Spring registration begins February 1, 2025. Spring classes begin March 3.
Transform Your Future with Comprehensive IT Training.
We provide career-focused cyber security training.
Spring registration begins February 1, 2025. Spring classes begin March 3.
We provide career-focused cyber security training.
Victrics, LLC was created to assist those with some IT and cyber experience or education or for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals, to take their career to the next level with cyber security, IT, and job-hunting skills at the best possible price. Price and profit are not the company's primary motivation, since this business model is driven by the owner's desire to fulfill a mission of assisting those wanting to enter the cyber security workforce or improve their current skills for a better career.
Our team of computer security experts have over 20 years of experience in the industry. We stay up to date with the latest trends and technologies to ensure our clients receive the best possible training. We also have the depth of experience to give a richer perspective in a rapidly evolving world.
We offer a cost-effective cyber security course designed by a leading cyber security expert to help younger and less experienced IT or cyber professionals to fully enter the world of cybersecurity with confidence. We cover what's important, everything from gaining the right certifications to tips and tools for finding your first job in cyber security, to coaching you in your cyber career for those who already have tech job experience.
There are essential computing and technology skills that all successful cybersecurity professionals first learn that serve as the baseline for careers and future education in the field. This module will serve as the launch of an IT education and career or can fill in the gaps by introducing students to these fundamentals.
By providing students with minimal technology proficiency and the ability to recognize key terms and develop competencies with case studies and “soak-in” time in a comfortable atmosphere, they are prepared for future skills development. This module will provide you with the core IT and computer knowledge needed for a future in cybersecurity.
Victrics is committed to teaching students a broad array of fundamental knowledge in areas such as computer hardware, networking, Windows operating systems, data storage, and much more. The skills gained are applicable to any IT, computing, or security role. Practical skills are key to success in cybersecurity. The course will set you up for entering the workforce and being prepared to continue learning in more advanced, technical areas across cybersecurity. Some specific areas of coverage:
· Week 1
o Computer Electronic Components & Concepts; motherboard, Analog to digital, (e.g., CPU & Memory)
o Information Systems, Operating Systems, Servers, Computer Hardware & Virtualization concepts
· Week 2
o Networking Fundamentals 1; 7-layer OSI model, Networking technologies,
o Networking Fundamentals 2; Network appliances and devices like firewalls
· Week 3
o Internet Concepts; architecture of WWW, DNS, HTTP, TCP/IP, Domains, Email, Web Servers
o Database Fundamentals: architecture, SELECT statements, security.
· Week 4
o Encryption Concepts; public and private keys, hashing.
o Introduction to Basic Security Concepts; CIA, physical, logical, management security
This module continues with security technology fundamentals but uses that platform to move the student into the job of helping secure information systems by utilizing information assurance principles for government systems. We will familiarize ourselves with the Federal Information Security Management Act and the National Institutes of Standards and Technology (NIST) guidance on how information systems are to be secured in federal governments space. We will be using the Risk Management Framework (RMF) developed by NIST and in use by all federal government agencies to “wholistically” secure government information systems using the RMF principles and knowing that all systems must protect Confidentiality, Integrity, and Availability or “CIA”. Some of the skills taught in this module:
Part 1
Week 1
· Cyber security terminology: tying in module 1, review internet and network security and how it strictly applies to being a security officer.
· The basics of computer networks; reading network diagrams is essential by using the concepts in module 1, we will explore reading a network diagram with confidence.
Week 2
· Access control protection concepts, e.g., Passwords, tokens, Multi factor authentication, security groups, least privilege
· Cryptography Part 2; concepts such as steganography, data infiltration/exfiltration
· Incident response; evaluating a good program.
Part 2
· Week 3
· Interpreting Security policies; reading is fundamental. Hands on reading Federal agency policies for important guidance, direction, clarity, and compliance.
· Contingency Planning; what’s the plan, Stan? Business Impact Analysis (BIA), Recovery priorities, Technologies such as local backup, distributed backups/cloud
· Week 4
· Introduction to the NIST SP 800-53; your friend from now on… We will go in-depth on the control families and how they are intended to be used to secure a government information system.
· Writing a Systems Security Plan (SSP) the “bedrock” work of an ISSO, we will deconstruct, then reconstruct a security plan for a Major Application (MA) and a General Support System (GSS)
This module is also designed for those who have very little knowledge of computers & technology with no prior experience of cyber security. The step-by-step, scenario-driven teaching approach will enable you to grasp the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills.
