From Zero to SOC Analyst

Securing Your Future: Inside The Cyber Academy’s 500-Hour Transformation

The Cyber Academy, based in Edmonton, is committed to closing the skills gap in Canada’s digital defence sector. Our flagship Cyber Security Bootcamp is not just a course; it’s a 500-hour intensive, career-focused launchpad designed specifically for career changers and dedicated IT professionals aiming for a Junior Security Analyst role. This program is built on a simple philosophy: hands-on mastery is the only true preparation for the modern threat landscape.


I. The Foundation: Mastering the Digital Battlefield

Any effective security professional must first understand the ground they are defending. Our Bootcamp begins with a rigorous focus on foundational IT skills, ensuring every student operates from a position of strength.

🌐 Module 1: Networking & Systems Basics (20 Hours)

You can’t secure what you don’t understand. This module goes beyond theory to provide practical proficiency:

  • OSI Model Deep Dive: Understanding how data travels at every layer is critical for traffic analysis and defense logic.
  • TCP/IP and Subnetting: Learn the architecture of modern networks to build effective access controls and segmentation.
  • Linux Command Line Fundamentals: The operating system of choice for servers and security tools. You will master Bash scripting basics to automate tasks and analyze data efficiently.

🛡️ Module 2: Security Architecture & Tooling (25 Hours)

This is where theory meets industrial-grade technology. Students gain practical experience configuring and managing the tools that power a Security Operations Center (SOC):

  • Firewall Configuration: Hands-on deployment and management using industry-standard solutions like pfSense and Fortinet.
  • SIEM Basics (Introduction to Splunk): Learn to collect, aggregate, and analyze massive volumes of security data. Understanding detection logic is the cornerstone of proactive defense.
  • IDS/IPS Deployment: Deploying and tuning Intrusion Detection Systems (Snort) and Intrusion Prevention Systems (Suricata) to identify and block malicious network activity in real-time.

II. Proactive Defense: Finding Weakness Before the Attack

A great defender is proactive, not reactive. These modules focus on the necessary skills to assess, prioritize, and manage risk across an enterprise.

🔎 Module 3: Vulnerability Management (20 Hours)

This module teaches the crucial skill of continuous risk assessment:

  • Asset Management and Scanning: Learn to use tools like Nessus and OpenVAS to scan large enterprise environments and identify security weaknesses.
  • CVSS Scoring and Risk Prioritization: Not all vulnerabilities are created equal. You will learn the Common Vulnerability Scoring System (CVSS) to prioritize patches and remediation efforts based on actual business risk.
  • Patch Management Strategies: Develop scalable strategies for managing and deploying patches in complex enterprise environments.

😈 Module 5: Ethical Hacking & Penetration Testing Intro (20 Hours)

To defend a system, you must think like an attacker. This module provides a safe, legal environment to explore offensive techniques:

  • Reconnaissance Techniques and OSINT: Learning to gather information (Open Source Intelligence) is the first step of any penetration test.
  • Web Application Vulnerabilities: A deep dive into the OWASP Top 10, understanding common attack vectors like SQL injection and cross-site scripting.
  • Capstone Project: Students finalize their practical knowledge by securing a vulnerable network, documenting their findings, and presenting a professional security assessment report.

III. The Aftermath: Incident Response and Career Launch

The ability to manage a crisis and secure employment are the ultimate tests of the training.

🚨 Module 4: Incident Response & Digital Forensics (25 Hours)

When an incident occurs, time is your enemy. This module provides a structured approach to crisis management:

  • The PICERL Framework: Mastery of the industry standard framework: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
  • Memory and Disk Forensics Basics: Learn the fundamentals of collecting and preserving digital evidence using tools like Autopsy, crucial for post-incident analysis.
  • Handling Ransomware Incidents: Step-by-step procedures for managing one of the most common and devastating modern attacks.

💼 Module 6: Career Prep & Certification (10 Hours)

The 500-hour investment culminates in career readiness. This final module ensures you successfully transition into your new role:

  • CompTIA Security+ Exam Preparation: Dedicated study time and resources to prepare for one of the industry’s most respected entry-level certifications (certification voucher is included in the Bootcamp price).
  • Mock Technical Interviews: Practice interviewing with expert instructors, sharpening your communication and technical skills.
  • Resume Workshops: Learn how to translate your 500 hours of intensive training and Capstone Project experience into a winning, professional resume that gets noticed by Canadian employers.
Facebook
Twitter
Email
Print

Leave a Reply

Your email address will not be published. Required fields are marked *

Newsletter

Sign up our newsletter to get update information, news and free insight.

Latest Post