Students

Cybersecurity is a rapidly growing industry that faces a severe talent shortfall

3.5 million unfilled jobs globally by 2021. As of 2020, approximately 50% of surveyed firms plan to increase their cybersecurity staffing1

Approximately 60% of employers say they are unable to recruit personnel with desired skillset and, because of staff shortages, face significant security risks 

Less than 10% of millennials expressed interest in a career of cybersecurity because of lack of familiarity with the industry. Yet for every 100,000 businesses, there is estimated to be 10,300 cybersecurity professionals. In the US, for every 1 million U.S. workers, there are approximately 4,600 cybersecurity professionals2

Global Cybersecurity workforce and Gap Estimates

The current cybersecurity workforce estimate is shown for each of the countries below, with the size of the workforce gap indicated in parentheses.

Cybersecurity professionals develop a rewarding career with stimulating opportunities to tackle challenging problems

Cybersecurity professionals protect businesses of all sizes across the globe. Job satisfaction among cybersecurity professionals is remarkably high (over 75% are satisfied) and has been growing

On average, cybersecurity professionals make ~$83,000 per year in base salary, with those who have greater experience earning as high as $112,000

By building a career in cybersecurity, professionals learn top skills needed to operate invaluable processes, conduct information analysis, and provide threat protection

Industry distribution

cybersecurity professionals protect organizations around the world in a broad range of organizational types and sizes

Top cybersecurity skills needed

cybersecurity professionals plan to develop their skills across multiple areas over the next two years, with 40% apecially naming cloud computing as an area of focus.

Cybersecurity salaries vary across
age and position type

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

  • Q1 2021
    Full time
  • Application deadline
    Jan 11th, 2021
  • Dates
    Jan 18th – Feb 12th, 2021
  • Schedule
    M – F: 9 am – 3 pm PT
  • Format
    Virtual/Online

Apply Now

Application Qualifications

  1. Student: If you are currently an enrolled student or have graduated from an accredited academic institution. All majors are accepted.
  2. Professional: all professional working backgrounds are welcome, including those from traditional (IT, computer science) and non-traditional backgrounds
  3. We especially want to encourage you to apply if you belong to the following groups:
    1. Women
    2. African American
    3. LatinX
    4. American Indian or Alaskan Native
    5. Native Hawaiian or Other Pacific Islander

Program Commitment

  1. Complete online technical training coursework to enhance your technical skills and knowledge. Participate in lab training for hands on research
  2. Expect active participation and do not be absent for more than 2 classes. Given COVID, for the time being all classes will be held virtually
  3. Maintaining contact with your NextGen mentor, an excellent resource to help you with any advice on how to navigate skill development, corporate culture, and recruiting process
  4. Be prepared to learn and be hungry. We are looking for those who are passionate about learning new technology, committed to problem solving, and dedicated to managing risks
  5. Upon successful completion of program and placement into a job, to be available to serve as volunteer coaches or NextGen representatives for future classes

Cohort Details

Privacy 101 Cohort - Offered by Grant Thornton

Part Time: Monday to Friday : 9AM - 3PM PT
Apr 1st, 2024 - Apr 26th, 2024 (Virtual Online)

In today’s digital world where individuals regularly transact and socialize through online platforms, privacy has become an important issue for consumers and organizations alike. Personal data is ubiquitously collected, linked, and leveraged by organizations for a variety of purposes ranging from business operations, product/service improvements, data insights, and often for purposes unknown or unclear to the consumer.

The methods and tools used to collect user data have advanced through evolving technologies, and organizations holding such data have become susceptible to data breaches and security incidents where user data has been exposed or compromised. In parallel, individuals are becoming increasingly concerned with how and why their information is being collected and used. This has led to an emergence of robust laws and regulations created to establish accountability for the handling of personal data and afford individuals meaningful access and control over their data.

This training course will provide an overview of the following topics, each of which provide foundational knowledge of privacy and data protection in today’s climate:

• What is privacy and why is it important
• Regulatory landscape of privacy in the United States and Europe
• Building and operationalizing a privacy program
• Privacy automation and technology
• Emerging privacy trends
• Professional certifications

This course aligns to the International Association of Privacy Professionals (IAPP) certification exams (CIPT, CIPP/US, and CIPP/E), with the hope that the information covered will supplement the studying process. OneTrust demos and trainings throughout this course will also provide students a strong foundation and background on the tool’s capabilities with the hope that the information covered will supplement the training and studying processes to receive the OneTrust Professional Certification.

» Apply by: March 10th, 2024

Cloud Security Training

Part Time:
May 1st, 2024 - May 31st, 2024 (Virtual Online)

Cloud Security refers to the set of policies, technologies, and controls designed to protect data, applications, and infrastructure in the cloud computing environments. It focuses on ensuring the confidentiality, integrity, and availability of resources stored and processed in the cloud.