This module takes the ISSO training, security controls assessor and all that you know so far and will use that knowledge to evaluate IT systems against the criteria found in the NIST SP 800-53A; this is the assessment companion to the NIST SP 800-53 used by ISSO’s. Due to FISMA, all government IT systems must be evaluated (assessed) and accredited (authorized). Preparing the system for this evaluation is the job of the ISSO. Evaluating the IT system is the job of the security control assessor. This module will leverage the previous module skills development in security plan writing and interpreting agency IT policies. However, this module will be heavy on “relearning” on how to read and write.
Technical skills will only take you so far, knowing how to read guidance and interpret policies is a big part of being an assessor. Writing to that guidance is even bigger. Writing effectively to speak to the controls assessment (via workbooks or workpapers), Security Assessment Reports (SARs), and Accreditation letters can all be a challenge and will “wash out” many a “potential” security professionals. In this module you will learn the most effective ways to deal with most any situation, leverage agency policies/templates/reports, effective interviewing skills (how to eliminate noise in interviews), how to effectively read for evaluation and get to the point, how to request pertinent artifacts (and how to spot fakes), and how to get the most out of your Subject Matter Experts (SMEs). You will then learn the most effective methods of synthesizing the information and making it “make sense” to the reader, quickly and with less effort.
The second part of this module will be used to see how what you learned ties directly into getting a job. We will learn to read job boards and position descriptions to help determine if you are a good fit for a specific job. We will explore the various jobs and titles in this IT security/Information Assurance space. We will work on an effective resume that gets noticed and finally, we will “rebrand” each student; based on their comfort levels and skillsets, into new security professionals.
Our courses are taught by experienced instructors who are experts in their field. Our expertise includes:
· Certified Information Privacy Technologist (CIPT)
· Linux Red Hat Administration
· CompTIA Cloud+ for IT Professionals
· SANS Advanced Security Essentials (Enterprise Defender)
· Certified Wireless Network Administrator (CWNA)
· Computer Hacking Forensic Investigator v8 (CHFI)
· Mobility+ for IT Professionals
· Security Sensor Array Training (Fire Eye)
· OpNet/Riverbed AppResponse Xpert
· Certified Ethical Hacker (CEH) v7
· Certified Information System Security Professional (CISSP)
· Cyber Security Assessment & Management (CSAM)
· Policy Planning for Security Architects
· Information System Security Officer (ISSO)
· Oracle 7 SQL/PL SQL
Enroll in our programs and start your journey towards a rewarding career in cybersecurity.
Our online courses allow you to learn from anywhere, at any time. With personalized instruction and a supportive community, you'll be amazed at how quickly you can learn cybersecurity concepts.
Our team of experienced instructors are passionate about teaching and dedicated to helping you succeed. With one-on-one support and guidance, small class sizes, you'll have everything you need to master the skills you need for a successful career in tech.
Our curriculum is designed to provide hands-on experience with real-world projects. You'll graduate with experience on projects that showcase your skills and demonstrate your ability to work on real-world problems.
We offer a range of career services to help you launch your career in tech. From resume and cover letter reviews to interview preparation, we're here to support you every step of the way.
Our community of students, alumni, and instructors is here to support you throughout your journey. Connect with others who are in the same cohort and work together to collaborate on projects.
We believe that everyone should have access to high-quality tech education. That's why we offer affordable tuition (Starting at $500*) and payment options to make our courses accessible to nearly everyone.
* A LIMITED NUMBER OF SCHOLARSHIPS ARE ALSO AVAILABLE PER CLASS
Networking Made Easy: Get Yourself Connected (Computers Made Easy) By James Bernstein ($15)
*All prices are approximate and from Amazon
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide (NIST 800 Cybersecurity). by Bruce Brown ($40)
RMF ISSO: NIST 800-53 Controls Book 2: NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity). by Bruce Brown ($40)
and
Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career. by Dr. Gerald Auger ($30)
Zoom will be the communication program used for all classes. This will allow for audio, video, document sharing, breakouts, chat, and file uploads.
At Victrics, our programs are designed to help you gain the skills and knowledge needed to succeed in today's fast-paced digital world. Our courses are taught by experienced instructors who are experts in their field. Whether you're just starting out or looking to enhance your skills, Victrics has the right program for you. We offer flexible schedules, affordable tuition, and a supportive learning environment to ensure your success.
Victor Williams (CEH) will be the primary instructor and has continually proven to be an industry leader for high quality service by having certifications and training in the technologies listed below.
We know that our clients have unique needs. Send us a message, and we will get back to you soon.
Mon | 06:30 pm – 09:30 pm | |
Tue | 06:30 pm – 09:30 pm | |
Wed | 06:30 pm – 09:30 pm | |
Thu | 06:30 pm – 09:30 pm | |
Fri | By Appointment | |
Sat | Closed | |
Sun | Closed |
Tuesdays and Thursdays may change due to current circumstances.
Copyright © 2024 Victrics, LLC - All Rights Reserved.
Powered by GoDaddy