Course Overviews
UMBC Training Centers’ Cybersecurity Academy offerings were designed to meet the Department of Defense’s training standards. Whether you are new to the field, already working in IT or cybersecurity, or are looking to prepare your workforce for the cyber mission, UMBC Training Centers has world-class cybersecurity training to meet your needs.
View DOD 8570 Approved Certifications
View upcoming cybersecurity Courses
Certificate Programs
-
Certificate in Cyber Foundations
This program provides candidates with the skills, knowledge and credentials required to successfully begin a career in the field of Information Technology. This program was designed by UMBC Training Centers in collaboration with senior executives and technical staff from the Department of Defense, leading Government Contractors, and Fortune 500 companies. Click for more information.
Industry and DoD 8570/8140 Certifications
-
CompTIA A+
If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA A+ Certification course is the first step in your preparation. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. A+ Certification Prep is the first course in the Certificate in Computer & Network Technology program. Click for more information
-
CompTIA Network+
CompTIA Network+ is a vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. CompTIA Network+ certified individuals are in-demand worldwide. With a CompTIA Network+ certification, you will possess the key skills to troubleshoot, configure and manage these systems and keep your company productive. Click for more information
-
CompTIA Security+
CompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic and your organization as a whole including the physical security elements and operational security measures. It is also the main course you will take to prepare for the CompTIA Security+ Certification examination. Click for more information
-
CompTIA PenTest+
PenTest+ is unique because it requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. The course provides the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Click for more information
-
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Cybersecurity Analyst (CySA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CySA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats. Click for more information
-
CompTIA Advanced Security Practitioner (CASP)
CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments. Click for more information
-
Cisco Certified Network Associate (CCNA)
The widely respected Cisco Career Certifications bring valuable, measurable rewards to network professionals, their managers, and the organizations that employ them. Cisco Certified Network Associate (CCNA) is one of the most valued certifications in the IT industry. Anyone seeking to pursue or advance their career as a network technician, network administrator, or information security specialist will benefit from the range of theoretical and practical skills covered by the CCNA certification course of study. Click for more information
-
CCNA Security
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. Click for more information
-
Red Hat System Administration II with Exam (RH135)
Red Hat System Administration II (RH135) focuses on the key tasks needed to become a full time Linux administrator. This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator exam (EX200), which is included in this version of the course. Click for more information
-
EC-Council Certified Ethical Hacker (CEH)
The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the expertise and insight necessary to prepare for and react to malicious intrusion. Click for more information
-
Certified Information Systems Security Professional (CISSP) Plus
Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems Security Certification Consortium (ISC)², to recognize individuals who have distinguished themselves as experienced, knowledgeable, and proficient information security practitioners. Certification can enhance a professional’s career and provide added credibility. CISSP is an approved certification for certain job classifications identified within DoD Directive 8570. Click for more information
-
Certified Network Defender (CND)
Organizational focus on cyber defense is more important than ever as cyber breaches now have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore, organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Click for more information
-
Computer Hacking Forensic Investigator (CHFI)
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Click for more information
Specialized Cyber Training
-
Logical Reasoning, Critical Thinking and Structured Analytic Techniques
The overall objective of this class is to enable students to critically think about their analysis and what they are tasked to analyze. A secondary objective is to provide students with a set of analytic tools to be used in future analytic scenarios. At the end of the course, students will be equipped with a “toolbox” of analytic methodologies and skills and have honed their critical thinking skills. Click for more information
-
Network & Packet Analysis
This course teaches the student the fundamental concepts, methodologies, and tools necessary to analyze network traffic for the purposes of intrusion and threat detection, network defense, and low profile offensive operations. Click for more information
-
Windows Internals and Command Line
Windows Internals and Command Line prepares students to use the Windows Operating System using the Command Line Interface (CLI). By emphasizing the CLI, the course prepares students to automate tasks through scripting or using a remote administration tool without a Graphical User Interface (GUI). Click for more information
-
Penetration Testing Methodology
Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world attacker’s thoughts and actions, all for the purpose of helping to improve the security posture of the organizations they support. Click for more information
-
Metasploit Framework
The Metasploit Framework course was developed to provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This course provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and shows them how to install it, maneuver within it and maintain it. Click for more information
-
