Tel: +1 (240) 863-2817

VICTRICS, LLC
VICTRICS, LLC

Tel: +1 (240) 863-2817

  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • FAQ
  • Training Registration
  • Credit Card Payments
  • Downloads (Sign-up)
  • Schedule
  • Price Lists

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

Cyber Security Training at Victrics. First week is always free. "Try before you buy!"

Cyber Security Training at Victrics. First week is always free. "Try before you buy!"Cyber Security Training at Victrics. First week is always free. "Try before you buy!"Cyber Security Training at Victrics. First week is always free. "Try before you buy!"

We offer a career-focused cyber security course that includes ISSO training and prepares you to become a qualified security controls assessor.

Learn More
See If You're Ready: Take the Assessment Test

About Victrics, LLC

Take classes anywhere.

Our Mission

  

Victrics, LLC was created to assist those with some IT and cyber experience or education or for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals, to take their career to the next level with cyber security, IT, and job-hunting skills at the best possible price.  Price and profit are not the company's primary motivation, since this business model is driven by the owner's desire to fulfill a mission of assisting those wanting to enter the cyber security workforce or improve their current skills for a better career.

Upgrade your career.

Our Team

Our team of computer security experts have over 20 years of experience in the industry. We stay up to date with the latest trends and technologies to ensure our clients receive the best possible training. We also have the depth of experience to give a richer perspective in a rapidly evolving world.

Learn Cyber Security and IT basics.

Our Services

We offer a cost-effective cyber security course designed by a leading cyber security expert to help younger and less experienced IT or cyber professionals to fully enter the world of cybersecurity with confidence. We cover what's important, everything from gaining the right certifications to tips and tools for finding your first job in cyber security, to coaching you in your cyber career for those who already have tech job experience. 

Learn Faster with Victrics Career Based Security Training

Click here to register.

***NEW *** Computer Security Analyst *** Sept 15, 2025 ***

Week 1: Foundations of Cybersecurity in our cyber security course. 


Week 2: Tools and Systems for Security, crucial for any ISSO training. 


Week 3: Threat Detection and Analysis as part of effective security controls assessor training. 


Week 4: Cryptography and Identity Management, essential topics in the field. 


Week 5: Vulnerability Management, a key component of cybersecurity. 


Week 6: Career Preparation and Final Project to launch your career in cyber security.

Program and Price

Module 1: Computer/Network Technology/Security Foundations

Cybersecurity is built on a foundation of core technical skills, and Module 1 of this cyber security course establishes those essentials. We begin with understanding computer components and move to operating systems and virtualization, forming the groundwork for managing IT environments. Networking fundamentals and network devices like firewalls are introduced to build confidence in designing and securing networks, which is crucial for anyone pursuing ISSO training or aiming to become a security controls assessor. 


This foundation is critical to success in subsequent modules. 


Week 1: 

Focus: Explore computer hardware and electronic components such as motherboards, CPUs, memory, and virtualization. Learn the basics of operating systems and servers. 


Week 2: 

Focus: Master networking fundamentals, including the OSI model, networking technologies, and devices like firewalls. 


Week 3: 

Focus: Understand internet architecture (DNS, HTTP, TCP/IP) and web server concepts. Gain foundational database knowledge, including structure, SELECT statements, and security. 


Week 4: 

Focus: Learn encryption basics, including public/private keys and hashing. Grasp core security principles, such as the CIA triad and physical/logical/management security.

Program and Price

Module 2: Information Systems Security Officer (ISSO) Basics

This module continues with security technology fundamentals but uses that platform to move the student into the job of helping secure information systems by utilizing information assurance principles for government systems. We will familiarize ourselves with the Federal Information Security Management Act and the National Institutes of Standards and Technology (NIST) guidance on how information systems are to be secured in the federal government space. This cyber security course will equip you with essential skills for the role of a security controls assessor. Some of the skills taught in this module: Week 1: Focus: Review cybersecurity terminology and revisit Internet/network security concepts to understand their application in ISSO training roles. Learn to confidently interpret network diagrams. Week 2: Focus: Study access control protection (passwords, tokens, MFA) and advanced cryptography (steganography, data infiltration/exfiltration). Dive into effective incident response strategies. Week 3: Focus: Learn to interpret security policies and contingency planning, including Business Impact Analysis (BIA) and recovery technologies like backups. Week 4: Focus: Get hands-on with NIST SP 800-53 controls. Practice writing Systems Security Plans (SSPs) for Major Applications (MA) and General Support Systems (GSS). The step-by-step, scenario-driven teaching approach we use will enable you to grasp the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills.

Program and Price

Module 3: Security Controls Assessor (SCA) Basics and Job Hunting

This module takes the ISSO training and the role of a security controls assessor, leveraging everything you have learned so far to evaluate IT systems against the criteria found in the NIST SP 800-53A. This assessment companion to the NIST SP 800-53 is critical for ISSOs. The responsibility of evaluating the IT system falls on the security control assessor. This module will build on your skills from the previous module in security plan writing and interpreting agency IT policies, but it will focus heavily on 'relearning' how to read and write for assessment purposes in the context of a cyber security course.


