CyberSecurity Micro-Credentials

Admissions Open

Managing cybersecurity risk amid pandemic-driven digitization shifts is top of mind for most Ontario organizations and was featured recently featured in the Ottawa Business Journal. Willis College has a solution to this problem ? an exciting new set of micro-credentials to enhance the cybersecurity skills of IT professionals that have been working in the field for over three years.
Compare

Additional information

Province

Manitoba, Ontario

Colleges

Willis College

Program Categories

IT

Program Duration
Program Intakes
Class Type

Virtual

Funding

Manitoba Student Aid, Scholarship, Bursary, Line Of Credit

Upgrade Your CyberSecurity Skills One Week at a TimeManaging cybersecurity risk amid pandemic-driven digitization shifts is top of mind for most Ontario organizations and was featured recently featured in the Ottawa Business Journal. Willis College has a solution to this problem ? an exciting new set of micro-credentials to enhance the cybersecurity skills of IT professionals that have been working in the field for over three years. These programs will: Ensure organizations are being proactive against cybersecurity threats instead of being in an expensive reactionary position after a breach.Enhance the skills of IT employees already working within an organization, or give new skills to IT professionals looking for work or underemployed.Offer professional skills development to IT employees.Allow for online,?instructor-led,?interactive training in short time frames.?Click here for something to share with your leadership teamOur Micro-CredentialsEach of the following micro-credentials is one week, 40 hours in length, and can be taken independently of each other: The dates listed below are our next intake dates for each programRed Teaming 1: Penetration Testing Fundamentals ? May 9th, 2022This course will provide students with knowledge and hands on skills in ethical hacking, vulnerability scanning, red teaming and coding for cyber professionals. With exposure to various live lab attack scenarios, students will gain a solid understanding of hackers? preferred attack vectors, techniques, methodologies and tools.Red Teaming 2: Ethical Hacking Strategies -May 16th, 2022This course is intended to build on Red Teaming 1 and will provide a deeper exploration of the coding and scripting techniques to build more complex ethical hacking strategies. Concepts such as scanner scripting, information gathering, exploitation scripting and post-exploitation scripting are taught.Blue Teaming 1: Cyber Operations ? May 23rd, 2022Trained within an operational style Security Operations Centre (SOC) lab environment, students in this course will develop skills to perform network reconnaissance, threat identification, threat mitigation, vulnerability analysis, security incidents investigation, security issues monitoring and cyber security threat analysis.Blue Teaming 2: Threat Intelligence Analysis ? May 30th, 2022As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the cybersecurity industry is vital for most organizations. The behavioural analytics skills covered in this course will provide students with security skills to identify and combat malware, advanced persistent threats (APTs) across a broad attack surface.?Blue Teaming 3: Threat Hunting and Incident Response Analysis ? June 6th, 2022Practices to proactively search for cyber threats that are lurking undetected in a network have become essential to organizations that invest in staying ahead of the curve. Cyber threat hunting digs deep to find malicious actors that have slipped past an organization?s security defenses. Methods such as threat intelligence, threat hunting and cyber incident response are essential components of the modern cyber defense strategy.For more information, and to secure your spot today, please email: MicroCredentials@WillisCollege.comdocument.getElementById(“eeb-410933-854641”).innerHTML = eval(decodeURIComponent(“%27%4d%69%63%72%6f%43%72%65%64%65%6e%74%69%61%6c%73%40%57%69%6c%6c%69%73%43%6f%6c%6c%65%67%65%2e%63%6f%6d%27”))*protected email*

Main Menu

Get in touch with an expert

Full Name
Email *
Phone *
Message

WhatsApp Icon