Cybersecurity Powered by Infosys

Powered by Infosys, this course is designed to prepare you for specific job demand Infosys has across the US. The curriculum will equip you with fundamental concepts in security specialties and hands-on training to enter this ever growing field as a cybersecurity analyst.

This course will be delivered online and is open to candidates from anywhere in the US.

Get Started

  • Remote

No cost, no catch. Tuition-Free training and exams.

IT Support Student

Offered in collaboration with:

Course level

Suitable for all levels ?


  • Remote 9:00 a.m. - 4:00 p.m. ET
    Monday through Friday
    10 Weeks

Upcoming course dates

  • May 3rd, 2021

This training aims to provide the participant with the necessary skills to obtain an entry-level position as a Systems Administrator or SysAdmin. Starting salaries vary greatly, but the average is about $30,000 per year.

Applicants with all levels of experience in tech are encouraged to apply.

While anyone may apply for this course, some technical background may be helpful.

While these courses may include either intermediate or advanced material, technical knowledge specified in these listings will be required as a prerequisite for applicants to be considered for admission.

The Google IT Support Professional Certificate introduces learners to troubleshooting, customer service, networking, operating systems, system administration and security. No prior experience is required.

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

Gain the knowledge and skills necessary to effectively demonstrate an overall understanding of the AWS Cloud and start a career in cloud computing.

As a response to COVID-19, Per Scholas courses have moved to a remote learning environment. As we return to training sites, upcoming courses may be moved to in-person classrooms. We will be in-touch with applicants after you have applied to provide updates on any changes to future courses.

This is the hybrid course tooltip lorem ipsum dolor sit amet, consectetur adipiscing.


Have questions?

We can help with course selection, and answer questions about eligibility requirements and special circumstances. Contact an admissions team member

How to Become a Cybersecurity Analyst

Rigorous cybersecurity training that includes hands on activities using real word servers, tools, and technologies. To be eligible, applicants cannot have a 4 year degree or higher and must reside in a targeted demand city or be willing to relocate within the United States for post training job opportunities.

Develop Critical Technical Skills

Gain hands-on experience in concepts like ITIL, Identity and Access Management, Linux/Unix, Active Directory Administration and Powershell with Active Directory.

Cover Conceptual Cybersecurity Topics

Become well-versed in topics like Cryptography, Governance, Risk, Compliance, Cloud Security, Data Security, Infrastructure Security, Container Security, Application Security, Vulnerability Management, DevSecOps, and Security Operations.

Powered by a Global Tech Industry Leader

This course is designed in partnership with Infosys, a global leader in next-generation digital services and consulting.

Designed to Meet Specific Job Demand across the US

Designed in partnership with Infosys, this technical and professional development curricula is customized for jobs Infosys is committed to interviewing all eligible graduates for at the end of training. Per Scholas does not require candidates sign a contract with any employer partner. Learners are always free to their own future.

Positions post-training are Full Time Junior and Senior Associate roles. To ensure optimum placement chances, candidates must reside in or be willing to relocate to:

  • Indianapolis, IN
  • Raleigh, NC



$35K+ Average Salary Per Scholas graduates are Offered by Infosys

Strengthen your Tech Professional Profile

Start Your Tech Career Wherever You Are

Whether you are new to tech or a seasoned veteran looking to upskill, Per Scholas will help you get the skills necessary to take the next step in your career.

Zobaria at podium
Within a few months, I changed from a person with the least-desired skills to one of the most sought-after employees. I have become someone my kids can look up to.

Meet Zobaria Ashraf

Customized Career Development and Networking

Regular Career Development like resume reviews, mock interviews, and "Meet the Employer" sessions will familiarize you with our employer partners, meet with other IT professionals and help prepare you for the job search.

Learn more about our partnership with:

Direct Connection to Jobs at Infosys

Graduates will receive job placement support from Infosys and identify career opportunities leveraging their new and existing skills.

When you are interviewing a Per Scholas graduate, you already have someone who is committed and prepared for the work world and responsible for their time and availability.

Meet David Jarvis

What You'll Learn

Introduction to Linux, Unix, BSD and Active Directory Administration

Understand Unix/Linux and how to navigate Active Directory with Editors and Utilities while leveraging Shell Scripting.

Behavioral Analytics and Security Monitoring

Learn how to detect and combat cybersecurity threats and develop core skills in areas such as threat management and cyber incident response.

Tools and Strategies to Succeed in the Workplace

Through hands-on projects and labs, gain exposure to tools and techniques employed in the field by real cyber analysts.


Our 10 week curriculum equips you with the skills you need.

ITIL, Basics of Incident and Request Management


  • Service Strategy
  • Service Design
  • Service Transition
  • Service Operation
  • Service-level Agreements/Operation-level Agreements/Warrantees

Incident Management

  • Introduction to ServiceNOW, a ticket management tool
  • Handling Incidents and Problem Tickets
  • Problem Management with ITSM process – based on L0, L1, L2 assignment
Cybersecurity Concepts, Domains, Frameworks & Standards

Cybersecurity Concepts

  • Brief history of the Internet
  • Cybersecurity terminology
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Cyber attacks and latest industry trends 
  • Internetworking
  • Firewalling Basics Encryption Basics
  • Key Exchange Basics
  • Operating System Fundamentals

Cybersecurity Domains ((ISC)²’s CISSP)

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications & Network Security
  • Identity & Access Management
  • Security Assessment & Testing
  • Security Operations
  • Software Development Security

NIST Cybersecurity Framework

  • Implementation Tiers, Framework Core, Profiles
  • Uses, Benefits, History, Functions
  • Informative References
  • NIST Zero Trust Model 
  • CIS Controls 
Identity and Access Management (IdAM)

Introduction to Identity and Access Management (IdAM)

  • Authentication/Authorization
  • Authentication Methods
  • Intro to NIST Digital Identity Guidelines

Access Control Models

  • Discretionary Access Control
  • Mandatory Access Control
  • Role Based Access Control (RBAC)
  • Attribute-based Access Control (ABAC)
  • Single Sign-on

Multi-Factor Authentication User Lifecycle Management (ULM)

  • What is ULM
  • Creation, Reviews & Updates
  • Deactivation
  • CRUD (create, read, update, delete)
  • Privileged Identity management vs Privileged Access Management (PIM/PAM)
  • Identity vs access differentiation
  • Definition of privileged identity vs privileged access

Identity & Access Management Technology

  • Periodic User Access Certification
  • Virtual Directory
IAM Protocols, Standards & Technologies

Conceptual Overviews

  • Markup Languages
  • Security Assertion Markup Language (SAML)
    • Exchanging authentication & authorization information between IP and SP
    • Enabling single sign-on (SSO) and identity federation
  • eXtensible Access Control Markup Language (XACML )
    • Attribute-based access control policy language
    • Processing model to evaluate access requests by defined rules
    • Applying to web services, digital rights management (DRM) and enterprise security applications

Protocols & Standards Auth Protocol: resource access and sharing

  • Differentiate from 
    • OpenID Connect: user authentication protocol using JWT
    • System for Cross-domain Identity Management (SCIM)
    • Kerberos: network authentication protocol with secret-key cryptography
  • Client, server, key distribution center (KDC), ticket-granting ticket (TGT), secret-key encryption, encrypted TGTs Lightweight Directory Access Protocol (LDAP)
  • Application protocol for accessing and maintaining distributed directory information services over IP network WS-Security: web service security open standard for securing SOAP messages via XML signatures:encryption, integrity and authentication support. Remote Authentication Dial-In User Service (RADIUS)
  • Client/server protocol running on the application layer that uses TCP or UDP as transport
Introduction to Cryptography

History of Cryptography

  • Historical Ciphers: Shift Cipher, Substitution Cipher, Vigenere Cipher
  • Enigma, One-time Pad & Perfect Secrecy 
  • Confidentiality, Integrity, Authentication, Non-Repudiation
  • Ciphertext, Encryption, Encoding, Hashes, Salting –
  • Role of Encryption, Computational Complexity
  • Best Practices

Overview of Cryptography Algorithms

  • Brief intro to modular arithmetic, probability, logarithms, elliptic Curves
  • Symmetric Encryption vs Asymmetric Encryption
  • Stream Ciphers
  • Block Ciphers, Blockchains

Symmetric Encryption

  • Key Management/Secret Key Distribution

Asymmetric Encryption

  • Public Key Cryptography
  • RSA, ElGamal, Rabin, Paillier
  • Diffie-Hellman Key Exchange

Hashing & Authentication

  • Forward Secrecy
  • One-way Functions
  • Digital Signature & Hashing 
  • SHA-1, SHA-2, SHA-256, SHA-384

Public Key Infrastructure

  • Digital Signatures
  • Digital Certificates and PKI
  • Examples of PKI, Implicit Certificates, Pros/Cons

Key Management

  • Hardware Security Models (HSM)
Data Security

Encryption best practices

  • Permissioning
  • Encryption
  • Risk assessments
  • Encryption and security software/technologies

Introduction to Data Security

  • Data Governance
  • Data Discovery
  • Data Classification
  • DLP ( Data Loss Prevention)
  • Digital Rights Management
  • Securing Data at Rest, Data in Use, Data in Motion
  • Data Masking
Infrastructure Security

Endpoint Security

  • Overview of Endpoint Security
  • Anti-Malware /Anti-Virus

Network Fundamentals/Network Security

  • Overview of Network Security
  • IPV4 and IPV6
  • OSI Layers/IP Subnetting
  • Overview of TCP/IP protocol
  • Application Protocols (DHCP, HTTP, HTTPS, DNS, Telnet, SMTP, FTP)
  • Router, Switches, Gateway
  • Connectivity
    • Permanent Virtual Circuits (PVC’s)
    • Wifi
    • LAN/WAN
  • Firewalling concepts, Web Application Firewalls
    • Layer 7/Web Application Firewall
    • VPN – L2TP, PPTP, IPSec, OpenVPN, Wireguard
  • Overview of Proxy servers/Proxy software
    • CASB
    • IDS/IPS
  • Host-based and Network Based technologies
    • Network Utilities (PING, TRACEROUTE, NETSTAT, ARP-a)
Introduction to Unix/Linux/BSD

Unix/BSD/Linux Overview

  • History of UNIX
  • Derivatives and distibutions
  • Navigating the Directory Structure (Shells, Editors & Utilities)
  • Shell Scripting
Active Directory Administration and Powershell

Introduction to Active Directory

  • Active Directory Overview & Terminology
  • DNS Services
  • Domain Overview
  • Domain Join
  • Active Directory Objects

Sites & Services

FSMO roles

Risk Management

Governance, Risk, Compliance

  • Identify critical information
  • Analyze threats
  • Analyze Vulnerabilities
  • Assess risk
  • Apply measures


Security Operations
  • Threat hunting
  • Incident Response
  • Threat Intel
  • Cyber Kill Chain
  • Mitre Attack framework
  • ‘Pyramid of Pain’
Cloud Security

History and evolution of cloud computing

Cloud computing basics

  • Essential characteristics of Cloud Computing
  • Cloud computing architecture
  • Cloud computing technologies
    • Virtualization
    • Service-Oriented Architecture (SOA)
    • Grid computing
    • Utility computing

Service Models

  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
  • Identity as a Service (IDaaS)
  • Network as a Service (NaaS)

Deployment models

  • Public cloud model
  • Private cloud model
  • Hybrid cloud model
  • Community cloud model

Cloud computing security

  • What is cloud security?
  • Risk and threats
    • Data breaches
    • Malware injections
    • Regulatory compliance
    • Distributed Denial of Service (DDoS), Malicious insiders, Advanced persistent threats (APTs), Insecure APIs
    • Account hijacking
  • Best practices
    • Shared-responsibility model
    • Operations management
    • Building controls and processes
    • User identity and access management
    • Security and compliance monitoring
    • Data encyption
  • Cloud security framework
    • Cloud security controls
    • NIST (National Institute of Standards and Technology) policy framework
    • Cloud Security-as-a-Service (CSaaS)
Container Security

Introduction to containers

  • What are containers?
  • How do containers work?
  • Virtual machines vs containers
  • Benefits of Containerization
  • Container Terminology
  • Microservices and containerization

Overview of Dockers and Kubernetes

  • What is Docker and Kubernetes?
  • Docker and Kubernetes terminologies
  • Docker containers, images and registries
  • How does docker and kubernetes perform containerization

Securing Containers

  • Main concerns when securing containers
  • How containers change the security paradigm
  • Securing docker and kubernetes
  • Securing the host
  • Securing the container
  • Securing the application in a container
  • Securing container management stack
  • Ensuring the integrity of the build pipeline

Cloud Access Security Broker (CASB)

  • How CASBs work
  • Pillars of CASB
  • What are CASBs used for in security?
  • Selecting the Best CASB Solution
Application Security

AppSec Overview

  • Application Threat Modeling: define, diagram, identify, mitigate, validate
  • How to include threat modeling into SDLC

Dynamic Application Security Testing (DAST) vs Static Application Security Testing (SAST)

  • Differences
  • Techniques to include both
  • How to carry out comprehensive testing

OWASP top 10 (Open Web Application Security Project)

  • Injection
  • Broken authentication + session management
  • Sensitive data exposure
  • XML external entities
  • Broken access control
  • Cross-site scripting (XSS)
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging + monitoring

AppScan Tool Overview

Penetration Testing



Vulnerability Management

Importance of Vulnerability management 

Overview of Vulnerability Management and Analysis

  • Asset Identification & Classification
  • Vulnerability Scanning
  • Vulnerability Analysis & Reporting
  • Vulnerability Response Planning & Remediation
  • Vulnerability Monitoring & Control


Security and Software Development Lifecycle (SDLC)

Importance and Benefits of security in Application Lifecycle

Determine risk tolerance

Conduct a risk/benefit analysis

Security controls within a given app

Automating repeated tasks



Our 10 week curriculum equips you with the skills you need.


Learn How to Think Like An IT Professional

Prepare to handle real workplace demands by challenging your understanding of course material and scenario problem solving.

Participate in Hands-on Labs

To provide an innovative, hands-on learning experience, Per Scholas provides learners with a tech kit based on their training track and delivery model, whether in person or remote. These kits are designed to enhance the learning experience and will be utilized in labs throughout the course.

Professional Training and Dedicated Career Coaching

Construct a tech professional resume, practice your interviewing skills and receive career counseling for our Business Solutions staff.

Monique Little

Meet Our Graduates

If someone had told me that this was where I would be now, I would never have believed them. I have a completely different outlook on life. My future is something that I never thought it could be.

Meet Monique Little

Application Details

Learner Profile

You may qualify to become a Per Scholas Cybersecurity Learner if you:

  • Are open to relocation to any US city for post-program positions with Infosys, if offered, and/or live in a targeted demand location
  • Are aged 18 or older
  • Do not have a 4 year degree or higher (Only HS  Diploma/Equivalent, Associate’s degree or college credits accepted)
  • Are authorized to work in the U.S.
  • Can read, write and speak in English
  • Can attend classes full-time for the entire duration of the course
  • Are able to start a full-time job after course completion
  • Ready to make an important commitment to building your future

*Women, youth, unemployed, underemployed and U.S. Veterans strongly encouraged to apply

Admissions Assessment Prep
Application Process

1. Submit an Online Application

If you apply within 6 weeks of a start date, it is likely you will experience a condensed version of the following admissions process known as ‘Rapid Review.’

2. Admissions Overview: Once you submit an application, our Admissions team will review to ensure it meets the basic requirements and invite you to attend an Admissions Overview.

3. Assessments: Each training requires either an academic assessment, tech assessment or both. Information will be provided in detail at the Admissions Overview.

4. Interview: Individuals who meet the assessment score requirements will be invited to attend a behavioral interview.

5. Background Check: Per Scholas believes technology can create opportunities and is committed to ensuring applicants are set up to succeed beyond the training program. Using a fair and efficient platform through Checkr, applicants will receive a secure link, provide the necessary virtual consents and complete the required screening information. Background check results will be provided to both the applicant and Per Scholas.

6. Offer Letter: The Admissions team will review assessment scores and interview results and offer seats to eligible candidates.

Please note, this application process is very competitive and not all applicants will be accepted for our limited slots.

More Than a Technical Training

Technical and professional development resources available at no additional cost to help you develop the skills you need for the job you want.

Virtual Learning from Wherever You are!

This course is delivered virtually and is open to learners from any US city.

A Community of Support

Partner with your classmates to form study groups and create a community dedicated to everyone’s personal and professional success. Learner support resources such as financial coaching, case management, and emergency financial support resources are offered to all learners.

Alumni Advancement

Complimentary upskilling opportunities extended to alumni up to two years post graduation to help them match employer hiring candidate profiles.

Frequently Asked Questions

What kinds of jobs can I get after completing this training?

Depending on experience, eligible graduates will interview for positions with Infosys including entry level Junior Associate roles, and experienced (3+ years IT experience) Senior Associate roles.

How can the course be free? Are there hidden fees?

Most people who learn about us think: “Too good to be true.” We know it seems that way, but it’s true. Our services are provided at no cost to you, using funds we raise from foundations, corporations, government and generous individuals.

When we say cost-free, we mean it. There is no point before, during or after when you will have to pay. No contracts, no catches.

I receive unemployment insurance benefits or other benefits that require me to spend time working or looking for work. Can I still enroll?

Yes. Per Scholas courses are approved for people receiving unemployment insurance, as well as other benefits that would ordinarily require them to spend time working or looking for work. Your benefits should not be affected. If you have questions or concerns about your situation, please contact us.

I meet other requirements, but I am not a U.S. citizen and haven’t received my work authorization yet. Can I still apply?

Unfortunately, we cannot process your application until you have received clearance to work in the U.S. However, if you are experiencing problems, we can refer you to other organizations that may be able to help.

I have a disability. Can you accommodate me?

We comply fully with the Americans with Disabilities Act and other relevant laws and regulations. Please contact admissions to discuss your specific situation and needs.

Does Per Scholas have a Non-Discrimination policy?

We’re proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or national origin. See our full EEO statement here.


Your Course

This course is only offered at select Per Scholas locations. Choose a location to get the most accurate course information.