Veterans and First Responders Training Initiative

Veterans and First Responders Training Initiative (VTI) is part of the CyberSkills2Work™ Program under the Jack D. Gordon Institute for Public Policy at Florida International University. As a key component of the National Cybersecurity Workforce Development Program, the VTI program is dedicated to preparing and empowering veterans, transitioning military personnel, first responders, military spouses, and dependents to enter cybersecurity careers that protect our nation’s Critical Infrastructure Sectors.

updated-vets-stats.jpg

Applications Are Now Open!

Apply by December 22nd to secure your spot. Availability is limited, and spots are filled on a first-come, first-served basis.

Program Overview

The CyberSkills2Work™ Program is a nationally scalable cybersecurity workforce development initiative, made possible through a two-year, $6 million grant from the National Security Agency's (NSA) National Centers of Academic Excellence in Cybersecurity (NCAE-C) and the Cybersecurity and Infrastructure Security Agency (CISA). The program is delivered in partnership with 10 National Centers of Academic Excellence in Cybersecurity (CAE-C) institutions across the U.S., furthering the mission to meet the growing demand for cybersecurity professionals.

Through free, fully online training (100% asynchronous), eligible participants are prepared for cybersecurity roles in critical sectors such as defense, energy, and financial services, with support for their career transition into high-demand jobs.

For more information, visit CyberSkills2Work.org.

2025 Program Information

Three specialized training pathways will be offered to prepare participants for roles in Digital Forensics, Network Operations, Technical Support, and other related cybersecurity fields. The program provides asynchronous online courses, digital badges, professional development, and job placement support through the CyberSkills2Work Employers Network.

Each pathway will accommodate 50 to 100 eligible participants, depending on the specific track. Best of all, all costs are fully covered by the grant—there’s no need to use your GI Bill® or Pell Grant. This opportunity is entirely free for eligible and accepted participants.

  • Eligibility

    Through VTI, we are committed to recruiting, training, and placing skilled individuals into critical cybersecurity roles, addressing the increasing demand for cyber professionals and enhancing our national security.

    To be eligible for the VTI program, participants must fall into one of the following categories:

    • Veterans
    • Transitioning military personnel
    • First responders
    • Military spouses
    • Military dependents

    Additionally, participants must:

    • Be a S. citizen or Permanent Resident
    • Have a high school diploma or equivalent
    • Be available to fully participate in the program and complete all course requirements
    • Have some IT or cybersecurity experience (required only for the Digital Forensics pathway)
  • How to Apply

    Prospective applicants should apply through the CyberSkills2Work.org site. Visit CyberSkills2Work.org and click "Apply" in the top right corner to create a learner account. When prompted, be sure to select the Florida International University training pathway(s) you would like to apply for. While you may choose to apply for pathways from other institutions, keep in mind that doing so will reduce the number of FIU applications we can review.

    Course Schedule for 2025:

    Course Starts

    Course Ends

    Pathway

    Course Name

    Instructor

    1/6/2025

    3/2/2025

    Technical Support Pathway

    Foundations of Cybersecurity

    Yacoub Hanna

    1/6/2025

    2/28/2025

    Digital Forensics Pathways

    Video and Imaging Forensics

    Matthew Ruddell

    1/6/2025

    2/28/2025

    Digital Forensics Pathways

    Fundamentals of Digital Forensics

    Matthew Ruddell

    3/10/2025

    5/4/2025

    Network Operations

    Foundations of Networking

    Yacoub Hanna

    3/10/2025

    5/2/2025

    Digital Forensics Pathways

    Mobile Forensics

    Matthew Ruddell

    3/10/2025

    5/2/2025

    Digital Forensics Pathways

    Networking Forensics and Incident Response

    Matthew Ruddell

    5/12/2025

    7/6/2025

    Technical Support Pathway

    Foundations of Cybersecurity

    Yacoub Hanna

  • Application Deadline and Process

    Pathway

    Course

    Application Opens

    Application Ends

    Technical Support

    Network Operations

    Digital Forensics

    Foundations of Cybersecurity

     

    Open Now!

    12/15/2024

    Digital Forensics

    Video and Imaging Forensics

     

    Open Now!

     

    12/15/2024

     

    Digital Forensics

    Digital Forensics Fundamental Skills

    Open Now!

     

    12/15/2024

     

    *** ALL APPLICATIONS ARE REVIEWED ON A FIRST-COME BASIS ***

    Prospective applicants apply through the CyberSkills2Work.org site.

  • Program Commitment Requirements

    To succeed in the program, participants should plan to spend approximately 5 hours per week on course modules and assignments.

    All selected applicants must agree to the following:

    • Commit to participating in the program for its entire duration
    • Have access to a working computer and a reliable internet connection.
    • Participate fully in all program and course activities, including online lectures, career development, and information sessions.
    • Dedicate time to self-study and complete all program requirements, including assigned readings, labs, quizzes, and surveys each week.
  • Application Requirements

    To ensure a smooth application process, we encourage all prospective applicants to start gathering the required documents as early as possible.

