Cybersecurity

Learn to assess security risks, implement controls to secure network infrastructures, combat hackers and viruses, and more.

QUESTIONS?
Contact us:

info@amesite.com
734 928 2644 (9 am – 5 pm EST)

OUR PARTNER:

engage @ emu Eastern Michigan University Professional Programs and Training

Eastern Michigan University
Professional Programs and Training

"Everyone thinks that cybersecurity technology is out of reach—but it's not! With the right training, like the Eastern Michigan / Amesite Cybersecurity Certification, an IT or other professional can upskill and execute—in an industry that is starved for workers, and pays out a high wage."

Raffaele Mautone, CEO of Aadya

About the Course

CERTIFICATION
Certification is awarded after successfully completing the course requirements.

UPCOMING OFFERING
Starting September 30, 2019

COST
$2,799

REQUIRED TEXTS
Hands-On Ethical Hacking and Network Defense | 3rd Edition
Michael T. Simpson, Nicholas Antill
ISBN: 9781337271738
eBook Rental (students as of 8/1/19) – $29.49
Order Here

Guide to Computer Forensics and Investigations | 6th Edition
Bill Nelson, Amelia Phillips, Christopher Steuart
ISBN: 9781337685863
eBook Rental (students as of 8/1/19) – $45.99
Order Here

Management of Information Security
Michael E. Whitman, Herbert J. Mattord
ISBN: 9781337405744
eBook Rental (students as of 8/1/19) – $34.99
Order Here

COURSE DESCRIPTION
Throughout this 18-week, 60 contact hour program, you’ll learn to assess security risks, implement controls to secure network infrastructure, and combat hackers and viruses. Through a combination of individual assessments, student engagement activities, quizzes and lab sessions, you will:

  • Be introduced to penetration testing and vulnerability assessments, and use in-depth labs featuring both open-source and commercial-based tools;
  • Use intensive lab exercises to simulate investigation and recovery of data in networks; physical interception; traffic acquisition; attack detection; and conduct protocol analysis;
  • Learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring, and compliance in the full panorama of information systems management; and
  • Develop skills in implementation and maintenance of cost-effective security controls that are closely aligned with both business and industry standards.

Laboratories — DETERLab
DETERLab is dedicated to supporting cyber security education. Since its inception, DETERLab has been used by 358 research projects, from 262 institutions and involving 918 researchers, from 203 locations and 46 countries. Students will use labs available at no cost in DETERLab to practice security techniques on this testbed.

Meet the Instructor

naveen

Naveen Bisht
Naveen Bisht has over 20 years of experience as an entrepreneur and advisor to startup companies. Currently, he is Co-Founder and CEO, Akitra Inc., an AI-based Cybersecurity software startup and Co-Founder, Auriss Technologies Inc. Prior to this, he was Co-Founder and CEO of Straks!, Inc, a real-time mobile commerce infrastructure software, CEO of SecurAct, Inc., a cloud security startup, and Founder, President and CEO, of Nayna Networks, Inc., a broadband access and networking technology, where he raised over $80 Million dollars from VC and PIPE firms and completed merger into a public company. Previously, he was Founder and CEO of Ukiah Software, Inc., a leader in policy-based security and firewall software acquired by Novell, Inc. Prior to this, he was Founder and President of NeoGlobal, Inc, a software development services company focused on internet security, enterprise software and networking market. He holds MS from Texas Tech University, MS and BSME from Birla Institute of Technology & Science. He also attended Ph.D. program at University of California, Santa Barbara and holds several patents in the area of firewalls and security software.

Build your career, your way.

protectedAsset 34
Protected Data
confidenceAsset 32
Stakeholder Confidence
cost-pinkAsset 33
Decreased Downtime