Ignite Your Path to Success in Cybersecurity

We are shaping the future landscape of cybersecurity

Through our training programs, we are committed to bridging the employment disparities in cybersecurity, technology, and other STEM-related domains. We reach out to communities, schools, and colleges that are often overlooked, ensuring inclusivity in programs that cultivate practical skills for the world of cybersecurity. Our meticulously crafted curriculum is specifically designed to align with The Workforce Framework for Cybersecurity, also known as the NICE Framework. This nationally recognized resource empowers employers to cultivate a robust cybersecurity workforce, thereby fostering professional growth and opportunities in the field.

Cyber Security Workforce Consortium Training Program

Program Start Date

Alan B. Levan Center Campus:

  • Cohort 1 Hybrid Training program starts: Monday, November 4, 2024

  • Cohort 2 Hybrid Training program starts: Monday, January 6, 2025

Maverc Technologies in affiliation with The Alan B. Levan Center is hosting two 6-week Cyber Security Training Programs designed to mobilize industry, government, and education with a mission to improve the technology risk and cybersecurity skills and capabilities for college students and the professional workforce, so they are more attractive to hire, reducing the time between being hired and productivity. We are seeking college students, veterans, and aspiring Cybersecurity & IT professionals interested in entering the technical workforce. Our Program is designed for self-motivated individuals who are committed to tackling challenging problems and have a strong passion for cybersecurity.

It offers a unique apprenticeship-style experience with both virtual and in-person sessions at the Alan B. Levan Center’s headquarters in Davie, Florida.

Our Cyber Training Program runs Monday through Friday, featuring a mix of live asynchronous events, workshops, hands-on activities, and self-paced learning. Participants are expected to dedicate 20 hours per week over six weeks. Live sessions will typically be scheduled between 12:00 to 5:00 PM (Eastern Standard Time) to accommodate participants in different time zones. A reliable internet connection and a computer with audio and camera capabilities are required for virtual meetings.

Program Features

  • Program starts fall (November) and spring (January)

  • 6 weeks

  • Hybrid scheduling:

    • Classes held every Monday and Friday, 12:00 PM - 5:00 PM

      • Attend in-person in Davie or live-remote during scheduled class times

  • Cyber hacking boot camp

  • Network with industry professionals

  • Courses taught by world-class faculty

  • Exclusive access to state-of-the-art classrooms, study rooms, and facilities

  • Cyber Room: replicates a real-world cyber experience

Applicant Requirements:

To Participate You must meet the following requirements:

    • Must be a current student with at least 60 earned credits.

    • Must be enrolled at least half-time in a college or university, pursuing a degree in Computer Science, Cybersecurity, or a related field.

    • Must have a minimum cumulative GPA of 2.8 and be in good academic standing.

    Or be an active member of the Military or a retired Veteran

  • Must have completed at least nine credit hours in cybersecurity-related subjects, which may include:

    • Cybersecurity Fundamentals

    • Network Administration/Security

    • Data Science

    • Applications Security

    • Information Assurance

    • Network Engineering

    • Systems Engineering

    • Software Engineering (Python, C, C++, Assembly language, embedded programming)

    • Data Communications

    • Database Security

    • Computer and Network Forensics

    A recent industry certification (within 2 years) from a recognized cybersecurity professional organization (e.g., EC-Council, CompTIA, (ISC)²) may substitute for coursework.

    • Must be a U.S. citizen.

    • Must be able to pass a background check (the cost is paid for or reimbursed by the program).

    • Strong moral character and good communication skills.

    • Demonstrated interest in cybersecurity through coursework, internships, extracurricular activities, professional organizations, or independent learning.

Application Components:

  • Cover letter.

  • Resume.

  • Transcript (official or unofficial), or report cards capturing all semesters of enrollment.

  • Letter of recommendation from a professor, employer, or supervisor familiar with the applicant's technical abilities.

Preference Given to:

  • Students with more than the minimum nine credit hours in cybersecurity-related subjects.

  • Retired or active members of the military.

