Students

Cybersecurity is a rapidly growing industry that faces a severe talent shortfall

3.5 million unfilled jobs globally by 2021. As of 2020, approximately 50% of surveyed firms plan to increase their cybersecurity staffing1

Approximately 60% of employers say they are unable to recruit personnel with desired skillset and, because of staff shortages, face significant security risks 

Less than 10% of millennials expressed interest in a career of cybersecurity because of lack of familiarity with the industry. Yet for every 100,000 businesses, there is estimated to be 10,300 cybersecurity professionals. In the US, for every 1 million U.S. workers, there are approximately 4,600 cybersecurity professionals2

Global Cybersecurity workforce and Gap Estimates

The current cybersecurity workforce estimate is shown for each of the countries below, with the size of the workforce gap indicated in parentheses.

Cybersecurity professionals develop a rewarding career with stimulating opportunities to tackle challenging problems

Cybersecurity professionals protect businesses of all sizes across the globe. Job satisfaction among cybersecurity professionals is remarkably high (over 75% are satisfied) and has been growing

On average, cybersecurity professionals make ~$83,000 per year in base salary, with those who have greater experience earning as high as $112,000

By building a career in cybersecurity, professionals learn top skills needed to operate invaluable processes, conduct information analysis, and provide threat protection

Industry distribution

cybersecurity professionals protect organizations around the world in a broad range of organizational types and sizes

Top cybersecurity skills needed

cybersecurity professionals plan to develop their skills across multiple areas over the next two years, with 40% apecially naming cloud computing as an area of focus.

Cybersecurity salaries vary across
age and position type

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

  • Q1 2021
    Full time
  • Application deadline
    Jan 11th, 2021
  • Dates
    Jan 18th – Feb 12th, 2021
  • Schedule
    M – F: 9 am – 3 pm PT
  • Format
    Virtual/Online

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

Cloud Security Training

Part Time:
May 1st, 2024 - May 31st, 2024 (Virtual Online)

Cloud Security refers to the set of policies, technologies, and controls designed to protect data, applications, and infrastructure in the cloud computing environments. It focuses on ensuring the confidentiality, integrity, and availability of resources stored and processed in the cloud.

This course is designed to explore Cloud Security and its related concepts in detail. After introducing the student to the basics of Cloud Security, it details how organizations adhere to Cloud Security compliance requirements and common risk factors that should be addressed with proper security controls. Following this, it details how organizations follow industry best practices to mitigate risks by adopting a set of guidelines, policies, and procedures. Lastly, it discusses how organizations implement Cloud Security tools to help protect and enhance their cloud computing environment.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of cloud security and its compliance requirements, common risk factors, proper security controls, best practices, and Cloud Security tools. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1 Introduction to Cloud Security: This module introduces Cloud Security and the most popular deployment models. Additionally, it provides an overview of the different cloud service models as well as the importance of cloud security framework.
• Module 2: Compliance and Frameworks: This module covers the various common compliance requirements that organizations need to consider for cloud security. It dives further into the common standards that are included in relevant publications.
• Module 3: Cloud Security Risks: This module highlights the importance of understanding Cloud Security risks and common factors associated with these risks. Students will gain a better understanding of common risks which are: Data Breaches, Inadequate Access Management, Malware injections, Shared infrastructure vulnerabilities, and Denial of Service (DoS) attacks.

Part 2:
• Module 4: Cloud Security Controls: This module focuses on how to implement Cloud Security controls to mitigate the risks mentioned in the previous module. After explaining the importance of the controls, students will learn about Identity and Access Management and Encryption.
• Module 5: Cloud Security Best Practices: This module explains Cloud Security best practices and how they can be adopted to mitigate risks. After learning what the difference is between
controls and best practices, students will discover industry best practices as well as common challenges that may be encountered during implementation. • Module 6: Cloud Security Tools: This module explores various Cloud Security tools that help organizations protect and enhance their cloud environments. In addition to providing an overview of each of the tools, key functionalities and/or features of each tool are covered in the module as well.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
After reviewing the course material and applying it to the case study, students will test their knowledge of Cloud Security with the following:

• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: April 15th, 2024

NextGen Secure Code Warrior Training

:
Apr 29th, 2024 - May 31st, 2024 (Virtual Online)

Overview:
Secure Code Warrior reduces vulnerabilities where they begin - at the code level. Their agile learning platform gives developers the ability to learn when and how they want, with the most complete and reliable vulnerability content in the industry today. Check out this 2 minute introductory video for more information about their approach at https://secure-code-warrior.wistia.com/medias/rg3lcq2122

This class will include highly impactful hands-on learning activities to teach introductory Application Security concepts, as well as code level guidance to identify and fix vulnerabilities at the start of the SDLC.

