CYBERSECURITY PATH FOR HIGH SCHOOL GRADUATES

Commence your cybersecurity journey by first mastering digital basics and establishing connections. Then, deepen your understanding with courses like Cisco’s Introduction to Cybersecurity, Fortinet, Check Point, and Splunk. Enrol in the PAYiCyS Programme: Cybersecurity Path for High School Graduates to embark on this exciting career pathway.

PAYiCyS programme is tailored for individuals committed to becoming cybersecurity professionals and is designed to be completed within six months. This certification program includes a diverse range of self-paced modules and practical, hands-on exercises aimed at demonstrating mastery of complex cybersecurity concepts. Each certification program within PAYiCyS assesses specific levels of cybersecurity expertise, spanning from foundational to architect levels. Furthermore, participants receive two $200 vouchers for Pearson Vue Exams upon completion.

SEE COURSES BELOW!!

Cybersecurity Essentials: Digital Forensics Essentials | eLearning

The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.

Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime, etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crimes or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.

Computer forensics enables the systematic and careful identification of evidence in computer-related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems to tracing the originator of defamatory emails, to recovering signs of fraud.

The Digital Forensics Essentials (DFE) program covers the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law.

This program gives a holistic overview of the key components of computer forensics. The course is designed for those interested in learning the various fundamentals of computer forensics and aspire to pursue a career in the computer forensics field.

Ethical Hacking Essentials | eLearning

Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information.

Information security plays a vital role in all organizations. It is a state of affairs where information, information processing, and communication are protected against confidentiality, integrity, and availability of the information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.

Information security is one of the required elements constituting the quality of information and information systems. Precaution to information security risks and taking adequate and sufficient information security measures are part of the good information processing practice required in particular by the data protection laws and more broadly, part of the good information management practice.

The Ethical Hacking Essentials (EHE) program covers the fundamental concepts of information security and ethical hacking. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls.

This program gives a holistic overview of the key components of information security. The course is designed for those interested in learning the various fundamentals of information security and ethical hacking and aspire to pursue a career in information security.

Throughout the course, you will be asked a number of questions to test your understanding. Enjoy the course!

Network Defense Essentials | eLearning

The computer network has become more and more complex over the past few years and so has the threats to its security. The impact of security breaches on organizations varies from monetary loss, reputation damage, waning customer loyalty, diminishing investor confidence, to legal consequences. It does not matter if an organization installs the state-of-the-art security software solutions or if it spends thousands of dollars on the security mechanisms; the fact remains that no organization is completely secure. Organizations need a security specialist who can help mitigate the security threats.

Network security plays a vital role in most of the organizations. It is the process of preventing and detecting unauthorized use of an organization’s networking infrastructure. It protects networks and their services from unauthorized modification, destruction, or disclosure. Network security assures that a network performs its critical functions securely without any harmful side effects. Security awareness and well-structured training can help find the weaknesses of a network and keep network administrators abreast of the latest threats and techniques by gaining a better understanding of risk exposure as well as the newest countermeasures.

The Network Defense Essentials (NDE) program covers the fundamental concepts of network security. It equips students with the skills required to identify the increasing network security threats that reflect on the organization’s security posture and implement general security controls to protect the underlying networking infrastructure from unauthorized access, modification, destruction, or disclosure.

This program gives a holistic overview of the key components of network security. The course is designed for those interested in learning the various fundamentals of network security and aspire to pursue a career in network security.

Get Connected and Master Digital Basics

Acquire crucial skills such as basic computer literacy, device connectivity, and accessing online tools like search engines, email, and social media platforms.

 Cover Your Digital Essentials

In both personal and professional realms, the digital landscape plays a vital role. Developing a better understanding of the internet, computers, and social media can significantly enhance your digital proficiency, paving the way for career advancement. Explore the fundamentals of computer usage, device connectivity, and online navigation in a user-friendly and interactive course environment, enriched with ample illustrations. No prior experience is necessary – this introductory course caters to beginners.

 Learning Objectives:

  • Establish accounts on Facebook, LinkedIn, and YouTube.
  • Gain insights into computer networking and effective internet browsing.
  • Familiarize yourself with Microsoft Windows and file management.
  • Recognize common issues and implement solutions.

Duration: 30 hours

Difficulty Level: Beginner

Learning Format: Instructor-led or self-paced online learning

 Cybersecurity Fundamentals: An Introduction

Embark on a journey to explore the dynamic world of cybersecurity and its profound impact, as you unravel the most prevalent threats, attacks, and vulnerabilities.

