Students

Cybersecurity is a rapidly growing industry that faces a severe talent shortfall

3.5 million unfilled jobs globally by 2021. As of 2020, approximately 50% of surveyed firms plan to increase their cybersecurity staffing1

Approximately 60% of employers say they are unable to recruit personnel with desired skillset and, because of staff shortages, face significant security risks 

Less than 10% of millennials expressed interest in a career of cybersecurity because of lack of familiarity with the industry. Yet for every 100,000 businesses, there is estimated to be 10,300 cybersecurity professionals. In the US, for every 1 million U.S. workers, there are approximately 4,600 cybersecurity professionals2

Global Cybersecurity workforce and Gap Estimates

The current cybersecurity workforce estimate is shown for each of the countries below, with the size of the workforce gap indicated in parentheses.

Cybersecurity professionals develop a rewarding career with stimulating opportunities to tackle challenging problems

Cybersecurity professionals protect businesses of all sizes across the globe. Job satisfaction among cybersecurity professionals is remarkably high (over 75% are satisfied) and has been growing

On average, cybersecurity professionals make ~$83,000 per year in base salary, with those who have greater experience earning as high as $112,000

By building a career in cybersecurity, professionals learn top skills needed to operate invaluable processes, conduct information analysis, and provide threat protection

Industry distribution

cybersecurity professionals protect organizations around the world in a broad range of organizational types and sizes

Top cybersecurity skills needed

cybersecurity professionals plan to develop their skills across multiple areas over the next two years, with 40% apecially naming cloud computing as an area of focus.

Cybersecurity salaries vary across
age and position type

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

  • Q1 2021
    Full time
  • Application deadline
    Jan 11th, 2021
  • Dates
    Jan 18th – Feb 12th, 2021
  • Schedule
    M – F: 9 am – 3 pm PT
  • Format
    Virtual/Online

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

BigID Bootcamp

Part Time:
Oct 16th, 2023 - Nov 10th, 2023 (Virtual Online)

Background
The world is changing. New global and national data privacy regulations require businesses to evolve their legacy data practices. Companies in all sectors – from retail to financial services to manufacturing to technology – are now data-driven enterprises that must ensure good data coherence, maintain governance and compliance, and manage sensitive data.

This digital transformation isn’t just required to stay afloat, but also to get ahead. Companies must adapt their approach to data visibility and control across data privacy, security and governance frameworks. Teams must embrace modern data discovery and machine learning techniques, automate manual data processes, and evolve to meet modern data challenges.

While business and personal data management is a critical reality for any modern business, academic education and training in these domains is trailing behind workplace needs and demands. Fresh college grads with credible data coursework and certification on their resume have an edge over other candidates still relying purely on industry associations, online videos and on-the-job training to build data expertise.

Fortunately colleges are beginning to recognize this gap. Courses centralized on privacy ethics, law, and policy are emerging. But while these programs cover the “what”, the “how” is still largely untended - few colleges offer classwork focused on real-world data privacy governance, data discovery and automation practices, cataloging and insights, and real-world use cases.

BigID Bootcamp Overview

With today’s dynamic job market calling for an academic curriculum that emphasizes hands-on data readiness, BigID is excited to share its domain expertise and collaborate with NextGen in offering a condensed, practical and relevant BigID Bootcamp learning program. This program will help students build crucial core data knowledge through hands-on exercises, and stand out as candidates in the job marketplace.

Academically, the BigID Bootcamp focuses on these domains:
● Introduction to core data concepts and relevant privacy regulations
● Modern data practices and processes in the business world
● Underlying technologies like SQL, networking, Kubernetes and machine learning
● Data discovery techniques
● BigID platform value and usage in real-world data practices
● BigID platform deployment and enterprise integrations
● BigID data source configuration and data scanning

The BigID Bootcamp curriculum combines theory with significant hands-on practice, with practical exercises conducted on personal lab sandboxes assigned to every learner.

BigID Bootcamp Objectives
After completing the BigID Bootcamp program, learners will be able to…
● Understand the core principles of modern data privacy regulations like GDPR and CCPA
● Understand key business data practices like DSARs, access control, cataloging and remediation
● Explain the importance of automation and machine learning for personal data protection
● Run basic Linux commands and edit files
● Run simple SQL queries
● Develop basic regular expressions
● List the BigID platform installation steps on Kubernetes
● Explain discovery using classification and correlation
● Explain the BigID platform architecture and main interfaces
● Connect BigID to data sources and run scans
● Use core BigID business apps to implement business use cases

» Apply by: October 8th, 2023

Technology Resilience Training

Part Time:
Dec 1st, 2023 - Dec 22nd, 2023 (Virtual Online)

Technology Resilience refers to the ability of company to withstand and recover from unexpected technology disruptions, failures, or attacks while maintaining essential business functions. In today’s interconnected and technology-dependent world, Technology Resilience has become an increasingly important topic.

This course is designed to explore Technology Resilience and its related concepts in detail. After introducing the student to the basics of Technology Resilience, it details how organizations can determine their most critical technology requirements. Following this, it details how organizations create Technology Resilience strategies and plans to protect critical technologies in case of a disruption. Lastly, it discusses how organizations conduct exercises to familiarize recovery teams with their plans.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of technology resilience and its requirements, governance, strategies, plans, and exercising. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1: Introduction to Resilience and Technology Concepts - This module introduces Technology Resilience and current Technology Resilience trends. Additionally, it provides students with an overview of the Technology Resilience Framework alongside common definitions and related topics.
• Module 2: Technology Resilience Governance: This module explores the role of governance within Technology Resilience. After outlining the activities required to develop Technology Resilience governance, it covers Technology Resilience policy and reporting.
• Module 3: Requirements Analysis (BIA & TIA): This module focuses on how organizations conduct a thorough analysis of their critical business processes, systems, and technologies. After introducing the students to Business Impact Analysis (BIA), this module provides a detailed explanation of the Technology Impact Analysis (TIA) process, which is used to inform the development of Technology Resilience strategies and plans.

Part 2:
• Module 4: Technology Resilience Strategies: This module delves into the strategies and methodologies for designing resilient technology systems and infrastructure. From on-premise and cloud strategies to hybrid strategies that mix the two, this module explains the ways organizations can implement resilience strategies to mitigate potential disruptions.
• Module 5: Technology Resilience Plans: This module covers Technology Resilience plans, which serve as a crucial reference when building a resilient technology infrastructure. After introducing the concept of resilience plans, students will learn about the three main types of Technology Resilience Plans: Infrastructure Recovery Plans, Application Recovery Plans, and Orchestration Plans.
• Module 6: Technology Resilience Testing/Exercising: This module emphasizes the importance of regularly exercising and validating Technology Resilience plans. From tabletop to full exercises, students will learn how each type of exercise plays a critical role in ensuring continued Technology Resilience.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.

After reviewing the course material and applying it to the case study, students will test their knowledge of Technology Resilience with the following:
• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: November 24th, 2023

Cloud Security Training

Part Time:
Nov 1st, 2023 - Nov 22nd, 2023 (Virtual Online)

Cloud Security refers to the set of policies, technologies, and controls designed to protect data, applications, and infrastructure in the cloud computing environments. It focuses on ensuring the confidentiality, integrity, and availability of resources stored and processed in the cloud.

This course is designed to explore Cloud Security and its related concepts in detail. After introducing the student to the basics of Cloud Security, it details how organizations adhere to Cloud Security compliance requirements and common risk factors that should be addressed with proper security controls. Following this, it details how organizations follow industry best practices to mitigate risks by adopting a set of guidelines, policies, and procedures. Lastly, it discusses how organizations implement Cloud Security tools to help protect and enhance their cloud computing environment.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of cloud security and its compliance requirements, common risk factors, proper security controls, best practices, and Cloud Security tools. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1 Introduction to Cloud Security: This module introduces Cloud Security and the most popular deployment models. Additionally, it provides an overview of the different cloud service models as well as the importance of cloud security framework.
• Module 2: Compliance and Frameworks: This module covers the various common compliance requirements that organizations need to consider for cloud security. It dives further into the common standards that are included in relevant publications.
• Module 3: Cloud Security Risks: This module highlights the importance of understanding Cloud Security risks and common factors associated with these risks. Students will gain a better understanding of common risks which are: Data Breaches, Inadequate Access Management, Malware injections, Shared infrastructure vulnerabilities, and Denial of Service (DoS) attacks.

Part 2:
• Module 4: Cloud Security Controls: This module focuses on how to implement Cloud Security controls to mitigate the risks mentioned in the previous module. After explaining the importance of the controls, students will learn about Identity and Access Management and Encryption.
• Module 5: Cloud Security Best Practices: This module explains Cloud Security best practices and how they can be adopted to mitigate risks. After learning what the difference is between
controls and best practices, students will discover industry best practices as well as common challenges that may be encountered during implementation. • Module 6: Cloud Security Tools: This module explores various Cloud Security tools that help organizations protect and enhance their cloud environments. In addition to providing an overview of each of the tools, key functionalities and/or features of each tool are covered in the module as well.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
After reviewing the course material and applying it to the case study, students will test their knowledge of Cloud Security with the following:

• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: October 27th, 2023

Student Referral

We would love it if you told your friends and colleagues about NextGen programs. We respond to all inquiries within 48 hours. Please provide us with your details so we can get in touch.

Support Center

Our friendly and knowledgeable support staff is ready to help you with registration, training, placement, and anything you need assistance with. We respond to all inquiries within 48 hours.