Job Readiness Training.
Powered by Experts.​

Combining live and group instruction, hands-on job shadowing, real on-the-job training and employer matching to create a powerful curriculum designed for you.

Job Readiness Training

Full Time Day: Total 17-weeks of training, 15 Quests with 2-Specialized Tracks
Part Time Evening: Total 23-weeks of training, 21 Quests with 2-Specialized Tracks
Cohorts: Three cohorts per year, Starting January, May, and August

Core Entry Level Cybersecurity and Role Specific Training

Core operational job tasks that every cybersecurity professional needs

Quests
1 - 4

Fundamentals: Cybersecurity Essentials, Team Basics and Business Orientation, Operating systems, Networking, and Threat Analysis

Learn best practices to execute day-to-day self-directed tasks and team projects. Work within your team to build your own computer networks and defend them from real-world attacks by instructors. Build and protect a system that you will continue to enhance. Learn key operating systems, including embedded systems and industry-specific communications. Immerse yourself in networks and enabled systems. Learn tradeoff analysis and report on and brief to real company managers, and enhance your skills with help of coaches and leading company experts and mentors.

Quests
5 – 8

Cybersecurity Operations: Identity and access management, monitoring networks and systems for attacks, Incident Response and Forensics

Immerse yourself in practical operational tasks required day-to-day by a cybersecurity professional. This includes vulnerability analysis and mitigation, threat analysis, tracking threat actors through your company’s network, monitoring and incident response. Build with your team the defenses to protect your system. Then, put on your hacker hat to red team and break into your system, measure your security performance, and improve your defense.

Quests
9 – 12

Securing Systems: Application Security, Cloud Security, and Risk Analysis

Analyze and design secure systems with a team, then red team and secure the system based on red teaming. Analyze and reverse engineer malware attacking Fortune 500 companies via cloud infrastructure and secure product architecture. Build detection engineering to stop today’s accelerated cyber-attacks.

Quests
13 – 14

Core Skills Review and Certification Prep (80 Hours)

Review core skills in a comprehensive walk through of CompTIA Certification tested areas. Review is performed in the context of how it applies to on the job tasks. Perform final preparation for the CompTIA Sec+ exam and take practice exams to prepare.

Quest
15

Level 1 Role Specific Training (40 Hours)

Select the role that you want to pursue initially and execute base tasks required in the first year in that role on-the-job. If you are an apprentice, your employer company will choose the role track for you during this Quest.

Flex and Specialized Skill Focus

Full Time Day: Week 6 (40 hours) and Week 11 (40 hours)
Part Time Evening: Week 11 (40 hours) and Week 21 (40 hours)
Specialize in Skills, SME Shadowing, Reinforce Prior Material, Foundations for Role Specific Training

Career path

SOC (Security Operations Center) engineer career path trains you from a tier 1 SOC analyst level through an incident responder. You will be part of a team that is responsible for monitoring company networks and systems around the clock to defend against threats and will work to identify and respond to incidents.

Week
1 - 4

Continue building on your skills in network traffic analysis to hunt threats and use the same tools you will use on the job. Analyze traffic in your cloud infrastructure and work in a team to defend your infrastructure. Perform Dark Web monitoring and triage SIEM tool alerts with ticketing systems you will use on the job.

Week
5 – 8

Work in your team to identify Indicators of compromise (IOCs) and write Yara detection rules to detect IOCs of threat actors targeting your company. Write scripts to automate detection and analysis, remove malware from company systems, and continue building your threat hunting skills.

Week
9 – 12

Work in your incident response team to investigate alerts escalated by the SOC tier 2 team and respond to live-fire incidents. Build IR playbooks and hunt advanced threats. Identify attack pathways to your company’s critical assets and build defenses against live-fire attacks from instructors. Analyze and reverse engineer advanced malware samples and perform forensic investigations.

The Penetration Tester (Pen Tester) career path prepares you for an intermediate level pen tester career. You will be responsible for performing internal and external penetration testing of a company’s network and applications. You and your team will use your skills to attack the networks of other teams using the latest hacking techniques. You will use your social engineering skills to bypass a company’s defenses without being caught and communicate the findings of your penetration test to stakeholders across the organization.

Week
1 - 4

Work in your team to execute network penetration tests in different industries and communicate your pen test findings to the executive team. Hands-on projects where you learn to live off the land and not rely on hacking tools that are easy for the defensive team to detect.

Week
5 – 8

Write your own hacking tools and use them to legally break into companies. Continue building your pen testing skills as your team hacks the networks of other teams in live-fire events.

Week
9 – 12

Build more complex pen testing tools. Work in your team to perform web application penetration testing for real businesses and help them secure their systems better.

The Cloud Security Engineer career path builds your skills using the leading public cloud platforms, Amazon AWS and Microsoft Azure. You will build cloud infrastructure and networks, monitor and secure them. You will gain hands-on experience with cloud secrets management, built-in AWS and Azure tools for security and third-party tools used by leading companies.

Week
1 - 4

Work in your team to help companies migrate to the cloud and build, secure and monitor your cloud infrastructure. Manage and restrict access to critical resources in the cloud.

Week
5 – 8

Scan your cloud environment with tools like Nmap and Metasploit to identify exploitable vulnerabilities. Write custom scripts to locate private S3 buckets and attack and secure APIs.

Week
9 – 12

Attack and secure database services, like Aurora, with your team in live-fire events. Locate and secure EC2 instances, attack WordPress websites and learn how to harden them against attack.

The Security Engineer career path prepares you to design, build, and implement security solutions for companies. You will leverage your threat hunting skills to identify new attack routes and build defenses against them and develop information security strategy for organizations. Build business continuity and disaster recovery plans for companies.

Week
1 - 4

Work in your team to identify critical assets, services and data for the company. Identify and prioritize risks to these and build a plan to manage risk. Develop policies and processes to maintain full visibility into your digital and physical assets and their interconnections.

Week
5 – 8

Analyze incidents with your team and build detection engineering capabilities to reduce the risk to critical assets, data and services. Build continuous monitoring solutions to improve the company’s security posture.

Week
9 – 12

Develop strategies to help companies recover and restore capabilities and services following a cyber-attack. Work in your team to architect networks for security across industries.

The Risk Engineer career path prepares you to build risk models and help companies remain compliant with governing bodies and lower their exposure to risk. This path can prepare you for a number of GRC (governance, risk, and compliance) careers.

Week
1 - 4

Work in your team to help companies improve their external security posture and security score. With your team, identify pathways to critical assets and communicate your findings to senior stakeholders.

Week
5 – 8

Work in your team to perform risk assessments and weigh the needs of businesses and critical operations against the security concerns and then effectively communicate this information to senior executives.

Week
9 – 12

Work with real companies to build roadmaps to improve the security posture of companies, so they can reduce their cybersecurity insurance premiums and reduce their organizational risk in the long-term. Assess the impact of software supply chain compromise attacks (I.e.- SolarWinds) and recommend ways companies can reduce their risk exposure.

Full-Time Schedule

Part-Time Evening Schedule

Career Opportunities

Job Readiness Training Overview

Once selected, and depending on the program, you will have the opportunity to:

How it works

All training takes place during Month 1-4: 100% full time professional training. This includes instructor time, flex time, project, and team exercises in addition to SME sessions.

Training takes place Mon-Thu in the evenings 5 pm-7 pm PT/8 pm -10 pm ET with 2 hours self-directed exercises or team projects, 8 hours flexible work time will be for the weekends or can be done if you have extra time during the week.

If a company selects you for their apprenticeship program, you typically will have 8-months paid as an apprentice with an employer.

Each cohort position requires testing. For apprenticeships, you must  have a strong score and interview with the employer company offering the apprenticeship.  You will need to abide by any additional requirements that the company has as part of its hiring process.

Early Matching

We begin the process of identifying potential career and employer matches early in our program to help ensure our students and employers alike receive the best mutual fit. From Day One, you’ll work through a company approved curriculum, build your portfolio, and align yourself to open job positions.

Time on Task

For some companies, you’ll receive micro-certifications that align with specific industry roles. The micro-certifications are what we call “Time on Task” and provide training on the systems they require to hit the ground running once you begin your career. Time on Task includes time with malware, controls and systems directly relevant to your future career.

Choose from Several Programs that We Offer

Return on investment

Program Cost
Support for GI Bill, Financial Aid, Grant Funding, and Student Loans Currently Available. We are a SkillBridge provider. VET TEC funding coming soon

At RapidAscent, we are striving to create an education that is affordable and attainable for everyone. In our program, if you demonstrate the aptitude and skills early on for cybersecurity, then we offer several options.

  1. Join our accelerated Job Readiness training with partner college credits powered by RapidAscent designed to help place you directly into job opportunities with our employer partners and others.
  2. Compete for an apprenticeship training opportunity with a hiring partner before you start the training, during your training, or after you have completed your training.

Apprenticeships are highly competitive. If you get selected by a hiring partner for this program, the learner is often paid a salary for their on-the-job apprenticing and will pay nothing out of pocket for our tuition from that point moving forward.

Accelerated Training Option

Sign Up and select a partner.

How It Works

Once accepted, you will have the option to choose a partner program that works for you.

See FAQs

Apprenticeship Program

Apprenticeship programs are offered at no out of pocket cost to those accepted into the programs.

How It Works

For our highly competitive apprenticeships, if you get selected by a hiring partner, the learner pays nothing out of pocket.

See FAQs