- Home
- Explore
-
-
CYBERSECURITY
Cybersecurity qualifications unlock careers, prove expertise, drive innovation, and will shape the digital frontier in tomorrow’s AI-driven threat landscape.
Learn More
-
HOMELAND SECURITY
Homeland Security qualifications empower leaders, safeguard nations, advance resilience, and shape the next generation of defenders in an evolving global threatscape.
- Leadership and Management
- Emerging Technologies
- Medical Management & Prehospital Considerations
- Capstone
-
CPS PROGRAMS
George Washington University’s College of Professional Studies offers dynamic, career-ready courses in leadership, cybersecurity, CBRNE, technology, and public service—transforming professionals worldwide.
Learn More
-
REVU EXCLUSIVES
GW RevU’s growing number of exclusive courses offer a range of learning opportunities, from student success and introductory courses to cutting-edge courses about what is happening in the world now.
Learn More
-
-
-
- Cybersecurity
-
-
CYBERSECURITY
Welcome to CyberForge.
MISSION — GW RevU aims to be a prime resource for lifelong learners and employers offering interdisciplinary, career-focused credentials that support up-skill, reskilling, and society advancement.VISION — GW RevU envisions delivering innovative, flexible education that meets evolving workforce needs and to empower professionals with current, market- and needs-based skills.
Learn More
-
PARTNERS
-
Cybersecurity (Coming Soon)
-
CISSP (Coming Soon)
- Homeland Security
-
-
HOMELAND SECURITY
Chemical. Biological. Radiological. Nuclear. Explosive. WMDs. Asymmetric Threats.
The CBRNE-WMD credentials program is a robust training series designed to prepare early and developing professionals for the complexities of a dynamic and evolving threat environment. Three interdependent certificates that deal with policy, mitigation, and emerging threats will propel you towards an immersive capstone in Washington, D.C. and the next steps in your career protecting our nation.
-
CBRNE-WMD Leadership and Management
Gain strategic leadership skills to manage CBRNE-WMD incidents through legal frameworks, interagency coordination, and real-world case studies.
CBRNE-WMD Hospital and Pre-Hospital Management
Learn medical response skills for CBRNE-WMD incidents, including triage, decontamination, PPE, and early threat detection in mass casualty events.
CBRNE-WMD Emerging Threats
Explore emerging CBRNE-WMD threats and technologies like AI and nanotech to enhance preparedness and response capabilities in complex environments.
CBRNE-WMD Capstone Event, Washington, D.C.
Experience an immersive, high-intensity, and multi-modal exercise that reflects the dynamic asymmetric threats of the modern world. The Capstone Experience is an annual event that is available to students that have completed the other CBRNE-WMD credentials.
-
- Degree Programs
-
-
CPS Programs
GW’s CPS bachelor programs empower working professionals with flexible, real-world education—launching impactful, leadership-focused, globally-oriented careers.
Learn More
-
BACHELORS DEGREES
GW’s CPS bachelor programs empower working professionals with flexible, real-world education—launching impactful, leadership-focused, globally-oriented careers.
Learn More
-
POSTGRADUATE DEGREES
CPS’s postgraduate programs transformed experienced professionals into visionary leaders through immersive, real-world learning, powerful networks, and practical rigor across critical fields.
- Cybersecurity Strategy & Information Management
- Homeland Security
- Legislative Affairs
- Paralegal Studies
- Political Management
- Public Relations & Communications
- Publishing
- Sustainable Urban Planning
-
REVU EXCLUSIVES
GW RevU’s growing number of exclusive courses offer a range of learning opportunities, from student success and introductory courses to cutting-edge courses about what is happening in the world now.
Learn More
-
- About RevU
Security+ Boot Camp (1w) 2026
ABOUT THIS COURSE
TDA
Overview
Modality
Online
Format
Asynchronous
Pricing
$2399.00
Partner
RevU
Topic
General
Information Technology and Engineering
Security+
COURSE REQUIREMENTS
COURSE SYLLABUS
General security concepts (12%)
- Security controls: comparing technical, preventive, managerial, deterrent, operational, detective, physical, corrective, compensating, and directive controls.
- Fundamental concepts: summarizing confidentiality, integrity, and availability (CIA); non-repudiation; authentication, authorization, and accounting (AAA); zero trust; and deception/disruption technology.
- Change management: explaining business processes, technical implications, documentation, and version control.
- Cryptographic solutions: using public key infrastructure (PKI), encryption, obfuscation, hashing, digital signatures, and blockchain.
Threats, vulnerabilities, and mitigations (22%)
- Threat actors and motivations: comparing nation-states, unskilled attackers, hacktivists, insider threats, organized crime, shadow IT, and motivations like data exfiltration, espionage, and financial gain.
- Threat vectors and attack surfaces: explaining message-based, unsecure networks, social engineering, file-based, voice call, supply chain, and vulnerable software vectors.
- Vulnerabilities: explaining application, hardware, mobile device, virtualization, operating system (OS)-based, cloud-specific, web-based, and supply chain vulnerabilities.
- Malicious activity: analyzing malware attacks, password attacks, application attacks, physical attacks, network attacks, and cryptographic attacks.
- Mitigation techniques: using segmentation, access control, configuration enforcement, hardening, isolation, and patching.
Security architecture (18%)
- Architecture models: comparing on-premises, cloud, virtualization, Internet of Things (IoT), industrial control systems (ICS), and infrastructure as code (IaC).
- Enterprise infrastructure: applying security principles to infrastructure considerations, control selection, and secure communication/access.
- Data protection: comparing data types, securing methods, general considerations, and classifications.
- Resilience and recovery: explaining high availability, site considerations, testing, power, platform diversity, backups, and continuity of operations
Security operations (28%)
- Computing resources: applying secure baselines, mobile solutions, hardening, wireless security, application security, sandboxing, and monitoring.
- Asset management: explaining acquisition, disposal, assignment, and monitoring/tracking of hardware, software, and data assets.
- Vulnerability management: identifying, analyzing, remediating, validating, and reporting vulnerabilities.
- Alerting and monitoring: explaining monitoring tools and computing resource activities.
- Enterprise security: modifying firewalls, IDS/IPS, DNS filtering, DLP (data loss prevention), NAC (network access control), and EDR/XDR (endpoint/extended detection and response).
- Identity and access management: implementing provisioning, SSO (single sign-on), MFA (multifactor authentication), and privileged access tools.
- Automation and orchestration: explaining automation use cases, scripting benefits, and considerations.
- Incident response: implementing processes, training, testing, root cause analysis, threat hunting, and digital forensics.
- Data sources: using log data and other sources to support investigations.
Security program management and oversight (20%)
- Security governance: summarizing guidelines, policies, standards, procedures, external considerations, monitoring, governance structures, and roles/responsibilities.
- Risk management: explaining risk identification, assessment, analysis, register, tolerance, appetite, strategies, reporting, and business impact analysis (BIA).
- Third-party risk: managing vendor assessment, selection, agreements, monitoring, questionnaires, and rules of engagement.
- Security compliance: summarizing compliance reporting, consequences of non-compliance, monitoring, and privacy.
- Audits and assessments: explaining attestation, internal/external audits, and penetration testing.
- Security awareness: implementing phishing training, anomalous behavior recognition, user guidance, reporting, and monitoring.
RELATED COURSES
Come Explore What GW RevU Can Offer You
Artificial Intelligence Fundamentals by ISACA
Offering Partner: RevU
Modalities Available: Online
CBNRE-2: Emerging Threats and Technology (0226)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE Capstone Experience 2026 (0426)
Offering Partner: CBRNE
Modalities Available: In-Person
CBRNE-1: Leadership and Management (0126)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-1: Leadership and Management (0226)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-1: Leadership and Management (0326)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-2: Emerging Threats and Technology (0126)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-2: Emerging Threats and Technology (0326)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-3: Medical Management (0226)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-3: Medical Management (0326)
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-WMD 2: Emerging Threats and Technology
Offering Partner: CBRNE
Modalities Available: Online
CBRNE-WMD: 2: Emerging Threats and Technology (Cohort 2)
Offering Partner: CBRNE
Modalities Available: Online
Certified in Risk and Information Systems Control (CRISC) by ISACA
Offering Partner: RevU
Modalities Available: Online
Certified Information Security Manager (CISM) by ISACA
Offering Partner: RevU
Modalities Available: Online
Certified Information Systems Auditor (CISA) by ISACA
Offering Partner: RevU
Modalities Available: Online
Cybersecurity Analyst+ Boot Camp (1w) 2026
Offering Partner: RevU
Modalities Available: Online
Cybersecurity Analyst+ Boot Camp (6w) (2026)
Offering Partner: RevU
Modalities Available: Online
Information Technology Bachelor’s Degree Completion Program
Offering Partner: RevU
Modalities Available: Online
Instructor-Led CISM by GW RevU (1w)
Offering Partner: RevU
Modalities Available: Online
Instructor-Led CISM by GW RevU (6w)
Offering Partner: RevU
Modalities Available: Online
Internet of Things Fundamentals by ISACA
Offering Partner: RevU
Modalities Available: Online
IT Audit Fundamentals Certificate by ISACA
Offering Partner: RevU
Modalities Available: Online
IT Risk Fundamentals Certificate by ISACA
Offering Partner: RevU
Modalities Available: Online
Leadership and Management of CBRNE-WMD Organization and Teams (Cohort 3)
Offering Partner: CBRNE
Modalities Available: Online
Leadership and Management of CBRNE-WMD Organizations and Teams-Cohort 1
Offering Partner: CBRNE
Modalities Available: Online
Leadership and Management of CBRNE-WMD Organizations and Teams-Cohort 2
Offering Partner: CBRNE
Modalities Available: Online
Master’s of Cybersecurity Strategy & Information Management
Offering Partner: RevU
Modalities Available: online
Project Management Professional Boot Camp (1w) 2026
Offering Partner: RevU
Modalities Available: Online
Project Management Professional Boot Camp (6w) 2026
Offering Partner: RevU
Modalities Available: Online
Thank you for your interest in the George Washington University’s College of Professional Studies. Please fill out the request for information form below, and we will be in touch shortly.
Loading…Request Information
Georgie
This AI chatbot provides automated responses, which may not always be accurate. By continuing with this conversation, you agree that the contents of this chat session may be transcribed and retained. You also consent that this chat session and your interactions, including cookie usage, are subject to our privacy policy.
-
-
-