training@bridgingcyber.com 202-713-9289

Specialty Workshops

Gain Valuable SKills

Our main service is to develop our students for everything their next employer would require of them. When you choose one of our cyber career tracks, students are required to take at least three elective workshops to help retain their new skills. Once a student completes their package registration, a career counselor will assist our students with coordinating their courses.

young lady taking an online course on computer

Introduction to Python

Package 1

Python can be used for nearly anything in cybersecurity. Python is used heavily in malware, host discovery, the sending and decoding of packets, accessing servers, port scanning and network scanning.

Duration: 24 hours

students in front of computers taking online IT courses

Risk Management Framework (RMF)

Package 2

RMF emphasizes integrating cybersecurity activities into existing processes including program protection planning, networks analysis, developmental and operational test and evaluation, financial management and cost estimating, and sustainment and disposal.

Duration: 8 hours

man and woman studying for online course

How to Create a System Security Plan (SSP)

Package 3

The System Security Plan (SSP) provides an overview of a security package that describes all the security controls in use on the information system and their implementation. Students will receive step-by-step guidance on how to create such plan.

Duration: 8 hours

CompTIA A+ certification student on computer

How to Create a Plan of Action & Milestone (POA&M)

Package 4

The Plan of Actions & Milestones (POA&M) is a key document in the security authorization package and for continuous monitoring activities. Students will receive step-by-step guidance on how to create such plan.

Duration: 8 hours

Group of students learn about ethical hacking course

How to Research NIST Guidelines

Package 5

The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high-tech industries today. Understanding how to comply with NIST guidelines and recommendations will help federal agencies and employees are compliant with other regulations, such as HIPAA, FISMA, or SOX.

Duration: 8 hours

Group of students discussing CompTIA Network+ certification around a computer

How to Create a Disaster Response Policy (DRP)

Package 6

A disaster can be classified as a sudden event, including an accident or natural disaster, that creates wide scoping, detrimental damage. In information management, DRPs are considered a critical subset of an entity’s larger business continuity plan (BCP), which seeks to prepare for, prevent, and recover from potential threats affecting an organization. DRPs provide instructions to follow when responding to various disasters, including both cyber and environment-related events.

Duration: 16 hours

Always In Demand

  • Unfortunately the pipeline of security talent isn’t where it needs to be to help curb the cybercrime epidemic. Until we can rectify the quality of education and training that our new cyber experts receive, we will continue to be outpaced by the Black Hats.

    Robert Herjavec
    Founder and CEO at Herjavec Group
  • Our students will be able to identify and mitigate the common attacks in a hyper-realistic environment so that they can be the Hero we can depend on to protect us in the real world.

    Ricky West
    Founder of BCT Institute
We are using cookies to give you the best experience. You can find out more about which cookies we are using or switch them off in privacy settings.
AcceptPrivacy Settings

GDPR

  • Cookies Catpure

Cookies Catpure

We are collecting cookies based your selections and page serach within our website. We collect this information for in-house reporting. We do not sell or share your personal information with outside vendors or partners.