We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Course Overviews

UMBC Training Centers’ Cybersecurity Academy offerings were designed to meet the Department of Defense’s training standards. Whether you are new to the field, already working in IT or cybersecurity, or are looking to prepare your workforce for the cyber mission, UMBC Training Centers has world-class cybersecurity training to meet your needs.

View DOD 8570 Approved Certifications

View upcoming cybersecurity Courses

Certificate Programs

  • Certificate in Cyber Foundations

    This program provides candidates with the skills, knowledge and credentials required to successfully begin a career in the field of Information Technology. This program was designed by UMBC Training Centers in collaboration with senior executives and technical staff from the Department of Defense, leading Government Contractors, and Fortune 500 companies. Click for more information.

Industry and DoD 8570/8140 Certifications

  • CompTIA A+

    If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA A+ Certification course is the first step in your preparation. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. A+ Certification Prep is the first course in the Certificate in Computer & Network Technology program. Click for more information

  • CompTIA Network+

    CompTIA Network+ is a vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. CompTIA Network+ certified individuals are in-demand worldwide. With a CompTIA Network+ certification, you will possess the key skills to troubleshoot, configure and manage these systems and keep your company productive. Click for more information

  • CompTIA Security+

    CompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic and your organization as a whole including the physical security elements and operational security measures. It is also the main course you will take to prepare for the CompTIA Security+ Certification examination. Click for more information

  • CompTIA PenTest+

    PenTest+ is unique because it requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. The course provides the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Click for more information

  • CompTIA Cybersecurity Analyst (CySA+)

    CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats. Click for more information

  • CompTIA Advanced Security Practitioner (CASP)

    CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments. Click for more information

  • Cisco Certified Network Associate (CCNA)

    The widely respected Cisco Career Certifications bring valuable, measurable rewards to network professionals, their managers, and the organizations that employ them. Cisco Certified Network Associate (CCNA) is one of the most valued certifications in the IT industry. Anyone seeking to pursue or advance their career as a network technician, network administrator, or information security specialist will benefit from the range of theoretical and practical skills covered by the CCNA certification course of study. Click for more information

  • CCNA Security

    Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. Click for more information

  • Red Hat System Administration II with Exam (RH135)

    Red Hat System Administration II (RH135) focuses on the key tasks needed to become a full time Linux administrator. This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator exam (EX200), which is included in this version of the course. Click for more information

  • EC-Council Certified Ethical Hacker (CEH)

    The most effective cybersecurity professionals are able to predict attacks before they happen.  Training in Ethical Hacking provides professionals with the expertise and insight necessary to prepare for and react to malicious intrusion. Click for more information

  • Certified Information Systems Security Professional (CISSP) Plus

    Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. Certification can enhance a professional’s career and provide added credibility. CISSP is an approved certification for certain job classifications identified within DoD Directive 8570. Click for more information

  • Certified Network Defender (CND)

    Organizational focus on cyber defense is more important than ever as cyber breaches now have a far greater financial impact and can cause broad reputational damage.  Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore, organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Click for more information

  • Computer Hacking Forensic Investigator (CHFI)

    Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Click for more information

Specialized Cyber Training

  • Logical Reasoning, Critical Thinking and Structured Analytic Techniques

    The overall objective of this class is to enable students to critically think about their analysis and what they are tasked to analyze.  A secondary objective is to provide students with a set of analytic tools to be used in future analytic scenarios.  At the end of the course, students will be equipped with a “toolbox” of analytic methodologies and skills and have honed their critical thinking skills. Click for more information

  • Network & Packet Analysis

    This course teaches the student the fundamental concepts, methodologies, and tools necessary to analyze network traffic for the purposes of intrusion and threat detection, network defense, and low profile offensive operations. Click for more information

  • Windows Internals and Command Line

    Windows Internals and Command Line prepares students to use the Windows Operating System using the Command Line Interface (CLI).  By emphasizing the CLI, the course prepares students to automate tasks through scripting or using a remote administration tool without a Graphical User Interface (GUI). Click for more information

