ImpactTek

Find out how to qualify for FREE training by joining our weekly info session on Saturdays at 11AM. CLICK HERE

Cybersecurity

The Northern Virginia Technology Council has identified five kinds of jobs that are hard-to-fill: big data and analytics; cybersecurity and privacy; data center and cloud infrastructure; network systems and programming and software development. Cyber security professionals are highly in demand. A study recently released stated that the U.S. has 500,000 unfilled cyber jobs due to lack of qualified candidates. The DC Metro Area is ranked number one in the U.S. for cyber jobs and cybersecurity professionals make an average annual salary of $120K!
For aspiring cyber security professionals without IT experience, knowledge or degree, CompTIA recommends to start with prerequisite courses like IT Fundamentals (click to go to program page)  before embarking in your cyber security training. After successfully completing IT fundamentals training, you can start your cyber security training with CompTIA Security+.
We created our cyber program to bridge the gap between demand and qualified candidates. We have developed three hands-on cybersecurity practical training program with job placement to give our students the knowledge, skills and tools needed to be successful in the fast growing and high-paying cyber field. The programs are broken down into 6-months, 3-months and 6 weeks.
6-Month Program:
1. CompTIA Security+ training
2. CEH training (Network Vulnerabilities and Cyber tools)
3 CompTIA Linux+ training
4. Splunk Core User training, Splunk
Power User training, Splunk Admin training and Splunk Architect training.
3-Month Program:
1. CompTIA Security+
2. CEH(Network Vulnerabilities and Cyber Tools)
6-Week Program:
1.CompTIA Security+
In the three programs students receive over 70 hands-on labs and will do projects that will simulate real IT environments. Students will learn how to secure applications, network, and devices, perform threat analysis, and respond with appropriate mitigation techniques, Trojan’s backdoors and countermeasures, and cybersecurity tools. The cyber security training is offered both in-person and instructor-led virtual.

Job Placement

Our cyber security training includes job placement which consists of:

Resume Building: A career coach and our recruiting agency will develop a resume that reflects the hands-on training student received and that will stand out to employers.

Interview Preparation: Our career coach and the recruiting agency will provide mock interviews and interview coaching to prepare students for job opportunities.

Job Support: After the recruiting agency successfully places you in the job, they will provide job support. They will help you do your job in the first few months.

In-Person & Virtual Training

We have combined the best of both worlds, our programs are both in-person and virtual at the same time. The instructor will be in-person and we will broadcast the class virtually so remote students can join.

Starts: Saturday October 1 – December 5

Days/Time: Saturdays 9AM-12PM and Mondays 6PM-9PM EST

Objectives and Labs

CompTIA Certmaster Learn 3-month access

CompTIA Certmaster Learn is online learning system that provides step by step training with lesson study guides, training videos, lesson quiz AND HANDS-ON LABS. You will receive access to 21 lessons and labs.

Objectives include:

  • Secure applications, network and devices.
  • Perform threat analysis and respond with appropriate mitigation techniques.
  • Operate with an awareness of applicable policies, and laws.

Schedule

11/5-12/18

Sat. 9am-12pm

Sun. 9am-12pm

 

 

 

Objectives and Labs

  • Information Security and Ethical Hacking Overview
  • Reconnaissance Techniques
  • System Hacking Phases and Attack Technique
  • Network and Perimeter Hacking
  • Web Application Hacking
  • Wireless Network Hacking
  • Mobile Platform, IoT, and OT Hacking
  • Cloud Computing
  • Cryptography

Schedule

Objectives and Labs

CompTIA Certmaster Learn 3-month access

CompTIA Certmaster Learn is online learning system that provides step by step training with lesson study guides, training videos, lesson quiz AND HANDS-ON LABS. You will receive access to 10 lessons and labs.

10 HANDS-ON LABS include:

  • Performing Installing Linux and Basic Linux Tasks
  • Managing Users and Groups
  • Managing Permissions and Ownership
  • Managing Storage
  • Managing Files and Directories
  • Managing Kernel Modules
  • Managing the Linux Boot Process
  • Managing System Components
  • Managing Devices
  • Managing Networking
  • Managing Packages and Software
  • Securing Linux Systems
  • Working with Bash Scripts
  • Automating Tasks

Schedule

Objectives and Labs

  • Introduction to Splunk’s interface
  • Basic searching
  • Using fields in searches
  • Search fundamentals
  • Transforming commands
  • Creating reports and dashboards
  • Datasets
  • The Common Information Model (CIM)
  • Creating and using lookups
  • Scheduled Reports
  • Alerts
  • Using Pivot

Schedule

Objectives and Labs

Schedule

Objectives and Labs

  • Information Security and Ethical Hacking Overview
  • Reconnaissance Techniques
  • System Hacking Phases and Attack Technique
  • Network and Perimeter Hacking
  • Web Application Hacking
  • Wireless Network Hacking
  • Mobile Platform, IoT, and OT Hacking
  • Cloud Computing
  • Cryptography

Schedule

Objectives and Labs

1 month access to Splunk training system
15 Lessons
12 HANDS-ON LABS
15 study guides
15 training videos
15 quizzes
Final exam
Splunk certificate of completion from SPLUNK!

Schedule

Objectives and Labs

Security + objective
Objectives include:

  • Secure applications, network and devices.
  • Perform threat analysis and respond with appropriate mitigation techniques.
  • Operate with an awareness of applicable policies, and laws.

CompTIA Certmaster Learn & 32 Labs+ Acces

Schedule

Cybersecurity Instructor

Instructor Ahmed Z.

Chief Information Officer

Instructor Ahmed Z. has 14 years of cyber security experience and has a masters in Computer Science.

Contact Us To Find Out How To Become Cyber Security Pro!

Call Now ButtonCall