Certificate in Information Assurance
- Fundamentals of System Security
- Introduction to Computer Forensics
- Incident Response and Computer Forensics
- Ethical Hacking and Countermeasures
- Network Monitoring, Security & Forensics
(not required for certificate)
Click Here to view the Cyber Security Brochure
Fundamentals of System Security
This course introduces the basics of systems security. Emphasis is placed on access controls, networking, auditing, security operations, and malicious code activity. This course is aligned to the Systems Security Certified Practitioner (SSCP) exam.
Certification: ISC2 SCCP Certification.
Text: The Official (ISC)2 Guide to the SSCP CBK, 5th Edition
Incident Response + Computer Forensics
Incident response is a coordinated and structured approach to go from incident detection to resolution. This course builds on Computer Forensics, and focuses on the tools and techniques used in the evaluation and remediation of computer incidents. Emphasis is placed on understanding the practical application of forensics as applied to malware and other information system threats. (CERT-Certified Computer Security Incident Handler)
Certification: CERT-Certified Computer Security Incident Handler
Ethical Hacking and Countermeasures
This course introduces the basics of ethical hacking, and includes practical, hands-on labs designed to teach students how to prepare and defend against intrusions. This course is aligned to the EC-Council Certified Ethical Hacker (CEH) exam.
Certification: EC-Council Certified Ethical Hacker (CEH) exam. (Voucher included in tuition)
Text: CEH Certified Ethical Hacker All-in-one Exam Guide, Third Edition Kindle version
Professional development has been the key building my career. As a cyber-security professional I knew that the Ethical Hacker program at Bucks County Community college offered the training I needed to improve my skill set. All the classes I have taken had skilled instructors, well-designed programs, and good systems for hands-on learning. I passed the Certified Ethical Hacker exam and Bucks was a large part of my success. – Randall C. Cole
Network Monitoring, Security & Forensics
The first of its kind at Bucks Community college, this cyber security course will leverage Elasticsearch, Kibana and other open source network data collection technologies to help the student not only understand what is happening on the network but also how to detect and make actionable decisions on events occurring real time in their environment. This class will include a multitude of hands on labs that will enable the student to visualize the state of the networks they are monitoring and protecting.
This course will focus on the concepts and practical application of Network Security Monitoring (NSM) using open source software to augment commercial products deployed within an organizations network. We will focus on three primary strategies, Collection, Detection and Analysis. Within these strategies we will discuss, plan and implement tools and techniques to build out or augment your security operations.
At the conclusion of this class students should be able to specify, deploy and manage NSM collectors and conduct analysis of collected data to produce actionable security responses to build upon the organization’s overall security posture.
Certification: Wireshark Certified Network Analyst (WCNA)
Concepts discussed in class and during hands on labs will build on the following concepts:
- Introduction to NSM and NSM concepts
- Planning NSM data collection
- Sensors platforms and management using Security Onion/RockNSM
- Session and flow data leveraging Zeek/Suricata
- Analysis of flow data using SiLK/Argus
- Packet data collection and parsing, tools and techniques
- Detection concepts and processes
- Indications of compromise use and application
- Network based IDS (NIDS) using Snort/Suricata
- Zeek analysis
- SIEM introduction using the Elastic Stack or (ELK)
- Visualization of NSM data using ELK
- Honeypots and Honeynet concepts and use
- Threat Intelligence
- NSM Analysis and Process
Advanced Ethical Hacking and Countermeasures
Building on the Ethical Hacking course (WITAC 2121), this course covers advanced penetration testing techniques and defenses. While the focus will be on developing the skill sets of the participants, the course will also focus on the defenses needed to protect the infrastructure from these types of attacks. No textbook required. Instructor will provide materials via slides and other handouts as necessary.
Students are required to purchase the following items prior to first class:
Canakit Raspberry Pi3 Complete Starter Kit, $69.99, https://www.amazon.com/dp/B01C6Q2GSY?PSC=1
UTRONICS IEEE 802.3af Micro USB Active PoE Splitter Power Over Ethernet 48V to 5V 2.4A for Tablets, Dropcam or Rasberry Pi, $9.49,https://www.amazon.com/UTRONICS-802-3af-Splitter-Ethernet-Raspberry/dp/B01MDLUSE7/ref=sr_1_3?s=electronics&ie=UTF8&qid=1492782528&sr=1-3&keywords=raspberry+pi+poe+adapter
Anker USB 3.0 Card Reader 8-in-1 for SDXC, SDHC, SD, MMC, RS-MMC, Micro SDXC, Micro SD Micro SDHC Card, Support UHS-I Cards, 18 Months Warranty, $7.99, https://www.amazon.com/Anker-Reader-RS-MCC-Support-Warranty/dp/B006T9B6R2/ref=sr_1_5?ie=UTF8&qid=1492782667&sr=8-5&keywords=usb+micro+sd+card+reader
WITAC 2124 - (ISC)² OFFICIAL CISSP CERTIFICATION BOOT CAMP WITAC 2124 BOOT CAMP
CISSP Certification Boot Camp is a comprehensive review of Cyber security & industry best practices merged with an award-winning comprehensive exam preparation for the rigorous 3 hour CISSP adaptive exam. Note: This course has been updated to reflect the new May 1 CISSP exam objectives.
Our CISSP Boot Camp represents the culmination of hundreds of hours of instructional design, thousands of hours of exam-focused instruction, and tens of thousands of efficiently and effectively skilled, certified students.
Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best “CISSP Free-Retake Guarantee.”
Official (ISC)² Courseware
(ISC)² CISSP Exam Voucher ($749 Value)
(ISC)² Official Practice Test Questions
CISSP Exam Pass Guarantee & Free Retake
(ISC)² Approved CISSP Exam Review Guide
(ISC)² CISSP Exam Review Sessions
CISSP Exam Delivery Support
CPE/CEU Post Class Package
Upon completion of this course, students will have a working knowledge of all eight domains required to be an effective manager in a cybersecurity environment. These eight domains include:
* Security and Risk Management
* Asset Security
* Security Engineering
* Communication and Network Security
* Identity and Access Management
* Security Assessment and Testing
* Security Operations
* Software Development Security
This class will prepare students to sit for the CISSP exam.
Computer Hacking Forensic Investigator
This course will teach students the required skills to perform a digital forensics investigation. Students will learn the practices of search and seizure, acquisition, preservation, analysis, and reporting of digital evidence. This course will provide theoretical knowledge and hands on experience with commonly used forensics tools in an online lab environment. Topics covered will prepare the student for the Computer Hacking Forensic Investigator (CHFI v10) certification.
Textbook: Computer Hacking Forensics Investigator Version 10 eBook
Labs: EC Council iLabs 6 months access
CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in network security; compliance and operational security; threats and vulnerabilities; application, data and host security; access control and identity management;and cryptography. CompTIA Security+ provides the knowledge of security concepts, tools and procedures to react to security incidents. Prerequisite: Basic computer and networking knowledge including file management in a Windows environment.
This course will prepare you to pass the current CompTIA Security+ SY0-601 certification exam. After taking this course, you will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.
Tuition $895 (test voucher included), Text: CompTIA Security+ Study Guide: Exam SY0-601 8th Edition, ISBN# 9781119736257
Certification Test: SY0-601 for CompTIA Security+ Certification
Certification Information at www.comptia.org
CPENT - Certified Penetration Testing Professional
The CPENT training program is designed to teach security professionals the advanced uses of the available methodologies, tools, and techniques required to perform comprehensive information security tests. Security professionals will learn how to design, secure, and test networks to protect their organizations from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques, this class helps security professionals perform the intensive assessments required to effectively identify and mitigate risks to the security of their infrastructure. As students learn to identify the security problems they also learn how to avoid and eliminate them, as the class provides complete coverage of analysis and network security-testing topics.
The (CPENT) program teaches students how to perform an effective penetration test in an enterprise network environment. It covers the processes involved in attacking, exploiting, evading, and defending. Students will aquire skills by learning how to pen test IoT systems, OT systems, how to write exploits, how to build original tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Certified Information Systems Auditor
The student will develop the knowledge and skills in the area of audit, control, assurance, and security. The course will prepare a student for advancement and expand the scope of their responsibilities. Because of several legal and regular requirements, such as HIPAA, PCI-DSS, SOX, GLBA, FDA, FERCN/NERC, GDPR, CCPA, PCI-QSA to improve a students skills and knowledge in Information Systems Auditing.
Textbook: CISA Certified Information Systems Auditor All-in-One Exam Guide, 4th Edition ISBN 9781260458800