Frequently Asked Questions

FAQs

How much does the program cost?

The cost of the NextGen program varies depending on your current status, if you are a student or if you are already employed in a job and looking to advance or start your career in cybersecurity.

If you are a student then we do have scholarship and grant opportunities. To determine if you qualify, click on this link and register as a NextGen and submit your application.

What are the classroom/study hours?

NextGen programs or classes are offered virtually and we do have self-paced online training and also instructor led training. The instructor led training is from Monday through Friday from 9AM to 3PM Pacific standard time once you are registered as part of a cohort. For more information, click here to access the upcoming cohorts and training program

Does NextGen help me get a job or internship?

NextGen helps you to be successful in cybersecurity domain by helping you find internships, full time job placements, mentoring, leadership development and also help you to network with experts and leaders to keep you abreast of cyber security threats and industry trends

Our goal is ensure our candidates have a complete end to end support and services to ensure you are successful in your career and personal development

How much can I expect to earn in cybersecurity?

It depends on your skillset and number of years of experience in cybersecurity. On average, cybersecurity professionals make ~$83,000 per year in base salary, with those who have greater experience earning as high as $112,000. To get a detailed understanding of the pay scale and job opportunity, we request you to join as a NextGen Member and review the details on our portal.  To register – click this link.

What is the NextGen program?​

NextGen offers aspiring students a plethora of options while choosing a career in cyber security and data protection. Our team of expert coaches have designed curriculums based on the student’s profiles starting from a beginner course for students from non-IT background to Advance courses which includes risk management, data science, privacy and compliance.

A student’s journey is typically from 45 to 90 days based on the course opted and will be encouraged to take up advanced levels. Training sessions have both theory and cloud-based technology labs to provide real-time professional experience.

Students can access courseware from anywhere through a dedicated Learning management system and can interact with peers and trainers through collaboration tools.

Why should I be a member of NextGen?​

NextGen provides an innovative approach to training and developing the future generation of cybersecurity professionals. For those who are interested and energized to learn, NextGen provides top-notch learning opportunities by collaborating with established industry leaders. NextGen does not stop at this but helps its members convert all their efforts and success into real jobs. We provide job placement support for those who successfully complete their training. We provide a platform to learn cybersecurity and data protection concepts, techniques, processes and solutions by engaging coaches who are domain experts and stalwarts in the field of cyber technology. We suggest relevant courses based on your profile and enable you to design your career path by providing full time placements, internships or externship. Apart from training & education members also get scholarship opportunities, internship along with mentoring and soft skills training.

How do I apply for a scholarship?

Please register as a member and submit an application. Upon submission, we will review and follow up if there is any additional information that we require. Generally it will take up to a month from your submission date for you to hear back if you have qualified for a scholarship

When do the courses start and how can I access the cohort schedule?

See below for a brief summary of our cohort schedule. There will be opportunities to apply for future classes. Please regularly stay connected with our social media and website announcements for new developments.

IT SOX Training Overview

Part Time:
Jul 1st, 2024 - Jul 31st, 2024 (Virtual Online)

The Sarbanes-Oxley (SOX) Act is a United States federal law, passed in 2002, that enacted strict rules for financial reporting and accountability of corporations. It was created with the goal of promoting financial transparency, accuracy, and fairness. While it was initially created to restore consumer trust in accounting practices following a series of financial scandals, this act continues to have a significant impact on corporate governance and financial reporting practices, ensuring all publicly traded companies have controls in place to maintain SOX compliance.

This course is designed to outline ITs critical role in ensuring compliance with the SOX Act. After introducing the students to the basics of IT SOX, this course details how to identify and manage IT risk, as well as implement and test proper IT controls.

Students will be guided through an interactive virtual presentation, where they will be met with knowledge checks along the way. As they progress through a series of modules, the students will gain a deeper understanding of the SOX Act, ITS role in SOX compliance, and how to effectively assess IT controls. At the end of all modules, students will take a final exam to test their knowledge of the subject matter.

Schedule:
Online self-paced training, with progressive and interactive training modules:
• Module 1: Introduction to SOX and IT Audit – This module introduces the Sarbanes-Oxley (SOX) Act and how it relates to IT. Additionally, it provides students with an introduction to IT Audit, which is closely tied to IT SOX compliance.
• Module 2: IT Risk – Risks arising from IT can have a large impact on financial reporting. This module covers some of the potential risks arising from IT, focusing on three core areas: access systems, system change control, and data center and network operations.
• Module 3: Controls and IT Environment - This module outlines the ways that risks are mitigated using internal controls. After reviewing the most frequently utilized control frameworks and types of controls, it takes a deep dive into the components of an IT environment and their functions.
• Module 4: Testing IT Controls – This module covers the various areas to focus on when performing an IT control test. From evaluating a control’s design to its operating effectiveness, students will discover the determining factors of an IT control’s success.
• Module 5: Evaluating Results & Deficiencies - This module outlines the steps to take following a control test, with a focus on identifying, classifying, and addressing deficiencies.
• Module 6: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 5 modules.

