Cyber Ops
Silver Spring, MD
Overview
This course is tough. So are you.
START A NEW CAREER
This course equips you with the knowledge to enter the Cybersecurity field as a Cyber Operations Analyst.
A Snapshot
- 14 Weeks: Monday-Friday from 9:00-4:00
- Cisco CCNA Cyber Operations Certification
- Hands on Training in an Education Security Operations Center Lab
- Career counseling & connections to employment
Accepting applications now only for 2019 courses.
“A year ago from today I was sitting in class at Per Scholas, not knowing anything about tech. And now I am a contractor for United States Department of Agriculture.”
Juan Pererya
Help Desk Analyst, Sotera Defense Solutions, Inc.

Curriculum
What You’ll Learn
The CyberOps Curriculum will kick start your career in Cyber Security . It focuses on the technical skills needed to land a job in the field. You will learn each new skill by practicing it yourself because 75% of the coursework is hands on. The Cyber Ops course will run in an education security operations center where you will work with the same tools cyber professionals use in the field. Classes are small, so your instructor will be available to help as often as you need.
By the time you finish, you’ll be prepared for an entry-level job as a Cyber Operations Analyst
Schedule
This course will be held Monday through Friday from 9:00AM to 4:00PM for 17 weeks. The course includes technical instruction and professional development curriculum. Review the syllabus for the specifics.
Syllabus
Week 1 of 17
technical skills focus
Cybersecurity and the Security Operations Center
Install and configure a CyperOPS workstation virtual machine. Explain the elements that make up a security operations center. Identify the various technologies that make up a SOC Monitoring System.
professional development focus
Overview
Overview of career-development, six core values, and expectations of students, with an emphasis on integrity. Team-building exercise.
technical skills focus
Windows Operating System
Configure, monitor and secure Windows.Identify basic networking commands in the Windows command line. Analyze the Windows Registry.
professional development focus
Goal Setting
Begin goal-setting and career planning. Deepen personal connections between students with group activity.
technical skills focus
Windows Operating System
Use Event Viewer to analyze system information. Fine tune Windows Firewall configuration to harden the operating system. Configure Windows Defender configuration for built- in virus and spyware protection.
professional development focus
Professionalism
Define professionalism and explore both the in-person and online personal brand. Practice personal pitch.
technical skills focus
Linux Overview
Use the Linux shell to work with directory and files and how to create, modify, copy, and move text files. Use the Linux operating system to view service logs used for monitoring purposes. Installing and running applications from the command line.
professional development focus
Job Search Toolkit
Create a job search toolkit: resume, cover letter, and job application. Interview skills and peer-to-peer interview practice.
technical skills focus
Linux Overview
Identify Linux tools that are used for security monitoring and investigation. Use piping to chain commands together, feeding one command output into the input of another command. Use the Linux operating system to view service logs used for monitoring purposes.
professional development focus
Practice
In-class time to work on job search toolkit, pitch practice, peer-to-peer resume review, and creating LinkedIn profile.
technical skills focus
Network Protocols and Services
Identify and configure switches and routers. Identify common network protocols. IP addressing and configuration.
professional development focus
Resourcefulness
Discuss how to be resourceful in a job search campaign. The importance of building and using a professional network. Includes pitch practice.
technical skills focus
Network Infrastructure
Configure and Analyze VLANs. Identify and configure protocols used to secure networks.Define and explore Intermediary Network Devices
professional development focus
Time Management Day 1
Guest speaker on job search strategies. Time management practices. How to properly prepare for an interview. Includes peer-to-peer mock interviews.
technical skills focus
Principles of Network Security
Define and examine rootkit detectors. Configure vulnerability exploitation tools. Identify, examine and implement password crackers.
professional development focus
Time Management Day 2
Guest speaker on job search strategies. Time management practices. How to properly prepare for an interview. Includes peer-to-peer mock interviews.
technical skills focus
Network Attacks: A Deeper Look and Protecting the Network
Analyze and protect against ICMP Attacks, DoS attacks, Session Hijacking. Examine attack vectors.
Explore Intelligence sharing standards. Analyze company business policies.
professional development focus
Perseverance Day 1
Perseverance in job search and on the job. Site visit to a networking event OR video documentation of personal pitch.
technical skills focus
Cryptography and the Public Key Infrastructure and Endpoint Security and Analysis
Identify and define the RADIUS protocol. Analyze Public Key Infrastructure (PKI). Identify and Examine Host Based Intrusion Detection Systems (HIDS). Complete a Risk Analysis to evaluate the risk posed by vulnerabilities to a specific organization.
professional development focus
Perseverance Day 2
Perseverance in job search and on the job. Site visit to a networking event OR video documentation of personal pitch.
technical skills focus
Security Monitoring and Intrusion Data Analysis
Identify and Explore the effect of privacy on security monitoring. Explore and use the Security Onion suite of applications and Analyze Intrusion Data. Configure and utilize tools like squil, wireshark and ElSA
professional development focus
Customer Service
The importance of customer service. How to develop excellent customer service skills. Includes peer-to-peer pitch practice.
technical skills focus
Incident Response and Handling
Identify and Analyze the steps in the Cyber Kill Chain. Identify and Explore the Diamond Model of Intrusion. Identify and define computer Security Incident Response Teams (CSIRT)
professional development focus
Balance
How to balance customer and business needs, work with dissatisfied customers and handle complaints. How to negotiate and accept an offer. How to prepare for success in the first day, week, month, and year on the job, including practices for long-term career
technical skills focus
CISCO CCNA CyberOPS Fundamentals Exam
This week is a comprehensive review of the 210-250 SECFND exam is taken at the end of the week.
professional development focus
Prepare for and Practice Mock Interviews Day 1
In-class time to finalize job search toolkit and launch job search. Prepare for mock interviews, practice personal pitch.
technical skills focus
CISCO CCNA CyberOPS Security Operations Exam
This week is a comprehensive review of the 210-255 SECOPS exam is taken at the end of the week.
professional development focus
Prepare for and Practice Mock Interviews Day 2
Discuss fears associated with interviewing. Participate in three mock interviews with professional volunteers with debrief of performance and improvement goal-setting. Includes review of steps to properly follow up after an interview.
technical skills focus
Python
Create and Run Scripts
Identify and explore Variables
Identify and explore Loops
Define and explore scoping
professional development focus
Workplace Success Day 1
The importance of understanding sexual harassment, embracing diversity, and managing anger for job success
technical skills focus
Python
Define and explore subroutines
Apply Python to Security Scripting
professional development focus
Workplace Success Day 2
Final personal pitch presentations. Students present on the six core values and reflect on own development of the values.
technical skills focus
Python
Analyze Alternate Data Streams
professional development focus
End of Course Activities
Closing activity and evaluations
Graduation

