Cyber Security Training at Victrics. First week is always free. "Try before you buy!"
We offer a career-focused cyber security course that includes ISSO training and prepares you to become a qualified security controls assessor.
We offer a career-focused cyber security course that includes ISSO training and prepares you to become a qualified security controls assessor.
Victrics, LLC was created to assist those with some IT and cyber experience or education or for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals, to take their career to the next level with cyber security, IT, and job-hunting skills at the best possible price. Price and profit are not the company's primary motivation, since this business model is driven by the owner's desire to fulfill a mission of assisting those wanting to enter the cyber security workforce or improve their current skills for a better career.
Our team of computer security experts have over 20 years of experience in the industry. We stay up to date with the latest trends and technologies to ensure our clients receive the best possible training. We also have the depth of experience to give a richer perspective in a rapidly evolving world.
We offer a cost-effective cyber security course designed by a leading cyber security expert to help younger and less experienced IT or cyber professionals to fully enter the world of cybersecurity with confidence. We cover what's important, everything from gaining the right certifications to tips and tools for finding your first job in cyber security, to coaching you in your cyber career for those who already have tech job experience.
Week 1: Foundations of Cybersecurity in our cyber security course.
Week 2: Tools and Systems for Security, crucial for any ISSO training.
Week 3: Threat Detection and Analysis as part of effective security controls assessor training.
Week 4: Cryptography and Identity Management, essential topics in the field.
Week 5: Vulnerability Management, a key component of cybersecurity.
Week 6: Career Preparation and Final Project to launch your career in cyber security.
Cybersecurity is built on a foundation of core technical skills, and Module 1 of this cyber security course establishes those essentials. We begin with understanding computer components and move to operating systems and virtualization, forming the groundwork for managing IT environments. Networking fundamentals and network devices like firewalls are introduced to build confidence in designing and securing networks, which is crucial for anyone pursuing ISSO training or aiming to become a security controls assessor.
This foundation is critical to success in subsequent modules.
Week 1:
Focus: Explore computer hardware and electronic components such as motherboards, CPUs, memory, and virtualization. Learn the basics of operating systems and servers.
Week 2:
Focus: Master networking fundamentals, including the OSI model, networking technologies, and devices like firewalls.
Week 3:
Focus: Understand internet architecture (DNS, HTTP, TCP/IP) and web server concepts. Gain foundational database knowledge, including structure, SELECT statements, and security.
Week 4:
Focus: Learn encryption basics, including public/private keys and hashing. Grasp core security principles, such as the CIA triad and physical/logical/management security.
This module continues with security technology fundamentals but uses that platform to move the student into the job of helping secure information systems by utilizing information assurance principles for government systems. We will familiarize ourselves with the Federal Information Security Management Act and the National Institutes of Standards and Technology (NIST) guidance on how information systems are to be secured in the federal government space. This cyber security course will equip you with essential skills for the role of a security controls assessor. Some of the skills taught in this module: Week 1: Focus: Review cybersecurity terminology and revisit Internet/network security concepts to understand their application in ISSO training roles. Learn to confidently interpret network diagrams. Week 2: Focus: Study access control protection (passwords, tokens, MFA) and advanced cryptography (steganography, data infiltration/exfiltration). Dive into effective incident response strategies. Week 3: Focus: Learn to interpret security policies and contingency planning, including Business Impact Analysis (BIA) and recovery technologies like backups. Week 4: Focus: Get hands-on with NIST SP 800-53 controls. Practice writing Systems Security Plans (SSPs) for Major Applications (MA) and General Support Systems (GSS). The step-by-step, scenario-driven teaching approach we use will enable you to grasp the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills.
This module takes the ISSO training and the role of a security controls assessor, leveraging everything you have learned so far to evaluate IT systems against the criteria found in the NIST SP 800-53A. This assessment companion to the NIST SP 800-53 is critical for ISSOs. The responsibility of evaluating the IT system falls on the security control assessor. This module will build on your skills from the previous module in security plan writing and interpreting agency IT policies, but it will focus heavily on 'relearning' how to read and write for assessment purposes in the context of a cyber security course.
Week 1:
Focus: Understand the role of security controls assessors (SCAs) and how to evaluate IT systems using NIST SP 800-53A. Learn to assess system controls based on ISSO-prepared plans.
