Due to VetTec funding replenishing on October 1, we're currently experiencing high call volumes and extended wait times to connect with our enrollment advisors. Our small but rapidly growing school is thrilled by the interest, and we kindly ask for your patience. Rest assured, we're committed to assisting each of you as promptly as we can. Thank you for your understanding.

Security Operations Management Immersive

SKILL LEVEL:
PREREQUISITES:
OVERVIEW:
TOPICS COVERED
JOBS THAT TYPICALLY USE OR REQUIRE THE CISSP:
SCHEDULE:
Security Operations Management Immersive
Continuous Compliance. Stay agile to meet regulatory standards through continuous monitoring and security control assessments.
Rather than doors, locks and vaults, IT departments rely on a combination of strategies, technologies and user education to protect an enterprise against cybersecurity attacks that can compromise systems, steal data and other valuable company information, and damage an enterprise’s reputation. As the volume and severity of cyber attacks grow, the need for cybersecurity risk management grows with it. Cybersecurity risk management involves identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected. In this course, Cybersecurity Risk Management, you’ll learn how to assess a company’s risk across each area within IT. First, you’ll explore the various methods used to assess risk like SLE, ALE, and ARO. Next, you’ll learn the fundamentals of computer forensics, including maintaining chain of custody, legal holds, and data acquisition techniques. Finally, you’ll discover the principals of disaster recovery, maintaining highly available infrastructure, and business continuity basics. By the end of the course, you’ll understand what’s required to assess an organization’s operational risk, the methods used to conduct a forensic investigation, and how to keep a business operational leveraging disaster recovery and business continuity concepts.
Student experience

Our comprehensive course is 400 hours in duration and can be completed in two different schedules: 10 weeks from Mon to Fri between 9:00 AM – 6:00 PM or 20 weeks from Mon to Fri between 9:00 AM – 1:00 PM. Each course includes 200 hrs of theory and 200 hrs of hands-on labs.

Expert-Led Instruction That Gets You Job-Ready: Become an elite ethical hacker. Gain skills and collaborate with leading professionals through lectures, research exercises, and real-world simulations.

Exclusive Access to Leaders in Security: Our program offers countless opportunities to learn and engage with security professionals from around the world through guest speakers, alumni gatherings, and topical community events.

Gain a Valuable Professional Network: Transform and grow your career alongside peers (and potential collaborators) on campus and in our Connected Classroom. The DA community is a priceless resource — just ask our alumni.

Course details

Manage Information Systems Security: Learn the management of domains in the Information Systems security which include Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.

Monitor Zero-Trust Systems: Explore the principles of Zero Trust – Verify explicitly, Use least privileged access, and Assume breach. Apply the principles through hands-on use cases and technology labs using modern cloud-enabled Security Incident and Event Management (SIEM), and Security Orchestration, Automation and Response (SOAR) platforms. Contemporary security operations teams use both SIEM and SOAR to optimize the Security Operations Center.

Manage CMMC Compliance : The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. The CMMC is the DoD’s response to significant compromises of sensitive defense information located on contractors’ information systems. Prepare through theory and hands-on use cases to Manage the risk with Federal Supply Chain, ensure compliance through implementing and evaluating CMMC Level 1-5, and Prepare an organization for an Assessment.

Perform Assessment Capstone: This module serves as the capstone for the 8 weeks of learning through integration of management techniques into an organization assessment. The assessment will include Information systems risk, Zero-Trust posture, and application of CMMC. The goal of this this module is to help a learner to develop an effective LinkedIn Profile, showcase project portfolio, prepare for interviews by revisiting their capstone problem, and share capstone project results.

Certifications: By the end of this course you will have the skills needed to acquire (ISC)² Certified Information Systems Security Professional (CISSP), the Certificate of Cloud Security Knowledge (CCSK), Microsoft Cybersecurity Architect (SC-100), Certified CMMC Professional (CCP), and the (ISC)² Certificate of Governance, Risk and Compliance (CGRC).

Security Jobs: Equip yourself to succeed in a career such as an IT Security Engineer, Information Assurance Analyst, Security Systems Administrator and more.

Prerequisites: Complete Microsoft Security, Compliance, and Identify Fundamentals (SC-900). 2+ years’ Tech Management experience.Minimum of Associates Degree. Complete our Cyber Tech Prep and Cloud Tech Prep courses before program start for an understanding of Security Operations.

Instructors

Our instructors represent the brightest professionals from companies like Microsoft, Amazon Web Services, and Sabre. They bring in-depth experience from the field to the classroom each day, providing invaluable insights into succeeding on the job.

Shane Walker

James Anderson

Kevin Koyle

Xerxes Cama

Logan Hillard

Career support

Strategy and Accountability: Our Career Services team works with you to individualize your path to a new career. Stay on track and motivated from the first day of class!

Resume Review: Learn how to design and tailor your resume to land the career you are looking for. Remember: every word counts.

LinkedIn Optimization: LinkedIn profiles are now mandatory extensions of our resumes. Setting up a thoughtful, well-written profile is the make or break for many inquiring employers. Using industry tips and tricks, we’ll work with you to spruce up yours.

Interview Preparation: Set up mock interviews to nail the real thing. Learn to develop effective interview strategies, get detailed feedback, and reduce stress before actual interviews.

Networking Opportunities: Learn how to navigate uncharted networking waters, tap into our expanding Divergence Alumni network, and watch your support and contacts grow!

Admission process
Step 1
Apply
Let's talk through it: your background, chosen path, weekday or weekend schedule, funding options, and more. Schedule an appointment with our Admissions Team.
Apply now
Step 2
Tech prep courses
Curious folks, we will not make you wait to get started on your learning journey. You'll be enrolled from the get-go in either Data or Cyber Tech Prep. Each provides valuable resources to help our future data scientists or ethical hackers prep for the first day of class.
Step 3
Decision
Congrats! Your funding has been verified and you are accepted into the program. Be on the lookout for a personalized Acceptance Letter via e-mail. You can always call us at 833-DIVERGE
Step 4
Orientation
Experiencing first day jitters? Here's how we can help.
A week before your program starts, our Community Manager will get you onboarded to the learning platform, walk you through TWC enrollment paperwork, and connect you with future classmates.