Instructors
Learn from the best
Learn from certified teachers with years of real-world training experience. Our instructors don’t just teach you what you need to know, but how to learn it.

Career Development
Building Your Career
You need more than just technical skills to get a good job. Excellent people skills are just as important. We’ve got you covered.
Start Out Right
Construct a professional resume and practice your interview skills. Find out exactly what employers are looking for and how you can impress them.
Get your foot in the door
Get customized referrals to open jobs at our hundreds of employer partners. Call on dedicated career developers for personalized advocacy, coaching and support.
Connect to our network
Meet and learn from working IT professionals. Visit employer sites and see their operations firsthand. Attend industry networking events and start making professional contacts.
Key to Success
Our students don't just land the job. They keep the job. Employers say customer service skills matter most. So you can guarantee it will be re-emphasized and applied with every piece of tech you learn.
“I have been promoted as supervisor of four staff that I trained. My achievements would not have been possible without the skills I got from Career Development. I found out that technical knowledge itself does not bring you up the ladder in a corporate environment.”
Jean Baptiste
IT Technician, FSIS Hanover Depot
Student Life
A Community of Support
You'll work hard. There's no doubt about it.
But if you’re like most students, you’ll look forward to each new day. And you’ll marvel at all the changes you see in yourself. Prepare yourself to spend your days in class and your evenings studying. Many students have children and hold part-time jobs and, despite those demands, they find a way to succeed. You will, too.
Buckle up
We'll be moving quickly. There’s a lot to pack in, and the standards are set high. But we also structure your training experience so that you have plenty of time to learn and practice each new skill.
Meet your new family
Your classmates will come from all walks of life and range in age from 18 to 65 (or older). It won’t take long before you see them as a second family—a community dedicated to everyone’s success. Study groups form somewhat naturally in and out of the classroom. Potluck dinners optional.
The staff are also some of the most dedicated and positive sources of encouragement you will ever encounter. Even on the days when some challenges might feel impossible, they will do everything in their power to help you continue to advance forward.
“My biggest accomplishment is getting into a great field while also taking care of my son.”
Nsia Frenche
Per Scholas graduate, University of Maryland University College (UMUC)

