Cybersecurity

Cybersecurity Powered by Infosys

Powered by Infosys, this course is designed to prepare you for specific job demand Infosys has across the US. The curriculum will equip you with fundamental concepts in security specialties and hands-on training to enter this ever growing field as a cybersecurity analyst. This course will be delivered online.

  • Remote

No cost, no catch. Tuition-Free training and exams.

Offered in collaboration with:

Course level

Suitable for all levels ?

This training aims to provide the participant with the necessary skills to obtain an entry-level position as a Systems Administrator or SysAdmin. Starting salaries vary greatly, but the average is about $30,000 per year.

The CompTIA IT Fundamentals certification focuses on the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development, and database use.

Applicants with all levels of experience in tech are encouraged to apply.

While anyone may apply for this course, some technical background may be helpful.

While these courses may include either intermediate or advanced material, technical knowledge specified in these listings will be required as a prerequisite for applicants to be considered for admission.

CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.

The Google IT Support Professional Certificate introduces learners to troubleshooting, customer service, networking, operating systems, system administration and security. No prior experience is required.

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

Gain the knowledge and skills necessary to effectively demonstrate an overall understanding of the AWS Cloud and start a career in cloud computing.

As a response to COVID-19, Per Scholas courses have moved to a remote learning environment. As we return to training sites, upcoming courses may be moved to in-person classrooms. We will be in-touch with applicants after you have applied to provide updates on any changes to future courses.

?

Have questions?

We can help with course selection, and answer questions about eligibility requirements and special circumstances. Contact an admissions team member

How to Become a Cybersecurity Analyst

Rigorous cybersecurity training that includes hands on activities using real word servers, tools, and technologies.


Develop Critical Technical Skills

Gain hands-on experience in concepts like ITIL, Identity and Access Management, Linux/Unix, Active Directory Administration and Powershell with Active Directory.


Cover Conceptual Cybersecurity Topics

Become well-versed in topics like Cryptography, Governance, Risk, Compliance, Cloud Security, Data Security, Infrastructure Security, Container Security, Application Security, Vulnerability Management, DevSecOps, and Security Operations.


Powered by a Global Tech Industry Leader

This course is designed in partnership with Infosys, a global leader in next-generation digital services and consulting.

Designed to Meet Specific Job Demand across the US

This program in partnership with Infosys is designed to meet specific demand Infosys has across the United States at the end of the program. Infosys is committed to interviewing all eligible graduates for Junior and Senior Associate positions. Per Scholas does not require candidates sign a contract with any employer partner. Learners are always free to their own future.

Starting salary for Junior Associates is $32,000. Those with more experience (2+ years IT experience) could expect salaries between $36,000-$50,000.

$40K+ Average Salary Per Scholas graduates are Offered by Infosys

Strengthen your Tech Professional Profile


Start Your Tech Career Wherever You Are

Whether you are new to tech or a seasoned veteran looking to upskill, Per Scholas will help you get the skills necessary to take the next step in your career.

Zobaria at podium
Within a few months, I changed from a person with the least-desired skills to one of the most sought-after employees. I have become someone my kids can look up to.

Meet Zobaria Ashraf


Customized Career Development and Networking

Regular Career Development like resume reviews, mock interviews, and "Meet the Employer" sessions will familiarize you with our employer partners, meet with other IT professionals and help prepare you for the job search.

Learn more about our partnership with:


Direct Job Placement Support

Graduates will receive job placement support from the employer partner and identify career opportunities leveraging their new and existing skills.

When you are interviewing a Per Scholas graduate, you already have someone who is committed and prepared for the work world and responsible for their time and availability.

Meet David Jarvis

What You'll Learn


Introduction to Linux, Unix, BSD and Active Directory Administration

Understand Unix/Linux and how to navigate Active Directory with Editors and Utilities while leveraging Shell Scripting.


Behavioral Analytics and Security Monitoring

Learn how to detect and combat cybersecurity threats and develop core skills in areas such as threat management and cyber incident response.


Tools and Strategies to Succeed in the Workplace

Through hands-on projects and labs, gain exposure to tools and techniques employed in the field by real cyber analysts.

Curriculum

Our 10 week curriculum equips you with the skills you need.

