CyberProtex
  • SOLUTIONS
    • Defense & Federal
    • Cloud & DevSecOps Engineering
    • Risk, Compliance & GRC
    • Rapid Prototyping
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Managed Security Services Provider (MSSP) >
      • Proactive Threat Monitoring
      • Managed Detection & Response (MDR)
      • Managed SIEM / Log Management
    • Security and Compliance >
      • Compliance and Governance >
        • Microsoft Purview
        • NIST 800-171 Assessments
        • CMMC Assessments
        • SPRS Score Checklist
      • Security Testing & Response >
        • Incident Response
        • Penetration Testing
        • Vulnerability Assessments
        • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Training Schedule
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Coffee & Compliance >
      • Sensitivity Labels
      • Identity Is the New Perimeter
      • Access Control Without Breaking the Business
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact

Cybersecurity Professional Course

The CyberProtex "Cybersecurity Professional" Course follows the Department of Homeland Security (DHS) Workforce Framework. The Framework is the foundation for increasing the size and capability of the US cybersecurity workforce. CyberProtex has partnered with the Department of Homeland Security to implement the Workforce Framework through the National Initiative for Cybersecurity Education (NICE). A listing of modules for the Cybersecurity Professional is shown below.
Picture

Module 1 - Overview of Cybersecurity 

Module 2 - Network Defense

Module 3 - Applied Encryption

Module 4 - Access Control

Module 5 - Intrusion Detection Systems

Module 6 - Applied Systems Hardening

Module 7 - Incident Response

Module 8 - Digital and Mobile Forensics

Module 9 - Advanced Business Continuity Planning (BCP)

CyberProtex, LLC - 2012-2026
850 Ben Graves Dr NW Suite 306, Huntsville, AL 35816
[email protected]
256-401-7072
Picture
  • SOLUTIONS
    • Defense & Federal
    • Cloud & DevSecOps Engineering
    • Risk, Compliance & GRC
    • Rapid Prototyping
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Managed Security Services Provider (MSSP) >
      • Proactive Threat Monitoring
      • Managed Detection & Response (MDR)
      • Managed SIEM / Log Management
    • Security and Compliance >
      • Compliance and Governance >
        • Microsoft Purview
        • NIST 800-171 Assessments
        • CMMC Assessments
        • SPRS Score Checklist
      • Security Testing & Response >
        • Incident Response
        • Penetration Testing
        • Vulnerability Assessments
        • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Training Schedule
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Coffee & Compliance >
      • Sensitivity Labels
      • Identity Is the New Perimeter
      • Access Control Without Breaking the Business
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact