Learn

Cybersecurity Portfolio Project

Join our new course on building a portfolio project in cybersecurity and learn the fundamentals of identifying and preventing cyber threats while gaining hands-on experience. Our expert instructors will guide you in building a project to showcase to potential employers and clients. Don't wait, join us today and become a cybersecurity expert!
I'm InterestedCall Now: 206-944-3969
Your Instructor
Drake Caruso
Cybersecurity professional with experience in defensive and offensive cyber operations. He is holds various certifications such as CISSP, Pentest + and Security + and he holds a Masters in Cybersecurity and Information Assurance from WGU.
Course Overview

Join our new course on building a portfolio project in cybersecurity and learn the fundamentals of identifying and preventing cyber threats while gaining hands-on experience. Our expert instructors will guide you in building a project to showcase to potential employers and clients. Don't wait, join us today and become a cybersecurity expert!

What you’ll learn

Course Objectives

  • Provide students with an in-depth understanding of the concepts learned in Cybersecurity
  • Offer a project-based learning environment, facilitating the practical application of theoretical knowledge in a real-world context.
  • Enable students to complete an advanced application project suitable for display in their professional portfolios.
  • Facilitate students' learning under the mentorship of an experienced Data Analyst, ensuring guidance and support throughout the course.

Course Prerequisites

  • Completion of a course in cybersecurity will provide a fundamental understanding of the project.
  • Prior knowledge and skills in Cybersecurity, specifically in certain areas.
  • College and university students studying cybersecurity who are interested in a portfolio project.

What does this course look like?

Who is it for?

Course Syllabus

Course Program Stages
Duration:
4 weeks (20 hours per week)
Total Hours:
80 hours
Week
Stage
1
-
3 Hours
Planning and scoping

This stage involves defining the scope and objectives of the project, identifying the assets that need to be protected, and assessing the potential risks and threats.

Week
Stage
2
-
3 Hours
Risk assessment and analysis

In this stage, the project team conducts a comprehensive risk assessment and analysis to identify vulnerabilities, threats, and potential impacts. This information is used to develop a risk management plan.

Week
Stage
3
-
18 Hours
Design

This stage involves designing a security solution tailored to the organization's needs. The team considers the most effective security measures, unique requirements, and integration into existing systems. Thorough testing is conducted to ensure the new measures are effective without disruption. This stage requires careful planning and collaboration to minimize risks and vulnerabilities.

Week
Stage
4
-
40 Hours
Implementation

This is where the solution is deployed in the IT infrastructure. How will the team go about actually deploying the solution? This focuses on the following vendor installation guides, configurations etc.

Week
Stage
5
-
16 Hours
Testing

How will the team go about testing the solution for effectiveness? Will there be a penetration test on the solution or some sort of security assessment? This could involve the team testing an IDS system's alerts and signatures by attempting system attacks on a network or host basis. The system alerts will then be tested on a false positive or false negative basis. After testing, the customer will need to give its overall approval of the final report to deem the project successfully completed.

View the full program syllabus, click for access!

Start Date
End Date
Enrollment Status
Open
Location
Online

Cohort Schedule

Start Date
End Date
Enrollment Status
Location
Open
Online
Start Date
End Date
Enrollment Status
Open
Location
Online

Cohort Time Schedule

Mon
Tue
Wed
Thu
Fri
Sat
Sun

Cohort Schedule

Course
Start Date
End Date
Enrollment Status
Coming soon
Open
Start Date
End Date
Enrollment Status
Open
Location
Online

Not sure about

Cybersecurity Portfolio Project

Here’s what our instructor has to say

We now have Classroom* and Remote courses in WA state.
*Veterans can only attend Classroom/In-person Classes
Scholarship
We offer scholarships based on eligibility upon receiving an application. Apply For Consideration

Want to learn full stack web development but don’t know where to start? Consider signing up to learn full stack with Python.

Python is easy to learn and great for back-end coding. The popularity of Python as a programming language is on the upsurge, thanks to its readability and ability to do more with less coding. If you are looking for a course that offers Python web development for beginners, look no further. Our online course allows you to learn full stack web development with Python at your own pace from the comfort of your home.

Vetrans
computer
As part of our full stack development course, you’ll also learn JavaScript and a suite of frameworks and tools that work with Java.

Our Java full stack developer course is designed to kickstart your programming career as a Java full stack developer. We regularly update our Java full stack developer course to make sure it is relevant and useful for our students. If you want to join our full stack JavaScript course, but aren’t sure if you have time to attend the classes, don’t worry. We schedule our classes on weekends and weekday evenings. Even if you work full-time, you can still attend our classes.

The opportunity is yours. We help you take it.
1
Submit your application and receive emails
2
Take skillspire coding skills assessment
3
Receive offers to join for the portfolio project
Start your application today
Apply
The opportunity is yours. We help you take it.
1
Submit Your Application
2
We’ll go over different class and payment options
3
You’ll start learning skills for a new career
Start your application today
Apply
Frequently asked questions
Do I need programming experience for your courses?

No, a basic level of computer literacy and a motivation to learn is all you need for most of our courses.

Who should take your courses?

The course is designed for diverse backgrounds; If programming or tech is a career track you really want to pursue, you can sign-up for our courses whether you are software engineer, product/program manager, analyst, researcher, consultant, student etc.

How much time do I need to spend studying outside of the classroom?

It can vary depending on your unique background. However, it usually takes 1-15 hours/week outside of the classroom for homework and study time.

Will I be given a certificate after the completion of the course?

Yes, you will be given a certificate of completion for this course after you pass your final exam.

Do you accept GI Bill®?

Yes, please refer to our Veterans page for more details.

Still Have Questions? Let's talk!

Book a call below and we can answer your questions and gide you through your opportunities.