Students

Cybersecurity is a rapidly growing industry that faces a severe talent shortfall

3.5 million unfilled jobs globally by 2021. As of 2020, approximately 50% of surveyed firms plan to increase their cybersecurity staffing1

Approximately 60% of employers say they are unable to recruit personnel with desired skillset and, because of staff shortages, face significant security risks 

Less than 10% of millennials expressed interest in a career of cybersecurity because of lack of familiarity with the industry. Yet for every 100,000 businesses, there is estimated to be 10,300 cybersecurity professionals. In the US, for every 1 million U.S. workers, there are approximately 4,600 cybersecurity professionals2

Global Cybersecurity workforce and Gap Estimates

The current cybersecurity workforce estimate is shown for each of the countries below, with the size of the workforce gap indicated in parentheses.

Cybersecurity professionals develop a rewarding career with stimulating opportunities to tackle challenging problems

Cybersecurity professionals protect businesses of all sizes across the globe. Job satisfaction among cybersecurity professionals is remarkably high (over 75% are satisfied) and has been growing

On average, cybersecurity professionals make ~$83,000 per year in base salary, with those who have greater experience earning as high as $112,000

By building a career in cybersecurity, professionals learn top skills needed to operate invaluable processes, conduct information analysis, and provide threat protection

Industry distribution

cybersecurity professionals protect organizations around the world in a broad range of organizational types and sizes

Top cybersecurity skills needed

cybersecurity professionals plan to develop their skills across multiple areas over the next two years, with 40% apecially naming cloud computing as an area of focus.

Cybersecurity salaries vary across
age and position type

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

  • Q1 2021
    Full time
  • Application deadline
    Jan 11th, 2021
  • Dates
    Jan 18th – Feb 12th, 2021
  • Schedule
    M – F: 9 am – 3 pm PT
  • Format
    Virtual/Online

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

IT SOX Training Overview

Part Time:
Jul 1st, 2024 - Jul 31st, 2024 (Virtual Online)

The Sarbanes-Oxley (SOX) Act is a United States federal law, passed in 2002, that enacted strict rules for financial reporting and accountability of corporations. It was created with the goal of promoting financial transparency, accuracy, and fairness. While it was initially created to restore consumer trust in accounting practices following a series of financial scandals, this act continues to have a significant impact on corporate governance and financial reporting practices, ensuring all publicly traded companies have controls in place to maintain SOX compliance.

This course is designed to outline ITs critical role in ensuring compliance with the SOX Act. After introducing the students to the basics of IT SOX, this course details how to identify and manage IT risk, as well as implement and test proper IT controls.

Students will be guided through an interactive virtual presentation, where they will be met with knowledge checks along the way. As they progress through a series of modules, the students will gain a deeper understanding of the SOX Act, ITS role in SOX compliance, and how to effectively assess IT controls. At the end of all modules, students will take a final exam to test their knowledge of the subject matter.

Schedule:
Online self-paced training, with progressive and interactive training modules:
• Module 1: Introduction to SOX and IT Audit – This module introduces the Sarbanes-Oxley (SOX) Act and how it relates to IT. Additionally, it provides students with an introduction to IT Audit, which is closely tied to IT SOX compliance.
• Module 2: IT Risk – Risks arising from IT can have a large impact on financial reporting. This module covers some of the potential risks arising from IT, focusing on three core areas: access systems, system change control, and data center and network operations.
• Module 3: Controls and IT Environment - This module outlines the ways that risks are mitigated using internal controls. After reviewing the most frequently utilized control frameworks and types of controls, it takes a deep dive into the components of an IT environment and their functions.
• Module 4: Testing IT Controls – This module covers the various areas to focus on when performing an IT control test. From evaluating a control’s design to its operating effectiveness, students will discover the determining factors of an IT control’s success.
• Module 5: Evaluating Results & Deficiencies - This module outlines the steps to take following a control test, with a focus on identifying, classifying, and addressing deficiencies.
• Module 6: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 5 modules.

Students can test their knowledge gained through the course with the following:
• Module 7: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
• Final Exam: A 25 multiple-choice question final exam concludes this training

» Apply by: June 24th, 2024

NextGen-Google CyberSecurity Certificate

Part Time:
Sep 2nd, 2024 - Jan 31st, 2025 (Virtual Online)

NextGen Cyber Talent is now participating in the Google Career Certificate program, allowing us to offer our candidates training for six professional certificates. We're kicking off with the Google Cybersecurity Professional Certificate.

