CyberWarrior Program Part-Time

The CyberWarrior part-time program is a hands-on technical training that prepares you for a career in cybersecurity. The 6-month training is intensive and delivered by white-hat hackers with day-to-day exposure to the rapidly changing threat landscape.

Program Cost $16,500

Cover up to 65% of Tuition with Scholarships from our Corporate Partners

Register NowIs the CW Program for me?

The Cybersecurity Market Needs You


or less of applicants are qualified for available cybersecurity roles

Source: ISACA State of Cybersecurity 2017: Current Trends in Workforce Development

million more cybersecurity professionals are needed by 2022

Source: (ISC)2 2017 Global Information Security Workforce Study

dollars is the average salary for IT security professionals

Souce: Bureau of Labor Statistics

hands-on technical training

Part-Time Hands-On Technical Training

NEXT CLASS: October 23, 2018

*Scholarships available up to 65% of Program Costs*

hands-on technical training

The CyberWarrior Program Objectives

The CyberWarrior Program is a hands-on cybersecurity training in which students gain:


  • EC Council: Certified Network Defender (CND)
  • EC Council: Certified Ethical Hacker (CEH) 
  • Certified Cyberwarrior (CW)

Technical Knowledge of Cybersecurity Tools and Technologies

  • Firewalls & IDS Configuration 
  • Vulnerability Management 
  • Security Monitoring 
  • Packet Analysis 
  • Incident Response 
  • Security Automation

Consulting Experience 

  • Network Security and Penetration Testing Capstone Projects

Career Growth Hacks from Cybersecurity Executives & Subject-Matter Experts

Be one of the first 30 to apply and earn a scholarship of up to $11,000








Earn Three Cybersecurity Certifications Around Your Schedule

These Certifications Will Positively Set You Apart From Your Competition in the Cybersecurity Workforce

EC Council – Certified Network Defender (CND)

During weeks 1-4, you will develop a deep understanding of cybersecurity technologies and techniques to defend a network. In this module you will develop a fundamental understanding of the true construct of data transfers, network technologies, and software technologies in order to comprehend how networks operate, how software is automated and how to assess target systems.T

EC Council – Certified Ethical Hacker

During weeks 5-8, you will dive into the types of attacks used by hackers to break into and compromise a network. In this module, you will learn how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of various target systems.

Certified Cybersecurity Warrior

During weeks 23-24, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  
hands-on technical training

Learn More Than Just Technology

IT leaders list the inability to communicate effectively as one of the biggest challenges faced by their cybersecurity personnel. How you collaborate with your peers, how you’re perceived and how you influence the outcomes of the day are critical to your professional advancement. Improving interpersonal skills is just as important as honing technical skills in the profession. The CyberWarrior program offers career development modules to help you become your best self, get noticed, and advance in the competitive field of Information Security.

Personal Brand

  •  How to Market Yourself
  •  How to Leverage Limited Cybersecurity Experience

Communication Skills

  • Fostering Trust in a Team Environment
  • Conflict Management
  • Communicating with non-technical business leaders

Presentation Skills

  • Bringing Data to Life
  • Critical Thinking and Strategic Planning
  • Board Room Presentation Delivery


Your 6-month curriculum provides you in-depth, hands-on technical and career development training to support the three certifications you will receive upon completion of the program.

Defend – CND



  • Module 1: Computer Network and Defense Fundamentals 
  • Module 2: Network Security Threats, Vulnerabilities, and Attacks 
  • Module 3: Network Security Controls, Protocols, and Devices 
  • Module 4: Network Security Policy Design and Implementation 
  • Module 5: Physical Security 
  • Module 6: Host Security 
  • Module 7: Secure Firewall Configuration and Management 
  • Module 8: Secure IDS Configuration and Management 
  • Module 9: Secure VPN Configuration and Management 
  • Module 10: Wireless Network Defense 
  • Module 11: Network Traffic Monitoring and Analysis 
  • Module 12: Network Risk and Vulnerability Management 
  • Module 13: Data Backup and Recovery 
  • Module 14: Network Incident Response and Management

