Cyber Master Training




Expanding Security Cyber Master Training

This high-level masters course is offered once per year for 9 months.  Next class begins late March 2018.  Contact Dean Bushmiller to discuss your participation 443-865-3265.

Full tuition includes 3 exam vouchers.

In Cyber Master Training we learn the concepts, the practical activities, and the business practices that will last for 50 years. Our program topics are selected based upon 10 years of NICCS research and the Framework of 2500 KSAT’s: Knowledge, Skills, Abilities, and Tasks. The resume, the boss, the one who makes the decisions needs proof; Certifications are still part of the Cyber Master Training program.

How can you get it done?

Cyber Master Training is faster than a degree and more substantive than bolted-together classes. This is a plan you can follow while working. 90 sessions LIVE ONLINE; 1 hour each; 3 meetings per week; spread over a digestible length of time.

This is not exam preparation. This is cybersecurity foundation building. You can do it. Follow the plan.

High-level course overview

NICCS Categories:

Securely Provision, Oversee and Govern, Protect & Defend

NICCS Roles:

  • Information Systems Security Manager
  • Security Control Assessor
  • Cyber Policy and Strategy Planner
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst

Certifications covered in Cyber Master Training

  1. CISSP® from ISC2
  2. CASP® from CompTIA
  3. CSXP® from ISACA

Detailed Course Outline – 8 sections, 57 topics, 570 NICCS KSAT’s


  1. Common Vulnerabilities and Exploits
  2. Penetration Testing and Assessment*
  3. Testing Computer System Vulnerability


  1. Systems Security Engineering
  2. Identity Verification
  3. Mobile Applications
  4. Protecting Information
  5. Media Sanitization*
  6. Patch Management*
  7. Securing Systems
  8. Configuration Management


  1. Log Management*
  2. Continuous Monitoring
  3. Incident Handling
  4. Event Recovery
  5. Threat Information Sharing
  6. Forensics and Incident Response


  1. Protocols & Communications Analysis*
  2. Virtual Private Networking *
  3. Transport Layer Security*
  4. Trustworthy Email *
  5. Bring Your Own Device*
  6. Industrial Control Systems
  7. Internet of Things*
  8. Virtual Network*
  9. Virtualization*
  10. Cloud Computing*
  11. Mobile Devices*
  12. Wireless Networks*
  13. Wireless Authentication*
  14. IPv6
  15. Domain Name System*
  16. Intrusion Prevention Systems*
  17. Firewalls*
  18. Anti-Virus
  19. Secure Web Services*
  20. RISK: (55)
    1. Personally Identifiable Information
    2. Risk Management Framework
    3. Managing Risk
    4. Supply Chain Risk Management
    5. Risk Assessments*

    MANAGEMENT: (31)

    1. Developing Security Plans
    2. Contingency Planning*
    3. System Development Life Cycle
    4. Performance Measurement

    CRYPTOLOGY: (37)

    1. Encryption*
    2. Block Cipher Modes
    3. Algorithms and Key Lengths
    4. Key Management Systems
    5. Digital Signatures
    6. Public-Key Cryptography*

    OTHER: (5)

    1. OWASP top 10*
    2. Physical Security

    *Indicates hands-on exercises