Schedule:

Week 1: Security Awareness 101 - This course is a prerequisite for the following week, and includes videos and interactive offensive missions to introduce software security concepts and the most prevalent vulnerabilities. Select your preferred programming language (it’s ok if you’re not a coder, you’ll be seeing sample code only) to enroll in the content most relevant to your background.

Week 2: Certification Program - Level 1 - This course is a prerequisite for Week 3 and will guide users through the OWASP Top 1-5 Vulnerabilities with a selection of videos, written coding guidelines, and interactive activities. Select your preferred programming language (not a coder? Try Pseudocode!) to enroll in the content most relevant to your background. The course will end with an Assessment requiring a score of 70% or higher.

Week 3: Certification Program - Level 2 - This final course will guide users through the OWASP Top 6-10. Please continue with your preferred programming language. The course will end with an Assessment requiring a score of 70% or higher.

» Apply by: April 8th, 2024

Technology Resilience Training

Part Time:
Jun 1st, 2024 - Jun 30th, 2024 (Virtual Online)

Technology Resilience refers to the ability of company to withstand and recover from unexpected technology disruptions, failures, or attacks while maintaining essential business functions. In today’s interconnected and technology-dependent world, Technology Resilience has become an increasingly important topic.

This course is designed to explore Technology Resilience and its related concepts in detail. After introducing the student to the basics of Technology Resilience, it details how organizations can determine their most critical technology requirements. Following this, it details how organizations create Technology Resilience strategies and plans to protect critical technologies in case of a disruption. Lastly, it discusses how organizations conduct exercises to familiarize recovery teams with their plans.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of technology resilience and its requirements, governance, strategies, plans, and exercising. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1: Introduction to Resilience and Technology Concepts - This module introduces Technology Resilience and current Technology Resilience trends. Additionally, it provides students with an overview of the Technology Resilience Framework alongside common definitions and related topics.
• Module 2: Technology Resilience Governance: This module explores the role of governance within Technology Resilience. After outlining the activities required to develop Technology Resilience governance, it covers Technology Resilience policy and reporting.
• Module 3: Requirements Analysis (BIA & TIA): This module focuses on how organizations conduct a thorough analysis of their critical business processes, systems, and technologies. After introducing the students to Business Impact Analysis (BIA), this module provides a detailed explanation of the Technology Impact Analysis (TIA) process, which is used to inform the development of Technology Resilience strategies and plans.

Part 2:
• Module 4: Technology Resilience Strategies: This module delves into the strategies and methodologies for designing resilient technology systems and infrastructure. From on-premise and cloud strategies to hybrid strategies that mix the two, this module explains the ways organizations can implement resilience strategies to mitigate potential disruptions.
• Module 5: Technology Resilience Plans: This module covers Technology Resilience plans, which serve as a crucial reference when building a resilient technology infrastructure. After introducing the concept of resilience plans, students will learn about the three main types of Technology Resilience Plans: Infrastructure Recovery Plans, Application Recovery Plans, and Orchestration Plans.
• Module 6: Technology Resilience Testing/Exercising: This module emphasizes the importance of regularly exercising and validating Technology Resilience plans. From tabletop to full exercises, students will learn how each type of exercise plays a critical role in ensuring continued Technology Resilience.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.

After reviewing the course material and applying it to the case study, students will test their knowledge of Technology Resilience with the following:
• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: May 18th, 2024

Student Referral

We would love it if you told your friends and colleagues about NextGen programs. We respond to all inquiries within 48 hours. Please provide us with your details so we can get in touch.

Support Center

Our friendly and knowledgeable support staff is ready to help you with registration, training, placement, and anything you need assistance with. We respond to all inquiries within 48 hours.