This course is designed to explore Cloud Security and its related concepts in detail. After introducing the student to the basics of Cloud Security, it details how organizations adhere to Cloud Security compliance requirements and common risk factors that should be addressed with proper security controls. Following this, it details how organizations follow industry best practices to mitigate risks by adopting a set of guidelines, policies, and procedures. Lastly, it discusses how organizations implement Cloud Security tools to help protect and enhance their cloud computing environment.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of cloud security and its compliance requirements, common risk factors, proper security controls, best practices, and Cloud Security tools. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1 Introduction to Cloud Security: This module introduces Cloud Security and the most popular deployment models. Additionally, it provides an overview of the different cloud service models as well as the importance of cloud security framework.
• Module 2: Compliance and Frameworks: This module covers the various common compliance requirements that organizations need to consider for cloud security. It dives further into the common standards that are included in relevant publications.
• Module 3: Cloud Security Risks: This module highlights the importance of understanding Cloud Security risks and common factors associated with these risks. Students will gain a better understanding of common risks which are: Data Breaches, Inadequate Access Management, Malware injections, Shared infrastructure vulnerabilities, and Denial of Service (DoS) attacks.

Part 2:
• Module 4: Cloud Security Controls: This module focuses on how to implement Cloud Security controls to mitigate the risks mentioned in the previous module. After explaining the importance of the controls, students will learn about Identity and Access Management and Encryption.
• Module 5: Cloud Security Best Practices: This module explains Cloud Security best practices and how they can be adopted to mitigate risks. After learning what the difference is between
controls and best practices, students will discover industry best practices as well as common challenges that may be encountered during implementation. • Module 6: Cloud Security Tools: This module explores various Cloud Security tools that help organizations protect and enhance their cloud environments. In addition to providing an overview of each of the tools, key functionalities and/or features of each tool are covered in the module as well.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.
After reviewing the course material and applying it to the case study, students will test their knowledge of Cloud Security with the following:

• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: April 15th, 2024

Technology Resilience Training

Part Time:
Jun 1st, 2024 - Jun 30th, 2024 (Virtual Online)

Technology Resilience refers to the ability of company to withstand and recover from unexpected technology disruptions, failures, or attacks while maintaining essential business functions. In today’s interconnected and technology-dependent world, Technology Resilience has become an increasingly important topic.

This course is designed to explore Technology Resilience and its related concepts in detail. After introducing the student to the basics of Technology Resilience, it details how organizations can determine their most critical technology requirements. Following this, it details how organizations create Technology Resilience strategies and plans to protect critical technologies in case of a disruption. Lastly, it discusses how organizations conduct exercises to familiarize recovery teams with their plans.

Students will be guided through a series of interactive virtual presentations, where they will be met with knowledge checks along the way. As they progress through each module, the students will gain a deeper understanding of technology resilience and its requirements, governance, strategies, plans, and exercising. At the end of the training, students will walk through a case study and take a final exam to test their knowledge of the subject matter.

Schedule:
A 3-part self-paced training, with progressive and interactive training modules:

Part 1:
• Module 1: Introduction to Resilience and Technology Concepts - This module introduces Technology Resilience and current Technology Resilience trends. Additionally, it provides students with an overview of the Technology Resilience Framework alongside common definitions and related topics.
• Module 2: Technology Resilience Governance: This module explores the role of governance within Technology Resilience. After outlining the activities required to develop Technology Resilience governance, it covers Technology Resilience policy and reporting.
• Module 3: Requirements Analysis (BIA & TIA): This module focuses on how organizations conduct a thorough analysis of their critical business processes, systems, and technologies. After introducing the students to Business Impact Analysis (BIA), this module provides a detailed explanation of the Technology Impact Analysis (TIA) process, which is used to inform the development of Technology Resilience strategies and plans.

Part 2:
• Module 4: Technology Resilience Strategies: This module delves into the strategies and methodologies for designing resilient technology systems and infrastructure. From on-premise and cloud strategies to hybrid strategies that mix the two, this module explains the ways organizations can implement resilience strategies to mitigate potential disruptions.
• Module 5: Technology Resilience Plans: This module covers Technology Resilience plans, which serve as a crucial reference when building a resilient technology infrastructure. After introducing the concept of resilience plans, students will learn about the three main types of Technology Resilience Plans: Infrastructure Recovery Plans, Application Recovery Plans, and Orchestration Plans.
• Module 6: Technology Resilience Testing/Exercising: This module emphasizes the importance of regularly exercising and validating Technology Resilience plans. From tabletop to full exercises, students will learn how each type of exercise plays a critical role in ensuring continued Technology Resilience.

Part 3: Summary and Practice Case Study
• Module 7: Summary & Key Takeaways: To conclude and prepare students for the case study/exam, this module provides an overview of the key topics and takeaways from the previous 6 modules.
• Module 8: Case Study: This module contains a practice business case, applying the content covered in the previous modules to a real-world scenario. Students will be required to use the knowledge gained throughout the course to answer a series of questions based on the information provided in the case.

After reviewing the course material and applying it to the case study, students will test their knowledge of Technology Resilience with the following:
• Final Exam: A 30 multiple-choice question final exam concludes this training.

» Apply by: May 18th, 2024

Student Referral

We would love it if you told your friends and colleagues about NextGen programs. We respond to all inquiries within 48 hours. Please provide us with your details so we can get in touch.

Support Center

Our friendly and knowledgeable support staff is ready to help you with registration, training, placement, and anything you need assistance with. We respond to all inquiries within 48 hours.