What does the CAPSLOCK cyber bootcamp teach?

Get a quick overview of what is covered on the CAPSLOCK cyber security bootcamp, including core problem areas and topics.

The CAPSLOCK cyber security bootcamp is designed to take someone from any background, with or without prior IT experience, and teach them the skills needed to launch a successful career in cyber security.

You will undertake the course as a Trainee Cyber Security Consultant, exploring our industry-focused curriculum and working in a small team to solve real-world cyber problems.

Because cyber security is as a very broad discipline, the curriculum is designed to develop you as an all-round cyber security practitioner who understands the breadth of cyber security principles, and knows how to apply the knowledge you've learned in real-life scenarios.

Upon successfully passing the course, you will be a Certified Cyber Security Practitioner. 

The 5 Problem Areas we cover on the course:

1. Understanding Business

In the first few weeks of the CAPSLOCK bootcamp, we explore why cyber security exists and how it applies to an organisation in a business context. You will learn how cyber security is measured, how organisations can develop effective cyber security culture, and explore threats such as social engineering. This is the foundational concept which you will build on as the course progresses. 


2. Security By Design
We introduce you to Governance, Risk, and Compliance (GRC), and how these concepts underpin the existence of cyber security. You'll develop your networking fundamentals and begin to consider security architecture by working on real scenario-based problems. 


3. Applied Security 

The problems you solve will begin to increase in complexity and you will continue to apply learnings from areas 1 & 2. Some of the areas you will be working on include Endpoint Protection, Cloud Security, Digital Forensics, Access Control and other applied security areas too.  
4. Offensive & Defensive Security

You will continue to develop your understanding of cyber security threats and apply this understanding in the context of both offensive and defensive security operations, such as penetration testing and security operations. You will learn how to apply skills such as reconnaissance, malware analysis, threat intelligence, and log analysis in simulated scenarios. 
5. Business Continuity Management 

In this final problem area, you will use your new skills from the course so far to tackle big picture problems such as incident management & response and strategic business resilience. You will also consider topics such as physical security and industrial control systems.  

Topics covered: 

Technology Fundamentals
● Emerging Technologies
● Network Fundamentals
● Basic Scripting
● Operating Systems
● Application Security (SDLC)
● Malware
● End Point Protection
● Pen Testing
● Cloud Infrastructure 
● Applied Cryptography
● Security Architecture
● Threat Hunting
● Industrial Control Systems
● Big Data
● IoT
● Supply Chain Security
● Threat Intelligence
● Outsourcing
● Governance
● Physical Security
● Business Resilience
● Laws, Regulations & Standards
● Risk Management
● MI & Metrics
● Forensics Fundamentals
● Audit
● Incident Management
● Ethics
● Policy
● Human Factors
● Business Understanding
● Security Culture & Awareness
Impact Skills
● Professional Communications
● Mentorship & Community
● Teamwork
● How To Learn
● Presenting & Public Speaking
● Problem Solving
● Career Counselling