Malware Triage
Malware Triage was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat it may pose within a system or network. The course includes significant amounts of hands-on practical application of skills learned. Click for more information
-
Wireless Analysis & Exploitation (WAX)
Wireless Analysis & Exploitation (WAX) is an intensive course that provides a comprehensive view into the methods and mindset used by hackers to compromise wireless networks. Wireless can be complex and effective learning requires mastery of a new set of acronyms and how these technologies fit into the big picture. Click for more information
-
Certified Wireless Network Administrator (CWNA)
This Enterprise Wireless LAN Administration course, whether in an academic format or a 5-day fast-track format, provides the networking professional a complete foundation of knowledge for entering into or advancing in the wireless networking industry. From basic RF theory to 802.11 frame exchange processes, this course delivers hands-on training that will benefit the novice as well as the experienced network professional. Click for more information
-
Malcare (Reverse Engineering Malware)
This course, developed and delivered by our partner, Rendition Infosec, introduces students to the principles, practices, and tools used in reversing engineer. Once students are comfortable with these foundational concepts, they will take a deep-dive into the concepts and practices around reverse engineering malicious software. Click for more information
-
Reverse Engineering Malware
Reverse Engineering Malware is an intermediate course that exposes students to the theoretical knowledge and hands-on techniques to analyze malware of greater complexity. Students will learn to analyze malicious Windows programs, debug user-mode and kernel-mode malware with WinDbg, identify common malware functionality, in addition to reversing covert and encoded malware. Click for more information
Programs for Organizations
-
Operational Cybersecurity
Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis. However, cyber technology creates unique vulnerabilities for both private and public sector users. Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. Click for more information
-
Software Engineering and Secure Coding
This course is an introduction to the basic concepts of software engineering including the software lifecycle. Emphasis is placed on the requirements – design – implementation phases of the lifecycle. Students will use various software development tools and exposed to software development methodologies including waterfall and agile. Best practices in software design and implementation with a view toward recognizing and avoiding weakness and vulnerabilities in software is a key part of this course. Click for more information
NICE / NIST / Risk Management Framework (RMF) Training
-
Cloud Computing Fundamentals
This course provides an overview of Enterprise Cloud Computing. It is aimed at a broad audience including technology managers. Cloud computing models are discussed, including public, private and hybrid clouds. Major Cloud platforms such as Amazon AWS and Microsoft Azure are analyzed. Important issues such as Compliance, Security and Legacy system migration are discussed. Click for more information
-
Cybersecurity Fundamentals
The three-day cybersecurity fundamentals course will provide students with an overview of current networking, information assurance (IA), and cybersecurity theory and application. The course will consist of lectures and hands-on labs for a multi-faceted learning experience. This course will provide a good initial foundation for participants wanting to ultimately pursue industry certification like Security + and/or Certified Ethical Hacker (CEH). Click for more information
-
Secure Programming Best Practices
The primary objective of this course is to teach professional computer programmers about the common methods used by hackers to exploit vulnerabilities in computer programs, and how to program defensively to avoid introducing such vulnerabilities into their own programs. Click for more information
-
Modern Software and Systems Engineering
This course covers the current concepts of software and systems engineering in the modern enterprise. Students will review major software development methodologies including classic SDLC/Waterfall, Rapid Development, Agile, Continuous Integration/Continuous Delivery (CI/CD) and DevSecOps. Best practices in software design and implementation with a view toward recognizing and avoiding weakness and vulnerabilities in software is a key part of this course. Test Driven Development (TDD) and Business Driven Development (BDD) are discussed, along with QA testing, code quality and vulnerability scanning, configuration management, and maintenance are also covered. We will also discuss issues related to outsourcing and working in cloud environments. Click for more information
Cybersecurity & AI
-
Post-Quantum Cryptography (PQC)
This course covers the essentials of Quantum Computing and Post-Quantum Cryptography (PQC). The course enables organizational leaders, security officers, and IT professionals to plan for the fast approaching quantum computing reality. Click for more information
-
Cybersecurity in the Age of AI
Delves into the unique cybersecurity risks posed by AI systems and strategies to mitigate vulnerabilities and protect sensitive data. Click for more information
-
Securing The Software Supply Chain: Software Bills Of Materials
This seminar provides a high-level overview of Software Bills of Materials (SBOMs). It focuses on how using SBOMs in software development can provide traceability, insight, and security. Any system that consumes or produces software can benefit from using SBOMs, either as fuel or output. Click for more information
-
AI Security, Compliance, and Explainability
In this AI course, attendees learn AI’s role in various sectors, best practices for system security, and the intricacies of AI design and deployment. Students also explore the AI auditing processes and understand the importance of making AI transparent through explainability techniques. This course is ideal for professionals seeking a straightforward understanding of responsible AI development. Click for more information