Corporate Partnerships

APPRENTICESHIPS ARE A UNIQUE TALENT PIPELINE

Hiring managers are engaged in our admissions and training process from the onset — selecting apprentices that best fit their needs and joining us in the classroom to enhance the student learning experience.

Corporate Partnerships

APPRENTICESHIPS ARE A UNIQUE TALENT PIPELINE

Hiring managers are engaged in our admissions and training process from the onset — selecting apprentices that best fit their needs and joining us in the classroom to enhance the student learning experience.

Cybersecurity Apprenticeships
training, certifications, and hands-on experience 
CyberWarrior Academy is a certified apprenticeship provider by the Massachusetts Department of Labor and under the auspice of the United States Department of Labor. We leverage our expertise as Cybersecurity practitioners and combine it with an unyielding commitment to increasing diversity within our industry.
18 Weeks of training + 12 months on the job
High Quality training combined with hands-on experience
CyberWarrior Academy’s Cybersecurity Apprenticeship combines an 18-week vocational lab-driven training with a one year, on the job, competency-based experience as a pathway to a full-time position.
 Our program provides the knowledge and certifications necessary to begin a career in cybersecurity. The curriculum was built using the National Institute of Standards and Technology (NIST) framework and is mapped to the National Initiative for Cybersecurity Education (NICE).

Selecting The Warrior 

Via cognitive and personality assessments, Cyberwarrior Academy ensures strong aptitude. 

Preparing the Warrior

All apprentices receive training in both offensive and defensive security as well as soft skills. 

 Tools and Technologies
Firewalls & IDPS , Vulnerability Management, Packet Analysis, Security Monitoring, Malware Analysis, ​Incident Response, and Security Automation.
 Soft Skills
Our innovative "Career Hacks" module delivers the soft skills to engage in the “business” of cybersecurity and is an integral part of the curriculum. 
 Consulting Experience
Our Capstone Projects build upon extensive lab exercises and LIVE instruction to empower you to engage in both Network Defense and Penetration Testing.
Graduate Testimonials
CyberWarrior academy changes lives
Cybersecurity is a significant economic development opportunity. With unemployment levels not seen since the Great Depression, there are millions of people looking for work and access to training opportunities online, a format that will maximize learning regardless of quarantine conditions. We open doors for people that have historically been excluded.
"I highly recommend CyberWarrior Academy's security engineering program because it covers an incredible amount of material and the trainer’s knowledge and teaching strategy are excellent. Thanks to CWA, I learned how to address real-world threats and vulnerabilities. I also learned the importance of having a secure IT infrastructure in both personal and work environments"
- Rodley Rene
Information Security Engineer, 
Partners Healthcare
“CyberWarrior Academy was a major key to my development and in helping me to get the position. I definitely recommend CyberWarrior Academy! My training prepared me by giving me insight into what the industry is looking for and what things they’re doing currently. One of the things that I liked best about the program is that we had people from industry come in each week and tells about what they do and what they are looking for.”
- Rodley Rene
Information Security Engineer, 
Partners Healthcare
“CyberWarrior Academy provided a foundation to build on with certification training and also bringing in all the Subject Matter Experts to provide their experience and tips and advice on how to perform in Security.” - “CWA provides hands-on support and relationships in the area so that you are more connected to the Cybersecurity community.”
- Eddy Milcette
Information Security Analyst, 
Houghton Mifflin Harcourt 
Meet The Leadership Team:
Reinier Moquete
CEO, CyberWarrior Consulting & CyberWarrior Academy
Omar Alvarado
CISO, CyberWarrior Consulting & CyberWarrior Academy
Jonathan Edwards
COO, CyberWarrior Academy 
Sue Bergamo
CISO, Episerver
CWA Board of Advisors
Bill Stone
CIO, Abacus Insights
CWA Board Of Advisors
Sonia Arista
Field CISO, Fortinet
CWA Board Of Advisors
Steve MacLellan
Fomer CISO, Fidelity 
CWA Board Of Advisors
What our corporate partners are saying
there are not enough cybersecurity professionals to meet industry demands
“It is very difficult to get people that are trained, knowledgable, and understanding of the information security industry.” - “The amount of good people we have in cybersecurity and the people that we have on the bad side is completely unbalanced.” - “Thanks to CyberWarrior Academy for guiding people and also manufacturing the talent that our organization needs." - "The cybersecurity profession is always exciting because the threat landscape keeps changing, there are always new things. I haven’t seen one cybersecurity professional who says “oh, my job is boring” because they always have something new. It’s always exciting.”
Houghton Mifflin Harcourt
Top 10 Publishing Company in USA
Week #2: CompTIA Network+ (Certification)
CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. This certification covers how to install, maintain, troubleshoot, and support a network, understanding different aspects of networking technologies, including TCP/IP and the OSI model. It also tests knowledge of network components and where they function in association with the OSI model, network cabling, network security, and network troubleshooting. Network+ is a mid-level certification for network techs.
Week #4: EC-Council Certified Network Defender (Certification)
The Certified Network Defender (CND) certification course focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate.
Week #6: Firewalls & IDPS
Students will create and implement firewalls and IDPS using opensource software. They will learn Cisco ACLs using packet simulators like PacketTracer, Linux IP Tables, Opensource firewall Pfsense, implementing Snort IDPS and creating customized rules, Suricata, BRO and connecting it to SecurityOnion using an NSM tool. This module will allow them to build the confidence to feel comfortable working with any Firewall or IDPS system in the market. 
Week #8: Packet Analysis
This course teaches how to analyze packets and perform network forensic investigations effectively, using open-source software. Participants also learn how to differentiate between normal vs. abnormal protocols & behaviors. We cover tools like tcpdump, Wireshark & Tshark, Snort, Bro, NetworkMinner, and others. Students learn to create simple scripts using Python Scapy, and use these skills for detecting network sniffing attacks. This module will provide students with the skills to work with raw data and have a better understanding of the underlying technologies used in their networks. 
Week #10: End of Module #1(Review & Catch up Week)
Our program is divided into three modules of four weeks each. At the end of each module we have a one-week “Review and Catch-up” period to review what we have covered during the module. This time is to clarify subject matter that either individually or as group has been difficult to digest and learn. The review week also gives students time to re-energize and solidify skills with less pressure.
Week #12: Malware Analysis
This course teaches participants everything from malware analysis fundamentals to the use of the latest reverse engineering tools to combat malware. Participants learn to break down potential malware threats and create solutions to combat them. We teach how to protect against malware in the future, performing dynamic and static analysis on all major file types. We guide students on carving malicious executables from documents, to recognize common malware tactics, and to debug and disassemble malicious binaries. 
Week #14: Security Automation
Students will learn the necessary skills to automate security tasks by using the Python programming language. For analysts and other security professionals, automation is a fundamental tool that helps them keep up with the volume of threats and individual activities to defend the enterprise. They will learn automated data analysis, policy validation, and customized scanning. Participants will also be trained on how to use Python to automate offensive activities as a penetration tester and better understand modern-day attacks.
Week #16: Career Hacks
An important part of the CWA training program is also in the area of professional development and enhanced soft skills that will help a new cybersecurity professional realize success in their new workplace. In response to employer feedback and demand, our program focuses on soft/professional skill training that enhances a student's "confidence" with their new found skills. 

To expand the students overall core "competence" in cybersecurity, we embed skills such as critical thinking, communication and presentation into our everyday curriculum. In each module, CWA introduces a skill through a company scenario/case study. In turn, the student uses the practical application of soft skills to reinforce and sustain both the technical and interpersonal learning.
Week #18: Capstone Project II
Blue Team exercise (Defense) – during this one-week capstone project, students demonstrate they know how to handle defensive strategies from a technical standpoint. Subsequently they develop a post incident report and present it to our board as an executive presentation. 

For evaluation purposes, we will bring CISOs and experts in the field to score the project outcome. The judges are hiring managers from our employer partners and other industry stakeholders. 

Why we are different?

A BROADER AND DEEPER APPROACH TO LEARNING

CyberWarrior Academy understands private industry needs better than legacy training organizations – we are the industry. We have credibility when talking to employers and the human capital to be current and relevant. As practitioners, we live the realities and challenges of protecting sensitive data and critical infrastructure for some of the world's top enterprises.
Copyright 2020 | CyberWarrior, Inc
All Rights Reserved
Powered By ClickFunnels.com