Developing analysts.

Defending infrastructure.

  • WHO we are

    We are a community of aspiring cybersecurity professionals hungry to break into the industry & make a lasting impact in the process.

  • What we do

    We develop job-ready SOC analysts by providing hands-on, operational training with live customer data while protecting our nation's critical infrastructure.

  • why we matter

    There are over 500,000 open cybersecurity jobs in the United States. When you want to get into the industry, you need demonstrated experience to land that first job. We are here to solve that problem.

How it works

We take the Centurion Approach.

Why? Well, we got tired of hearing aspiring analysts pointing out a very common catch-22:

I NEED EXPERIENCE TO GET AN ENTRY-LEVEL JOB, BUT I ALSO NEED AN ENTRY-LEVEL JOB TO GET EXPERIENCE”

Hands-on training should end in a digital badge AND resume building experience. Our training programs apply the Centurion Approach to provide this dual-solution.

Programs

Centurion offers the opportunity for aspiring analysts to train on specific tools for a set duration. Regardless of how you start, you will follow the same Centurion Approach to learning

Partnerships

Analysts can gain experience with a variety of SOC tools whether they attend university, community college, high school, or are an adult looking to transition into the cyber industry. Our partnerships create opportunities for students to get involved through their academic institutions.

Individuals

There are three “marks” anyone needs to stand out in their search for their first job in cybersecurity: degrees, certifications, and experience. If you have all three of those you are ready to rock n’ roll. However, access to work based learning is difficult to find if you are trying to get into the field and not attending university or community college. Learn how you can access to resume building experience today.

NICE framework alignment

The Workforce Framework for Cybersecurity, commonly referred to as the NICE Framework, is a nationally focused resource to help employers develop their cybersecurity workforce. It establishes a common lexicon that describes cybersecurity work and workers regardless of where or for whom the work is performed. The NICE Framework applies across public, private, and academic sectors.

Centurion training programs align with all roles within the Investigate and Protect / Defend categories and cover 5 different specialty areas.

Investigate

  • Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.

  • Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.

Protect and Defend

  • Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.

  • Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

  • Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.

  • Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations.