Cyber Security

The Year Up Cyber Security training program focuses on developing a comprehensive skill set in computer systems, systems administration, technical support, information security fundamentals, and methodologies.

Explore below the roles that the graduates of this program are ready for and the competencies they have been trained in.

Role pathways for graduates of the Cyber Security program

incident reporting, job board, 2

Incident Monitoring & Response

  • Monitoring network traffic for organizations.
  • Creating tickets for security incidents and responding to or escalating these incidents as needed.
  • Playing a critical role in the initial detection and handling of security breaches.
soc analyst, job board, 2

Security Operations Center (SOC) Analyst

  • Assisting organizations in securing themselves against cyber attacks.
  • Communicating, executing, and monitoring cyber security protocols effectively.
  • Serving as a key part of the team that oversees the security posture of an organization.
penetration testing, job board, 2

Penetration Testing

  • Conducting security tests on networks, web-based applications, and computer systems.
  • Designing tests and tools aimed at breaching security to identify vulnerabilities.
  • Helping organizations understand and fortify their defenses against potential cyber threats.
computer forensic, job board

Computer & Digital Forensics Analyst

  • Handling tasks related to computer hard drives and storage devices.
  • Using various software to recover information destroyed on media devices.
  • Preparing reports post software analysis to contribute to investigations or security assessments.

Summary of the key competencies developed during the one-year training

Computer Architecture & Systems Fundamentals
  • Computer Systems: Proficiency in operating systems (Windows, Linux, Mac), servers, and cloud infrastructure.
  • Computer Architecture: Understanding of basic computer and server hardware configurations.
  • Computer Networking: Knowledge of basic wired and wireless network protocols, address schemes, and configurations.
Technical Support
  • Technical Documentation: Creating documentation for basic procedures and tool usage for non-technical business users.
  • Ticketing System Navigation: Using common ticketing/incidence management systems (e.g., Zendesk, Remedy).
Computer Systems Administration
  • File Systems Management: Skills in managing file systems for file path tracking, corruption detection, and basic file recovery troubleshooting.
  • Operating Systems Management: Ability to use administrative tools in common operating systems like Windows & Linux for installation, updates, and upgrades.
  • Device Management: Competence in using OS utility software for backup, restore, imaging, partitioning, defragmentation, compression, encryption, and managing devices, processes, memory, and user accounts.
  • Error & Security Monitoring: Capability to monitor diagnostics, identify, and report basic errors and security issues.
  • Computer Network Configuration: Skills in setting up and troubleshooting basic computer networks, including LAN and WLAN.
  • Active Directory Navigation: Ability to manage user profiles, accounts, workgroups, and domains in common operating systems.
Information Security Fundamentals
  • Information Security: Understanding principles such as confidentiality, integrity, availability, governance, risk management, and compliance.
  • Security Architecture: Communicating requirements for an integrated security framework.
  • Digital Forensics: Understanding branches of digital forensics and related laws and governance.
  • Cloud Security: Navigating security configurations in cloud systems and understanding security automation techniques and tools.
Information Security Methodologies
  • Network Monitoring Tools Navigation: Using network monitoring tools for service risk management.
  • Threat Identification: Identifying and reporting basic threats to network services, devices, traffic, and data.
  • Penetration Testing: Testing networks for vulnerabilities using standard testing methods.
  • Scripting: Using Python or shell scripts in Linux to automate tasks.
  • Incident Management: Monitoring, detecting, and triaging infrastructure and security incidents, and executing defensive measures.
  • Data Access: Executing simple queries in SQL.

Ready to find your next hire?