ITIL, Basics of Incident and Request Management

ITIL 

  • Service Strategy
  • Service Design
  • Service Transition
  • Service Operation
  • Service-level Agreements/Operation-level Agreements/Warrantees

Incident Management

  • Introduction to ServiceNOW, a ticket management tool
  • Handling Incidents and Problem Tickets
  • Problem Management with ITSM process – based on L0, L1, L2 assignment
Cybersecurity Concepts, Domains, Frameworks & Standards

Cybersecurity Concepts

  • Brief history of the Internet
  • Cybersecurity terminology
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Cyber attacks and latest industry trends 
  • Internetworking
  • Firewalling Basics Encryption Basics
  • Key Exchange Basics
  • Operating System Fundamentals

Cybersecurity Domains ((ISC)²’s CISSP)

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications & Network Security
  • Identity & Access Management
  • Security Assessment & Testing
  • Security Operations
  • Software Development Security

NIST Cybersecurity Framework

  • Implementation Tiers, Framework Core, Profiles
  • Uses, Benefits, History, Functions
  • Informative References
  • NIST Zero Trust Model 
  • CIS Controls 
Identity and Access Management (IdAM)

Introduction to Identity and Access Management (IdAM)

  • Authentication/Authorization
  • Authentication Methods
  • Intro to NIST Digital Identity Guidelines

Access Control Models

  • Discretionary Access Control
  • Mandatory Access Control
  • Role Based Access Control (RBAC)
  • Attribute-based Access Control (ABAC)
  • Single Sign-on

Multi-Factor Authentication User Lifecycle Management (ULM)

  • What is ULM
  • Creation, Reviews & Updates
  • Deactivation
  • CRUD (create, read, update, delete)
  • Privileged Identity management vs Privileged Access Management (PIM/PAM)
  • Identity vs access differentiation
  • Definition of privileged identity vs privileged access

Identity & Access Management Technology

  • Periodic User Access Certification
  • Virtual Directory
IAM Protocols, Standards & Technologies

Conceptual Overviews

  • Markup Languages
  • Security Assertion Markup Language (SAML)
    • Exchanging authentication & authorization information between IP and SP
    • Enabling single sign-on (SSO) and identity federation
  • eXtensible Access Control Markup Language (XACML )
    • Attribute-based access control policy language
    • Processing model to evaluate access requests by defined rules
    • Applying to web services, digital rights management (DRM) and enterprise security applications

Protocols & Standards Auth Protocol: resource access and sharing

  • Differentiate from 
    • OpenID Connect: user authentication protocol using JWT
    • System for Cross-domain Identity Management (SCIM)
    • Kerberos: network authentication protocol with secret-key cryptography
  • Client, server, key distribution center (KDC), ticket-granting ticket (TGT), secret-key encryption, encrypted TGTs Lightweight Directory Access Protocol (LDAP)
  • Application protocol for accessing and maintaining distributed directory information services over IP network WS-Security: web service security open standard for securing SOAP messages via XML signatures:encryption, integrity and authentication support. Remote Authentication Dial-In User Service (RADIUS)
  • Client/server protocol running on the application layer that uses TCP or UDP as transport
Introduction to Cryptography

History of Cryptography

  • Historical Ciphers: Shift Cipher, Substitution Cipher, Vigenere Cipher
  • Enigma, One-time Pad & Perfect Secrecy 
  • Confidentiality, Integrity, Authentication, Non-Repudiation
  • Ciphertext, Encryption, Encoding, Hashes, Salting –
  • Role of Encryption, Computational Complexity
  • Best Practices

Overview of Cryptography Algorithms

  • Brief intro to modular arithmetic, probability, logarithms, elliptic Curves
  • Symmetric Encryption vs Asymmetric Encryption
  • Stream Ciphers
  • Block Ciphers, Blockchains

Symmetric Encryption

  • Key Management/Secret Key Distribution

Asymmetric Encryption

  • Public Key Cryptography
  • RSA, ElGamal, Rabin, Paillier
  • Diffie-Hellman Key Exchange

Hashing & Authentication

  • Forward Secrecy
  • One-way Functions
  • Digital Signature & Hashing 
  • SHA-1, SHA-2, SHA-256, SHA-384

Public Key Infrastructure

  • Digital Signatures
  • Digital Certificates and PKI
  • Examples of PKI, Implicit Certificates, Pros/Cons

Key Management

  • Hardware Security Models (HSM)
Data Security

Encryption best practices

  • Permissioning
  • Encryption
  • Risk assessments
  • Encryption and security software/technologies