Professional Certificate - 8 course series
Prepare for a new career in the high-growth field of cybersecurity, no degree or experience required. Get professional training designed and delivered by subject matter experts at Google and have the opportunity to connect with top employers.

Organizations must continuously protect themselves and the people they serve from cyber-related threats, like fraud and phishing. They rely on cybersecurity to maintain the confidentiality, integrity, and availability of their internal systems and information. Cybersecurity analysts use a collection of methods and technologies to safeguard against threats and unauthorized access — and to create and implement solutions should a threat get through.

During the 8 courses in this certificate program, you’ll learn from cybersecurity experts at Google and gain in-demand skills that prepare you for entry-level roles like cybersecurity analyst, security operations center (SOC) analyst, and more. At under 10 hours per week, you can complete the certificate in less than 6 months.

Upon completion of the certificate, you can directly apply for jobs with Google and over 150 U.S. employers, including American Express, Deloitte, Colgate-Palmolive, Mandiant (now part of Google Cloud), T-Mobile, and Walmart.

The Google Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the industry leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both.

Applied Learning Project

This program includes 170 hours of instruction and hundreds of practice-based assessments and activities that simulate real-world cybersecurity scenarios that are critical for success in the workplace. Through a mix of videos, assessments, and hands-on labs, you’ll become familiar with the cybersecurity tools, platforms, and skills required for an entry-level job.

Skills you’ll gain will include: Python, Linux, SQL, Security Information and Event Management (SIEM) tools, Intrusion Detection Systems (IDS), communication, collaboration, analysis, problem solving and more!

Additionally, each course includes portfolio activities through which you’ll showcase examples of cybersecurity skills that you can share with potential employers. Acquire concrete skills that top employers are hiring for right now.

» Apply by: August 16th, 2024

Cloud Security Training

Part Time:
Aug 1st, 2024 - Aug 31st, 2024 (Virtual Online)

Cloud Security refers to the set of policies, technologies, and controls designed to protect data, applications, and infrastructure in the cloud computing environments. It focuses on ensuring the confidentiality, integrity, and availability of resources stored and processed in the cloud.

This course is designed to explore Cloud Security and its related concepts in detail. After introducing the student to the basics of Cloud Security, it details how organizations adhere to Cloud Security compliance requirements and common risk factors that should be addressed with proper security controls. Following this, it details how organizations follow industry best practices to mitigate risks by adopting a set of guidelines, policies, and procedures. Lastly, it discusses how organizations implement Cloud Security tools to help protect and enhance their cloud computing environment.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of cloud security and its compliance requirements, common risk factors, proper security controls, best practices, and Cloud Security tools. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1 Introduction to Cloud Security: This module introduces Cloud Security and the most popular deployment models. Additionally, it provides an overview of the different cloud service models as well as the importance of cloud security framework.
• Module 2: Compliance and Frameworks: This module covers the various common compliance requirements that organizations need to consider for cloud security. It dives further into the common standards that are included in relevant publications.
• Module 3: Cloud Security Risks: This module highlights the importance of understanding Cloud Security risks and common factors associated with these risks. Students will gain a better understanding of common risks which are: Data Breaches, Inadequate Access Management, Malware injections, Shared infrastructure vulnerabilities, and Denial of Service (DoS) attacks.

Part 2:
• Module 4: Cloud Security Controls: This module focuses on how to implement Cloud Security controls to mitigate the risks mentioned in the previous module. After explaining the importance of the controls, students will learn about Identity and Access Management and Encryption.
• Module 5: Cloud Security Best Practices: This module explains Cloud Security best practices and how they can be adopted to mitigate risks. After learning what the difference is between
controls and best practices, students will discover industry best practices as well as common challenges that may be encountered during implementation. • Module 6: Cloud Security Tools: This module explores various Cloud Security tools that help organizations protect and enhance their cloud environments. In addition to providing an overview of each of the tools, key functionalities and/or features of each tool are covered in the module as well.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
After reviewing the course material and applying it to the case study, students will test their knowledge of Cloud Security with the following:

• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: July 26th, 2024

Student Referral

We would love it if you told your friends and colleagues about NextGen programs. We respond to all inquiries within 48 hours. Please provide us with your details so we can get in touch.

Support Center

Our friendly and knowledgeable support staff is ready to help you with registration, training, placement, and anything you need assistance with. We respond to all inquiries within 48 hours.