Apply today to Holgate Cybersecurity Academy!
Apply today to Holgate Cybersecurity Academy!
Our dedication to student success has allowed us to build long-term relationships with our students. Since our founding, we have distinguished ourselves from our competitors by our focused approach to education and meaningful measures of success.
Our goal is to provide our students comprehensive cybersecurity training and education, with student satisfaction as our trademark. Moreover, because of our forward-thinking knowledgeable employees, we continue to reach new levels of success."
At Holgate Cyber Academy, we offer an exclusive training and certification program for those who are serious about getting into Cybersecurity.
In our Academy,
You'll get 1-on-1, 1-hour calls every week with a Senior Cybersecurity professional, who is active in the field and has first hand and current experience.
We aren't your run-of-the-mill bootcamp who accepts anyone who sends them money. HCA only accepts a limited amount of students who are ready to put in the efforts to learn and succeed in the program.
This is not the typical bootcamp training mill!
HCA offers a 6-month intensive Cybersecurity Academy where the student will learn current and relevant skills in the cybersecurity field.
See our course outline for more information on the topics and areas of competencies that will be covered during the program.
Already a Student? Login to the LMS:
Its important to understand some fundamental Cybersecurity, Networking and Systems administration fundamentals to truly understand where and how Cyber plays it role in security systems and data. This introductory competency will cover things like Networking, IP Addressing, Cloud systems, Systems Administration concepts, CLI and GUI and others. With this initial grounding, the following program will make more sense and flow together better.
What is an identity and what role does it play in technology and security? This section goes through concepts such as identities, access controls, authentication and methods, privileged access, authorization and various tools of the trade commonly used to control these things.
Gathering information is critical to many Cybersecurity positions. This section will go over many concepts and programs related to logging, aggregation, correlation, automation and other concepts related to gathering and analyzing data. You will get a chance to look at the actual tools commonly used to conduct these tasks in the enterprise environment.
This competency will start looking at the Security+ Exam (Voucher included), that is a staple foundational certification in the INFOSEC and Cyber world. Exam objectives will be reviewed, along with sample questions, topics and study resources. Certification in Security+ will give a leg up during career searching.
Data in the Cloud? Well, kind of. Cloud security is really just data, systems, applications or infrastructure supported by others and/or stored on other peoples servers. This section will go over many Cloud related topics, and look at some of the standards and best practices for security data that is in the cloud.
Talk about the cloud.. Azure is Microsoft's platform for Cloud resources. This section will not only teach you about Cloud security specific to elements in Azure, but also prepare you for another valuable certification to show employers you current and knowledgeable about cloud technologies and security.
Not all of Cybersecurity is coding and technical. Governance of Cyber program is important, as it often defines how a cybersecurity program will be developed and ran. This section looks at how governance, risk and compliance play a role in cybersecurity and information security within a company.
In addition to the technical skills you'll be learning and practicing throughout the program, we'll also help you with some best practices and advise surrounding networking with potential employers and other like-minded cybersecurity professionals. Building connections and acquaintances in the field is valuable in many ways. We'll also help you with resume building to ensure your targeting your intended audience appropriately.
Soft skills such as communications, culture building and teamwork are arguably just as important as technical ability. Employees who fit into a team, often see increased success in their careers. We will go over many soft skills topics, both within the online Learning Management System, as well as during our calls.
This unit is focused on security controls that can be applied to an enterprise environment to secure data, network and systems. These include technical controls such as firewalls, encryption, intrusion detection systems, SIEM, antivirus, endpoint detection, patch management, physical security, logging. In addition to technical controls, we will also take a close look at Administrative controls such as policies, procedures, incident response and risk management practices.
Please reach us at if you cannot find an answer to your question.
Holgate Cyber Academy is an online education platform that offers a comprehensive Cybersecurity education. This includes approximately 6-months of curated educational material if committed to at least ~10 hours of study each week. The course material will remain available for 12 months, but the calls and coaching will end at the 6 month point.
The 6 month program, including 1-on-1 calls and coaching is $6000.
Yes, all the courses at Holgate Cyber Academy are taught by industry experts who have many years of experience in the technology and cybersecurity fields. This experience spans multiple sectors, including private, government, transportation and other critical infrastructure.
We love our students, so feel free to contact us with any questions.
Holgate Cyber Academy
Copyright © 2024 Holgate Cyber Academy - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.