Frequently Asked Questions

FAQs

How much does the program cost?

The cost of the NextGen program varies depending on your current status, if you are a student or if you are already employed in a job and looking to advance or start your career in cybersecurity.

If you are a student then we do have scholarship and grant opportunities. To determine if you qualify, click on this link and register as a NextGen and submit your application.

What are the classroom/study hours?

NextGen programs or classes are offered virtually and we do have self-paced online training and also instructor led training. The instructor led training is from Monday through Friday from 9AM to 3PM Pacific standard time once you are registered as part of a cohort. For more information, click here to access the upcoming cohorts and training program

Does NextGen help me get a job or internship?

NextGen helps you to be successful in cybersecurity domain by helping you find internships, full time job placements, mentoring, leadership development and also help you to network with experts and leaders to keep you abreast of cyber security threats and industry trends

Our goal is ensure our candidates have a complete end to end support and services to ensure you are successful in your career and personal development

How much can I expect to earn in cybersecurity?

It depends on your skillset and number of years of experience in cybersecurity. On average, cybersecurity professionals make ~$83,000 per year in base salary, with those who have greater experience earning as high as $112,000. To get a detailed understanding of the pay scale and job opportunity, we request you to join as a NextGen Member and review the details on our portal.  To register – click this link.

What is the NextGen program?​

NextGen offers aspiring students a plethora of options while choosing a career in cyber security and data protection. Our team of expert coaches have designed curriculums based on the student’s profiles starting from a beginner course for students from non-IT background to Advance courses which includes risk management, data science, privacy and compliance.

A student’s journey is typically from 45 to 90 days based on the course opted and will be encouraged to take up advanced levels. Training sessions have both theory and cloud-based technology labs to provide real-time professional experience.

Students can access courseware from anywhere through a dedicated Learning management system and can interact with peers and trainers through collaboration tools.

Why should I be a member of NextGen?​

NextGen provides an innovative approach to training and developing the future generation of cybersecurity professionals. For those who are interested and energized to learn, NextGen provides top-notch learning opportunities by collaborating with established industry leaders. NextGen does not stop at this but helps its members convert all their efforts and success into real jobs. We provide job placement support for those who successfully complete their training. We provide a platform to learn cybersecurity and data protection concepts, techniques, processes and solutions by engaging coaches who are domain experts and stalwarts in the field of cyber technology. We suggest relevant courses based on your profile and enable you to design your career path by providing full time placements, internships or externship. Apart from training & education members also get scholarship opportunities, internship along with mentoring and soft skills training.

How do I apply for a scholarship?

Please register as a member and submit an application. Upon submission, we will review and follow up if there is any additional information that we require. Generally it will take up to a month from your submission date for you to hear back if you have qualified for a scholarship

When do the courses start and how can I access the cohort schedule?

See below for a brief summary of our cohort schedule. There will be opportunities to apply for future classes. Please regularly stay connected with our social media and website announcements for new developments.

Cloud Security Training

Part Time:
May 1st, 2024 - May 31st, 2024 (Virtual Online)

Cloud Security refers to the set of policies, technologies, and controls designed to protect data, applications, and infrastructure in the cloud computing environments. It focuses on ensuring the confidentiality, integrity, and availability of resources stored and processed in the cloud.

This course is designed to explore Cloud Security and its related concepts in detail. After introducing the student to the basics of Cloud Security, it details how organizations adhere to Cloud Security compliance requirements and common risk factors that should be addressed with proper security controls. Following this, it details how organizations follow industry best practices to mitigate risks by adopting a set of guidelines, policies, and procedures. Lastly, it discusses how organizations implement Cloud Security tools to help protect and enhance their cloud computing environment.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of cloud security and its compliance requirements, common risk factors, proper security controls, best practices, and Cloud Security tools. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1 Introduction to Cloud Security: This module introduces Cloud Security and the most popular deployment models. Additionally, it provides an overview of the different cloud service models as well as the importance of cloud security framework.
• Module 2: Compliance and Frameworks: This module covers the various common compliance requirements that organizations need to consider for cloud security. It dives further into the common standards that are included in relevant publications.
• Module 3: Cloud Security Risks: This module highlights the importance of understanding Cloud Security risks and common factors associated with these risks. Students will gain a better understanding of common risks which are: Data Breaches, Inadequate Access Management, Malware injections, Shared infrastructure vulnerabilities, and Denial of Service (DoS) attacks.

