Programs

Total Cyber Solutions offers a range of programs to jumpstart your career in many Cybersecurity fields

"What really turned me over was the ability to understand how everything works without any prior knowledge."
John Doe
Designer

Desktop Support

You will learn Windows and Linux, how to fix hardware and troubleshoot software, the IT service process and how to take care of customers.

Cybersecurity

You will learn what Cybersecurity is and how to secure Operating Systems, Networks and IT environments for a variety of organizations.

Penetration Tester

You will learn the penetration testing methodology, how to use it to help businesses find holes in their IT environments and provide a detailed report.

Data Analysis Using Python

Analyze data using Python code and Python scripts

Programs Courses Syllabi

  • Desktop Support Program
  • Cybersecurity Engineer Program
  • Penetration Tester Program
  • Data Analytics with Python Program

In the Desktop support program students will learn: 

Fundamentals of Information Technology  

Students will learn how to address issues including: 

IT Concepts and Terminology 

Infrastructure Setup 

Applications & Software 

Software Development 

Database Fundamentals 

Security Essentials 

  

Fundamentals and intermediate skills of Software and Hardware support 

Students will learn how to address issues including: 

Hardware 

Operating Systems 

Software Troubleshooting 

Networking 

Hardware & Network Troubleshooting 

Security 

Mobile Devices 

Virtualization & Cloud Computing 

Operational Procedures 

  

End User Awareness 

Students will learn how to address issues including: 

Information Protection 

Cyber Terrorism 

Social Engineering 

Remote Worker Security 

Virus Protection 

Password Security 

Web Browser Security 

Email Security 

Instant Messaging Security 

Telephone Security 

Mobile Security 

  

Intermediate Network Concepts 

Students will learn how to address issues including: 

Networking Concepts 

Infrastructure 

Network Operations 

Network Security 

Network Troubleshooting & Tools 

  

Intermediate Security Concepts 

Students will learn how to address issues including: 

Attacks, Threats and Vulnerabilities 

Architecture and Design 

Implementation 

Operations and Incident Response 

Governance, Risk and Compliance

In the Cybersecurity Engineer Program students will learn: 

Fundamentals of Information Technology 

Students will learn how to address issues including: 

IT Concepts and Terminology 

Infrastructure Setup 

Applications & Software 

Software Development 

Database Fundamentals 

Security Essentials 

  

Intermediate Network Concepts 

Students will learn how to address issues including: 

Networking Concepts 

Infrastructure 

Network Operations 

Network Security 

Network Troubleshooting & Tools 

  

Intermediate Security Concepts 

Students will learn how to address issues including: 

Attacks, Threats and Vulnerabilities 

Architecture and Design 

Implementation 

Operations and Incident Response 

Governance, Risk and Compliance 

  

Cloud Computing 

Students will learn how to address issues including: 

Cloud Architecture & Design 

Cloud Security 

Cloud Deployment 

Operations & Support 

Troubleshooting 

  

Operating System and Server and Workstation Concepts 

Students will learn how to address issues including: 

  

Vulnerability Assessment and Risk Management 

Students will learn how to address issues including: 

Vulnerability Assessment Frameworks 

Vulnerability Assessment Techniques 

Vulnerability Assessment Tools 

Detect and Respond to Vulnerabilities 

Preform a Vulnerability Assessment 

  

Cyber Policy and Compliance 

Students will learn how to address issues including: 

Risk Assessment Fundamentals 

Steps to Risk Assessment Process 

Risk Assessment Procedures 

Risk Reduction and Management 

  

Critical Controls 

Students will learn how to address issues including: 

  

Security and Network Operations Center Concepts 

Students will learn how to address issues including: 

Fundamentals of Security and Network Operations Center 

Incident Detection and Response 

Security Event and Information Management (SEIM) or 

Security information and event management (SIEM) 

SEIM Deployment and Operations 

In the Penetration Tester Program students will learn: 

