Become an exceptional
candidate and optimize
your career growth

From fundamentals to advanced development,
build a valuable skillset

Industry experts provide cybersecurity training and mentorship through a safe, cloud-based platform where you can hone cutting-edge skills. Upon completing your online cybersecurity training, you will be equipped with the knowledge and technical skills to defend organizations and the public from real threats, design secure system solutions, and identify weaknesses.

Employment of
cybersecurity
professionals is
expected to grow
33% from 2020
to 2030.

- U.S. Bureau of
Labor Statistics

img

Train with top
industry tools

Get expert-level skills in the leading cybersecurity software. Our bootcamp gives you access to the cutting-edge tools that cybersecurity professionals are using right now.

Learn to defend
against cyberattacks

Thrive in the expanding world
of cybersecurity

Hands-on
learning

Our innovative approach to instruction provides you with critical, hands-on training in a live, online environment. The curriculum is designed for professionals of all backgrounds in every stage of their careers.

Virtual classroom

Interact with your instructors and peers in a real-time environment using cloud-based chat software. Enjoy weeknight classes built to fit into your busy life from the comfort of your own home.

TDX Arena

TDX Arena, a proprietary virtual training platform, is curated by cybersecurity experts to help you gain valuable experience through real-world simulations. Our in-depth training teaches you how to identify the different vulnerabilities on desktop, mobile, server, and web platforms, and the techniques needed to protect against threats.

Industry-leading instructors

Our instructors give you the inside track on a complex field. As you sharpen your practical and theoretical skills with their expert guidance, you benefit from their current industry knowledge and expert perspectives.

Receive personalized support
every step of the way

Comprehensive career services designed to support your
unique goals

Networking advantages

As the demand for cybersecurity professionals increases, local and global employers are looking to connect with qualified candidates. Throughout the bootcamp, you will receive access to virtual networking events where you can explore cybersecurity career opportunities.

Dedicated support

Once you invest in our online cybersecurity bootcamp, you get the full-fledged support of a team dedicated to your success. From day one, your student success manager ensures you have the tools you need to excel within the bootcamp—and beyond.

Professional coaching

Our bootcamp features a team of passionate career coaches who are eager to help you achieve your professional goals. Get access to a wide array of professional development opportunities including interview prep, LinkedIn profile optimization, and resume writing.

Career search assistance

Our Career Outcomes team is here to support your journey, whether you are preparing to apply for your first cybersecurity role or looking to advance an existing career. From exclusive networking opportunities to practice interviews, the personalized services our team offers help you become a more marketable candidate.

Check out our

course catalog

Find out what
you will learn

img

Bootcamp overview

4-Week Intro Course |
32-Week Bootcamp Program

  • Intro Course

    The intro course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the full bootcamp. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the full bootcamp and pursue a career in cybersecurity.

    This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.
  • Fundamentals Phase

    In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.
  • Computer Networking Fundamentals

    This course serves as an in-depth primer on computer networking, equipping you with hands-on proficiency in configuring and safeguarding network devices for peak performance. Participants will gain insights into network structures, protocols, and security measures while refining their skills in device configuration and troubleshooting. Through engaging, experiential activities, participants will cultivate their critical thinking and problem-solving capacities to address frequent networking quandaries.

    Participants will:
    • Discover how various entities interface and interact in the digital realm
    • Grasp the diversity of networks and their profound influence on our interlinked world
    • Master the art of documentation related to configuration settings
    • Experience the significance of audits in maintaining the highest standards of network performance and safety
    • Recognize the critical role system and communication protection plays in information security
    • Learn to effectively modify and update policies in response to the ever-changing landscape
    • The knowledge imparted in this course lays the groundwork for students to start their journey toward acquiring the following certifications:* CompTIA® Network+, ISC2 Certified in Cybersecurity.
  • Microsoft Security Systems Administration

    This course delivers practical training centered on safeguarding Microsoft Windows environments, equipping participants with the tactical know-how to deploy security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. Participants will also learn to regulate and manage networks for optimal security and stability using system administration tools. Upon course completion, participants will have a foundational understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments across various professional contexts.

    Participants will:
    • Gain insights into the makeup of Microsoft's infrastructure and its constituent parts
    • Develop effective methods to shield Microsoft's infrastructure from potential hazards
    • Acquire the ability to administer diverse types of accounts corresponding to business roles
    • Explore strategies for preserving a secure and reliable network environment
    • Discover how automation and scripting can boost both security and efficiency in cybersecurity roles
    • Understand the role of Active Directory in managing permissions and regulating access to network resources
    • Learn to enhance system security and operational productivity using Powershell
  • Integrating Your Infrastructure Security

    This course empowers students with the skills needed to proficiently manage Linux operating systems, apply rudimentary Python programming, delve into cloud computing, and strengthen system defenses against threats and vulnerabilities. Furthermore, participants will learn to monitor, detect, and analyze threats and vulnerabilities within these settings, while also acquainting themselves with remediation strategies. Lastly, participants will initiate an understanding of the transformative role DevSecOps plays in the cybersecurity domain.

