Cybersecurity Track

Defend. Detect.
Respond. Certify.

From SOC analyst fundamentals to zero trust architecture — build the defensive skills that every enterprise needs right now.

6Courses
79Hours
1,203Students
4Certifications

Curriculum Roadmap

A structured path from security fundamentals to architecture leadership.

Foundation
SOC Analyst Bootcamp
Intermediate
Threat Hunting + IR + Pentest
Advanced
CMMC 2.0 + Zero Trust
Certified
BTG Security Architect

Course Curriculum

Six courses built on real-world attack scenarios and enterprise defense playbooks.

Beginner20 hr

SOC Analyst Bootcamp

Become a production-ready SOC analyst. Triage alerts, investigate incidents, and build defensive habits from day one.

  • The security operations center: roles, shifts, tools, and workflow
  • Log analysis: Windows Event Logs, Sysmon, and SIEM queries
  • Alert triage: distinguishing false positives from real threats
  • MITRE ATT&CK framework: mapping alerts to adversary techniques
  • Escalation procedures and incident handoff documentation
  • Microsoft Sentinel and Defender 365 navigation essentials
Enroll — $199
Intermediate10 hr

Threat Hunting with Microsoft Defender

Stop waiting for alerts. Proactively hunt threats across your environment using Defender XDR and KQL.

  • KQL (Kusto Query Language) for security investigations
  • Advanced hunting queries in Defender 365 portal
  • Behavioral indicators of compromise vs. signature detection
  • Lateral movement and credential harvesting hunt hypotheses
  • Threat intelligence integration: TI feeds into Defender
  • Building custom detection rules and automated responses
Enroll — $199
Advanced15 hr

CMMC 2.0 Compliance Certification

Achieve and maintain CMMC 2.0 compliance. Required for all DoD contractors by 2025 deadlines.

  • CMMC 2.0 model: Levels 1, 2, 3 requirements and applicability
  • NIST 800-171 control mapping and gap assessment
  • System Security Plan (SSP) and POA&M development
  • CUI identification, data flows, and boundary scoping
  • Microsoft GCC High configuration for CMMC Level 2
  • Third-party assessor preparation and audit readiness
Enroll — $199
Intermediate12 hr

Incident Response & Forensics

When breaches happen, your response speed determines the damage. Build a rehearsed incident response capability.

  • NIST incident response lifecycle: Prepare, Detect, Contain, Eradicate, Recover
  • Digital forensics fundamentals: chain of custody, evidence preservation
  • Memory forensics with Volatility Framework
  • Network forensics: PCAP analysis, Wireshark, Zeek
  • Ransomware incident playbook and recovery procedures
  • Post-incident reports and lessons-learned documentation
Enroll — $199
Advanced8 hr

Zero Trust Architecture

Design and implement a zero trust security model. Never trust, always verify — at every layer of your network.

  • Zero trust principles: identity, device, network, application, data
  • Microsoft Zero Trust deployment model with Entra ID
  • Conditional Access policy design: risk-based authentication
  • Microsegmentation: VLAN, SDN, and application-layer controls
  • Privileged access workstations (PAW) and just-in-time access
  • Zero trust maturity assessment and roadmap development
Enroll — $199
Intermediate14 hr

Penetration Testing Fundamentals

Learn to think like an attacker. Find vulnerabilities before they do, and document findings that drive real fixes.

  • Legal and ethical frameworks for authorized penetration testing
  • Reconnaissance: OSINT, DNS enumeration, Shodan
  • Vulnerability scanning: Nessus, OpenVAS, Nuclei
  • Exploitation fundamentals: Metasploit and manual techniques
  • Web application testing: OWASP Top 10 in practice
  • Pentest report writing: executive summary to technical findings
Enroll — $199

Hands-On Labs

Simulated enterprise environments — practice attacks and defenses safely.

SOC Simulator

A live SOC dashboard with injected attack scenarios. Triage 20+ realistic alerts, investigate lateral movement, and write incident reports against a timed clock.

Course 1

Defender XDR Sandbox

A pre-populated Microsoft Defender XDR tenant with real malware detections, KQL query exercises, and custom detection rule challenges.

Course 2

Compliance Audit Tool

Interactive CMMC 2.0 gap assessment against a simulated mid-market organization. Score 110 NIST 800-171 controls and auto-generate a POA&M template.

Course 3

Forensics Workbench

Memory dumps and disk images from simulated ransomware incidents. Use Volatility and Wireshark to reconstruct the attack timeline and identify patient zero.

Course 4

Certification Path

Build credentials that employers and auditors recognize.

BTG Security Foundations
Course 1
BTG SOC Analyst
Courses 2–4
BTG Security Engineer
Course 5
BTG Security Architect
Course 6

Prerequisites

Basic IT literacy required. Intermediate courses assume completion of the SOC Analyst Bootcamp or equivalent experience in a security operations environment.

  • Foundation: Basic computer and networking literacy
  • Intermediate: SOC Foundations cert or 1+ yr security experience
  • Advanced: Intermediate certs + hands-on security role

Your Instructor

SC

Dr. Sarah Chen

CISSP, CEH, Microsoft Security MVP

Dr. Chen brings 18 years of enterprise security experience spanning financial services, healthcare, and defense contracting. She has led CMMC compliance programs for three Tier-1 DoD suppliers and contributes to MITRE ATT&CK working groups. Former Head of Threat Intelligence at a Fortune 500 financial institution.

Pricing

Government funding programs may cover 100% of cybersecurity training costs for eligible learners.

Individual
$199/course
  • Lifetime course access
  • Hands-on lab environment
  • Certificate of completion
  • Community forum access
Enroll Now
Enterprise
Custom
  • Unlimited seats
  • Custom content & branding
  • CMMC readiness consulting included
  • Dedicated instructor sessions
  • Invoicing & NET30 terms
Contact Sales

Government Funding Available

Cybersecurity training is a top priority for federal workforce programs. WIOA, VET TEC, and CareerSource Pinellas all fund security certifications.

Check Your Eligibility
WIOA Eligible
VET TEC Approved
CareerSource Partner
FL DEO Approved

Start Your Security Career Today

1,203 professionals have already earned BTG cybersecurity credentials.

Enroll Now