Intermediate Network Concepts 

Students will learn how to address issues including: 

Networking Concepts 

Infrastructure 

Network Operations 

Network Security 

Network Troubleshooting & Tools 

  

Intermediate Security Concepts 

Students will learn how to address issues including: 

Attacks, Threats and Vulnerabilities 

Architecture and Design 

Implementation 

Operations and Incident Response 

Governance, Risk and Compliance 

  

Vulnerability Assessment 

Students will learn how to address issues including: 

Vulnerability Assessment Frameworks 

Vulnerability Assessment Techniques 

Vulnerability Assessment Tools 

Detect and Respond to Vulnerabilities 

Preform a Vulnerability Assessment 

  

Fundamentals of Ethical Hacking and Penetration Testing 

Students will learn how to address issues including: 

Emerging Attack Vectors 

Enumeration 

Malware and Reverse Engineering 

Cloud Computing 

Hacking Web Applications 

Operation Technologies 

WIFI Cracking 

Penetration testing Labs 

  

Intermediate Ethical Hacking and Penetration Testing 

Students will learn how to address issues including: 

Planning & Scoping 

Information Gathering & Vulnerability Identification 

Attacks & Exploits 

Penetration Testing Tools 

Reporting & Communication 

Ethical Hacking Labs 

  

  

Advanced Ethical Hacking and Penetration Testing 

Students will learn how to address issues including: 

Penetration Testing: What You Should Know 

Getting Comfortable with Kali Linux 

Command Line Fun 

Practical Tools 

Bash Scripting 

Passive Information Gathering 

Active Information Gathering 

Vulnerability Scanning 

Web Application Attacks 

Introduction to Buffer Overflows 

Windows Buffer Overflows 

Linux Buffer Overflows 

Client-Side Attacks 

Locating Public Exploits 

Fixing Exploits 

File Transfers 

Antivirus Evasion 

Privilege Escalation 

Password Attacks 

Port Redirection and Tunneling 

Active Directory Attacks 

The Metasploit Framework 

PowerShell Empire 

Penetration Testing Labs

Python Fundamentals 

Students will learn how to address issues including: 

Installing the latest version of Python 

Working with Jupyter Notebooks 

Python data types, operators, and variable names 

Python strings, lists, ranges, and constructors 

Controlling the flow of Python programs 

Modularizing code with functions 

Handling data with tuples, sets, and dictionaries 

Developing Python modules 

Encapsulation with Python classes 

Building an intelligent Texas Hold’em Poker application 

  

Data Analysis 

Students will learn how to address issues including: 

Introduction to pandas 

Selecting subsets of data 

Essential pandas commands 

Grouping data with pandas 

Analyzing time series data 

Exploring text with regular expressions 

Cleaning and transforming data 

Joining multiple datasets together 

Building professional data analytics reports 

  

SQL 

Students will learn how to address issues including: 

Connecting to SQL databases 

Querying databases with the SELECT statement 

Translating pandas to SQL 

  

Data visualization 

Students will learn how to address issues including: 

Learning the data visualization landscape in Python 

Building interactive data analytics dashboards

Additional Programs we Offer

Desktop Support

Our Desktop Support program will help you become the best technician

Cybersecurity

Our Cybersecurity program teaches best business practices

Penetration Tester

Our Penetration Tester program will make you a skilled ethical hacker

Data Analysis Using Python

Analyze data using Python code and Python scripts

CompTIA Courses

CompTIA offers everything you need to prepare for your certification exam. Explore training developed by CompTIA with options that fit various learning styles and timelines. Whether you prefer self-study or classroom training, CompTIA has you covered.

EC-Council Courses

EC-Council is committed to uphold the highest level of impartiality and objectivity in its practices, decision making, and authority in all matters related to certification.

Micro Courses

**Description soon to come!**

The Companies that Have Hired our Students

Why choose us over the "free" programs?

Udemy

Total Cyber Solutions

Bootcamps

Ready to Apply for a Program?