Week 1:

Focus: Understand the role of security controls assessors (SCAs) and how to evaluate IT systems using NIST SP 800-53A. Learn to assess system controls based on ISSO-prepared plans.


Week 2:

Focus: Hone your skills in reading and interpreting guidance, requesting artifacts, and synthesizing findings into Security Assessment Reports (SARs) and Accreditation Letters.


Week 3:

Focus: Build effective communication and interviewing skills. Learn to collaborate with subject matter experts (SMEs), eliminate unnecessary noise, and focus on pertinent details during evaluations.


Week 4:

Focus: Transition into job preparation. Learn to interpret job boards, tailor resumes, and rebrand yourself for roles in IT security.


You will also discover the most effective methods of synthesizing information to present it in a clear and concise manner to the reader.


The second part of this module will connect what you have learned directly to securing a job. We will explore how to read job boards and position descriptions to assess your fit for specific roles. Each student will be 'rebranded' based on their comfort levels and skill sets into new security professionals.

Program and Price

Government and Industry Experience

Qualifications

Our courses are taught by experienced instructors who are experts in their field, ensuring a comprehensive understanding of vital topics such as cyber security. Our expertise includes:  


· Certified Information Privacy Technologist (CIPT)  

· Linux Red Hat Administration  

· CompTIA Cloud+ for IT Professionals  

· SANS Advanced Security Essentials (Enterprise Defender)  

· Certified Wireless Network Administrator (CWNA)  

· Computer Hacking Forensic Investigator v8 (CHFI)  

· Mobility+ for IT Professionals  

· Security Sensor Array Training (Fire Eye)  

· OpNet/Riverbed AppResponse Xpert  

· Certified Ethical Hacker (CEH) v7  

· Certified Information System Security Professional (CISSP)  

· Cyber Security Assessment & Management (CSAM)  

· Policy Planning for Security Architects  

· Information System Security Officer (ISSO) training  

· Security Controls Assessor training  

· Oracle 7 SQL/PL SQL

Ready to Get Started?

Enroll in our programs and start your journey towards a rewarding career in cybersecurity.

Learn Cybersecurity the Victrics Way

Learn from experts in the field with over 20 years' experience.

Flexible Online Courses

Our online courses allow you to learn from anywhere, at any time. With personalized instruction and a supportive community, you'll be amazed at how quickly you can learn cybersecurity concepts.

Expert Instructors

Our team of experienced instructors are passionate about teaching and dedicated to helping you succeed. With one-on-one support and guidance, small class sizes, you'll have everything you need to master the skills you need for a successful career in tech.

Real-World Projects

Our curriculum is designed to provide hands-on experience with real-world projects. You'll graduate with experience on projects that showcase your skills and demonstrate your ability to work on real-world problems.

Career Services

We offer a range of career services to help you launch your career in tech. From resume and cover letter reviews to interview preparation, we're here to support you every step of the way.

Community

Our community of students, alumni, and instructors is here to support you throughout your journey. Connect with others who are in the same cohort and work together to collaborate on projects.

Affordable Tuition

We believe that everyone should have access to high-quality tech education. That's why we offer affordable tuition (Starting at $500*) and payment options to make our courses accessible to nearly everyone.

* A LIMITED NUMBER OF SCHOLARSHIPS ARE ALSO AVAILABLE PER CLASS

Materials Needed for Classes

Module 1: Computer/Network Technology/Security Foundations

Week 1: Foundations of Cybersecurity in our cyber security course. 


Week 2: Tools and Systems for Security, crucial for any ISSO training. 


Week 3: Threat Detection and Analysis as part of effective security controls assessor training. 


Week 4: Cryptography and Identity Management, essential topics in the field. 


Week 5: Vulnerability Management, a key component of cybersecurity. 


Week 6: Career Preparation and Final Project to launch your career in cyber security.

Module 2: Information Systems Security Officer (ISSO) Basics

Cybersecurity is built on a foundation of core technical skills, and Module 1 of this cyber security course establishes those essentials. We begin with understanding computer components and move to operating systems and virtualization, forming the groundwork for managing IT environments. Networking fundamentals and network devices like firewalls are introduced to build confidence in designing and securing networks, which is crucial for anyone pursuing ISSO training or aiming to become a security controls assessor. 


This foundation is critical to success in subsequent modules. 


Week 1: 

Focus: Explore computer hardware and electronic components such as motherboards, CPUs, memory, and virtualization. Learn the basics of operating systems and servers. 


Week 2: 

Focus: Master networking fundamentals, including the OSI model, networking technologies, and devices like firewalls. 


Week 3: 

Focus: Understand internet architecture (DNS, HTTP, TCP/IP) and web server concepts. Gain foundational database knowledge, including structure, SELECT statements, and security. 


