Dark Horse Cybersecurity Bootcamp


Categories: Cyber Security
Includes lifetime access

Course Overview


Topics covered:


    This 4-day course will provide an overview of the updated information security and information technology audit requirements based on the Federal Information Security Management Act (FISMA) inspector general reporting requirements; NIST Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems; and Federal Information System Controls Audit Manual (FISCAM). Upon completion of this course, participants will understand the Risk Management Framework and security controls as outlined in NIST SP 800-53, as well as understand relevant audit techniques and approaches.


    provides participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, participants will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution. Upon completion of this course, each participant will be able to define cybersecurity terminology, compliance requirements, review sample attacks, and gain an understanding of the impact of current threat trends on cybersecurity implementation.


    This hands-on 4-day course provides participants with fundamental skills needed to understand and analyze security threats against a network. Further, participants will have the necessary knowledge to develop security policies that will protect an organization’s information. Through lecture and hands-on exercises, participants will leave the course with the knowledge and skills to configure various network technologies, analyze network packets, and recognize and mitigate network vulnerabilities.


    This hands-on 4-day course will focus on understanding exploits and vulnerabilities in a Wireless network. Through lecture and hands-on exercises participants will gain fundamental knowledge of wireless technologies and standards, vulnerabilities, threats, and attacks facing wireless technologies, and methods of securing wireless technologies. Upon completion of the course, participants will have the knowledge necessary to design and implement a secured wireless infrastructure while ensuring confidentiality, integrity, and availability.


    This hands-on 4-day course provides students with intermediate-level training in hacking and penetration testing techniques. The training immerses each student into an interactive environment where they will learn how to scan and attack with the purpose of securing networks and information systems. The course provides students practical exercises in the skills needed to test and protect today’s sensitive networks and information systems. Students will gain an understanding of the five phases of hacking, the various tools and methods for conducting “white hat” system/network penetration testing, and the ethics surrounding hacking and penetration testing. Students will leave the course with the skills needed to provide evidence of weaknesses and real assurance that current controls are working properly. Further, students will obtain the ability to quantitatively assess and measure threats to information assets and discover where an organization is most vulnerable to hacking. Ultimately, students will leave this course with a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or “white hat” hacking situation.

This is a hands-on 20-day set of courses!