Skip to Search Skip to Global Navigation Skip to Local Navigation Skip to Content
Show/Hide University Links


Our Cyber Security Master track fully prepares the student to become involved in computer forensics, investigations, and strategy and tactics for defending cyber systems.

This track is comprised of three courses: the Certified Ethical Hacker Prep Course, the Computer Hacking Forensic Investigator course, and Cyber Defense Techniques. Each course within the Master Track will be one week long. The track runs from May to July, as highlighted below:

 

Course fees:

Registration Fee $3,495.00
Military/veteran fee $2,995.00

Register for the Master Track

 

Course Information

Certified Ethical Hacker Prep Course

Course Overview / Description

This course prepares information security professionals for the CEH examination.  Lectures cover in detail all the domains required for the CEH examination.  Each module covers specific objectives and details for the exam, as defined by EC-Council.  Demonstration of security tools and techniques will be used throughout the course to enhance the concepts discussed in the course. Exam registration is not included.

Scope

The following topics will be covered in this course:

  • Ethical Hacking Basics
  • Footprinting and Reconnaissance
  • Scanning and Enumeration
  • System Hacking
  • Hacking Through The Network
  • Web-Based Hacking – Web Servers and Applications
  • Hacking Wireless Networks
  • Malware
  • Cryptography
  • Low-Tech Hacking: Social Engineering and Physical Security
  • Penetration Testing

Who Should Attend?

Participants are IT / Security professionals who want to earn the CEH certification.  Participants must meet EC-Council candidate eligibility requirements in order to attempt the CEH certification examination.


Prerequisites

Participants should have experience with Windows and Unix/Linux operating systems and TCP/IP.

Course Length

The next course will be May 5th - May 9th, from 8:00 a.m. to 4:00 p.m. with an hour break for lunch.

Provided Materials / Facilities

All training materials including Participant Manual, practice tests, answer keys and handouts will be provided.
Courses hosted in CIAS facilities, at 4350 Lockhill Selma road in San Antonio.

Just interested in this course? Register for it here!

Course Overview / Description

This course prepares the information security professional for the CHFI exam.  This course introduces IT professionals to a process overview of computer forensics and evidence analysis.  This is an instructional and analytical course covering major forensic investigation scenarios leading students through activities to acquire hands-on experience.  Hands-on activities include various forensic investigation techniques and standard forensic tools used to perform a proper computer forensic investigation.  Exam registration is not included.

Scope

The following topics will be covered in this course:

  • What is computer forensics
  • Why create an evidence analysis process
  • Forensic investigation techniques
  • Tracking and detecting hacking attempts
  • Determining how to prevent future attacks
  • Performing a proper computer forensic investigation through prosecution

Who Should Attend?

This class is for professionals who bear the responsibility for creating, maintaining or managing an organization’s IT security, fraud or forensics systems.

Prerequisites

Participants must be familiar with Windows-based computers.  Participants should have a solid understanding of their security, fraud or forensics department, and how technology is implemented in their organization.

Course Length

The next course will be June 9th - 13th, from 8:00 a.m. to 4:00 p.m. with an hour break for lunch.

Provided Materials / Facilities

Lecture and reference materials are provided.
Courses hosted in CIAS facilities, at 4350 Lockhill Selma road in San Antonio.

Just interested in this course? Register for it here!

Cyber Defense Techniques

Course Overview / Description

This five day hands-on and lecture course teaches skills and practices for defending networks and systems from cyber attacks. This course allows participants to understand what a cyber attack looks like by examining attack tools and techniques. Then the class teaches tools and techniques needed to combat the attacks.  

Scope

This course is designed to show network administrators, system administrators and those that have their hands on the network on a regular basis how to defend their networks. A virtual infrastructure will be developed, and participants will be responsible for hardening their systems before and while attacks are occurring. Participants will look at access logs and networking tools to determine what happened to their systems and what type of response is necessary, if any. 

Who Should Attend?

Participants with work experience in general Information Technology and a familiarity with networking (TCP/IP, protocols, ports, wireless, etc.) and system administration (operating systems, user accounts, etc.).

Prerequisites

Participants should have experience with Windows and Unix/Linux operating systems and knowledge of TCP/IP and networking.

Course Length

The next course will be July 14 - 18, from 8:30 am to 3:30 pm with an hour break for lunch.

Provided Materials / Facilities

All training materials including Participant Manual and handouts will be provided.
Courses hosted in CIAS facilities, at 4350 Lockhill Selma road in San Antonio.

Just interested in this course? Register for it here!

Register for the Master Track

 

Additional Information

Admission for students who have not completed the Cyber Security Apprentice track or the Cyber Security Technician track is considered on a case-by-case basis. If you feel you have previous education or experience to substitute for part of this program, or have questions about class and track programs, please contact us with your inquiry.

 

Read About Class Instructors

 

Brought to you by a partnership between the Office of Extended Education and CIAS.

CIAS

Back to top