    Participants will:
    • Cultivate a comprehensive understanding of Linux operating system management and the monitoring, detection, and analysis of threats and vulnerabilities in Linux and cloud-based settings
    • Receive an introduction to Python programming
    • Develop a foundational understanding of cloud computing settings and generate an instance using Amazon Web Services (AWS)
    • Comprehend remediation strategies and methods to communicate protection measures to safeguard other systems
    • Learn to design automations for efficient system management and protection
    • Investigate the design tenets of scalable cloud solutions and the integration of various settings
    • Become conversant with DevSecOps


    The knowledge gleaned from this course equips students to commence preparation for the following certification:* AWS Cloud Practitioner.
  • Infrastructure Phase

    The Infrastructure Phase imparts the essential knowledge and practical experience required to establish and maintain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, students focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions. Upon completing this phase, you will possess an understanding of critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.
  • Securing Your Network

    In this course, you will continue to augment your knowledge of networks. You will explore various aspects of wired and wireless networks, including their inherent security challenges and vulnerabilities. The course will guide you through designing access controls, encompassing all facets of network security—from people and data to devices. Moreover, you will learn how to safely construct and fortify networks, discussing topics like cryptography and privacy restrictions.

    Participants will:
    • Cultivate an understanding of network security measures and the requisite strategies for network protection
    • Start mastering techniques for effective network monitoring
    • Gain insights into how to proficiently manage system accounts
    • Understand how security attributes can fortify network defenses
    • Familiarize themselves with an array of common tools and technologies that bolster network safety
    • Develop the competence to construct a secure network architecture
    • Learn the rudiments of MHN networks and how to effectively implement them
    • Comprehend the interaction between Telnet and POP3 machines

    The knowledge gained in this course lays the groundwork for students to commence preparation for the following certifications:* CompTIA® Network+, Cisco Certified CyberOps Associate.
  • Designing Your Cybersecurity Infrastructure

    This course delves deeply into the critical components of defending endpoint devices, enforcing data loss prevention methodologies, and employing advanced instruments and strategies to protect an organization's digital resources. By the course's conclusion, participants will have a holistic understanding of endpoint device defense, data loss prevention, and the security implications for industrial systems and IoT devices.

    Participants will:
    • Investigate endpoint devices to comprehend how to assess, recognize threats to, and secure them
    • Learn to record and monitor configurations and tool choices
    • Understand how to devise rules and constraints that shield endpoint devices from potential damage
    • Discover how to collaborate with external information systems while preserving the security of endpoint devices
    • Develop the competency to enforce data loss prevention techniques
    • Become conversant with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)

    The knowledge imparted in this course lays the groundwork for students to begin preparation for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 CISSP.
  • Social Engineering and Ethical Hacking

    In the Social Engineering and Ethical Hacking course, participants delve into the psychology of hackers and grasp the principles of game theory as they apply to cybersecurity defense and strategies. By the course's conclusion, learners will understand social engineering tactics and the fundamentals of ethical hacking, enabling them to bolster cybersecurity defenses and guard against potential threats.

    Participants will:
    • Gain an understanding of the motivations and actions of prospective attackers
    • Develop insights into how adopting a malicious hacker’s perspective can fortify system security
    • Discover how ethical hacking can proactively fortify applications, systems, and organizational infrastructure
    • Investigate how reconnaissance, penetration testing, and evasion of defense systems can contribute to system safety
    • Learn to identify vulnerabilities in web applications and cloud-based systems
    • Cultivate the ability to effectively communicate risks and suggest defense strategies
    • Understand how social engineering techniques can manipulate individuals


    The knowledge gained in this course prepares students to commence their journey towards the following certifications:* CompTIA® CySA+, PenTest+.
  • Advanced Phase

    Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities.

    Upon successful culmination of this phase, you will be awarded your Cybersecurity Bootcamp credential certifying completion.
  • Digital Forensics and Incident Response

    The Digital Forensics & Incident Response course endows learners with the vital tools needed to efficiently counter attacks, perform investigations, collect evidence, and generate detailed reports. Upon course completion, participants will possess the required knowledge to address incidents, conduct investigations, and report their findings. These abilities will aid students in identifying, scrutinizing, and brainstorming about security incidents to avert future violations.

    Participants will:
    • Engage in the rudiments of offensive security
    • Acquire an understanding of digital forensics fundamentals
    • Investigate file recovery strategies and the retrieval of stolen data
    • Learn to proficiently manage various types of attacks directed at organizations
    • Gain insights into the strategies attackers employ to gain access to critical systems and data
    • Explore the basics of malware analysis to improve your capacity to identify and neutralize potential threats


    The knowledge imparted in this course prepares students to start their journey toward the following certifications:* CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP.
  • Threat Hunting and Intelligence

    The Threat Hunting and Intelligence course arms students with the necessary knowledge to detect and neutralize vulnerabilities in an organization's infrastructure. By the course's conclusion, students will be adept at recognizing vulnerabilities, reacting to threats, and formulating solid plans to protect an organization's infrastructure.