Week 2:
Focus: Hone your skills in reading and interpreting guidance, requesting artifacts, and synthesizing findings into Security Assessment Reports (SARs) and Accreditation Letters.
Week 3:
Focus: Build effective communication and interviewing skills. Learn to collaborate with subject matter experts (SMEs), eliminate unnecessary noise, and focus on pertinent details during evaluations.
Week 4:
Focus: Transition into job preparation. Learn to interpret job boards, tailor resumes, and rebrand yourself for roles in IT security.
You will also discover the most effective methods of synthesizing information to present it in a clear and concise manner to the reader.
The second part of this module will connect what you have learned directly to securing a job. We will explore how to read job boards and position descriptions to assess your fit for specific roles. Each student will be 'rebranded' based on their comfort levels and skill sets into new security professionals.
Our courses are taught by experienced instructors who are experts in their field, ensuring a comprehensive understanding of vital topics such as cyber security. Our expertise includes:
· Certified Information Privacy Technologist (CIPT)
· Linux Red Hat Administration
· CompTIA Cloud+ for IT Professionals
· SANS Advanced Security Essentials (Enterprise Defender)
· Certified Wireless Network Administrator (CWNA)
· Computer Hacking Forensic Investigator v8 (CHFI)
· Mobility+ for IT Professionals
· Security Sensor Array Training (Fire Eye)
· OpNet/Riverbed AppResponse Xpert
· Certified Ethical Hacker (CEH) v7
· Certified Information System Security Professional (CISSP)
· Cyber Security Assessment & Management (CSAM)
· Policy Planning for Security Architects
· Information System Security Officer (ISSO) training
· Security Controls Assessor training
· Oracle 7 SQL/PL SQL
Enroll in our programs and start your journey towards a rewarding career in cybersecurity.

Our online courses allow you to learn from anywhere, at any time. With personalized instruction and a supportive community, you'll be amazed at how quickly you can learn cybersecurity concepts.
Our team of experienced instructors are passionate about teaching and dedicated to helping you succeed. With one-on-one support and guidance, small class sizes, you'll have everything you need to master the skills you need for a successful career in tech.
Our curriculum is designed to provide hands-on experience with real-world projects. You'll graduate with experience on projects that showcase your skills and demonstrate your ability to work on real-world problems.
We offer a range of career services to help you launch your career in tech. From resume and cover letter reviews to interview preparation, we're here to support you every step of the way.
Our community of students, alumni, and instructors is here to support you throughout your journey. Connect with others who are in the same cohort and work together to collaborate on projects.
We believe that everyone should have access to high-quality tech education. That's why we offer affordable tuition (Starting at $500*) and payment options to make our courses accessible to nearly everyone.
* A LIMITED NUMBER OF SCHOLARSHIPS ARE ALSO AVAILABLE PER CLASS
Week 1: Foundations of Cybersecurity in our cyber security course.
Week 2: Tools and Systems for Security, crucial for any ISSO training.
Week 3: Threat Detection and Analysis as part of effective security controls assessor training.
Week 4: Cryptography and Identity Management, essential topics in the field.
Week 5: Vulnerability Management, a key component of cybersecurity.
Week 6: Career Preparation and Final Project to launch your career in cyber security.
Cybersecurity is built on a foundation of core technical skills, and Module 1 of this cyber security course establishes those essentials. We begin with understanding computer components and move to operating systems and virtualization, forming the groundwork for managing IT environments. Networking fundamentals and network devices like firewalls are introduced to build confidence in designing and securing networks, which is crucial for anyone pursuing ISSO training or aiming to become a security controls assessor.
This foundation is critical to success in subsequent modules.
Week 1:
Focus: Explore computer hardware and electronic components such as motherboards, CPUs, memory, and virtualization. Learn the basics of operating systems and servers.
Week 2:
Focus: Master networking fundamentals, including the OSI model, networking technologies, and devices like firewalls.
Week 3:
Focus: Understand internet architecture (DNS, HTTP, TCP/IP) and web server concepts. Gain foundational database knowledge, including structure, SELECT statements, and security.
Week 4:
Focus: Learn encryption basics, including public/private keys and hashing. Grasp core security principles, such as the CIA triad and physical/logical/management security.
This module continues with security technology fundamentals but uses that platform to move the student into the job of helping secure information systems by utilizing information assurance principles for government systems. We will familiarize ourselves with the Federal Information Security Management Act and the National Institutes of Standards and Technology (NIST) guidance on how information systems are to be secured in the federal government space. This cyber security course will equip you with essential skills for the role of a security controls assessor. Some of the skills taught in this module: Week 1: Focus: Review cybersecurity terminology and revisit Internet/network security concepts to understand their application in ISSO training roles. Learn to confidently interpret network diagrams. Week 2: Focus: Study access control protection (passwords, tokens, MFA) and advanced cryptography (steganography, data infiltration/exfiltration). Dive into effective incident response strategies. Week 3: Focus: Learn to interpret security policies and contingency planning, including Business Impact Analysis (BIA) and recovery technologies like backups. Week 4: Focus: Get hands-on with NIST SP 800-53 controls. Practice writing Systems Security Plans (SSPs) for Major Applications (MA) and General Support Systems (GSS). The step-by-step, scenario-driven teaching approach we use will enable you to grasp the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills.
This module takes the ISSO training and the role of a security controls assessor, leveraging everything you have learned so far to evaluate IT systems against the criteria found in the NIST SP 800-53A. This assessment companion to the NIST SP 800-53 is critical for ISSOs. The responsibility of evaluating the IT system falls on the security control assessor. This module will build on your skills from the previous module in security plan writing and interpreting agency IT policies, but it will focus heavily on 'relearning' how to read and write for assessment purposes in the context of a cyber security course.
Week 1:
Focus: Understand the role of security controls assessors (SCAs) and how to evaluate IT systems using NIST SP 800-53A. Learn to assess system controls based on ISSO-prepared plans.
Week 2:
Focus: Hone your skills in reading and interpreting guidance, requesting artifacts, and synthesizing findings into Security Assessment Reports (SARs) and Accreditation Letters.
Week 3:
Focus: Build effective communication and interviewing skills. Learn to collaborate with subject matter experts (SMEs), eliminate unnecessary noise, and focus on pertinent details during evaluations.
Week 4:
Focus: Transition into job preparation. Learn to interpret job boards, tailor resumes, and rebrand yourself for roles in IT security.
You will also discover the most effective methods of synthesizing information to present it in a clear and concise manner to the reader.
The second part of this module will connect what you have learned directly to securing a job. We will explore how to read job boards and position descriptions to assess your fit for specific roles. Each student will be 'rebranded' based on their comfort levels and skill sets into new security professionals.
Our courses are taught by experienced instructors who are experts in their field, ensuring a comprehensive understanding of vital topics such as cyber security. Our expertise includes:
· Certified Information Privacy Technologist (CIPT)
· Linux Red Hat Administration
· CompTIA Cloud+ for IT Professionals
· SANS Advanced Security Essentials (Enterprise Defender)
· Certified Wireless Network Administrator (CWNA)
· Computer Hacking Forensic Investigator v8 (CHFI)
· Mobility+ for IT Professionals
· Security Sensor Array Training (Fire Eye)
· OpNet/Riverbed AppResponse Xpert
· Certified Ethical Hacker (CEH) v7
· Certified Information System Security Professional (CISSP)
· Cyber Security Assessment & Management (CSAM)
· Policy Planning for Security Architects
· Information System Security Officer (ISSO) training
· Security Controls Assessor training
· Oracle 7 SQL/PL SQL
Victor Williams (CEH) will be the primary instructor and has continually proven to be an industry leader for high quality service by having certifications and training in the technologies listed above.
We understand that our clients have unique needs, whether they're interested in a cyber security course, ISSO training, or require the expertise of a security controls assessor. Send us a message, and we will get back to you soon.
Mon | 06:30 pm – 09:30 pm | |
Tue | 06:30 pm – 09:30 pm | |
Wed | 06:30 pm – 09:30 pm | |
Thu | 06:30 pm – 09:30 pm | |
Fri | By Appointment | |
Sat | Closed | |
Sun | Closed |
Tuesdays and Thursdays may change due to current circumstances.