CORE Program: Colorado Springs, Spring 2020
A 20-week immersive program
CORE Program
Our CORE program is your direct path to a cybersecurity engineering career. This 800-hour immersive curriculum includes 12 foundational courses, extensive hands-on skill building and guided product training. In as little as 20 weeks, CORE students graduate as tier 1+ security engineers, analysts, pen testers and consultants qualified for immediate employment.
Colorado Springs Campus
Our Colorado Springs Campus is a welcoming environment for both military and civilian individuals. What our Springs students hold in common is a strong desire to join a mission, put 100% into everything they do, and secure the future for not only themselves, but for others.
SecureSet Co Springs is located in the beautiful downtown Colorado Springs, in the shadow of Colorado’s Pikes Peak. We have converted a trolley assembly building into an optimal learning environment for providing successful cybersecurity training. Built in 1890, our cool urban building provides ample free parking, close proximity to public transit, restaurants, and banking.
Tuition + Financing
Learn about our competitive tuition rates and tuition assistance programs here. Our options open the door to your education and career goals.
What You’ll Need
To successfully complete this program, you will need your own laptop of reasonable quality. Click here to learn more, from our instructors, about the kind of laptop you should look for.
Modules included in this program
Learn industry-standard theories and techniques, then apply them during hands-on labs for a complete cybersecurity skill set. The CORE program includes:
Cryptography
Core crypto primitives
Encryption & authentication
High-level security protocols
GRC
Engaging the enterprise
Delivering system security
Plans and policies
Logs & Detection
System security monitoring
Intrusion detection
Crisis management
Network Intro
Network basics
Network layers
Common protocols
Network Security
Core network security
Basic network protocols
Attacks on basic technology
Network Security 2
Advanced network security
Sniffing & port scanning
Web-based security
Security Culture
Professionalism in security
Conducting intelligence
Industry expectations
Strategy & Analysis
Psychology of analysis
Criminal psychology
Threat intelligence
System Intro
Intro to OSes
Intro configuration
Intro to security
System Security
Core system security
Key desktop OS
Key mobile OS
Advanced Systems
Advanced system security
Standard attacks
Payloads, malware & more
Threat Intelligence
Threat intelligence overview
Threat creation
Threat consumption
Upcoming Cohorts
We're here for you. Reach out with questions.
Contact UsIf you're ready, so are we. Apply for CORE.
Enroll NowExplore our FAQs and see what others are asking.
Visit FAQs