Respond to a Review

Responses should answer questions and address concerns raised in the review or clarify information about your school. Once we authenticate that you are an official school representative, we will publish your response under the corresponding review. Each review is limited to one response, but you may submit a new response to replace the previous one. Please restrict comments to addressing the content of the review in question and refrain from including advertising/promotional material or unrelated exchanges. Official representatives will have the option to make a contact email available, but please avoid directing users from our site through other means.


Reviewer Name Review Body
Kyle Munger Woz U has a people-centric approach, every individual i came into contact with was readily available to see that I was getting the most out of the program. Before Woz U I spent my years self-teaching myself security skills, challenging myself to learn quickly and think abstractly. Meeting those challenges required preparedness and constant vigilance. If you are an autodidact you must know that developing cyber skills is not a one-and-done date, it takes commitment and tremendous effort to keep up with the development of new security technologies. I was tired of sifting through misleading information and I wanted more education, I wasn't able to find the information I wanted to learn in traditional education. Through the entire Cyber Security program at Woz U I was guided by my instructors and mentors with direction and structure that i needed to develop new skills. You feel apart of a team and you see how what you learn is applied in a real world environment. Here are some skills I want to highlight that I was able to learn in this program. | BASH, PowerShell, Python, learned HTML prior to program, Metasploit, Oracle VirtualBox, GNS3, CentOS, Ubuntu, and Kali, Visual Studio Code, Nmap, netcat, arp-scan, nikto, SQLMap, Hydra, PCI DSS, NIST, ISO, Penetration testing, vulnerability analysis, access Controls, Cryptography, Forensic analysis, Social Engineering, System Administration, Logging and Monitoring, Project Management. |