Introduction to Data Security

  • Data Governance
  • Data Discovery
  • Data Classification
  • DLP ( Data Loss Prevention)
  • Digital Rights Management
  • Securing Data at Rest, Data in Use, Data in Motion
  • Data Masking
Infrastructure Security

Endpoint Security

  • Overview of Endpoint Security
  • Anti-Malware /Anti-Virus
  • NIDS/HIDS

Network Fundamentals/Network Security

  • Overview of Network Security
  • IPV4 and IPV6
  • OSI Layers/IP Subnetting
  • Overview of TCP/IP protocol
  • Application Protocols (DHCP, HTTP, HTTPS, DNS, Telnet, SMTP, FTP)
  • Router, Switches, Gateway
  • Connectivity
    • Permanent Virtual Circuits (PVC’s)
    • Wifi
    • LAN/WAN
  • Firewalling concepts, Web Application Firewalls
    • Layer 7/Web Application Firewall
    • VPN – L2TP, PPTP, IPSec, OpenVPN, Wireguard
  • Overview of Proxy servers/Proxy software
    • CASB
    • IDS/IPS
  • Host-based and Network Based technologies
    • Network Utilities (PING, TRACEROUTE, NETSTAT, ARP-a)
Introduction to Unix/Linux/BSD

Unix/BSD/Linux Overview

  • History of UNIX
  • Derivatives and distibutions
  • Navigating the Directory Structure (Shells, Editors & Utilities)
  • Shell Scripting
Active Directory Administration and Powershell

Introduction to Active Directory

  • Active Directory Overview & Terminology
  • DNS Services
  • Domain Overview
  • Domain Join
  • Active Directory Objects

Sites & Services

FSMO roles

Risk Management

Governance, Risk, Compliance

  • Identify critical information
  • Analyze threats
  • Analyze Vulnerabilities
  • Assess risk
  • Apply measures

 

Security Operations
  • Threat hunting
  • Incident Response
  • Threat Intel
  • Cyber Kill Chain
  • Mitre Attack framework
  • ‘Pyramid of Pain’
Cloud Security

History and evolution of cloud computing

Cloud computing basics

  • Essential characteristics of Cloud Computing
  • Cloud computing architecture
  • Cloud computing technologies
    • Virtualization
    • Service-Oriented Architecture (SOA)
    • Grid computing
    • Utility computing

Service Models

  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
  • Identity as a Service (IDaaS)
  • Network as a Service (NaaS)

Deployment models

  • Public cloud model
  • Private cloud model
  • Hybrid cloud model
  • Community cloud model

Cloud computing security

  • What is cloud security?
  • Risk and threats
    • Data breaches
    • Malware injections
    • Regulatory compliance
    • Distributed Denial of Service (DDoS), Malicious insiders, Advanced persistent threats (APTs), Insecure APIs
    • Account hijacking
  • Best practices
    • Shared-responsibility model
    • Operations management
    • Building controls and processes
    • User identity and access management
    • Security and compliance monitoring
    • Data encyption
  • Cloud security framework
    • Cloud security controls
    • NIST (National Institute of Standards and Technology) policy framework
    • Cloud Security-as-a-Service (CSaaS)
Container Security

Introduction to containers

  • What are containers?
  • How do containers work?
  • Virtual machines vs containers
  • Benefits of Containerization
  • Container Terminology
  • Microservices and containerization

Overview of Dockers and Kubernetes

  • What is Docker and Kubernetes?
  • Docker and Kubernetes terminologies
  • Docker containers, images and registries
  • How does docker and kubernetes perform containerization

Securing Containers

  • Main concerns when securing containers
  • How containers change the security paradigm
  • Securing docker and kubernetes
  • Securing the host
  • Securing the container
  • Securing the application in a container
  • Securing container management stack
  • Ensuring the integrity of the build pipeline

Cloud Access Security Broker (CASB)

  • How CASBs work
  • Pillars of CASB
  • What are CASBs used for in security?
  • Selecting the Best CASB Solution
Application Security

AppSec Overview

  • Application Threat Modeling: define, diagram, identify, mitigate, validate
  • How to include threat modeling into SDLC

Dynamic Application Security Testing (DAST) vs Static Application Security Testing (SAST)

  • Differences
  • Techniques to include both
  • How to carry out comprehensive testing

OWASP top 10 (Open Web Application Security Project)