  • Applicants with minimal scheduling conflicts during the program's live session hours (12:00 p.m. to 5:00 p.m. EST)​

Track 1: Security Operations 101

The Security Operations 101 Track is an entry-level program designed to introduce participants to the essential concepts, tools, and practices that underpin modern security operations (SecOps). This hands-on training program is ideal for individuals seeking a foundational understanding of how cybersecurity operations teams monitor, detect, and respond to security threats in real-time. The apprenticeship emphasizes practical experience with industry-standard security tools and techniques, preparing participants to contribute effectively to a Security Operations Center (SOC).

    • Security Monitoring & Detection: Learn the fundamentals of monitoring network and system activities for potential security incidents using tools such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and log analysis.

    • Incident Response: Understand the incident response lifecycle, including preparation, detection, containment, eradication, and recovery. Gain experience in responding to common security incidents such as malware infections, phishing attacks, and data breaches.

    • Threat Intelligence: Learn how to collect, analyze, and utilize threat intelligence to anticipate and mitigate cyber threats. Understand how to integrate threat feeds into security operations to improve detection and response capabilities.

    • Vulnerability Management: Get hands-on experience in identifying and managing vulnerabilities through tools like vulnerability scanners (Nessus, Qualys) and learn best practices for patch management, vulnerability prioritization, and remediation.

    • SOC Processes & Procedures: Understand how Security Operations Centers (SOCs) function, including workflows, roles, and the importance of 24/7 monitoring. Learn how to work within a SOC environment, including daily tasks such as monitoring alerts, investigating incidents, and reporting on security events.

    • Real-World Scenarios: Engage in simulated attack scenarios to practice security monitoring and incident response in a controlled environment. These exercises provide invaluable experience in applying theoretical knowledge to real-world threats.

    • Tool Mastery: Gain hands-on experience with industry-standard security tools, including SIEM platforms (Splunk, QRadar, Elastic), endpoint detection and response (EDR) systems, and firewall/IDS/IPS technologies. Learn to configure, monitor, and manage these tools in a production-like environment.

    • Mentorship from Industry Experts: Benefit from mentorship and guidance from seasoned professionals with years of experience in Security Operations Centers, cybersecurity management, and threat hunting.

    • Career Development: Take part in career-focused workshops on SOC roles, resume building, and interview preparation, enabling you to pursue security analyst positions with confidence.

    • Certification Preparation: The program provides foundational knowledge aligned with certifications such as CompTIA Security+, Certified SOC Analyst (CSA), and Splunk Core Certified User.

Track 2: Governance, Risk and Compliance

The Governance, Risk, and Compliance (GRC) Track is a comprehensive, hands-on program designed to equip aspiring cybersecurity professionals with the foundational knowledge and skills needed to excel in the field of cybersecurity governance, risk management, and regulatory compliance. This apprenticeship focuses on real-world applications of GRC principles, providing participants with an understanding of the frameworks, standards, and regulations that guide organizations in securing their digital assets while adhering to industry requirements.

    • Governance: Understand the role of governance in cybersecurity, including establishing policies, procedures, and accountability mechanisms within organizations to ensure secure and compliant operations.

    • Risk Management: Gain hands-on experience in identifying, assessing, and mitigating risks through the use of risk management frameworks such as NIST, ISO 27001, and FAR. Learn to conduct risk assessments and develop strategies for addressing security risks effectively.

    • Compliance: Develop proficiency in aligning cybersecurity practices with regulatory standards such as GDPR, HIPAA, SOX, PCI-DSS, and CMMC. Learn how to perform audits, create documentation, and implement controls to ensure compliance with various industry regulations.

    • Mentorship and Industry Insights: Learn directly from experienced cybersecurity professionals who have worked on GRC projects across a variety of industries, including finance, healthcare, government, and manufacturing.

    • Practical Projects: Work on live projects, including risk assessments, compliance audits, and the development of governance policies. These real-world scenarios provide valuable hands-on experience and prepare you for the demands of GRC roles in cybersecurity.

    • Career Development: The program includes career workshops on resume building, interview preparation, and professional networking, helping apprentices transition into cybersecurity roles with confidence.

    • Certification Preparation: Participants will be prepared to pursue industry-recognized certifications such as Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), and Certified Information Systems Security Professional (CISSP).

We take immense pride in transforming lives for the better, as we equip individuals with exceptional training and secure placements in the world's most esteemed companies.

Powered By

What Are The Participants Saying?