Spring registration begins February 1, 2025. Spring classes begin March 3.
Transform Your Future with Comprehensive IT Training.
We provide career-focused cyber security training.

Spring registration begins February 1, 2025. Spring classes begin March 3.
We provide career-focused cyber security training.
Victrics, LLC was created to assist those with some IT and cyber experience or education or for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals, to take their career to the next level with cyber security, IT, and job-hunting skills at the best possible price. Price and profit are not the company's primary motivation, since this business model is driven by the owner's desire to fulfill a mission of assisting those wanting to enter the cyber security workforce or improve their current skills for a better career.
Our team of computer security experts have over 20 years of experience in the industry. We stay up to date with the latest trends and technologies to ensure our clients receive the best possible training. We also have the depth of experience to give a richer perspective in a rapidly evolving world.
We offer a cost-effective cyber security course designed by a leading cyber security expert to help younger and less experienced IT or cyber professionals to fully enter the world of cybersecurity with confidence. We cover what's important, everything from gaining the right certifications to tips and tools for finding your first job in cyber security, to coaching you in your cyber career for those who already have tech job experience.
Week 1: Foundations of Cybersecurity
Week 2: Tools and Systems for Security
Week 3: Threat Detection and Analysis
Week 4: Cryptography and Identity Management
Week 5: Vulnerability Management
Week 6: Career Preparation and Final Project
Cybersecurity is built on a foundation of core technical skills, and Module 1 of this curriculum establishes those essentials. We begin with understanding computer components and move to operating systems and virtualization, forming the groundwork for managing IT environments. Networking fundamentals and network devices like firewalls, are introduced to build confidence in designing and securing networks.
This foundation is critical to success in subsequent modules.
This module continues with security technology fundamentals but uses that platform to move the student into the job of helping secure information systems by utilizing information assurance principles for government systems. We will familiarize ourselves with the Federal Information Security Management Act and the National Institutes of Standards and Technology (NIST) guidance on how information systems are to be secured in federal governments space. Some of the skills taught in this module:
The step-by-step, scenario-driven teaching approach we use will enable you to grasp the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills.
This module takes the ISSO training, security controls assessor and all that you know so far and will use that knowledge to evaluate IT systems against the criteria found in the NIST SP 800-53A; this is the assessment companion to the NIST SP 800-53 used by ISSO’s. Evaluating the IT system is the job of the security control assessor. This module will leverage the previous module skills development in security plan writing and interpreting agency IT policies. However, this module will be heavy on “relearning” on how to read and write for assessment purposes.
You will then learn the most effective methods of synthesizing the information and making it “make sense” to the reader, quickly and with less effort.
The second part of this module will be used to see how what you learned ties directly into getting a job. We will learn to read job boards and position descriptions to help determine if you are a good fit for a specific job. We will “rebrand” each student; based on their comfort levels and skillsets, into new security professionals.
Our courses are taught by experienced instructors who are experts in their field. Our expertise includes:
· Certified Information Privacy Technologist (CIPT)
· Linux Red Hat Administration
· CompTIA Cloud+ for IT Professionals
· SANS Advanced Security Essentials (Enterprise Defender)
· Certified Wireless Network Administrator (CWNA)
· Computer Hacking Forensic Investigator v8 (CHFI)
· Mobility+ for IT Professionals
· Security Sensor Array Training (Fire Eye)
· OpNet/Riverbed AppResponse Xpert
· Certified Ethical Hacker (CEH) v7
· Certified Information System Security Professional (CISSP)
· Cyber Security Assessment & Management (CSAM)
· Policy Planning for Security Architects
· Information System Security Officer (ISSO)
· Oracle 7 SQL/PL SQL
Enroll in our programs and start your journey towards a rewarding career in cybersecurity.
Our online courses allow you to learn from anywhere, at any time. With personalized instruction and a supportive community, you'll be amazed at how quickly you can learn cybersecurity concepts.
Our team of experienced instructors are passionate about teaching and dedicated to helping you succeed. With one-on-one support and guidance, small class sizes, you'll have everything you need to master the skills you need for a successful career in tech.
Our curriculum is designed to provide hands-on experience with real-world projects. You'll graduate with experience on projects that showcase your skills and demonstrate your ability to work on real-world problems.
We offer a range of career services to help you launch your career in tech. From resume and cover letter reviews to interview preparation, we're here to support you every step of the way.
Our community of students, alumni, and instructors is here to support you throughout your journey. Connect with others who are in the same cohort and work together to collaborate on projects.
We believe that everyone should have access to high-quality tech education. That's why we offer affordable tuition (Starting at $500*) and payment options to make our courses accessible to nearly everyone.
* A LIMITED NUMBER OF SCHOLARSHIPS ARE ALSO AVAILABLE PER CLASS
Networking Made Easy: Get Yourself Connected (Computers Made Easy) By James Bernstein ($15)
*All prices are approximate and from Amazon
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide (NIST 800 Cybersecurity). by Bruce Brown ($40)
RMF ISSO: NIST 800-53 Controls Book 2: NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity). by Bruce Brown ($40)
and
Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career. by Dr. Gerald Auger ($30)
Zoom will be the communication program used for all classes. This will allow for audio, video, document sharing, breakouts, chat, and file uploads.
At Victrics, our programs are designed to help you gain the skills and knowledge needed to succeed in today's fast-paced digital world. Our courses are taught by experienced instructors who are experts in their field. Whether you're just starting out or looking to enhance your skills, Victrics has the right program for you. We offer flexible schedules, affordable tuition, and a supportive learning environment to ensure your success.
Victor Williams (CEH) will be the primary instructor and has continually proven to be an industry leader for high quality service by having certifications and training in the technologies listed below.
We know that our clients have unique needs. Send us a message, and we will get back to you soon.
Mon | 06:30 pm – 09:30 pm | |
Tue | 06:30 pm – 09:30 pm | |
Wed | 06:30 pm – 09:30 pm | |
Thu | 06:30 pm – 09:30 pm | |
Fri | By Appointment | |
Sat | Closed | |
Sun | Closed |
Tuesdays and Thursdays may change due to current circumstances.