Students can test their knowledge gained through the course with the following:
• Module 7: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
• Final Exam: A 25 multiple-choice question final exam concludes this training

» Apply by: June 24th, 2024

NextGen-Google CyberSecurity Certificate

Part Time:
Sep 2nd, 2024 - Jan 31st, 2025 (Virtual Online)

NextGen Cyber Talent is now participating in the Google Career Certificate program, allowing us to offer our candidates training for six professional certificates. We're kicking off with the Google Cybersecurity Professional Certificate.

Professional Certificate - 8 course series
Prepare for a new career in the high-growth field of cybersecurity, no degree or experience required. Get professional training designed and delivered by subject matter experts at Google and have the opportunity to connect with top employers.

Organizations must continuously protect themselves and the people they serve from cyber-related threats, like fraud and phishing. They rely on cybersecurity to maintain the confidentiality, integrity, and availability of their internal systems and information. Cybersecurity analysts use a collection of methods and technologies to safeguard against threats and unauthorized access — and to create and implement solutions should a threat get through.

During the 8 courses in this certificate program, you’ll learn from cybersecurity experts at Google and gain in-demand skills that prepare you for entry-level roles like cybersecurity analyst, security operations center (SOC) analyst, and more. At under 10 hours per week, you can complete the certificate in less than 6 months.

Upon completion of the certificate, you can directly apply for jobs with Google and over 150 U.S. employers, including American Express, Deloitte, Colgate-Palmolive, Mandiant (now part of Google Cloud), T-Mobile, and Walmart.

The Google Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the industry leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both.

Applied Learning Project

This program includes 170 hours of instruction and hundreds of practice-based assessments and activities that simulate real-world cybersecurity scenarios that are critical for success in the workplace. Through a mix of videos, assessments, and hands-on labs, you’ll become familiar with the cybersecurity tools, platforms, and skills required for an entry-level job.

Skills you’ll gain will include: Python, Linux, SQL, Security Information and Event Management (SIEM) tools, Intrusion Detection Systems (IDS), communication, collaboration, analysis, problem solving and more!

Additionally, each course includes portfolio activities through which you’ll showcase examples of cybersecurity skills that you can share with potential employers. Acquire concrete skills that top employers are hiring for right now.

» Apply by: August 16th, 2024

Cloud Security Training

Part Time:
Aug 1st, 2024 - Aug 31st, 2024 (Virtual Online)

Cloud Security refers to the set of policies, technologies, and controls designed to protect data, applications, and infrastructure in the cloud computing environments. It focuses on ensuring the confidentiality, integrity, and availability of resources stored and processed in the cloud.

This course is designed to explore Cloud Security and its related concepts in detail. After introducing the student to the basics of Cloud Security, it details how organizations adhere to Cloud Security compliance requirements and common risk factors that should be addressed with proper security controls. Following this, it details how organizations follow industry best practices to mitigate risks by adopting a set of guidelines, policies, and procedures. Lastly, it discusses how organizations implement Cloud Security tools to help protect and enhance their cloud computing environment.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of cloud security and its compliance requirements, common risk factors, proper security controls, best practices, and Cloud Security tools. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1 Introduction to Cloud Security: This module introduces Cloud Security and the most popular deployment models. Additionally, it provides an overview of the different cloud service models as well as the importance of cloud security framework.
• Module 2: Compliance and Frameworks: This module covers the various common compliance requirements that organizations need to consider for cloud security. It dives further into the common standards that are included in relevant publications.
• Module 3: Cloud Security Risks: This module highlights the importance of understanding Cloud Security risks and common factors associated with these risks. Students will gain a better understanding of common risks which are: Data Breaches, Inadequate Access Management, Malware injections, Shared infrastructure vulnerabilities, and Denial of Service (DoS) attacks.

Part 2:
• Module 4: Cloud Security Controls: This module focuses on how to implement Cloud Security controls to mitigate the risks mentioned in the previous module. After explaining the importance of the controls, students will learn about Identity and Access Management and Encryption.
• Module 5: Cloud Security Best Practices: This module explains Cloud Security best practices and how they can be adopted to mitigate risks. After learning what the difference is between
controls and best practices, students will discover industry best practices as well as common challenges that may be encountered during implementation. • Module 6: Cloud Security Tools: This module explores various Cloud Security tools that help organizations protect and enhance their cloud environments. In addition to providing an overview of each of the tools, key functionalities and/or features of each tool are covered in the module as well.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
After reviewing the course material and applying it to the case study, students will test their knowledge of Cloud Security with the following:

• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: July 26th, 2024

How do I get started?

To get started register as a member at no cost and we will schedule time with you to schedule an orientation session to provide details on our training, mentorship, networking and leadership opportunities

How long does the application process take?

Typically it takes 2-3 weeks once you register and submit your application for the Next Gen Program

What are the eligibility requirements and criteria?

Please see our student page for more details here