x

We use the latest technologies to provide the best experience!

Please download a newer version of your browser. Click to close

Become a Cyber Security Specialist

Follow the Cyber Security course and land a high-paying job in one of the fastest growing industries

Why follow the Cyber Security course?

Enter one of the fastest growing industries in the world
savings icon

Sustainable career

One of the fastest growing markets overall and the fastest in the tech industry. You'll set yourself up for a rewarding career.

rate-up icon

High-paying jobs

Depending on experience and seniority, Cyber Security professionals can earn up to €60,000 gross per year on average in The Netherlands.

notes icon

Need for hands-on skills

With an unemployment rate of 0%, the industry is looking for more talent to fill the growing number of open positions.

privacy-policy icon

Have impact

Cyber Security plays an essential role in the safety of the online, as well as the offline world. Contribute to protecting individuals, corporations and governments from cybercrime.

What will you learn?

The Cyber Security Academy covers the hands-on and practical skills you need to kickstart your career in cybersecurity. The Academy offers an accelerated training program for people with or without an IT background, in an optimal blended learning format.
Summary
Part 1
Part 2
Part 3
Part 4
Part 5
Part 6

Theory & NICE Framework

The curriculum is based on the National Initiative for Cybersecurity Education (NICE) Framework. The program consists of an interactive online learning platform with instant feedback from the facilitators

Group projects

Cyber security is a team effort. Work together on exercises and projects while improving your collaboration skills.

Real World Simulations

Gain experience with real life scenarios and hands-on exercises. Learn to perform and defend from cyber attacks with the use of virtual machines.

Job Ready

With our career accelerator program, you'll be ready to hit the job market. Create your profile and land your first job in Cyber Security!

Overview of the Cybersecurity Landscape and Industry

Basics of Computer and Device Hardware, Software, Operating Systems, and Processes

Basics of Networking Traffic, Hardware Components, and Topology

Network Communication Principles and Methods

Network and Routing Protocols / Services

Packet Level Traffic Analysis

Hands-on Operation of a Computer Network and Equipment, Monitoring and Analyzing Network Traffic Flow, Patterns and Performance

Hands-on Creation and Analysis of Critical Network Servers

Hands-on Creation and Analysis of Telnet, Web, Data and Active Directory Servers

Hands-on Analysis of Network Topologies, Network Mapping and OS Fingerprinting

Telecommunication Concepts and Range

System and Network Admin Concepts, Management Principles and Controls

Hands-on Creation and Use of Virtual Machines and Bootable USB OS

Hands-on Assessment of Access Controls and Hardening Techniques to Ensure a Network’s Security

Hands-on Configuration and Utilization of a Firewall (on Windows, Linux and Hardware Firewall)

Hands-on Configuration and Utilization of a Network/Host Intrusion Detection/Prevention System to Alert and Prevent Malicious Activity on a Network

Hands-on Configuration and Utilization of a Security Information and Event Management System to Correlate, Research, Analyze Logs and Provide Timely Detection of Misuse, Threats and Malicious Activity on the Network

Hands-on Malware Detection, Analysis, Isolation and Removal

Cyber-Forensics Investigation Methodologies, Mindset, Tools

Hands-on Forensics Investigation: Logs, System Files, Media, Memory Dump and Traffic Monitoring and Analysis

Overview of Network Vulnerabilities, Associated Attacks; Ethical Hacking Methodologies, Stages, Principles, Tools and Techniques

Conducting Hands-on Vulnerability and Compliance Scanning and Correction Recommendation

Performing Hands-on Incident Response, Damage Assessment, Incident Triage, Tracking and Reporting

Full Day Scenarios: Hands-on Protecting a Network from a Range of Cyber-Attacks (DDoS, SQL Injection, XSS, Ransomware, MiTM, ARP Poisoning, etc.)

Analysis of System Security and Organizational Posture Trends

Analysis of Cyber-Defense Trends and Staying at the Cutting Edge of the Industry

Performing Security Design and Architecture Evaluation and Ensuing Recommendation

Hands-on Processing of the Whole Chain of Custody for Handling Digital Evidence

Performing Hands-on Static and Dynamic Analysis of Drive Images and other Data Sources, Recovery and Mitigation/Remediation of an Enterprise System

Risk and Security Management Processes and Security Models

Privacy Principles and Advising on Disaster Recovery, Contingency, and Continuity

Final Hands-on Scenario

Career Accelerator Program

Start date & Application process

Follow the steps below to secure a spot of the upcoming course

Application Process

These are the steps you will go through.

1. RegistrationSign up by selecting your preferred start date and filling in all your details, including your motivation to this course.
2. Intake with Education AdvisorYou will be contacted by the Education Advisor to schedule an intake meeting to discuss the course in detail and all practicalities before starting.

Upcoming start date

Select the start below. Make sure to submit your application before the deadline.

2 November 2020

Application deadline: 21 October

Part-time

Pricing & structure

Part-time course with personal hybrid facilitation and a self-paced online learning environment.

1.

Hybrid facilitation to match your online or on-site need

2.

Tuesday & Thursday 18:30 - 22:00

3.

+ 4 hours of self-study every week

Pricing

€5,995
Paid in 6 instalments
Part-time

Pricing & structure

Part-time course with personal hybrid facilitation and a self-paced online learning environment.

1.

Hybrid facilitation to match your online or on-site need

2.

Tuesday & Thursday 18:30 - 22:00

3.

+ 4 hours of self-study every week

Pricing

€5,995
Paid in 6 instalments

What is Cyber Security?

Cyber Security is a field that encompasses the protection of data, networks, and software from unauthorized access, attack, or damage. Every company that collects, processes, and stores data has to protect its sensitive information (such as financial data, personal information, intellectual property etc). Government bodies, the military, large corporations, and medical institutions are now the sectors most dependent on cyber security, but as the number of sophisticated cyber attacks grows, more sectors will follow.

graphic illustration

For whom is the Cyber Security Academy?

For motivated people looking to acquire in-demand skills in a fast-paced learning environment.

Career Switchers

Are you looking for something completely new in the IT sector? Then this might be something for you! No technical background is required and the course is designed to take you from absolute beginner to professional level in 6 months.

Entrepreneurs

A growing market means business opportunities! Get all the relevant knowledge to start your own business or use it to protect your current business!

Upskillers

Looking to expand your technical knowledge by adding solid Cyber Security skills to your resume? This course will round up your professional profile.

Graduates

Just finished your studies and looking for a stepping stone into cyber security? This hands-on course will set you up with all the essential skills to be effective from day 1.

Future Proof Industry

The Cyber Security industry has grown more than 30 times in the last 10 years and is expected to keep growing exponentially. The only thing standing in your way is getting the right skills to secure a sustainable career. That's where Codaisseur comes in.

graphic illustration

Career opportunities

As Cyber Security becomes a more pressing and urgent matter, so is the need for talent with the right skills. Globally, the shortage of Cyber Security professionals is estimated at nearly 3 million. Job opportunties vary from very technical roles like Network Security Engineer to more consultancy-based ones such as Cyber Security Strategist. All these roles require deep knowledge about Cyber Security and hands-on skills.

graphic illustration

Join the Open Evening!

Join us for the Cyber Security Open Evening, where we'll provide a detailed presentation about the Cyber Security course. We'll cover the course content, the innovative learning methods and the career possibilities. Get to meet the team and have all your questions answered. Joining this event is completely free, so sign up now!
play icon