at the publisher's website. As soon as you have registered for the course, you will buy the book: https://nostarch.com/packetanalysis3.
  • NON-118E Cybersecurity Defense builds on the defensive skills and experience students gained in Immediate Immersion. The twelve-week course is designed to impart a strong foundation of defensive information security skills, preparing students for entry-level careers as security operations center analysts and digital forensics analysts. Students work through six online real-life tasks in a private cloud environment with help, advice and feedback from a knowledgeable mentor and extensive online learning resources. The tasks are embedded in the realistic, but fictional, context of work as an entry-level employee of a government cyber operations agency.

This course includes the following tasks:

  1.  Analyze a remote intrusion attempt 
    A security operations center analyst has seen evidence of a password cracking attempt within a key network. Students analyze a packet capture file and event logs within a security information and event management system (the Splunk SIEM) to determine if any passwords were compromised and if the network was breached as a result.
  2. Investigate an incident using a SIEM
    Students analyze a possible “watering hole” attack in which clicking on a malicious link embedded in an otherwise legitimate website launches an exploit kit that infects a user’s machine with a “banking trojan.
  3. Compile indicators of compromise to guide forensic analysis 
    Students use a “hash” of a possible malware-containing file to conduct research using VirusTotal, online sandboxes, and open source intelligence sources to determine specific indicators of compromise to guide forensic analysis of memory and file system images of infected devices.
  4. Examine a compromised host’s memory 
    Students perform a forensic examination of a memory image taken from a computer to identify sophisticated malware that infected the system.
  5. Conduct a forensic disk examination 
    Students perform disk forensics on an infected system. By analyzing an image of the computer’s file system, the students are able to identify malware infections and to create a timeline for the attack.
  6. Close your investigation
    Students are asked to conclude their investigation by compiling a timeline for the attack and writing a comprehensive report for technical and non-technical stakeholders.

Upon successful completion of the two courses, you will separately enroll in Udemy’s 21-hour CompTIA Security course, which includes the SY0-601 exam. You will also purchase the full-length CompTIA Security+ (SY0-601) Practice Exams. Combined, your purchase of both the course and practice exams from Udemy will be about $40.00*. *Please note: Prices are subject to change and BHCC has no control of the tuition cost charged by Udemy. 

Udemy is a global teaching and learning platform that provides online video courses. You must continue your learning through Udemy immediately after successfully completing your 18-week training. The program's cybersecurity mentors will support you as you work through the Udemy course. In total, you are looking at 24 weeks, or six months, to complete the training and be ready to sit for the national exam. Once you pass the CompTIA Security exam, you will earn your industry-recognized credential. Links to Purchase the Supplementary Training Through Udemy Upon Completion of the 18-Week Cybersecurity Training Certificate: CompTIA Security+ (SY0-601 exam) https://www.udemy.com/course/securityplus/ CompTIA Security+ (SY0-601) Practice Exams & Simulated PBQs https://www.udemy.com/course/security-601-exams/

Prerequisite Coursework or IT Work Experience Required

To qualify for the Cybersecurity Training Certificate Program, you must meet one of the four prerequisites listed below. If you do not meet one of the prerequisites, you will not be eligible to apply. 

Review each and choose one to submit your information. Once submitted, your document will be evaluated and you will be notified whether you are able to proceed with registration for the first course, “Cybersecurity: Immediate Immersion”. Being approved to register means you meet the eligibility requirement to enroll in the program. 

If you register in advance of being approved, you will be dropped from the course and refunded your money minus 3% administration fee.

Prerequisite List (Review and Choose One)

  • IT Work Experience: You are currently working in the IT field or have recently been employed in an entry-level IT position. Submit your resume to bhcc-cyberprogram@socraticarts.com.

OR

  • An associate's degree or beyond in Computer Science, Engineering, or Information Technology. Submission of your academic transcript is required. Please email a copy of your transcript to bhcc-cyberprogram@socraticarts.com.

OR

  • BHCC's Network and Security Certificate or its equivalent. Submission of your BHCC academic transcript is required. Please email a copy of your transcript to bhcc-cyberprogram@socraticarts.com.

OR

  • Successfully completed the non-credit IT coursework at the Division of Workforce and Economic Development at Bunker Hill Community College. Course accepted are:
    • NON-500E (Part 1 Cisco Networking) and NON-501E (Part 2 Comp TIA A Plus)
    • CPT-100E (Cisco Networking Technology Certificate)

Email Jack Chan at jchan@bhcc.edu your interest. He will evaluate if you had passed the course. You must have passed the course to meet this prerequisite.

Socratic Arts

Socratic Arts is one of the leading Cybersecurity training academies. With its Story-Centered, learn-by-doing approach, students will learn the skills they need to succeed in the Cybersecurity field. 

Despite the specter of COVID still looming, professionals with cybersecurity skills are more in demand than ever. Emsi, a national labor analytics firm, recently revealed that the U.S. has less than half of the cybersecurity candidates it needs to keep up with the burgeoning demand.

Student Testimonials

“Before enrolling in the Cyber Academy, I was working as the digital marketing manager for an e-commerce website (and) …had very little understanding of information security. The Cyber Academy has had a resounding impact on my professional career and I was able to secure employment within the information security field in less than one year.

The many skills I developed are sought after by countless employers.”

-- Clif

“For those who might be considering the program, it’s important to know that your success has almost nothing to do with the knowledge you have coming in. If you don’t have a background in IT, it is really not an issue. The most important factor in your success is your commitment, your disposition, and whether you are willing to dig in, teach yourself, and grab onto a problem like a terrier. If you have those qualities and the desire, you will absolutely be great at this.

I highly recommend this program for anyone who is thinking about a career change, wants to build their skills, or wants to go into a diverse and growing field. “

-- Celeste

“It’s hard to express how much Cyber Academy changed my life. It literally turned my life around. When I enrolled, I was dropout who was making a meager living as a massage therapist—I always knew my potential was being squandered, but I didn’t think there was any way to change that without going back to college.

“I discovered that infosec is a field full of intelligent, curiosity-driven people just like me...and not only that, but it’s a field where curiosity is not merely tolerated but prized. I felt I had finally found my people.

“When I enrolled, I wasn’t expecting to make a massive career change within a few months. Within a month of completing Cyber Academy, I had a full-time job with benefits for the first time in my life—and I’ve never felt happier or felt more fulfilled.”

-- Alice

"I like how the class was created around an investigation of cyber security crime. It was cool to learn as if I was solving a real cybercrime."

-- Student

 

Cyber Attack and Defense: Immediate ImmersonNON-108E

Duration: Six weeks, 25 hours per week Meets 1-2 hours per week on a weeknight; instructor will work with the cohort to identify the time before class starts. Combined (instructor-led and self-study) is 25 hours per week. In this six-week "on-ramp" course, you will gain experience thinking like an attacker and then investigate alerts by analyzing network traffic.

Before you register, you must complete a no-cost, no-obligation pre-assessment of your technical skills. Email Commed@bhcc.edu to request your assessment.

This course requires a textbook, Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems, 3rd Edition by Chris Sanders. Order here: https://nostarch.com/packetanalysis3

SectionDatesDays and TimesInstructorFeeRegister
NON-108E-NO1FAOct 20 - Dec 8
This course is Asynchronous
TBA$1,599

 Skills and Traits of the Ideal Cybersecurity Student

Useful technical skills:

  • Experience with the command-line interface
  • Experience installing and using complex software packages

Essential general skills:

  • Ability to do independent research (on technical issues) and put the results into practice
  • Proficiency using search engines

Essential traits:

  • Intense curiosity
  • Unwillingness to give up
  • Attention to detail
  • Predisposition for self-directed learning
  • Willingness to experiment (e.g., when instructions are unclear)
  • Openness to failing and trying again
  • Adequate time to devote to the program (Absent the time necessary to do the work, the skills and traits enumerated about will not be enough to result in success.)
 

 Cybersecurity Training Certificate Frequently Asked Questions

You need not have an IT or computer science background to succeed in this field. That being said, you should have strong basic computer skills, such as the ability to install and run complex applications. If you are unfamiliar with computer networks and protocols, we also recommend that you review the basics before beginning the program. Several online tutorials are available including some good Youtube tutorials.

Rather than being a progression of typical lecture courses, the Cybersecurity Training Certificate is 100% project-based learning by doing. Students work through a progression of realistic tasks online in a private cloud environment, learning the necessary knowledge and skills just in time as the knowledge and skills are relevant to what the student is trying to accomplish. As they work, students are supported by help, advice, and feedback from a knowledgeable mentor and extensive online learning resources.

The courses run in cohort form with specific start and end dates. There will be one or two weekly meetings while a course is running that students are required to attend. The course instructor will work with the cohort to determine the meeting dates and times. The meetings are required because we believe there are significant benefits to peer-to-peer experience sharing that will only be achieved if students are going through a course together. That being said, the majority of a student's time during the week is self-scheduled.

The scheduled meetings will take 1-2 hours/week; they are typically held on weekday evenings.

The total time commitment required is 25 hours/week including scheduled mentor meetings and independent work. (Some students opt to spend more time than this.)

Each course is six weeks long. At 25 hours/week, the duration of a course is approximately 150 hours. 

The deadline to register is one week prior to the class start date. This gives us time to set up your accounts to access the curriculum website and the private cloud environment in which you will do your work. This also gives you time to complete some recommended prework which will be sent to you after you register.

Before you register, you need to determine if meet one of the four prerequisites as specified in the Prerequisite Coursework or IT Work Experience Required section. Once you are approved to enroll in the program, you may register by clicking the registration link for the Cyber Attack and Defense: Immediate Immersion course.

 

Wendy Lehnert, a retired professor from UMass Amherst, is the senior mentor for the program and mentors the Immediate Immersion course. Two other mentors are cybersecurity professionals whose only job is to help you to succeed in the program.

Only the Immediate Immersion course has a required textbook: Practical Packet Analysis: Using Wireshark to Solve Real-world Network Problems (3rd edition) by Chris Sanders. The book is available in printed and electronic form from the publisher, No Starch Press, and from Amazon. You are required to purchase this book, and we suggest that you purchase it from the publisher because the Amazon Kindle version does not have page numbers (which the Immediate Immersion course references) and also because the author receives a higher royalty if you buy the book from the publisher.

There is significant regional variation in salaries, but speaking generally, the average salary is $89,000. The salary increases as you move up in a cybersecurity career.

You will gain extensive experience with a wide range of professional tools. These include:

  • NetworkMiner
  • Wireshark
  • Splunk
  • Snort
  • Volatility
  • Autopsy
  • Burp Suite
  • HybridAnalysis
  • VirusTotal
  • Any.run

The focus of our program is to give you job-ready skills for an entry-level position, not to teach you to pass a multiple-choice test. If a graduate of the program wants to obtain a certification, we recommend CompTIA Security+ and an inexpensive (~$15) online course to cram for the test.

We will provide assistance in crafting an effective resume and LinkedIn profile. We will also provide advice on effective networking, which provides a much better route to an entry-level job than simply sending a resume to "the black hole of HR."