UI | UX
UI | UX Designers focus on the development of digital products by lending their customer experience expertise to a wide variety of verticals. These individuals specialize in enhancing and streamlining the user experience of an application as it relates to ‘functionality’, ‘usability’, and ‘user adaptability’. By prioritizing a product’s “look and feel” and “responsiveness and interactivity”, designers develop user interfaces supported by audience research, developer collaboration, and competitor analysis.
This unique Introductory Course teaches students
about defensive cybersecurity and IT fundamentals
to assess if this is the right career path for them.
The course also ensures classroom success
by facilitating the advancement of only those
students with the necessary passion and skills to
ultimately land a career in the field.
At the end of the course, each student takes
a summary exam and has a one-on-one
assessment to examine their future in the
program. Most importantly, this course discusses
students’ expectations of working in cybersecurity
versus the reality
Material introduces students to the fundamentals
of Networking, the Linux and Windows operating
systems, and virtualization concepts. Students
also learn to run basic commands and computer
communication protocols, develop a firm
understanding of basic operating system
structures, and become familiarized with the
Cyber Attack Cycle. Experiential education
provides students with hands-on exercises so
they gain a better understanding of cybersecurity
countermeasures and defense techniques.
Countless companies worldwide rely on Windows
Server 2012 to manage their organization’s
computers and networks using Group Policy
Objects. Students learn how to set up domain
environments using Active Directory, which
enables central control of all computers and
users in a domain. This course also teaches
students how to manage network services, such
as DNS and DHCP servers, how to configure
security servers to harden systems, and the
differences between Windows Server 2012 and
newer versions, such as 2016 and 2019.
Today, network devices are installed in almost all business sectors, including government, finance, transportation, technology, healthcare, manufacturing, hospitality, and more. This course provides students with an in-depth understanding of various protocols, network layers, and devices.
Cybersecurity professionals must have a comprehensive understanding of networking. This course teaches all the necessary networking concepts, including protocols, topologies, and network devices. While participating in this course, students will be able to obtain their first cyberrelated certificate, since they will be prepared to take the CompTIA Network+ exam.*
This course focuses on the growing use of cloud platforms, and teaches how environments are managed and secured in the cloud. Students also build the knowledge base and skill set required to take the AWS Certified Cloud Practitioner exam.*
Many organizations today are moving their infrastructure to cloud platforms that include centralized managed solutions for all their needs. All their servers and databases are migrated to solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. These platforms provide services ranging from basic physical servers to completely managed solutions. Knowing how to leverage such platforms, work with them, and secure them, is a crucial aspect of today’s cyber industry.
This course teaches students how to manage and operate the Linux open-source operating system, and specifically the cybersecurity distribution known as Kali Linux. Students are taught the security aspects and hardening of such environments. This course also prepares students for the LPI Linux Essentials certification exam.*
Linux has grown very popular in recent years due to its use in IoT products and the benefits it lends to information security personnel. Students learn to navigate the Linux file system, run basic commands, configure network services, handle access permissions, and exploit mitigations.
The purpose of this course is to build the skills students need to secure, manage, and operate network communication equipment and systems for a variety of organizational types. During this course, students prepare for the Cisco Certified CyberOps Associate exam.*
The curriculum focuses on enabling students to achieve technical positions in organizations specializing in technological fields and business operations by giving them the digital skill set needed to stand out to active potential employers in the market.
This course provides students with the knowledge and practical training needed to design and maintain secure infrastructures. Students also learn to implement various security countermeasures and build the knowledge base required to take the CompTIA Security+ certification exams.*
This course provides an in-depth examination of the various defensive infrastructures. The curriculum focuses on how to design a secure architecture, and familiarizes students with various security measures that can be used to harden networks, devices, and cloud infrastructures. Students also learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a widespread open-source solution currently available on the market.
This course introduces students to basic programming concepts and how to implement them using Python, the Cyber and information security industry’s leading programming language. Students learn to set up a Python environment in Windows and Linux, advanced Python programming, and how to use external libraries. All material is taught via immersive training exercises, which provide students with firsthand experience in building tools to automate cybersecurity tasks.
Guidance is integrated into the cyber infrastructure courses to help students find a position in the role of Cybersecurity Practitioner, to become involved with IT and Network Operations Center (NOC) teams across a variety of organizations, and to become the cybersecurity specialist for those teams.
This course delves deeper into the mindset of criminal hackers to provide students with an indepth understanding of how black-hat hackers think, where they come from, and what they intend to do, in order to beat them at their own game and stay ahead of impending threats.
Students learn how to execute and defend against a variety of cyber attacks, including social engineering attacks, network attacks, application attacks, and cryptographic attacks. Hands-on labs provide students with the tools, knowledge, and specialized skill set needed to discover and exploit system vulnerabilities. This course provides further preparation for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams.*
This course covers digital forensics and incident response (DFIR). Curriculum focuses on preparing students for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams*. Students learn how to conduct successful threat hunting procedures, how to identify elusive threats that evade existing security countermeasures, how to handle cyber attacks as they occur, and the dynamics of working on a Security Operations Center (SOC) team.
Throughout this course, students study advanced threat hunting techniques such as machine learning, situational awareness, user behavior analytics, and intelligence. The curriculum seeks to deeply familiarize students with the role of SOC teams across a variety of organizations and how to prepare for and manage attacks in real time. Students also conduct an in-depth study of digital forensics and learn to investigate network attacks, host attacks, and how to reverse engineer malware to understand its purpose and execution on vulnerable systems.
Hackers always seem to be many steps ahead of us. The only way to defend ourselves and stay ahead of impending cyber threats is to become experts at divergent thinking and put ourselves in the mind of a hacker. This course introduces students to the fundamentals of Game Theory—a tool that is essential to understanding how players interact, the rational (or irrational) thinking of attackers, and thinking out of the box in terms of securing networks.
The course material broadens students’ perspectives on many strategic topics, equips them with the skills required to use Game Theory to model real-world scenarios, and teaches them to apply the methods to find solutions for the defense of an organization.
This specialized course provides students with the training and tools needed to land a position in the cybersecurity field. The course’s career planning services include personalized interview training, professional networking, internship placement assistance, and one-on-one consultations devoted to perfecting LinkedIn profiles and CVs.
01| Introductory Course
02 | Microsoft Security
03 | Computer Networking
04 | Cloud Security
05 | Linux Security
06 | Network Security
07 | Cyber Infrastructure & Technology
08 | Introduction to Python for Security
09 | Offensive Security: Ethical Hacking
10 | Incident Response & Threat Hunting
11 | Game Theory Strategy in Cybersecurity
12 | Career Services
Cyber Infrastructure & Technology
Introduction to Python for Security
Offensive Security: Ethical Hacking
Incident Response & Threat Hunting
Game Theory Strategy inCybersecurity
INTRODUCTION TO ANIMATION TOOLS
FAMILIARIZING WITH THE WEB
DESIGN AND WRITING FOR SOCIAL MEDIA
PREPARATION FOR THE JOB MARKET
HackerU equips its partners in Continuing Education with the essential tools students need to get ahead in today's digital workplace.
The Hackeru Process
Every student enrolled in a Continuing Education program empowered by HackerU’s curriculum gets the benefit of our unique philosophy and training process.
Introductory Course Selection
Extended Course Enrollment
Trial Course Selection
A 30-hour trial course covering the fundamentals of the Ethical Hacking field ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.*
*Terms & Conditions Apply
Extended Course Enrollment
Trial Course Selection
A 30-hour trial course covering the fundamentals of the Cyber and IT fields ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.*
Extended Course Enrollment
Each student receives the hands-on training Cyber Security Professionals need to meet and exceed the prestigious market demands required by today’s employers. Career services are built in to the program, providing students with guidance in transitioning to an active Cyber career.
Give Your Students
the Code to Career Success
The Right Student for This Program
This program doesn’t demand any natural-born artistic ability from prospective UI | UX designers. Design is learned and is about proposing and implementing creative solutions to everyday problems.
We Are Waiting to Assist You
Be a part of our success
Our Educational Success Managers are happy to help 24/7.
2121 Ponce De Leon Blvd.
Suite 800, Coral Gables,
We Want To Hear From You