Part 2:
• Module 4: Cloud Security Controls: This module focuses on how to implement Cloud Security controls to mitigate the risks mentioned in the previous module. After explaining the importance of the controls, students will learn about Identity and Access Management and Encryption.
• Module 5: Cloud Security Best Practices: This module explains Cloud Security best practices and how they can be adopted to mitigate risks. After learning what the difference is between
controls and best practices, students will discover industry best practices as well as common challenges that may be encountered during implementation. • Module 6: Cloud Security Tools: This module explores various Cloud Security tools that help organizations protect and enhance their cloud environments. In addition to providing an overview of each of the tools, key functionalities and/or features of each tool are covered in the module as well.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
After reviewing the course material and applying it to the case study, students will test their knowledge of Cloud Security with the following:

• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: April 15th, 2024

NextGen Secure Code Warrior Training

:
Apr 29th, 2024 - May 31st, 2024 (Virtual Online)

Overview:
Secure Code Warrior reduces vulnerabilities where they begin - at the code level. Their agile learning platform gives developers the ability to learn when and how they want, with the most complete and reliable vulnerability content in the industry today. Check out this 2 minute introductory video for more information about their approach at https://secure-code-warrior.wistia.com/medias/rg3lcq2122

This class will include highly impactful hands-on learning activities to teach introductory Application Security concepts, as well as code level guidance to identify and fix vulnerabilities at the start of the SDLC.

Schedule:

Week 1: Security Awareness 101 - This course is a prerequisite for the following week, and includes videos and interactive offensive missions to introduce software security concepts and the most prevalent vulnerabilities. Select your preferred programming language (it’s ok if you’re not a coder, you’ll be seeing sample code only) to enroll in the content most relevant to your background.

Week 2: Certification Program - Level 1 - This course is a prerequisite for Week 3 and will guide users through the OWASP Top 1-5 Vulnerabilities with a selection of videos, written coding guidelines, and interactive activities. Select your preferred programming language (not a coder? Try Pseudocode!) to enroll in the content most relevant to your background. The course will end with an Assessment requiring a score of 70% or higher.

Week 3: Certification Program - Level 2 - This final course will guide users through the OWASP Top 6-10. Please continue with your preferred programming language. The course will end with an Assessment requiring a score of 70% or higher.

» Apply by: April 8th, 2024

Technology Resilience Training

Part Time:
Jun 1st, 2024 - Jun 30th, 2024 (Virtual Online)

Technology Resilience refers to the ability of company to withstand and recover from unexpected technology disruptions, failures, or attacks while maintaining essential business functions. In today’s interconnected and technology-dependent world, Technology Resilience has become an increasingly important topic.

This course is designed to explore Technology Resilience and its related concepts in detail. After introducing the student to the basics of Technology Resilience, it details how organizations can determine their most critical technology requirements. Following this, it details how organizations create Technology Resilience strategies and plans to protect critical technologies in case of a disruption. Lastly, it discusses how organizations conduct exercises to familiarize recovery teams with their plans.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of technology resilience and its requirements, governance, strategies, plans, and exercising. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1: Introduction to Resilience and Technology Concepts - This module introduces Technology Resilience and current Technology Resilience trends. Additionally, it provides students with an overview of the Technology Resilience Framework alongside common definitions and related topics.
• Module 2: Technology Resilience Governance: This module explores the role of governance within Technology Resilience. After outlining the activities required to develop Technology Resilience governance, it covers Technology Resilience policy and reporting.
• Module 3: Requirements Analysis (BIA & TIA): This module focuses on how organizations conduct a thorough analysis of their critical business processes, systems, and technologies. After introducing the students to Business Impact Analysis (BIA), this module provides a detailed explanation of the Technology Impact Analysis (TIA) process, which is used to inform the development of Technology Resilience strategies and plans.

Part 2:
• Module 4: Technology Resilience Strategies: This module delves into the strategies and methodologies for designing resilient technology systems and infrastructure. From on-premise and cloud strategies to hybrid strategies that mix the two, this module explains the ways organizations can implement resilience strategies to mitigate potential disruptions.
• Module 5: Technology Resilience Plans: This module covers Technology Resilience plans, which serve as a crucial reference when building a resilient technology infrastructure. After introducing the concept of resilience plans, students will learn about the three main types of Technology Resilience Plans: Infrastructure Recovery Plans, Application Recovery Plans, and Orchestration Plans.
• Module 6: Technology Resilience Testing/Exercising: This module emphasizes the importance of regularly exercising and validating Technology Resilience plans. From tabletop to full exercises, students will learn how each type of exercise plays a critical role in ensuring continued Technology Resilience.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.

After reviewing the course material and applying it to the case study, students will test their knowledge of Technology Resilience with the following:
• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: May 18th, 2024

How do I get started?

To get started register as a member at no cost and we will schedule time with you to schedule an orientation session to provide details on our training, mentorship, networking and leadership opportunities

How long does the application process take?

Typically it takes 2-3 weeks once you register and submit your application for the Next Gen Program

What are the eligibility requirements and criteria?

Please see our student page for more details here