  • Injection
  • Broken authentication + session management
  • Sensitive data exposure
  • XML external entities
  • Broken access control
  • Cross-site scripting (XSS)
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging + monitoring

AppScan Tool Overview

Penetration Testing

 

 

Vulnerability Management

Importance of Vulnerability management 

Overview of Vulnerability Management and Analysis

  • Asset Identification & Classification
  • Vulnerability Scanning
  • Vulnerability Analysis & Reporting
  • Vulnerability Response Planning & Remediation
  • Vulnerability Monitoring & Control

 

Security and Software Development Lifecycle (SDLC)

Importance and Benefits of security in Application Lifecycle

Determine risk tolerance

Conduct a risk/benefit analysis

Security controls within a given app

Automating repeated tasks

 

Curriculum

Our 10 week curriculum equips you with the skills you need.

View

More Than a Technical Training


Learn How to Think Like An IT Professional

Prepare to handle real workplace demands by challenging your understanding of course material and scenario problem solving.


A Community of Support

Partner with your classmates to form study groups and create a community dedicated to everyone’s personal and professional success.


Professional Training with Employer Partners

Construct a tech professional resume and practice your interviewing skills with employees from some of our employer partners.

Meet Your Instructors

Learn from certified teachers with years of real-world training experience. Our instructors don't just teach you what you need to know, but how to learn it.

Meet Our Graduates

I peaked in my previous career and was ready for a change. I have always loved computer science but thought it was just for college kids out in California. But if you study hard, you can make it!

Meet Joovay Arias

Application Details

Minimum Eligibility Requirements
  • Must have at least a high school diploma, GED or equivalent

  • Must be authorized to work in the United States without visa sponsorship (presently or in the future)

  • Must be open to relocation to any US city for post-program positions with Infosys, if offered

Admissions Assessment Prep
Application Process
  • Submit an Online Application
  • Admissions Overview: Once you submit an application, our Admissions team will review to ensure it meets the basic requirements and invite you to attend an Admissions Overview.
  • Assessments: This training requires a problem solving assessment and basic computer/hardware/software assessment. We recommend studying the suggested resources above to prepare.
  • Interview: Individuals who pass the problem solving assessment will be invited to attend a behavioral interview where they will take the final admissions assessment.
  • Offer Letter: The Admissions team will review assessment scores and interview results and offer seats to eligible candidates.

Please note, this application process is very competitive and not all applicants will be accepted for our limited slots.

Student Resources

Technical and career development resources available at no additional cost to help you develop the skills you need for the job you want.


Virtual Learning from Wherever You are!

This course is delivered virtually and requires computer access and a stable Internet connection.


Ongoing Support and Professional Development

Career development and wraparound support services such as financial coaching, case management, and emergency financial support services.


Alumni Advancement

Complimentary upskilling opportunities extended to alumni up to two years post graduation to help them match employer hiring candidate profiles.

Frequently Asked Questions

What kinds of jobs can I get after completing this training?

Depending on experience, eligible graduates will interview for positions with Infosys including entry level Junior Associate roles, and experienced (3+ years IT experience) Senior Associate roles.

How can the course be free? Are there hidden fees?

Most people who learn about us think: “Too good to be true.” We know it seems that way, but it’s true. Our services are provided at no cost to you, using funds we raise from foundations, corporations, government and generous individuals.

When we say cost-free, we mean it. There is no point before, during or after when you will have to pay. No contracts, no catches.

I receive unemployment insurance benefits or other benefits that require me to spend time working or looking for work. Can I still enroll?

Yes. Per Scholas courses are approved for people receiving unemployment insurance, as well as other benefits that would ordinarily require them to spend time working or looking for work. Your benefits should not be affected. If you have questions or concerns about your situation, please contact us.

I meet other requirements, but I am not a U.S. citizen and haven’t received my work authorization yet. Can I still apply?

Unfortunately, we cannot process your application until you have received clearance to work in the U.S. However, if you are experiencing problems, we can refer you to other organizations that may be able to help.

I have a disability. Can you accommodate me?

We comply fully with the Americans with Disabilities Act and other relevant laws and regulations. Please contact us at [email protected] to discuss your specific situation and needs.

Does Per Scholas have a Non-Discrimination policy?

We’re proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or national origin. See our full EEO statement here.

Close


Your Course

This course is only offered at select Per Scholas locations. Choose a location to get the most accurate course information.