Facilities
Modern Facilities
Our facilities always include modern classrooms; well-equipped training labs; and places to relax, socialize and study.
Your own workstation
You will work from your own lab-based computer workstation for the entire course. There, you’ll follow along in lectures and demonstrations, practice new skills, review course materials and measure how much you’ve learned.

Admissions
Discover how to take advantage of our free courses.
Eligibility
To be eligible for Cyber Ops:
- Ages 18 and older
- High school diploma or GED
- Interest in pursuing a career in IT Security
- 1+ year IT work experience or equivalent IT focused coursework
- U.S. citizen or authorized to work in the U.S.
- Women, youth, and U.S. Veterans strongly encouraged to apply
- If you’re a veteran, must have been honorably discharged within the last 10 years
- Unemployed or underemployed
Other factors that may affect your eligibility are addressed in the FAQs.
Become fully versed in:
- Penetration Testing
- TCP/IP Addressing and Data Delivery
- Networking & security concepts
- Cryptography
- Ethical Hacking
- Python programming
- In-demand customer service
Process
Joining us takes just 5 easy steps.
1. Online Application
Complete our online application to begin.
Don't worry. This doesn't lock you in to a final commitment. In the following step you will get to ask questions and get the answers you need to determine if this is the right time for you to take this training.
2. Information Session
You will be invited to attend an in-person information session after you complete your online application. All of your questions will be addressed in the information session. The information and instructions to attend are provided after you submit your online application.
3. Entrance exam
If you decide that Per Scholas is right for you, you can take our entrance exam at your information session. Or you can return to take it at a later time.
We use the Test of Adult Basic Education (TABE) as our entrance exam. To be admitted to Per Scholas, you must pass this test at a 10th grade level or higher. Find out more about the test and practice with sample questions here. We strongly encourage you study and practice in advance.
If you don’t pass the TABE on your first try, you may be invited back to retest.
4. Interviews
If you pass the TABE and meet other eligibility requirements, we’ll schedule one or two interviews to determine your fit and any special needs.
During the interview, we’ll ask about your education, life experience and plans for the future.
5. Enrollment
If we agree that you’re ready for this training, we’ll let you know right away and try to enroll you in a course that starts within a month.

Costs
It’s free.
No cost. No catch. We invest in your success. All we ask in return is that you take the course seriously and work as hard as you can.
We are a national nonprofit organization. Our courses, job placement and other services are funded by generous donors and are 100% free to students and graduates.
Because our services are free, we can’t offer any other kind of financial support. But if you’re worried about making ends meet at Per Scholas, talk to one of our admissions specialists. We may be able to find other ways to help.

FAQs
Curious? Let’s break it down.
Following this training, you will be prepared to enter the field of Cyber Security as a Cyber Operations Analyst.
No. You must make arrangements to make a full-time commitment and attend class every day. As well, all courses are in-person and not available to take online.
Most people who learn about us think: “Too good to be true.” We know it seems that way, but it’s true. Our services are provided at no cost to you, using funds we raise from foundations, corporations, government and generous individuals.
The costs you can prepare for include transportation or childcare—expenses that take care of you so you can focus on your studies.
Students will have the opportunity obtain the brand new CIsco CCNA Cyber Ops Certification.
Yes. Per Scholas courses are approved for people receiving unemployment insurance, as well as other benefits that would ordinarily require them to spend time working or looking for work. Your benefits should not be affected. If you have questions or concerns about your situation, please contact us.
Unfortunately, we cannot process your application until you have received clearance to work in the U.S. However, if you are experiencing problems, we can refer you to other organizations that may be able to help.
We comply fully with the Americans with Disabilities Act and other relevant laws and regulations. Please contact us at [email protected] or (301) 557-9200 to discuss your specific situation and needs.
We're proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or national origin. See our full EEO statement here.