    Required Documents:

    • Up-to-date resume
    • Unofficial transcripts for your most advanced degree (high school, associate's, or bachelor's)
    • Proof of U.S. citizenship or permanent residency (e.g., service records, employment verification)

    Make sure to have these documents ready before starting your application.

    Additional Documentation by Applicant Type:

    For First Responders:

    Submit one of the following:

    • ID Card - Should indicate an eligible position or job title)
    • Training Certificates - Must include your full name)
    • Signed Verification Letter
      • Must include your full name, position, or job title
      • Must be signed by an administrator on official letterhead
    • Paystub
      • Must include your full name, position, or job title
      • Must be dated within the last four years

    For Military Service Members:

    Submit one of the following:

    • Military Pay Stubs (Leave & Earnings Statement, LES)
    • Record Briefs (ARB/ERB/ORB for U.S. Army)
    • Reserve Activation Orders
    • Enlistment Contracts

    For Veterans:

    Submit one of the following:

    • DD-214 Form
    • Driver’s License or DMV-Issued State ID with the "VETERAN" endorsement
    • Honorable Discharge Certificate
    • NGB Form 22
    • Reserve Separation Orders
    • Veterans Health Identification Card (VHIC) or Veteran Identification Card (VIC)
    • VA Disability Letter

    For Military Spouses:

    Submit one of the following:

    • A copy of your marriage certificate along with your spouse's military orders showing their current duty station
    • A copy of your spouse’s Military ID (front and back) that indicates active duty status (please redact any sensitive information)
    • A copy of your spouse’s DD-214 if they are a veteran, along with your marriage certificate
    • A DEERS Enrollment Confirmation showing you are listed as a military spouse

    For Military Dependents:

    Submit one of the following:

    • Dependent Military ID Card (front and back)
    • DD Form 1172-2 (Application for Identification Card/DEERS Enrollment)
    • Sponsor’s Permanent Change of Station (PCS) orders that list the dependent's name
    • Marriage certificate (for military spouses)
    • Birth certificate or adoption papers (for children/dependents)
    • Dependency and Indemnity Compensation (DIC) letter (if applicable)
    • Certificate of Eligibility (COE) for VA education benefits (e.g., Post-9/11 GI Bill®)
  • Program Benefits
    • Offers three short-term, intensive cybersecurity training pathways with career development support at no cost to eligible participants.
    • Instructor-led courses taught by FIU faculty, providing foundational cybersecurity knowledge.
    • Provides career development support and access to employers through the National Employers Cybersecurity Network.
    • Offers digital badges, and certificates to showcase skills and competencies.
    • Courses and programs are fully asynchronous and online, ensuring flexible learning. Optional synchronous activities, such as Q&A sessions, may be available and recorded for later viewing.
    • You have flexibility within the pathways to pick and choose which courses you'd like to take. If a particular course doesn’t interest you or if you don’t have the time to take it at the moment, you can choose to skip it and return to it later. However, foundational or fundamental courses must be completed to ensure you have the core knowledge required for the program. This structure allows you to progress at your own pace while focusing on the areas that fit your schedule and interests.
  • Frequently Asked Questions (FAQs)

    1. What if I have no prior experience in IT or cybersecurity?

    No prior IT or cybersecurity experience is necessary to join our program! The goal of our program is to help you build the essential skills you need for a career in cybersecurity. The only pathway that requires some prior IT experience is Digital Forensics, as it's our more advanced course. If you don’t have an IT background, we recommend starting with our Foundations of Networking or Foundations of Cyber Security courses to gain the knowledge needed to succeed in Digital Forensics or other specialized areas.

    2. How does the job placement support work?

    Once you successfully complete any of our courses, you'll be eligible to join our Employers Network. This platform allows you to upload your resume, apply for job postings, and browse available job listings from participating employers. We are committed to supporting your job search and connecting you with opportunities in the field of cybersecurity.

    3. Are there networking opportunities with employers?

    Yes! We host monthly meetings that provide valuable career information and networking opportunities with top organizations, including Booz Allen Hamilton, CISA, and many more. These sessions are a great chance to learn about industry trends and connect directly with potential employers.

    4. Do I have to take all the courses in the pathway?

    No, you do not need to take every course in the pathway. Our courses are designed to provide flexibility, allowing you to select the ones that align with your career goals. Whether you're looking for foundational knowledge or advanced skills, you can choose courses that suit your needs.

    5. Do you offer certifications?

    While we don’t offer official certifications, we do provide Certificates of Completion and digital badges for each course you complete. These can be added to your resume and LinkedIn profile to demonstrate your skills and commitment to cybersecurity education.

