Follow Us
Follow us
Login / Register

Security Operations Management Immersive

Security Operations Management Immersive
Continuous Compliance. Stay agile to meet regulatory standards through continuous monitoring and security control assessments.
Rather than doors, locks and vaults, IT departments rely on a combination of strategies, technologies and user education to protect an enterprise against cybersecurity attacks that can compromise systems, steal data and other valuable company information, and damage an enterprise’s reputation. As the volume and severity of cyber attacks grow, the need for cybersecurity risk management grows with it. Cybersecurity risk management involves identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected. In this course, Cybersecurity Risk Management, you’ll learn how to assess a company’s risk across each area within IT. First, you’ll explore the various methods used to assess risk like SLE, ALE, and ARO. Next, you’ll learn the fundamentals of computer forensics, including maintaining chain of custody, legal holds, and data acquisition techniques. Finally, you’ll discover the principals of disaster recovery, maintaining highly available infrastructure, and business continuity basics. By the end of the course, you’ll understand what’s required to assess an organization’s operational risk, the methods used to conduct a forensic investigation, and how to keep a business operational leveraging disaster recovery and business continuity concepts.
Student Experience Unveiled: Schedules,Training, Networking, & Beyond

Our comprehensive program offers 400 hours of content, evenly divided between 200 hours of theory and 200 hours of practical labs. We provide three scheduling options, tailored to your needs, all in Central Time (CT):

  • - Monday through Friday, 9:00 AM to 6:00 PM CT over 10 weeks.
  • - Monday through Friday, 9:00 AM to 1:00 PM CT across 20 weeks.
  • - Monday, Tuesday, and Thursday from 6:00 PM to 10:00 PM CT, and Saturday from 8:00 AM to 5:00 PM CT over 20 weeks.

*Kindly note that these schedules might not be offered simultaneously. Based on demand and availability, adjustments to your intended start date may be necessary to coincide with your chosen schedule.

Transformative Training with a Career Focus:

Embark on your journey to become a top-tier ethical hacker under the guidance of industry professionals. Our program blends enlightening lectures, investigative research, and real-world simulations, ensuring you're not just skilled but also job-ready. And with our exclusive voucher budget, your newfound knowledge paves the way for a coveted certification—at no extra cost to you.

Network and Learn with Industry Leaders:

Beyond traditional instruction, every Friday is an opportunity for "Lunch n Learns", where you engage with industry champions, recruitment experts, or alumni. Obtain insights, prepare for post-graduation opportunities, and get insider tips on acing interviews.

Unparalleled Support Throughout Your Journey:

Your success is our priority. From day one, dedicated student success advisors guide you—from orientation to celebrating you landing your dream job post-graduation. And it doesn’t stop there; our instructors aren't just educators—they're active industry professionals. They bring to the classroom current, real-world challenges, ensuring you’re always ahead of the curve and prepared for the evolving landscape of ethical hacking. Join the DA community and tap into a reservoir of knowledge, guidance, and opportunity like no other.

A Glimpse into Our Comprehensive Program: Key Modules & Details

GRC Foundations for Zero-Trust Security:

This module in the Security Operations Management Immersive (SOMI) Program focuses on establishing the governance framework for effective security operations. It delves into how organizations define security objectives, allocate responsibilities, and ensure compliance with industry standards and regulations. Participants will learn how to assess and manage risks associated with security operations, enhancing their ability to govern security effectively.

Monitoring Compliance:

Within the SOMI Program, this module is dedicated to understanding and implementing the Cybersecurity Maturity Model Certification (CMMC). Participants will explore the specific standards and practices required by CMMC, from basic hygiene to advanced cybersecurity measures. This module equips individuals and organizations with the knowledge and skills needed to align their security operations with CMMC requirements, ensuring they meet the stringent cybersecurity standards of the U.S. Department of Defense. The module concludes with the Environmental Assessment Capstone, a hands-on experience where students harness their insights in a real-world context, merging theory and practice to adeptly address compliance challenges and oversee adherence.

Managing Information Systems Security:

This module within SOMI is designed to prepare professionals to earn the Certified Information Systems Security Professional (CISSP) certification. It focuses on developing expertise in designing, implementing, and managing security programs that protect information systems. Participants will gain insights into leadership roles within security operations, enabling them to effectively manage and navigate the complexities of modern cybersecurity challenges. Concluding with the Environmental Assessment Capstone, students will be given the opportunity to synthesize their theoretical knowledge by tackling practical challenges, ensuring they are not only prepared for certification but also equipped to handle real-world security scenarios.


Upon completing our program, you will be well-prepared to potentially test for esteemed certifications such as ISC(2) Certification for Governance Risk Compliance (CGRC), ISC(2) Certified Information Systems Security Professional (CISSP), and Certified CMMC Professional (CCP). We understand the significance of these certifications in the cybersecurity world, which is why we proudly offer a voucher budget for each learner in compliance with our voucher policy. This allows you to confidently pursue these certifications, bolstering your professional credentials and enhancing your career prospects in the realm of information security.


To be eligible for our Security Operations Management Immersive program, a high school degree is essential. Additionally, for a foundational understanding of Security Operations, we require students to complete both our Cyber Tech Prep and Cloud Tech Prep courses before the program commences. Don't worry; gaining access to these valuable tech prep courses is straightforward—simply fill out our application form, and you'll be granted free access regardless of whether or not you choose to attend our program.

Learn From The Best: Instructors for Every Learner's Journey

Our instructors stand as pillars of expertise and dedication in the world of IT compliance. Not only do they hold esteemed CISSP and CCP certifications, but they are also current working professionals immersed in the rapidly-evolving IT compliance landscape. This invaluable on-the-ground experience means that when they step into our classrooms, they bring with them the most up-to-date knowledge and insights, ensuring our students are always at the cutting edge of the field.

But beyond their impressive credentials and industry expertise, what truly sets our instructors apart is their unwavering commitment to the success of each student. They possess a genuine passion for teaching and an innate ability to break down even the most complex topics into understandable concepts. Their deep-seated care for every learner's progress ensures that they're always willing to go the extra mile, guaranteeing that no student feels left behind and every challenging topic is thoroughly grasped.

Myriam Batista

Ekzhin Ear

Vatrick Ramble

Thor Munoz

Chris Golden And more!

Career Services Support: Empowering Success in Your Future Career

Career Strategy & Empowerment:

At Divergence Academy, we take a personalized approach to your career aspirations. Our dedicated Career Services team collaborates with you and your Student Success Advisor from week 1, ensuring you remain inspired and aligned with your professional goals throughout the program.

Mastering the Resume Craft:

It's more than just a piece of paper. We teach you the art of crafting a compelling resume, emphasizing the significance of every word, ensuring it resonates with the roles you desire.

LinkedIn Mastery:

In the digital age, a LinkedIn profile isn't just an extension—it's a crucial part of your professional identity. We provide insider insights on optimizing your profile, making it a magnet for potential employers.

Ace the Interview: More than just preparation, our program offers mock interview sessions. This immersive experience, combined with actionable feedback, equips you with the confidence and strategies to shine during real-life interviews.

Expansive Networking:

Delve into the vast realm of professional networking with our weekly "Lunch n Learns" every Friday. These sessions provide an avenue to engage with industry champions and recruitment experts. Benefit further from our robust Divergence Alumni network, expanding your circle and reinforcing your career foundation. Your opportunities to connect, learn, and grow are endless with us.

Integrated Career Workshops:

Beyond our core curriculum, we've intricately woven career services workshops into the program. This ensures that by graduation, you're not only equipped with knowledge but also exude job readiness.

AI-Powered Job Search:

Step into the future with the revolutionary Job Machine. Select students experience this AI-driven tool that streamlines the application process for numerous jobs and ensures your job hunt remains organized and efficient. With our enhanced Career and Placement Services by your side, venturing into the vast ocean of career prospects becomes a seamlessly navigable journey. Your dream career is not just within sight—it's within grasp.

From Application to Orientation: Your Admissions Roadmap
Step 1
Begin your journey by discussing your background, preferred pathway, scheduling preferences (10 weeks vs 20 weeks), funding choices, and more with our Admissions Team. Let's align your vision with our offerings.
Apply now
Step 2
Tech prep courses
Eager learners, you can kickstart your educational path right away. Before diving into the main program, you'll get free access to our Cybersecurity and Cloud Engineering Tech Prep. These foundational courses equip you with essential knowledge, ensuring you're well-prepared and confident on your first day of the program.
Step 3
Congratulations! With your funding confirmed, you're now officially accepted into the program. Keep an eye on your inbox for a personalized Acceptance Letter. Should you questions, don't hesitate to reach out to us at 833-DIVERGE.
Step 4
Ready to embark on your journey? To ensure a smooth start, our Student Success Director will introduce you to the learning platform a week before your program begins. Additionally, they'll guide you through the TWC enrollment paperwork and give you an opportunity to meet your dedicated Student Success Advisor and fellow learners in the program. Let's set the stage for success together!
Call or text us:
Email us 24/7 hours:
Our  location:
14665 Midway Rd Suite 220, Addison, TX 75001
Your next step into emerging tech.
Text us: (469) 405-1663
Connect with us:
Get in touch!
Fusce varius, dolor tempor interdum tristiquei bibendum service life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Copyright © 2023 Divergence. All Rights Reserved.