Week 4: 

Focus: Learn encryption basics, including public/private keys and hashing. Grasp core security principles, such as the CIA triad and physical/logical/management security.

Module 3: Security Controls Assessor (SCA) Basics and Job Hunting

This module continues with security technology fundamentals but uses that platform to move the student into the job of helping secure information systems by utilizing information assurance principles for government systems. We will familiarize ourselves with the Federal Information Security Management Act and the National Institutes of Standards and Technology (NIST) guidance on how information systems are to be secured in the federal government space. This cyber security course will equip you with essential skills for the role of a security controls assessor. Some of the skills taught in this module: Week 1: Focus: Review cybersecurity terminology and revisit Internet/network security concepts to understand their application in ISSO training roles. Learn to confidently interpret network diagrams. Week 2: Focus: Study access control protection (passwords, tokens, MFA) and advanced cryptography (steganography, data infiltration/exfiltration). Dive into effective incident response strategies. Week 3: Focus: Learn to interpret security policies and contingency planning, including Business Impact Analysis (BIA) and recovery technologies like backups. Week 4: Focus: Get hands-on with NIST SP 800-53 controls. Practice writing Systems Security Plans (SSPs) for Major Applications (MA) and General Support Systems (GSS). The step-by-step, scenario-driven teaching approach we use will enable you to grasp the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills.

ZOOM: For All Sessions

This module takes the ISSO training and the role of a security controls assessor, leveraging everything you have learned so far to evaluate IT systems against the criteria found in the NIST SP 800-53A. This assessment companion to the NIST SP 800-53 is critical for ISSOs. The responsibility of evaluating the IT system falls on the security control assessor. This module will build on your skills from the previous module in security plan writing and interpreting agency IT policies, but it will focus heavily on 'relearning' how to read and write for assessment purposes in the context of a cyber security course.


Week 1:

Focus: Understand the role of security controls assessors (SCAs) and how to evaluate IT systems using NIST SP 800-53A. Learn to assess system controls based on ISSO-prepared plans.


Week 2:

Focus: Hone your skills in reading and interpreting guidance, requesting artifacts, and synthesizing findings into Security Assessment Reports (SARs) and Accreditation Letters.


Week 3:

Focus: Build effective communication and interviewing skills. Learn to collaborate with subject matter experts (SMEs), eliminate unnecessary noise, and focus on pertinent details during evaluations.


Week 4:

Focus: Transition into job preparation. Learn to interpret job boards, tailor resumes, and rebrand yourself for roles in IT security.


You will also discover the most effective methods of synthesizing information to present it in a clear and concise manner to the reader.


The second part of this module will connect what you have learned directly to securing a job. We will explore how to read job boards and position descriptions to assess your fit for specific roles. Each student will be 'rebranded' based on their comfort levels and skill sets into new security professionals.

Ready for Victrics Career-Based Cyber Security Training? Live In-Person Training Starting at $500

Enroll Now

Advance Your Career with Victrics

Training and Payment Flexibility

Our courses are taught by experienced instructors who are experts in their field, ensuring a comprehensive understanding of vital topics such as cyber security. Our expertise includes:  


· Certified Information Privacy Technologist (CIPT)  

· Linux Red Hat Administration  

· CompTIA Cloud+ for IT Professionals  

· SANS Advanced Security Essentials (Enterprise Defender)  

· Certified Wireless Network Administrator (CWNA)  

· Computer Hacking Forensic Investigator v8 (CHFI)  

· Mobility+ for IT Professionals  

· Security Sensor Array Training (Fire Eye)  

· OpNet/Riverbed AppResponse Xpert  

· Certified Ethical Hacker (CEH) v7  

· Certified Information System Security Professional (CISSP)  

· Cyber Security Assessment & Management (CSAM)  

· Policy Planning for Security Architects  

· Information System Security Officer (ISSO) training  

· Security Controls Assessor training  

· Oracle 7 SQL/PL SQL

CEO/Thought Leader

Victor Williams (CEH) will be the primary instructor and has continually proven to be an industry leader for high quality service by having certifications and training in the technologies listed above.

Learn More

See what others are saying about the Victrics Way

Contact Us

Get in Touch

Attach Files
Attachments (0)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Questions or Comments?

We understand that our clients have unique needs, whether they're interested in a cyber security course, ISSO training, or require the expertise of a security controls assessor. Send us a message, and we will get back to you soon.

Message us on WhatsApp

Victrics, LLC

Bowie, Maryland, United States

Tel: 2408632817 Email: Director@victrics.com

Hours

Mon

06:30 pm – 09:30 pm

Tue

06:30 pm – 09:30 pm

Wed

06:30 pm – 09:30 pm

Thu

06:30 pm – 09:30 pm

Fri

By Appointment

Sat

Closed

Sun

Closed

Tuesdays and Thursdays may change due to current circumstances.

Social

Subscribe

Blog

Copyright © 2024 Victrics, LLC - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept