即將到來

HK$29,000 以上

Full-Time Cybersecurity Immersive

12 weeks, Full-Time

課程概要

The Cybersecurity Bootcamp at Xccelerate, powered by Cybint is an accelerated cybersecurity training program designed to successfully prepare people with little or no background in IT for entry level jobs in cybersecurity, a highly in-demand and lucrative career path.

This Full-Time Cybersecurity Immersive Bootcamp is designed for students with a burning desire to understand the cybersecurity landscape and how to proactively protect organizations and individuals from digital threats. In this 12-week immersive bootcamp, you will learn the building blocks and tools that will empower you to tackle, build and deploy Cybersecurity initiatives. You will develop the practical skills necessary to work in a job requiring a thorough up-to-date understanding of cybersecurity best practices to prevent and mitigate security breaches.

The classroom and learning environment is designed to be practical and allow students to quickly apply their new skills to real world problems and work with real datasets. While many PhDs spend much of their time engulfed in theory and self-study practitioners struggling between time and subject management, your 500 hours with Xccelerate will be spent on effective practical learning to build a career in one of the most exciting fields in technology: Cybersecurity.

...

專注參與核心知識

在校園或直播中上課。無論哪種方式,我們的課程都是為了讓您專注。

線上辦公時間

導師將在指定日期進行直播,以確保您在課程進度及作業方面獲得更多幫助。

隨時訪問課程內容

在課程期間,您可以無限次重溫課程內容。

職業結果

91%

畢業生就業率

90%

滿意率 (switch-up)

學習模式比較

混合模式

HK$ 49,000

遠程學習

HK$ 29,000

課堂

可選擇線上上課

可選擇回到校舍上課

校園內Hotdesk

以行業為中心的項目

個人

小組

課程內容

課程期間無限次重溫

課堂錄影

課程期間24小時無限次重溫


申請流程

1

Fill out the application form

2

Tell us your unique story


課程計劃

單元 1

Prework

Basics of Computer and Device Hardware, Software, Operating Systems and Processes in Windows and Linux

Nerking Basics nd the OSI Model

單元 2

Bootcamp Introduction

Overview of Bootcamp and Cybersecurity Industry

Cybersecurity Career Paths

Prework Content Review

單元 3

Network Administration

Network Configuration - LAN, WAN

Segmentations, VLANs and Subnetting

Network Mapping Tools

Troubleshooting and Monitoring Networks

Network Devices - Switches, Routers

Telecommunications

System Administration

單元 4

Introduction to Cybersecurity

NIST Framework

Malware Types

Social Engineering

Vulnerabilities, Risks, and Exploits

Famous Cyber-Attacks

單元 5

Network and Application Security

Cryptography - Symmetric vs Asymmetric Keys

Encryption/Decryption, Hash Functions

Security Architecture

Security Tools - Firewalls, Antivirus, IDS/IPS, SIEM

Access Control Methods, Multi-factor Authentication, Authentication Protocols

Honeypots and Cyber Traps

單元 6

Incident Handling

Detection and Analysis of Cyber-Attacks - DDos/Dos, Brute-Force

OSWAP Top 10 Attacks - SQL Injection, Cross-Site Scripting

Group and Individual Incident Report Writing

單元 7

Forensics

Computer Memory Forensics, Memory Dump Analysis

FTK Imager, Autopsy, Redline and RAM capturing

Digital Evidence Acquisition Methodologies

Registry Forensics

Windows Timeline Analysis and Data Recovery

Network Forensics, Anti-Forensics and Steganography

單元 8

Malware Analysis

Dynamic Malware Analysis, Reverse Engineering and Malware Obfuscation

Fileless Malware Analysis

Containment, Eradication and Recovery Malware Stages

Android APK Analysis

單元 9

Ethical Hacking and Incident Response

Ethical Hacking Processes and Methodologies

Network Hacking, Reconnaissance, Google Hacking and Locating Attack Vecctors

Exploutation Techniques

Web Application Hacking, OWASP Top 10 - XSS, SQL Injection, Manual and Automated Attacks

Post Incident Activity

單元 10

Secure Design Principles

Trend Analysis

Artificial Intelligence in Cybersecurity

Zero-Trust Policy

Best Detection Methodologies

Incident Impact Mitigation

單元 11

Risk Management

Risk Management Processes

Analyzing, Prioritizing, Evaluating and Monitoring Severity of Internal and External Risks

Risk Management Policies, Procedures, Standards, and Guidelines

Security Models

單元 12

Threat Intelligence

Threat Intelligence Cycle Methodology and Industry Implementation

Google Hacking - Operators, Finding Sensitive Data, Directory Listing, Devices and Hardware

Dark Web and Dark Market Investigation

Online Anonymity using Metadata, Google Cache, VPN and Tor

Trend Analysis, Basic Excel Data Analysis

Industrial Tool Practice in Real Environments

單元 13

Final Scenarios and Interview Prep

Real-Life Scenarios of Cybersecurity Incidents

Final Exam

Group Project Presentations

Technical and Soft-Skill Interview Prep


導師和支援團隊

Emil Chan

FinTech Committee Chairman


地點

天后威非路道18號萬國寶通中心3樓 炮台山地鐵站: A出口步行5分鐘天后地鐵站: A2出口步行5分鐘



課程時間表

8月 23 - 10月 4, 2021

Mon-Fri, 9am-6pm

已停止接受報名

100%

已報讀

上課日期或時間不適合您?


預約一個諮詢時段

不確定哪個課程適合你的職業目標?預約一個免費的45分鐘諮詢時段,我們專業的職業支援團隊會為你提供意見。

預約一個諮詢時段

不確定哪個課程適合你的職業目標?預約一個免費的45分鐘諮詢時段,我們專業的職業支援團隊會為你提供意見。

即將到來

教學語言:

混合模式

參加校園課程或通過在線直播觀看任何課程

HK$ 49,000

遠程學習

通過直播隨時隨地參與課堂

HK$ 29,000

預約職業諮詢

培育未來人才 加速創新科技