Virginia Tech® home

Cybersecurity Traineeship Curriculum

CCI NoVa Node Cybersecurity Traineeship: Curriculum

Cybersecurity is constantly evolving field. A career in cyber requires a commitment to continual professional development and learning to keep up with these changes. Additionally, cybersecurity is a broad discipline with many different approaches, especially in industry.

The curriculum for NoVa Node's Cybersecurity Traineeship is designed to provide a broad set of entry-level technical skills, while cultivating the soft skills required of foundational cyber skills. The curriculum is by no means exhaustive, but it should provide a base upon which a career in cybersecurity can be build.

Data Analytics, Database Design, and SQL

Week 1

  • Introduction to Data
  • Introduction to Data Analytics (Descriptive Analytics, Diagnostic Analytics, Predictive Analytics, Prescriptive Analytics)
  • The importance of Exploratory Data Analytics and Storytelling
  • Data Analytics components
  • Introduction to Database, Database Design
  • MySQL Workbench (Introduction and Installation)
  • Create a connection (local and remote)
  • Data Definition Language (Create, Insert, Alter & Truncate)
  • Select Queries
  • Sorting and Order by Wildcard characters
  • Aggregate Functions
  • Not NULL and NULL keyword and value
  • Sub Query, Union and Distinct
  • Introduction to PL/SQL
  • Function
  • Trigger

Week 2

  • Database Design
  • Case Study – Database
  • Case Study – Database (Continued)
  • Presentation of case study
  • Python Fundamentals
  • Python – Functions, loops, Recursions
  • Lists, Dictionaries and Tuples
  • Files, classes, functions and methods
  • What Is Data Visualization?
  • Trends in Data Visualization—Storytelling
  • Trends in Data Visualization—Interactive Graphics
  • Explore the data visually (Histogram, Boxplots, Scatterplot, Moving average, Clusters, etc.)
  • Devise the Problem, Challenge and/or Questions
  • Visualization using Python

Week 3

  • The Regression Paradigm – Concepts
  • Use Cases and implementation in Python
  • Classification Paradigm – Concepts
  • Use Cases and implementation in Python
  • Optimization Paradigm – Concepts
  • Use Cases and implementation in Python
  • Recommendation Paradigm – Concepts
  • Use Cases and implementation in Python
  • Case Study – Data Analytics

Week 4

  • Data Analytics of log files
  • Introduction of Splunk and setting of labs
  • Getting started with Splunk
  • Basic searching
  • Using fields in searches
  • Search fundamentals
  • Transforming commands
  • Creating reports and dashboards
  • Creating and using lookups
  • Learn the various data onboarding techniques
  • Learn Reporting & Transforming commands in
  • Field Extraction
  • Event types
  • Transaction
  • Workflow action
  • Create Alerts triggered on certain conditions
  • Different Splunk Visualizations
  • Create Reports with search results
  • Create Dashboards with different Charts and other visualizations
  • Set permissions for Reports and Dashboard
  • Create Reports and schedule them using cron schedule
  • Splunk Case Study

Networking & Security

Week 5

  • Basic OSI overview
  • Wireshark introduction
  • Wireshark Installation
  • Wireshark Filters
  • History of Malware
  • How Malware Works
  • Types of Malware
  • Case Studies
  • Intro to OSINT
  • How to: Google Dorking

Week 6

  • Reconnaissance
  • Knowledge bases
  • The Sites of OSINT
  • Network Review
  • Network Ports
  • Protocol and Services
  • Identifying Malware and Malware symptoms
  • Malware Scanning Applications
  • Intro to Vulnerability Scanning
  • Intro to PenTesting
  • Tools for Ethnical Hacking
  • Intro to Kali Linux

AWS Basics

Week 7

  • AWS Cloud concepts
  • Security and compliance within the AWS Cloud
  • Deploying an operating in the AWS Cloud
  • AWS global infrastructure
  • Core AWS services
  • Billing, account management, and pricing models