0% found this document useful (0 votes)
57 views

Cyber Security Bootcamp Syllabus - HyperionDev

IT notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Cyber Security Bootcamp Syllabus - HyperionDev

IT notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Cyber Security

Online Bootcamp
SYLLABUS OVERVIEW
Cyber Security Page 2

Table of contents

Overview 3
The process 3
Code review powered by HyperionDev 4
Why choose Cyber Security as a career? 5
How we help get you hired 5
Potential career paths 6
Structure of the bootcamp 8

Hyperiondev.com Page 2
Cyber Security Page 3

Overview

As cyber threats increase, the demand for trained experts to protect businesses and critical IT
infrastructure is rising. If the idea of ethical hacking, finding system and network vulnerabilities so
as to design defence mechanisms against cyber attacks, excites you, then this may be the career for
you!

Cyber security, also known as information technology security, is the process of protecting electronic
information by mitigating information risks and vulnerabilities. Information risks can include
unauthorised access, use, disclosure, interception, or destruction of data. Data can include but is not
limited to, the confidential information of businesses, organisations, or individuals.

No prior knowledge of coding is required when taking this bootcamp, as we help you progress
from beginner to job-ready. Attending this bootcamp will accelerate you down the path towards a
lucrative career in cyber security.

Going beyond Cyber Security

Throughout the bootcamp, you will be guided to develop the skills required to think beyond just
information security. You’ll learn how to think like a cyber security professional by evaluating
and mitigating risks posed by everything from poor access policies to popular cyber attack
techniques including cross-site scripting, SQL injection, and man-in-the-middle attacks. You’ll
also be exposed to a broad range of fundamental cyber security tools and concepts including
PKI, cyphers, bash scripting, Kali Linux, penetration testing, and digital forensics.

The process

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Get paired Complete coding A mentor reviews Perfect your coding Receive a certificate of Begin your new
with an expert exercises online your work over 3-6 months completion career in tech with
mentor HyperionDev support

Hyperiondev.com Page 3
Cyber Security Page 4

Code review powered by HyperionDev


Bootcamp code reviewers and mentors are expertly trained to integrate code review into
the bootcamp learning experience for students. The on-demand code review method helps
participants to become fluent in their selected area of study much faster.

Our 1-on-1 code review approach works


Code review enables you to learn to code the right way by becoming proficient in the deeper
aspects of software development that are a prerequisite for a career in coding. We help you set
the foundation for a lucrative career in tech.

Here’s why learning through code review is smarter

Don’t make the same mistakes as computers


Automated code checking is like spell check for computer programs. But you can’t
write a world-class essay with just good spelling – you need the right tone, facts,
grammar, and style. Only human-led code review can help you learn aspects of coding
that are analogous to tone and style that will make you truly fluent as a developer –
automated graders just can’t help you learn this!

Get unstuck with on-demand technical help


Our code reviewers will ensure you move at a steady pace by helping you debug your
programs. This will help you to keep moving forward so you stay on track.

Be exposed to industry standards from day one


Developers in the real world have their work assessed by a senior developer through the
technique of code review. We’re the only bootcamp in the world that exposes our students to
this technique from day one, giving you an advantage in the job market.

Hyperiondev.com Page 4
Cyber Security Page 5

We offer a unique, proven, and


personalised approach to code review

Industry experts with Join a community Free of fear


expertise tailored of career-changers of failure
to your goals
Learn as part of a cohort of Human-led code review builds
You’ll work with experienced bootcamp participants all trust with your mentors and
code reviewers and mentors working towards ultimate lets you progress at your own
who will guide you through career fulfilment. Join online pace. Establish a safe space
1:1 calls and email support. group tutorials, community to discuss any roadblocks
chats, and peer coaching. without fear of failure.

Why choose Cyber Security as a career?

The global cyber security industry is projected to be worth $193 billion by 2026 as technology
continuously evolves. This growing industry needs experts who can address emerging threats and
vulnerabilities. A challenging yet rewarding career, cyber security offers high salaries and six-figure
earning potential for those with experience and expertise. Rapid growth provides opportunities
to advance in this dynamic field. If you seek a career that is both challenging and lucrative, cyber
security may be the right choice for you!

How we help get you hired

We’re with you every step of your journey, and our support doesn’t end when you complete the
bootcamp. Our career services are developed to help you stand out from the crowd and grab the
attention of top employers.

Technical CV and portfolio Bootcamp Certificate


Receive technical assistance in getting Walk away with a newly minted
your CV and tech portfolio industry- certificate as evidence of your skills and
ready by applying accepted best- expertise in cyber security.
practice formats.

Interview Preparation Join our Hiring Network


Know what to expect when getting We work with select hiring partners and
ready for that big interview with aim to help you prepare for and land
expert interview-preparation your first tech job opportunity after
guidance from professionals who completing your bootcamp.
have been where you are.

Hyperiondev.com Page 5
Cyber Security Page 6

Potential career paths

Penetration Testing
Penetration Testing, also known as “pen testing” or “ethical hacking,” is a career that involves
simulating real-world cyber attacks to identify and address vulnerabilities in an organisation’s
systems and applications. Pen testers use a range of tools and techniques to try to gain
unauthorised access to systems and networks and then report their findings and provide
recommendations for addressing any vulnerabilities they find.

Responsibilities include:

Searching for vulnerabilities and security issues before other hackers find them.

Recommending security solutions or improvements.

Conducting security assessments.

Performing tests on applications, network devices, and cloud infrastructure.

Writing reports and presenting findings to clients and technical staff.

