Voyage CONSULTING LLC
Voyage CONSULTING LLC
  • Home
  • Solutions
    • Professional Development
    • IT Consulting Services
    • Cybersecurity Training
  • Contact
  • More
    • Home
    • Solutions
      • Professional Development
      • IT Consulting Services
      • Cybersecurity Training
    • Contact
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out


Signed in as:

filler@godaddy.com

  • Home
  • Solutions
    • Professional Development
    • IT Consulting Services
    • Cybersecurity Training
  • Contact

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

Cybersecurity Training

The objective of our 12-week Cybersecurity Bootcamp is to equip professionals with the essential knowledge, hands-on experience, and industry-relevant skills needed to successfully transition into a cybersecurity career. Through comprehensive, practical training, participants will gain expertise in key cybersecurity concepts, tools, and techniques, empowering them to tackle real-world security challenges. Our program is designed to provide a seamless bridge from various professional backgrounds to the cybersecurity industry, ensuring participants are job-ready and confident in their new career path.

Training Curriculum

Introduction to Cybersecurity

Introduction to Cybersecurity

Introduction to Cybersecurity


  • Overview of Cybersecurity: Importance, scope, and the evolving landscape of cyber threats.
  • Cybersecurity Terminology: Key concepts such as threats, vulnerabilities, exploits, and risk.
  • Cybersecurity Frameworks: NIST, CIS, and ISO/IEC 27001.
  • Introduction to Security Controls: Preventive, detective, and corrective measures.
  • Governance: How to write policies, standards and procedure documents.

Risk Management

Introduction to Cybersecurity

Introduction to Cybersecurity

  • Fundamentals of Risk Management: Risk management objectives: Identification, assessment, mitigation, and monitoring.
  • Risk Management Frameworks: Overview of popular risk management standards (ISO 31000, COSO ERM Framework). Developing a risk management strategy and process. Risk appetite, risk tolerance, and risk culture.
  • Risk Assessment Process: Techniques for identifying and assessing risks (e.g., risk registers, qualitative and quantitative analysis).
  • Risk Mitigation and Control: Implementing risk controls and treatments.

IT Compliance

Introduction to Cybersecurity

IT Compliance


  • Regulatory Compliance: Evaluate your adherence to industry regulations and standards, such as GDPR, HIPAA, PCI-DSS, or CCPA, if applicable.
  • Data Privacy: Review data handling practices to ensure proper safeguards for personal and sensitive information.
  • Audit Trails and Reporting: Check if your organization maintains proper records of access, changes, and transactions for compliance and audit purposes.

Contact Us

Drop us a line!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

We love our customers, so feel free to contact us during normal business hours.

Voyage Consulting LLC

Phone: 410.707.1322 Email: info@vygconsult.com

Hours

Mon

09:00 am – 05:00 pm

Tue

09:00 am – 05:00 pm

Wed

09:00 am – 05:00 pm

Thu

09:00 am – 05:00 pm

Fri

09:00 am – 05:00 pm

Sat

Closed

Sun

Closed

  • Home
  • Cybersecurity Training
  • Contact

Voyage Consulting LLC

Phone: 410.707.1322

Copyright © 2025 Voyage Consulting LLC - All Rights Reserved.

Announcement

Upcoming Cybersecurity Training starts on Saturday, June 14th, 2025

Learn more

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept