AF CYBER ACADEMY

AF CYBER ACADEMYAF CYBER ACADEMYAF CYBER ACADEMY
  • Home
  • 2025 Schedule
  • Registration
  • Contact Us
  • AF Cyber Swag Competition
  • More
    • Home
    • 2025 Schedule
    • Registration
    • Contact Us
    • AF Cyber Swag Competition

AF CYBER ACADEMY

AF CYBER ACADEMYAF CYBER ACADEMYAF CYBER ACADEMY
  • Home
  • 2025 Schedule
  • Registration
  • Contact Us
  • AF Cyber Swag Competition

REGISTER FOR COURSES BELOW

Before you register:

Our courses are designed to advance participants in real-world skill acquisition. It is imperative that registrants have the requisite background, experience, and system hardware to successfully enter and complete the courses. Click each course below to see what is required before you register.

WHAT EXPERIENCE AND TOOLS DO I NEED FOR EACH CLASS?

Red Team Pentesting

Blue Team Threat Hunting

Blue Team Threat Hunting

   2 yrs enterprise IT experience, including the following skills:

· Networking Fundamentals

· Windows Fundamentals

· Experience with Active Directory

· Experience with Bash and PowerShell

· Experience with using Python Tools

· Experience with Kali Linux is preferable but not required

Experience may typically include:

  1. Networking Fundamentals
    • Under

   2 yrs enterprise IT experience, including the following skills:

· Networking Fundamentals

· Windows Fundamentals

· Experience with Active Directory

· Experience with Bash and PowerShell

· Experience with using Python Tools

· Experience with Kali Linux is preferable but not required

Experience may typically include:

  1. Networking Fundamentals
    • Understanding of OSI and TCP/IP       models
    • Knowledge of IP addressing and       subnetting
    • Familiarity with network protocols       (e.g., HTTP, HTTPS, FTP, DNS, DHCP)
    • Understanding of network topologies       and architectures (e.g., LAN, WAN, VLAN)

  1. Network Security
    • Understanding of firewalls, VPNs,       and intrusion detection/prevention systems (IDS/IPS)
    • Knowledge of common network attacks       (e.g., DDoS, man-in-the-middle, phishing)
    • Familiarity with security protocols       (e.g., SSL/TLS, IPsec)

  1. Network Services
    • Knowledge of DNS, DHCP, and       directory services (e.g., Active Directory)
    • Understanding of email protocols       (e.g., SMTP, IMAP, POP3)
    • Familiarity with web services and       APIs

  1. Not required by beneficial Network Configuration      and Management
    • Understanding of network management       protocols (e.g., SNMP, NetFlow)
    • Familiarity with network monitoring       and troubleshooting techniques

Tools

  1. Security Tools
    • Wireshark for packet analysis
    • Nmap for network scanning
    • Metasploit for penetration testing

  1. General Networking Tools
    • ipconfig/ifconfig for network       interface configuration
    • ping and traceroute for connectivity       testing
    • nslookup and dig for DNS queries

Blue Team Threat Hunting

Blue Team Threat Hunting

Blue Team Threat Hunting

2 yrs enterprise IT experience, including the following skills:

· Networking Fundamentals

· Windows Fundamentals

· Experience with Active Directory

· Experience with Bash and PowerShell

· Experience with using Python Tools

· Experience with Kali Linux is preferable but not required

Experience may typically include:

  1. Networking Fundamentals
    • Understa

2 yrs enterprise IT experience, including the following skills:

· Networking Fundamentals

· Windows Fundamentals

· Experience with Active Directory

· Experience with Bash and PowerShell

· Experience with using Python Tools

· Experience with Kali Linux is preferable but not required

Experience may typically include:

  1. Networking Fundamentals
    • Understanding of OSI and TCP/IP       models
    • Knowledge of IP addressing and       subnetting
    • Familiarity with network protocols       (e.g., HTTP, HTTPS, FTP, DNS, DHCP)
    • Understanding of network topologies       and architectures (e.g., LAN, WAN, VLAN)

  1. Network Security
    • Understanding of firewalls, VPNs,       and intrusion detection/prevention systems (IDS/IPS)
    • Knowledge of common network attacks       (e.g., DDoS, man-in-the-middle, phishing)
    • Familiarity with security protocols       (e.g., SSL/TLS, IPsec)

  1. Network Services
    • Knowledge of DNS, DHCP, and       directory services (e.g., Active Directory)
    • Understanding of email protocols       (e.g., SMTP, IMAP, POP3)
    • Familiarity with web services and       APIs

  1. Not required by beneficial Network Configuration      and Management
    • Understanding of network management       protocols (e.g., SNMP, NetFlow)
    • Familiarity with network monitoring       and troubleshooting techniques

Tools

  1. Security Tools
    • Wireshark for packet analysis
    • Nmap for network scanning
    • Metasploit for penetration testing

  1. General Networking Tools
    • ipconfig/ifconfig for network       interface configuration
    • ping and traceroute for connectivity       testing
    • nslookup and dig for DNS queries

IR and Digital Forensics

IR and Digital Forensics

IR and Digital Forensics

  4 yrs enterprise IT experience, including the following skills:

· Networking Fundamentals

· Windows Fundamentals

· Experience with Active Directory

· Experience with Bash and PowerShell

Experience may typically include:

  1. Networking Fundamentals
    • Understanding of OSI and TCP/IP       models
    • Knowledge of IP addressing and       subnetting
    • Familiarit

  4 yrs enterprise IT experience, including the following skills:

· Networking Fundamentals

· Windows Fundamentals

· Experience with Active Directory

· Experience with Bash and PowerShell

Experience may typically include:

  1. Networking Fundamentals
    • Understanding of OSI and TCP/IP       models
    • Knowledge of IP addressing and       subnetting
    • Familiarity with network protocols       (e.g., HTTP, HTTPS, FTP, DNS, DHCP)
    • Understanding of network topologies       and architectures (e.g., LAN, WAN, VLAN)

  1. Network Security
    • Understanding of firewalls, VPNs,       and intrusion detection/prevention systems (IDS/IPS)
    • Knowledge of common network attacks       (e.g., DDoS, man-in-the-middle, phishing)
    • Familiarity with security protocols       (e.g., SSL/TLS, IPsec)

  1. Network Services
    • Knowledge of DNS, DHCP, and       directory services (e.g., Active Directory)
    • Understanding of email protocols       (e.g., SMTP, IMAP, POP3)
    • Familiarity with web services and       APIs

  1. Not required by beneficial Network Configuration      and Management
    • Understanding of network management       protocols (e.g., SNMP, NetFlow)
    • Familiarity with network monitoring       and troubleshooting techniques

Tools

  1. Security Tools
    • Wireshark for packet analysis
    • Nmap for network scanning
    • Metasploit for penetration testing

  1. General Networking Tools
    • ipconfig/ifconfig for network       interface configuration
    • ping and traceroute for connectivity       testing
    • nslookup and dig for DNS queries

Auditing and Compliance

IR and Digital Forensics

IR and Digital Forensics

  5 yrs IT experience including:

· 2 yrs leadership experience

· 2 yrs cybersecurity experience

· Experience in formal written and oral communications (e.g. interacting with a board, legal team).

Experience may typically include:

1. Basic Understanding of Information Technology (IT) Concepts

  • Computer Systems and Networks: Knowledge of how      

  5 yrs IT experience including:

· 2 yrs leadership experience

· 2 yrs cybersecurity experience

· Experience in formal written and oral communications (e.g. interacting with a board, legal team).

Experience may typically include:

1. Basic Understanding of Information Technology (IT) Concepts

  • Computer Systems and Networks: Knowledge of how      computer systems, servers, and networking devices work, including      understanding protocols (e.g., TCP/IP), network topologies, and services      (DNS, HTTP, etc.).
  • Operating Systems: Familiarity with common operating      systems (Windows, Linux, macOS), as well as their security features.

2. Foundational Cybersecurity Knowledge

  • Basic Cybersecurity Principles: An understanding of      core concepts like confidentiality, integrity, and availability (CIA      triad).
  • Common Threats and Vulnerabilities: Knowledge of      various types of cyberattacks (e.g., phishing, malware, DDoS) and      vulnerabilities (e.g., buffer overflows, misconfigurations).
  • Security Technologies: Familiarity with firewalls,      encryption, intrusion detection/prevention systems, and antivirus      solutions.

3. Basic Risk Management Concepts

  • Risk Assessment and Mitigation: Understanding the      basic concepts of risk identification, assessment, and management (e.g.,      risk matrix, impact analysis).
  • Business Continuity: Awareness of business continuity      planning and disaster recovery.

4. Introduction to Policy and Governance

  • Legal and Regulatory Frameworks: Familiarity with      laws, regulations, and standards related to cybersecurity, such as GDPR,      HIPAA, PCI-DSS, and NIST cybersecurity frameworks.
  • Ethical Considerations: Basic knowledge of ethical      issues in cybersecurity, such as privacy concerns, responsible disclosure,      and ethical hacking.

5. Communication Skills

  • Written and Verbal Communication: Ability to write      clear and concise reports and policies and present ideas effectively, as      managing cybersecurity often requires communicating complex ideas to both      technical and non-technical stakeholders.

6. Foundational Knowledge of Management Principles

  • Project Management Basics: Understanding of basic      project management techniques, as cybersecurity policy management often      involves coordinating teams and managing resources.
  • Leadership and Strategic Planning: Familiarity with      high-level organizational management concepts, such as aligning      cybersecurity efforts with overall business strategy.

Hardware Requirements

Any modern computer (at least 8GB of Ram) with a wireless card will suffice. Direct any questions regarding hardware requirements to communications@aliascybersecurity.com.

Registration

You may register for more than one course at a time.  If registering for more than one applicant, complete a separate registration for each individual to ensure they get enrolled in the course and receive all correspondence.

Copyright © 2024 AF Cyber Academy - All Rights Reserved.

Powered by

  • Home
  • 2025 Schedule
  • Registration
  • Contact Us
  • AF Cyber Swag Competition

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept