HUNT Program: Co Springs, Spring 2021
A 12-week immersive program
HUNT Program
Our HUNT program is your direct path to a career as a cybersecurity analyst. Our 480-hour immersive curriculum includes eight foundational courses, extensive hands-on skill building and guided product training.
In 12 weeks, HUNT students graduate as tier 1+ security analysts, threat analysts and hunt analysts qualified for immediate employment.
Our Colorado Springs Campus is a welcoming environment for both military and civilian individuals. What our Springs students hold in common is a strong desire to join a mission, put 100% into everything they do, and secure the future for not only themselves, but for others.
Colorado Springs Campus
SecureSet Co Springs is located in the beautiful downtown Colorado Springs, in the shadow of Colorado’s Pikes Peak. We have converted a trolley assembly building into an optimal learning environment for providing successful cybersecurity training. Built in 1890, our cool urban building provides ample free parking, close proximity to public transit, restaurants, and banking.
Tuition + Financing
Learn about our competitive tuition rates and tuition assistance programs here. Our options open the door to your education and career goals.
What You’ll Need
To successfully complete this program, you will need your own laptop of reasonable quality. Click here to learn more, from our instructors, about the kind of laptop you should look for.
Modules included in this program
Learn industry-standard theories and techniques, then apply them during hands-on labs for a complete cybersecurity skill set. The HUNT program includes:
GRC
Engaging the enterprise
Delivering system security
Plans and policies
Hunt Skills
Team methods and tools
Threat ID & surveillance
Data & tracking
Network Admin
Network security
Network protocols
Intro to attacks
Security Culture
Professionalism in security
Conducting intelligence
Industry expectations
SIEM Admin
Security monitoring
Threat ID & response
Crisis management
Strategy & Analysis
Psychology of analysis
Criminal psychology
Threat intelligence
System Admin
System security
Desktop OSes
Service configuration
Threat Intelligence
Threat intelligence overview
Threat creation
Threat consumption
We're here for you. Reach out with questions.
Contact UsIf you're ready, so are we. Apply for HUNT.
Enroll NowExplore our FAQs and see what others are asking.
Visit FAQs