Attack – CEH



  • Module 00: Student Introduction 
  • Module 01: Introduction to Ethical Hacking 
  • Module 02: Footprinting and Reconnaissance 
  • Module 03: Scanning Networks 
  • Module 04: Enumeration 
  • Module 05: Vulnerability Analysis 
  • Module 06: System Hacking 
  • Module 07: Malware Threats 
  • Module 08: Sniffing 
  • Module 09: Social Engineering 
  • Module 10: Denial-of-Service 
  • Module 11: Session Hijacking 
  • Module 12: Evading IDS, Firewalls, and Honeypots 
  • Module 13: Hacking Web Servers 
  • Module 14: Hacking Web Applications 
  • Module 15: SQL Injection 
  • Module 16: Hacking Wireless Networks 
  • Module 17: Hacking Mobile Platforms 
  • Module 18: IoT Hacking 
  • Module 19: Cloud Computing 
  • Module 20: Cryptography 

Hands-On Training


WEEKS 9-10 (Firewalls & IDS Configuration)

  • Module 1: Firewall & IDPS concepts 
  • Module 2: CISCO Access Control Lists (ACLs) 
  • Module 3: Linux IPTABLE 
  • Module 4: PFSense 
  • Module 5: Snort 
  • Module 6: Suricata  
  • Module 7: BRO 
  • Module 8: SecurityOnion 
  • Module 9: Infrastructure security, best practices & strategies 

WEEKS 11-12 (Vulnerability Management)

  • Module 1: Vulnerability scanning concepts 
  • Module 2: Dynamic asset inventory 
  • Module 3: NMAP vulnerability scanning and NSE 
  • Module 4: Nessus vulnerability scanning tool 
  • Module 5: Nexpose/InsightVM vulnerability management tool 
  • Module 6: OpenVAS Opensource vulnerability scanning 
  • Module 7: Web Application Vulnerability Scanning 
  • Module 8: Open Threat Intelligence 
  • Module 9: Effective vulnerability reporting 
  • Module 10: Vulnerability remediation strategies 

WEEKS 13-14 (Security Monitoring)

  • Module 1: Concepts, components and log sources 
  • Module 2: RSYSLOG 
  • Module 3: ELK (Elasticsearch, Logstash and Kibana) 
  • Module 4: GrayLog 
  • Module 5: Splunk 
  • Module 6: SecurityOnion 
  • Module 7: Open Threat Intelligence Integration 
  • Module 8: Strategies for effective security monitoring 

WEEKS 15-16 (Packet Analysis)

  • Module 1: Network and protocols concepts 
  • Module 2: Tcpdump 
  • Module 3: Wireshark & Tshark 
  • Module 4: Packet analysis automation with Python Scapy 
  • Module 5: Network sniffing attacks 
  • Module 6: Network forensic investigations 

WEEKS 17-18 (Malware Analysis & Incident Response)

  • Incident handling steps 
  • Linux SIFT Virtual Machine 
  • Logs analysis 
  • Network evidence acquisition 
  • Forensic malware analysis 
  • Triage process 
  • Incident reporting 
  • Situation handling 

WEEK 19-20 (Security Automation)

  • Python fundamentals 
  • Defending with Python 
  • Attacking with Python 

Career Hacks


WEEKS 21-22

  • Personal Branding
  • Communication and Resource Management skills 
  • Critical Thinking and Presentation skills 



WEEKS 23-24

In the Capstone module, you will take the skills you’ve learned in the previous weeks and put them to the test in simulated real-world scenarios. The professional development component includes creating security reports and delivering presentations to “upper management.” By doing this you will demonstrate the depth of your knowledge as well as the ability to communicate a comprehensive security assessment to non-technical business leaders.  

Learn More about CyberWarrior Program

Career Opportunities

Gain New Knowledge, Skills, and Abilities

CyberWarrior’s cybersecurity training aligns its curriculum to the National Initiative for Cybersecurity Education (NICE) Framework. This allows you to understand the knowledge, skills, and abilities (KSAs) that are valued by employers for in-demand cybersecurity jobs and positions.

Security Provision:

  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer


  • Threat Analyst

Operate and Maintain:

  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst

Protect and Defend:

  • Cybersecurity Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst
hands-on technical training
hands-on technical training
hands-on technical training

Admission Requirements

Program Prerequisites: 

  • Good understanding of different numeral systems like binary, decimal and hexadecimal numbers
  • Good understanding of computer components, memory, disk space, CPU, etc
  • Good understanding of how to install/uninstall a Windows and Linux operating system
  • Basic understanding of how to use virtualization environments like VMware or VirtualBox
  • Basic understanding of fundamental network protocols like ICMP, DNS, DHCP, HTTP
  • Ability to convert between numeral systems
The most successful Cybersecurity professionals are those who possess character traits such as:

Curiosity: The desire to explore new things and different ways of using common items

Resilience: Ability to push through a steep learning curve and handle the frustration of guiding through undefined situations

Autodidactic Ability: The ability to self-teach… people with this ability want to spend their time learning and as such their brain is wired to absorb information.

Pricing and Tuition Assistance

Part-Time Cybersecurity Tuition Cost: $16,500*

The total tuition to attend the CyberWarrior Program is $16,500.

*Advoqt Academy looks to provide loan assistance, payment plans and finance options for qualified individuals. We also have need-based scholarships of up to $11,000 available for those who qualify. Contact us for more details!

Certifications and Hands-On Modules can each be taken separately:

Certified Network Defender (CND) – 4 weeks part-time – $2,900

Certified Ethical Hacker (CEH) – 4 weeks part-time – $2,900

Firewalls & IDS Configuration – 2 weeks part-time – $2,200

Vulnerability Management – 2 weeks part-time – $2,200

Security Monitoring – 2 weeks part-time – $2,200

Packet Analysis – 2 weeks part-time – $2,200

Malware Analysis and Incident Response – 2 weeks part-time – $2,200

Security Automation – 2 weeks part-time – $2,200

Contact us through the Contact Form below with any questions regarding scholarships, pricing, or the purchase of individual modules.



Upstart provides private loans of up to $50,000 with rates as low as 7.8%. Because you are more than your credit score, Upstart looks at your education and work experience to help you get the rate you deserve and fund your cybersecurity education.

Diversity Scholarship

Advoqt believes that the tech ecosystem should reflect the diverse composition of our community. To help with that effort, we offer need-based scholarships of up to $11,000 to people of diverse backgrounds. Send us a message in the “Contact Us” section below to learn more.

Edie Windsor Scholarship

Scholarship covers up to 50% of tuition for gender nonconforming and LGBTQ women

CyberWarrior Program Part-Time Scholarships of up to $11,000 Available

Frequently Asked Questions


What sets CyberWarrior apart from other training programs?

CyberWarrior is a social enterprise and workforce development program providing cybersecurity training and career advancement services. The training is intensive, hands-on and delivered by practicing white-hat hackers. Our students graduate with 3 certifications (EC Council – Ethical Hacker, EC Council – Network Defender, and CyberWarrior Certified), develop the technical competency to deliver immediate value to leading corporations, and learn how to constantly investigate new innovations.

What is the total investment?

Tuition is $16,500USD for the entire 6-month program including instruction, courseware, certification exams, learning platform, and labs.

Certifications (CND & CEH – $2,900) and hands-on modules ($2,200) can be purchased separately.

Is cybersecurity experience a prerequisite for the training program?

No. While certain IT skills and/or experience are required for the CW program, cybersecurity experience is not a prerequisite. Examples of the types of backgrounds we recruit from are: Technical Support, IT Specialist, Network Specialist, Network and Systems Administrator, Applications Support, Help Desk Analyst and Developer.

Contact Us

If you have any questions or concerns about the program, please do not hesitate to contact us.

7 + 4 =

Powered by Advoqt