 In an Era of Expanding Connectivity, New Threats Emerge Constantly

In today’s interconnected world, the risk of cyber-attacks is ever-present. Whether you’re drawn to the rapidly evolving field of cybersecurity as a prospective professional or simply wish to enhance your online safety and social media practices, this introductory course is tailored to meet your needs. It delves into current cyber trends, common threats, and the broader landscape of cybersecurity, providing insights that are directly applicable to your daily life. From safeguarding personal privacy online to understanding the complex challenges faced by businesses, government agencies, and educational institutions, this course equips you with essential knowledge. No prior experience is required.

 Learning Objectives:

  • Gain a comprehensive understanding of cybersecurity and its relevance to individuals.
  • Identify and analyse prevalent threats, attacks, and vulnerabilities in cyberspace.
  • Explore strategies employed by organisations to protect their operations from cyber threats.
  • Stay informed about the latest job trends and the growing demand for cybersecurity professionals.

Duration: 15 hours (comprising 3 days of self-paced online study and quizzes to obtain an international certification)

Level: Beginner

Learning Format: Instructor-led or self-paced online learning

The second in a 2-course series. Further your mastery of Linux and prepare for certification.

Part Two – Further Your Mastery of Linux

It’s easy to believe that Linux has been around since the mid-‘90s, especially, considering its wide adoption across products, markets and industries. Further mastering Linux installation, configuring and maintenance is key to positioning yourself well and securing the IT administrator job of your choice. This is the second course in a 2-course series, preparing you for the Linux Professional Institute LPIC-1 certification. Prerequisite NDG Linux I or equivalent knowledge is recommended.

 $29.95 for self-paced classes; cost for instructor-led classes is determined by the institution.

You’ll Learn These Core Skills:

Augment your basic knowledge to become skilled in the Linux command line.

Configure basic networking, using virtual machines running Linux.

Perform scripting and data management; learn about interfaces, networking fundamentals and security.

Prepare for certification LPIC-1 (Exam 102).

Length: 70 hours

Level: Advanced

Learning Type: Instructor-led, Online self-paced

Achievements: Certification Aligned

Cybersecurity Essentials / Fundamentals

Acquire Essential Security Principles for Network Protection

 Master the Basics to Combat Cybercrime

A single breach can have devastating consequences for a company, impacting its financial viability and disrupting the lives of millions. This explains the increasing demand for skilled security professionals. Take the opportunity to develop an understanding of cybercrime, security principles, technologies, and procedures crucial for defending networks. Then, decide whether you wish to pursue an entry-level networking or security professional role. This course is highly recommended if you intend to pursue certifications such as CCNA or CyberOps Associate. Completion of Introduction to Cybersecurity or equivalent knowledge is advised as a prerequisite.

 Learning Outcomes:

  • Understand security controls for networks, servers, and applications.
  • Learn invaluable security principles and how to formulate compliant policies.
  • Implement appropriate procedures for ensuring data confidentiality and availability.
  • Develop critical thinking and problem-solving skills through hands-on exercises using real equipment and Cisco Packet Tracer simulations.

 Length: 30 hours (comprising 3 days of individual online study and quizzes to obtain an international certificate)

Level: Intermediate

Learning Type: Instructor-led, Online self-paced

IT Essentials: Mastering Computer Systems and Networks

Acquire the necessary competencies and methodologies to proficiently install, configure, and rectify issues pertaining to computers, mobile devices, and software.

For existing students, please liaise with your academy for further information.

Navigating the Basics of Computer-Network Connectivity

Imagine the satisfaction of constructing a computer system and seamlessly integrating it into a secure network environment. This initial endeavour sets the stage for a fulfilling career in IT. Mastery of fundamental computer principles is paramount for success in any IT specialization. IT Essentials not only delves into these foundational concepts but also imparts the essential career skills requisite for entry-level IT positions. Engage with advanced simulation tools from Cisco Networking Academy and partake in numerous hands-on lab sessions designed to sharpen your troubleshooting acumen. No prerequisites or prior computer knowledge are necessary.

Key Skills to Acquire:

  • Proficient installation, configuration, and troubleshooting of computers and mobile devices.
  • Identification and mitigation of prevalent security threats such as phishing and spoofing.
  • Cultivation of critical thinking and problem-solving capabilities through hands-on experience with real equipment and Cisco Packet Tracer simulations.
  • Preparation for CompTIA A+ Certification.

Duration: 70 hours

Level: Intermediate

Learning Mode: Instructor-led Training (ILT)

Achievements: Badge, Certification Alignment

Sample job titles.

  • Tech Support,
  • System Administrator,
  • Software Development,
  • Application Development,
  • IoT Device Manager and more

Who hires for this skill?

Companies with a server room, cloud providers and more.

 If you are interested in the programme, please submit request.

Fortinet Networking Fundamentals (FNF)

Fortinet Networking Fundamentals (FNF)

This course serves as an introduction to the essential aspects of data communication and the foundational operations of computer networking. Designed for newcomers to the data networking field, it caters to those aiming for careers in IT, computer networking and infrastructure, or cybersecurity. FNF establishes a base of vital networking concepts and terminology, providing students with a springboard to delve into more advanced topics relevant to these career paths.

 Fortinet Certified Fundamentals in Cybersecurity

The Fortinet Certified Fundamentals (FCF) in Cybersecurity certification validates your mastery of the essential technical skills and knowledge required for entry-level cybersecurity positions. This curriculum encompasses courses covering the current threat landscape and the fundamental principles of cybersecurity.

To achieve this certification, you must successfully complete the core course along with one elective course. The certification remains valid for two years from the completion of the second course.

 Core Course:

Introduction to the Threat Landscape This course provides an understanding of the cyber threat landscape, including the various threats endangering computer networks, the actors responsible for these threats, and the fundamental cybersecurity principles crucial for maintaining network security.

 Elective Courses:

  1. Getting Started in Cybersecurity Ideal for individuals in non-technical roles who need a high-level understanding of key technical cybersecurity fundamentals. Examples include security product salespeople and company CEOs.
  2. Technical Introduction to Cybersecurity Designed for individuals in technical roles requiring a deeper understanding of cybersecurity fundamentals. It’s also suitable for those aspiring to pursue technical careers in cybersecurity.

Fortinet Certified Associate in Cybersecurity

The Fortinet Certified Associate (FCA) in Cybersecurity certification confirms your capability to perform advanced operations on a FortiGate device effectively. This curriculum focuses on mastering the fundamental aspects of operating the key features commonly found in FortiGate devices.

At the FCA level, there is a single certification available. To earn this certification, candidates are required to complete the FortiGate Operator course and pass the corresponding exam. The FCA certification remains valid for two years from the date of passing the FortiGate Operator exam.

 Core Exam:

  • FortiGate Operator

 Fortinet Certified Professional

The Fortinet Certified Professional (FCP) certifications attest to your proficiency in securing networks and applications through the deployment, management, and monitoring of Fortinet cybersecurity products. Each certification’s curriculum focuses on the day-to-day tasks associated with Fortinet devices.

At the FCP level, there are three certifications available. Each certification requires a minimum number of core exams and/or elective exams. All FCP certifications remain valid for two years from the date the last exam(s) were passed. FCP exams can be scheduled through Pearson Vue, and PAICTA offers a $200 x 2 voucher for this purpose.

Fortinet Certified Professional in Security Operations

The FCP in Security Operations certification validates your competency in securing networks and applications through the deployment, management, and monitoring of Fortinet security operations products. This program covers the daily tasks associated with Fortinet security operation devices. To obtain this certification, you are required to pass two elective exams within a two-year timeframe.

 Elective Exams:

  • FortiGate Administrator
  • FortiAnalyzer Analyst
  • FortiSIEM
  • FortiSOAR Administrator
  • FortiEDR

 Fortinet Certified Professional in Network Security

The FCP in Network Security certification confirms your ability to secure networks and applications by deploying, managing, and monitoring Fortinet network security products. This curriculum addresses the routine tasks associated with Fortinet network security devices. To achieve this certification, you must pass the core exam and one elective exam within two years.

 Core Exam:

  • FortiGate Administrator

Elective Exams:

  • FortiClient EMS Administrator
  • FortiManager
  • FortiAnalyzer Administrator
  • FortiAuthenticator Administrator
  • FortiNAC
  • FortiSwitch
  • Secure Wireless LAN Administrator

Fortinet Certified Professional in Public Cloud Security

The FCP in Public Cloud Security certification validates your proficiency in securing cloud applications through the deployment, management, and monitoring of Fortinet public cloud products. This curriculum addresses the daily responsibilities associated with Fortinet public cloud devices and virtual machines (VMs). To achieve this certification, you are required to pass one core exam and one elective exam within a two-year timeframe.

 Core Exams:

  • Cloud Security for AWS Administrator
  • Cloud Security for Azure Administrator

 Elective Exams:

Kindly fill out the form to enrol in the PAYiCyS: Cybersecurity Path For High School Graduates. We’re required to provide statistics to the Partner/Funder who has generously supported this program, aimed at nurturing your expertise in the cybersecurity field.