LCC Cybersecurity
Bootcamp POWERED BY CYBINT

Accelerated LCC International University Cybersecurity Career Part Time Bootcamp powered by Cybint covers the hands-on and practical skills necessary for Bootcampers to land high-paying careers in cybersecurity, one of the world’s fastest growing industries.


SPECIAL LAUNCH PRICE - save 2,000 EUR!
Limited time offer - 6000 EUR 4000 EUR

  • Course combines facilitator-led and self-study learning
  • No prior knowledge or experience required
  • Part-time course: 20 hours per week commitment
  • Duration: 6 months (March 15th - August 27th)
  • Online registration by March 1st - spots are filling up fast!




.

LCC Cybersecurity Bootcamp Powered by Cybint


The LCC International University - the first higher education institution in Europe that became Cybint Certified Center. Cybersecurity Bootcamp powered by Cybint is an accelerated cybersecurity training program designed to successfully prepare people with little or no background in IT for entry level jobs in cybersecurity, a highly in-demand and lucrative career path. The LCC Cybersecurity Bootcamp in partnership with Cybint is for anyone interested in becoming a cybersecurity professional. No prior knowledge or experience required.    

Why Cybersecurity?


Cybersecurity is the fastest growing market in technology with 30x growth over the last decade. Not only is it a hot topic, but the field has had 0% unemployment for nearly a decade. With plentiful opportunities and competitive compensation, the only thing standing in your way of a lucrative, future-proof career is skill.

20 hours per week

Guided synchronous flexible learning with instant feedback

Real-world simulations

Get experience learning from real events

Dedicated facilitator

Assisted by international world class professors

High-paying careers

One of the fastest growing markets in technology

Within a 6 month period and 20 hours per week commitment:

Bootcamp sessions are twice per week for four hours with the Boot Camp Facilitator. Between sessions, with clear goals established for the group by the Facilitator, students will complete tasks using the Cybint platform. Student tasks will require daily individual online work (approximately 2-3 hours).

8 hours of instruction with Facilitator, divided into two 4-hour sessions.    

12 additional hours of individual online work  



Cybint is a global cyber education company with a commitment to reskilling the workforce and upskilling the industry in cybersecurity. With innovative and leading-edge education and training solutions, Cybint tackles cybersecurity’s two greatest threats: the talent shortage and the skills gap.

The Cybint team is comprised of cyber experts, industry professionals, and educators united under the vision of creating a safer digital world through education, training, and collaboration.


“”

Dr. Teo is a 2020 Fulbright Faculty Scholar hosted by LCC International University in Klaipėda, Lithuania. He will be teaching and promoting cybersecurity, and engaging in cybersecurity initiatives.


He was appointed Professor of Cybersecurity and Chair of the Department at Bluefield College in 2017. Prior to Bluefield College, he was Professor of Cybersecurity at Montreat College from August 2004 to Spring 2017. As lead faculty, he created, designed and launched the college’s Bachelor of Science degree in Cybersecurity, a first among private colleges and universities in North Carolina. Under Dr. Teo's leadership and vision, the institution became the first CCCU college/university to receive the coveted National Security Agency (NSA)/Department of Homeland Security (DHS) designation as a National Center of Academic Excellence in Cyber Defense (NSA CAE CD).

a photo of person or place for the testimony

Jeff Teo, Ph.D.
Professor

Which Cybersecurity Roles Can I Get?

Common Job Titles:

Cyber Defense Forensic Analyst, Digital Forensics Analyst, Cyber Crime Analyst.

Top Skills Requested:

Computer forensics, threat analysis, network defense, system administration, encryption.

 

Common Job Titles:

Cybersecurity Analyst, SOC Analyst, Info Security Analyst, Network Defense Technician.

Top Skills Requested:

Network defense, vulnerabilities assessment, data management, info. assurance, incident management.


Common Job Titles:

Incident Response Analyst, Intrusion Analyst, Security Monitoring Analyst, Computer Crime Investigator.

Top Skills Requested:

Incident management, network defense, information systems, digital forensics, threat analysis.


Common Job Titles:

Network Systems and Data Communications Analyst, IT Specialist, Network Analyst, LAN/WAN Admin.

Top Skills Requested:

Network management, information technology assessment, operating systems, system administration.


Common Job Titles:

Cyber Defense Infrastructure Support Specialist, Intrusion Detection System Admin, Network Security Specialist.

Top Skills Requested:

Network defense, information systems, incident management, network security, encryption.


Time & location


Fit your schedule

The Bootcamp sessions take place twice a week, for 4 hours each day. Between these sessions, the facilitator will establish clear goals for the group, which students will complete using Cybint’s platform.  

Location

Courses are held online where you will be immersed in an international English speaking atmosphere. 

Get Started

Registration Information


To apply for the program you must complete an online registration form by March 1st.


  • Payment: The total price for the 6 months program is 6.000 Eur.
  • Exclusive: Special launch price for the first group - 4.000 Eur. 
    Payment can be made online or via bank transfer.
  • Refunds:
    First 2 days of the program (Mar 15-16) - we will refund 100%
    Next 2 days of the program (Mar 17-18) - we will refund 50%
    The fifth day of the program (Mar 19) - we will refund 25%
    From March 20 - no refund available.
Get Started

97%

Employment rate

Career-ready

Skills

Affordable

& accelerated

Program Schedule

  • Introduction to the Bootcamp
  • Overview of the Cybersecurity Landscape and Industry
  • Basics of Computer and Device Hardware, Software, Operating Systems and Processes
  • Basics of Networking Traffic, Hardware Components and Topology
  • Network Communication Principles and Methods
  • Network and Routing Protocols / Services
  • Packet Level Traffic Analysis
  • Hands-on Operation of a Computer Network and Equipment, Monitoring and Analyzing Network Traffic Flow, Patterns and Performance
  • Hands-on Creation and Analysis of Critical Network Servers.
  • Hands-on Creation and Analysis of Telnet, Web, Data and Active Directory Servers
  • Hands-on Analysis of Network Topologies, Network Mapping and OS Fingerprinting
  • Telecommunication Concepts and Range
  • System and Network Admin Concepts, Management Principles and Controls
  • Hands-on Creation and Use of Virtual Machines and Bootable USB OS
  • Overview of Threats, Classes, Attackers, Tactics, and Application Security Risks (OWASP)
  • Hands-on Communications Security through Encrypting and Decrypting Data and Medias
  • Hands-on Backup and Recovery of Data, Devices and Servers
  • Network Security Principles, Methods, Protocols, Components and Architectures
  • Hands-on Assessment of Access Controls and Hardening Techniques to Ensure a Network’s Security
  • Hands-on Configuration and Utilization of a Firewall (on Windows, Linux and Hardware Firewall)
  • Hands-on Configuration and Utilization of a Network/Host Intrusion Detection/ Prevention System to Alert and Prevent Malicious Activity on a Network
  • Hands-on Configuration and Utilization of a Security Information and Event Management System to Correlate, Research, Analyze Logs and Provide Timely Detection of Misuse, Threats and Malicious Activity on the Network
  • Hands-on Malware Detection, Analysis, Isolation and Removal
  • Cyber-Forensic Investigation Methodologies, Mindset, Tools
  • Hands-on Forensics Investigation: Logs, System Files, Media, Memory Dump and Traffic Monitoring and Analysis
  • Overview of Network Vulnerabilities, Associated Attacks; Ethical Hacking Methodologies, Stages, Principles, Tools and Techniques
  • Hands-on Conducting of Vulnerability and Compliance Scanning; and Correction Recommendation
  • Hands-on Performing Incident Response, Damage Assessment, Incident Triage, Tracking and Reporting
  • Full Day Scenarios: Hands-on Protecting a Network from a Range of Cyber-Attacks (DDoS, SQL Injection, XSS, Ransomware, MiTM, ARP Poisoning, etc.)
  • Analysis of System Security and Organizational Posture Trends
  • Analysis of Cyber-Defense Trends and Staying at the Cutting Edge of the Industry
  • Performing of Security Design and Architecture Evaluation and Ensuing Recommendation
  • Hands-on Process of the Whole Chain of Custody for Handling Digital Evidence
  • Hands-on Performing of Static and Dynamic Analysis of Drive Images and other Data Sources, Recovery and Mitigation/Remediation of an Enterprise System
  • Risk and Security Management Processes and Security Models
  • Cybersecurity and Privacy Principles
  • Advising on Disaster Recovery, Contingency and Continuity
  • Summary and Presentation by Bootcampers
  • Technical and Soft-Skill Preparation of a Job Interview
  • Final Hands-on Scenario

Interested? Leave your contact details to find out more about the program!