  • Penetration Testing Methodology

    Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world attacker’s thoughts and actions, all for the purpose of helping to improve the security posture of the organizations they support. Click for more information

  • Metasploit Framework

    The Metasploit Framework course was developed to provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This course provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and shows them how to install it, maneuver within it and maintain it. Click for more information

  • Malware Triage

    Malware Triage was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat it may pose within a system or network. The course includes significant amounts of hands-on practical application of skills learned. Click for more information

  • Wireless Analysis & Exploitation (WAX)

    Wireless Analysis & Exploitation (WAX) is an intensive course that provides a comprehensive view into the methods and mindset used by hackers to compromise wireless networks. Wireless can be complex and effective learning requires mastery of a new set of acronyms and how these technologies fit into the big picture. Click for more information

  • Certified Wireless Network Administrator (CWNA)

    This Enterprise Wireless LAN Administration course, whether in an academic format or a 5-day fast-track format, provides the networking professional a complete foundation of knowledge for entering into or advancing in the wireless networking industry. From basic RF theory to 802.11 frame exchange processes, this course delivers hands-on training that will benefit the novice as well as the experienced network professional. Click for more information

  • Malcare (Reverse Engineering Malware)

    This course, developed and delivered by our partner, Rendition Infosec, introduces students to the principles, practices, and tools used in reversing engineer. Once students are comfortable with these foundational concepts, they will take a deep-dive into the concepts and practices around reverse engineering malicious software. Click for more information

  • Reverse Engineering Malware

    Reverse Engineering Malware is an intermediate course that exposes students to the theoretical knowledge and hands-on techniques to analyze malware of greater complexity. Students will learn to analyze malicious Windows programs, debug user-mode and kernel-mode malware with WinDbg, identify common malware functionality, in addition to reversing covert and encoded malware. Click for more information

Programs for Organizations

  • Operational Cybersecurity

    Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis.  However, cyber technology creates unique vulnerabilities for both private and public sector users.  Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. Click for more information

  • Software Engineering and Secure Coding

    This course is an introduction to the basic concepts of software engineering including the software lifecycle. Emphasis is placed on the requirements – design – implementation phases of the lifecycle.  Students will use various software development tools and exposed to software development methodologies including waterfall and agile. Best practices in software design and implementation with a view toward recognizing and avoiding weakness and vulnerabilities in software is a key part of this course. Click for more information

NICE / NIST / Risk Management Framework (RMF) Training

  • Cloud Computing Fundamentals

    This course provides an overview of Enterprise Cloud Computing. It is aimed at a broad audience including technology managers. Cloud computing models are discussed, including public, private and hybrid clouds. Major Cloud platforms such as Amazon AWS and Microsoft Azure are analyzed. Important issues such as Compliance, Security and Legacy system migration are discussed. Click for more information

  • Cybersecurity Fundamentals

    The three-day cybersecurity fundamentals course will provide students with an overview of current networking, information assurance (IA), and cybersecurity theory and application.  The course will consist of lectures and hands-on labs for a multi-faceted learning experience.  This course will provide a good initial foundation for participants wanting to ultimately pursue industry certification like Security + and/or Certified Ethical Hacker (CEH). Click for more information

  • Secure Programming Best Practices

    The primary objective of this course is to teach professional computer programmers about the common methods used by hackers to exploit vulnerabilities in computer programs, and how to program defensively to avoid introducing such vulnerabilities into their own programs. Click for more information

  • Modern Software and Systems Engineering

    This course covers the current concepts of software and systems engineering in the modern enterprise.  Students will review major software development methodologies including classic SDLC/Waterfall, Rapid Development, Agile, Continuous Integration/Continuous Delivery (CI/CD) and DevSecOps. Best practices in software design and implementation with a view toward recognizing and avoiding weakness and vulnerabilities in software is a key part of this course. Test Driven Development (TDD) and Business Driven Development (BDD) are discussed, along with QA testing, code quality and vulnerability scanning, configuration management, and maintenance are also covered. We will also discuss issues related to outsourcing and working in cloud environments. Click for more information

Cybersecurity & AI

Contact Us