    Resource Links:

    The Workforce Framework for Cybersecurity (NICE Framework) is a valuable tool for anyone pursuing a career in cybersecurity because it provides a clear, standardized way to understand the skills, knowledge, and tasks associated with different roles in the field. It organizes cybersecurity work into Work Role Categories and specific Work Roles, helping applicants identify where they might fit best, based on their qualifications. Additionally, the framework's TKS (Tasks, Knowledge, Skills) Statements give detailed insight into what is required for each role, allowing applicants to spot skills gaps and tailor their resumes and training accordingly. By using the Competency Areas outlined in the framework, applicants can focus on the key areas they need to develop to succeed in their chosen career path.

    CyberSeek is a powerful resource that helps various groups—such as employers, educators, counselors, students, and policymakers—better understand the cybersecurity job market and workforce. For Students they can use the platform to see if cybersecurity careers are in high demand in their area, understand the skills and education required to enter the field, and even learn about salary expectations. CyberSeek is a comprehensive tool that provides valuable data for making informed decisions about cybersecurity education, hiring, and career planning.

Upcoming Programs

Foundations of Cybersecurity (Technical Support Pathway)

January 6 - March 2, 2025 | Cybersecurity is more crucial than ever as new technologies reshape our world. This eight-week, self-paced online course, provides the essential skills and knowledge you need to start or advance your career in this rapidly growing field. You will explore diverse cybersecurity career pathways, develop basic computer literacy, and understand networking concepts. The course also covers analyzing the societal impact of cybersecurity, applying core principles to identify common threats, gaining insights into global cybersecurity challenges, and conducting digital forensics and incident response. Whether you're looking to enter the cybersecurity workforce or enhance your current skills, this course will prepare you to tackle the challenges of today and tomorrow.

Video and Image Forensics (Digital Forensics Pathways)

January 6 - March 2, 2025 | This course will introduce participants to the concepts of video and image forensics as it relates to the larger field of digital forensics and the justice system. Video and Image evidence is a growing concern during an investigation as more and more of our lives are captured in some form. From CCTV security cameras in public places, to cell phone cameras, our everyday activities are constantly being recorded. This evidence, when properly collected and analyzed, can be crucial in solving crimes and equally crucial in exonerating the innocent.

Fundamentals of Digital Forensics (Digital Forensics Pathway)

January 6 - March 2, 2025 | This 2-month-long, self-paced online program will provide working professionals with a comprehensive overview of digital investigations, how digital evidence can be found and how it is useful in the investigation of a crime. The program introduces forensics analysis policy, tools, data recovery, cybersecurity, law and ethics, and more. It aligns with the NICE Framework work role of "Cyber Defense Forensic Analyst" and "Law Enforcement/Counterintelligence Forensics Analyst.

Foundations of Networking

March 10 - May 4, 2025 | The course aims to educate on fundamental concepts and principles within telecommunication networks, particularly the Internet, and to demonstrate their application in synthesizing, analyzing, and evaluating computer communication networks. It covers diverse aspects of telecommunication networking, focusing on components, flow and congestion control, switching and routing, quality of service, and application-level protocols like RTP, peer-to-peer networks, and overlay networks.

Past Programs

cti-bootcamp.jpg

Cyber Threat Intelligence and Analysis Bootcamp

This one-week professional program covers the basics of Dark Web investigations, Dark Market, Cryptocurrency, tools for Tor and 12P, and other technical competencies. This program provides professionals hands-on research experience and foundational knowledge to begin transitioning towards a career as a Cyber Threat/Warning Analyst.

forensic-intelligence-bootcamp.jpg

Forensics Intelligence and Governance Bootcamp

This self-paced, hybrid program explores the foundations of biometric and forensics intelligence as well as policies, legality, and ethics. You will receive live instruction and guidance from your instructor as well as complete modules at your own pace. The program’s goal is to prepare a learner for a work role as a Cyber Defense Forensics Analyst.

network-forensics.jpeg

Networking Forensics and Incident Response

This eight-week self-paced course will introduce participants to the field of Network Forensics. It is designed to give participants practical, hands-on, and in-depth introduction to the tools, methodologies, and common challenges faced when conduct a network forensics investigation. The course aims at exposing participants to various log file sources and packet captures to determine the presence of network related incidents. It covers the tools and techniques needed to begin to comprehend the objectives of network forensics.

emergingtechforensics.png

Emerging Technology Forensics

The seminar includes a series of lectures and discussions looking specifically at technology that falls outside of standard digital forensics. As time marches on, more and more of our lives are dependent on a whole host of digital technologies, many of which have become so ingrained in the business of our lives we don’t even think about them. What information might these technologies hold and how can digital forensic investigators access and leverage that information? What new and innovative technologies might we see in the near or far future that will challenge our investigations? What is already here and how can we deal with all this data?

Contact Us

For any further details or questions regarding the veterans and first responders' initiative, please don't hesitate to contact us at vfrti@fiu.edu or call 305-348-2374.

For any general questions regardingCyber Skills to Work (CS2W), please contact us at cyberskills2work@uwf.edu.

cyberskills2work-colored-1.png
cae-seal_web.png