Purposefully attempting to exploit existing computer systems and software to detect


and correct system weaknesses.

Digital Forensics Analyst


A Digital Forensics Analyst is responsible for collecting, analysing, and presenting digital
evidence supporting criminal investigations or other legal proceedings. This may involve using
programming skills to automate collecting and analysing digital evidence or developing custom
tools and scripts for specific tasks.

Responsibilities include:

Figuring out what happened after a security incident and being able to reverse-engineer

hacks and attacks.

Conducting computer and cell phone forensics investigations.

Analysing evidence and preparing reports.

Performing accurate data analysis to ensure the content being retrieved is relevant.

Working efficiently alone. Digital forensics tasks are a mixture of solitary investigation and

group problem-solving.

Hyperiondev.com Page 6
Cyber Security Page 7

Cyber Security Analyst


A Cyber Security Analyst is responsible for protecting an organisation’s networks and systems
from cyber threats. This may involve using programming skills to develop custom tools and scripts
for analysing data from various sources, such as log files, network traffic, and mobile devices.

Responsibilities include:

Monitoring security procedures and making sure that best practices are
implemented and followed.

Using a variety of tools and techniques to protect computer networks and


systems from attacks.

Continually testing all company networks and identifying weaknesses before bad
actors or external threats can compromise them.

Responding to security incidents.

Writing reports.

Recommending security improvements.

Cyber Crime Investigator


A Cyber Crime Investigator is responsible for conducting investigations into cyber crimes
including cyber stalking, cyberbullying, identity theft, online fraud, and cyber espionage. This
may involve using programming skills to develop custom tools and scripts for analysing data
from various sources to identify activity patterns and build a case against suspects.

Responsibilities include:

Determining the details of intrusions into computer systems, recovering data from
encrypted or erased files, or recovering emails and deleted passwords.

Recovering and gathering electronic evidence and data from computers that can be used in
prosecuting crimes.

Hacking into an organisation’s computer networks to test security systems that are already
in place.

Maximising optimal computer system performance levels.

Presenting computer evidence and recovering files and data.

Drafting testimonies and affidavits.

Preparing reports and consulting with clients.

Hyperiondev.com Page 7
Cyber Security Page 8

Structure of the bootcamp

This bootcamp helps you progress from learning the basics of programming in Python to
launching a career as a cyber security specialist. Proceed from novice to coding expert, and land
the successful career you deserve! The journey will involve:

Bootcamp Prep
Learn about the tech sector and how HyperionDev supports you in achieving your
development goals. Start programming with Python to attain a clearer idea of whether or
not a career in tech is really for you.

Introduction to Programming and Cyber Security


Get acquainted with cyber security, types of cyber attacks, and the impact of cyber crime.
Understand how industry professionals develop software by exploring the best practices
they use and develop solid coding foundations in Python, one of the most powerful and
versatile coding languages available.

HTML and Semantic HTML


Learn how web pages are written with a view to understanding Internet
infrastructure that is exploited by hackers, and then focus on typical attacks such as
cross-site scripting, learning how they work and how to prevent them.

Databases and SQL


Learn how to write code to interact with databases, and how hackers exploit this
process through attacks like SQL injection. Armed with this knowledge, you’ll learn
how to write secure code that is not vulnerable to attacks.

Penetration Testing and Digital Forensics


Learn to ethically compromise systems as part of a security evaluation exercise,
finding vulnerabilities and reporting on or fixing them before bad actors can take
advantage of them.

A Toolbox for Ethical Hacking


Explore and master tools used for reconnaissance, scanning and enumeration,
exploitation and post-exploitation.

Hyperiondev.com Page 8
Cyber Security Page 9

Career Readiness and Employability (Post bootcamp completion)


Once you have completed your bootcamp we provide career support and guidance,
including interview preparation and CV review, to equip you with not only technical
skills but also the professional career development tools and skills you need to
succeed in your job search.

We introduce our graduates to the tech industry through various networking events,
career expos, and job opportunities with our hiring partners. With our support and
mentorship, most of our graduates get hired within six months of graduating.

What to expect from the Cyber Security syllabus


During your bootcamp, you will progress through a series of learning tasks. Each task includes
a lesson and one or more practical activities. Some are tasks introducing and practising new
concepts, and some are capstone projects, intended to challenge you to bring together the
skills you’ve learned over a number of weeks to create a more complex program that you can
use to showcase your learning.

By the end of your bootcamp, you should be able to:

Program confidently in Python.

Learn how to set up local and cloud-based virtual machines (command line as well as GUI).

Write bash scripts and understand scripting exploits.

Install and confidently navigate a Linux environment, applying the array of advanced cyber security
tools provided by Kali Linux, a Linux distribution designed especially for digital forensics and
penetration testing.

Use the command line and bash scripting, demonstrating a hands-on approach to hardening and
securing servers and networks, protecting them from attacks.

Write and understand HTML, semantic HTML, and CSS, and relate these skills to secure web
programming.

Learn security fundamentals and how to think like an experienced cyber security professional by
evaluating threats and mitigating risks.

Explore offensive security such as XSS vulnerabilities, SQL injection, and penetration testing.

Use the support and guidance of our world-class career support team to hone your job application
and interview skills to land your dream role in tech!

Remember, with HyperionDev, you’re never alone. You can contact a mentor for support whenever you need help with a task. The
code that you submit for each task is reviewed by an expert who provides feedback to help you improve the efficiency and quality
of your code.

We hope to see you online soon to embark on your personal learning journey as a budding Cyber Security expert!

Hyperiondev.com Page 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy