Cybersecurity Professional Penetration Tester

SKILL LEVEL:
PREREQUISITES:
OVERVIEW:
TOPICS COVERED
JOBS THAT TYPICALLY USE OR REQUIRE THE CISSP:
SCHEDULE:
Cybersecurity Professional Penetration Tester
Creating the next generation of Ethical Hackers
Divergence Academy is the very first institute bringing programs at the intersection of artificial intelligence and cybersecurity. Students graduate with sought-after knowledge, priming them for careers as tier 1 security engineers, threat analysts, and pen testers.
Student experience

Our comprehensive course is 400 hours in duration and can be completed in two different schedules: 10 weeks from Mon to Fri between 9:00 AM – 6:00 PM or 20 weeks from Mon to Fri between 9:00 AM – 1:00 PM

Expert-Led Instruction That Gets You Job-Ready: Become an elite ethical hacker. Gain skills and collaborate with leading professionals through lectures, research exercises, and real-world simulations.

Exclusive Access to Leaders in Security: Our program offers countless opportunities to learn and engage with security professionals from around the world through guest speakers, alumni gatherings, and topical community events.

Gain a Valuable Professional Network: Transform and grow your career alongside peers (and potential collaborators) on campus and in our Connected Classroom. The DA community is a priceless resource — just ask our alumni.

Course details

Virtualization and Cloud: Get acquainted with Server architecture, storage, security, networking, troubleshooting, and disaster recovery. Move the components of the server infrastructure into the Cloud via Virtualization, Additional security, Deployment, Operations and automation.

Wired and Wireless Networking: Learn Information Technology network foundations to work better with security practitioners. This module covers newer hardware, cloud computing best practices, service models, and hands-on troubleshooting of small, medium, and large simulated networks for network resiliency.

Security and Pentesting: Install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. In addition – plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

Instructors

Our instructors represent the brightest professionals from companies like Microsoft, Amazon Web Services, and Sabre. They bring in-depth experience from the field to the classroom each day, providing invaluable insights into succeeding on the job.

Shane Walker

James Anderson

Bret Harder

Xerxes Cama

Logan Hillard

Career support

Strategy and Accountability: Our Career Services team works with you to individualize your path to a new career. Stay on track and motivated from the first day of class!

Resume Review: Learn how to design and tailor your resume to land the career you are looking for. Remember: every word counts.

LinkedIn Optimization: LinkedIn profiles are now mandatory extensions of our resumes. Setting up a thoughtful, well-written profile is the make or break for many inquiring employers. Using industry tips and tricks, we’ll work with you to spruce up yours.

Interview Preparation: Set up mock interviews to nail the real thing. Learn to develop effective interview strategies, get detailed feedback, and reduce stress before actual interviews.

Networking Opportunities: Learn how to navigate uncharted networking waters, tap into our expanding Divergence Alumni network, and watch your support and contacts grow!

Admission process
Step 1
Apply
Let's talk through it: your background, chosen path, weekday or weekend schedule, funding options, and more. Schedule an appointment with our Admissions Team.
Apply now
Step 2
Online Wookie Course
Curious folks, we will not make you wait to get started on your learning journey. You'll be enrolled from the get-go in either Data or Cyber Wookie. Each provides valuable resources to help our future data scientists or ethical hackers prep for the first day of class.
Step 3
Decision
Congrats! Your funding has been verified and you are accepted into the program. Be on the lookout for a personalized Acceptance Letter via e-mail. You can always call us at 833-DIVERGE
Step 4
Orientation
Experiencing first day jitters? Here's how we can help.
A week before your program starts, our Community Manager will get you onboarded to the learning platform, walk you through TWC enrollment paperwork, and connect you with future classmates.