    Participants will:
    • Cultivate an extensive understanding of the threats and vulnerabilities that can surface within an organization's network infrastructure, including hardware devices, software applications, and network services.
    • Improve their capacity to proactively pinpoint and respond to threats, thereby promoting a proactive security stance.
    • Gain the knowledge and skills to design effective plans and procedures to handle security situations efficiently, ensuring a rapid and coordinated response.
    • Develop the ability to evaluate information sources and tools, allowing them to bolster their defense tactics.


    The knowledge acquired in this course prepares students to start their preparation for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP.
  • Elective CompTIA® Security+ Certification Exam Prep Course

    The Cybersecurity Bootcamp includes an optional CompTIA® Security+ Exam Preparation Course* designed to prepare students for this highly-valued industry certification. A voucher for the CompTIA® Security+ certification exam is included.

    Certificate Highlights:

    • Lays the groundwork for the crucial knowledge required in any cybersecurity role
    • The only basic cybersecurity certification that underscores hands-on practical abilities
    • A globally acknowledged certification that instills the essential knowledge required in the sector and serves as a launchpad for mid-level cybersecurity positions
Icon

Intro Course (4 Weeks)

The intro course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the full bootcamp. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the full bootcamp and pursue a career in cybersecurity.

This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.

Icon

Fundamentals Phase (12 weeks)

In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.

Icon

Computer Networking Fundamentals

This course serves as an in-depth primer on computer networking, equipping you with hands-on proficiency in configuring and safeguarding network devices for peak performance. Participants will gain insights into network structures, protocols, and security measures while refining their skills in device configuration and troubleshooting. Through engaging, experiential activities, participants will cultivate their critical thinking and problem-solving capacities to address frequent networking quandaries.

Participants will:

  • Discover how various entities interface and interact in the digital realm
  • Grasp the diversity of networks and their profound influence on our interlinked world
  • Master the art of documentation related to configuration settings
  • Experience the significance of audits in maintaining the highest standards of network performance and safety
  • Recognize the critical role system and communication protection plays in information security
  • Learn to effectively modify and update policies in response to the ever-changing landscape
  • The knowledge imparted in this course lays the groundwork for students to start their journey toward acquiring the following certifications:* CompTIA® Network+, ISC2 Certified in Cybersecurity.

Icon

Microsoft Security Systems Administration

This course delivers practical training centered on safeguarding Microsoft Windows environments, equipping participants with the tactical know-how to deploy security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. Participants will also learn to regulate and manage networks for optimal security and stability using system administration tools. Upon course completion, participants will have a foundational understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments across various professional contexts.

Participants will:

  • Gain insights into the makeup of Microsoft's infrastructure and its constituent parts
  • Develop effective methods to shield Microsoft's infrastructure from potential hazards
  • Acquire the ability to administer diverse types of accounts corresponding to business roles
  • Explore strategies for preserving a secure and reliable network environment
  • Discover how automation and scripting can boost both security and efficiency in cybersecurity roles
  • Understand the role of Active Directory in managing permissions and regulating access to network resources
  • Learn to enhance system security and operational productivity using Powershell

Icon

Integrating Your Infrastructure Security

This course empowers students with the skills needed to proficiently manage Linux operating systems, apply rudimentary Python programming, delve into cloud computing, and strengthen system defenses against threats and vulnerabilities. Furthermore, participants will learn to monitor, detect, and analyze threats and vulnerabilities within these settings, while also acquainting themselves with remediation strategies. Lastly, participants will initiate an understanding of the transformative role DevSecOps plays in the cybersecurity domain.

Participants will:

  • Cultivate a comprehensive understanding of Linux operating system management and the monitoring, detection, and analysis of threats and vulnerabilities in Linux and cloud-based settings
  • Receive an introduction to Python programming
  • Develop a foundational understanding of cloud computing settings and generate an instance using Amazon Web Services (AWS)
  • Comprehend remediation strategies and methods to communicate protection measures to safeguard other systems
  • Learn to design automations for efficient system management and protection
  • Investigate the design tenets of scalable cloud solutions and the integration of various settings
  • Become conversant with DevSecOps


The knowledge gleaned from this course equips students to commence preparation for the following certification:* AWS Cloud Practitioner.

Icon

Infrastructure Phase (12 Weeks)

The Infrastructure Phase imparts the essential knowledge and practical experience required to establish and maintain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, students focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions. Upon completing this phase, you will possess an understanding of critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.

Icon

Securing Your Network

In this course, you will continue to augment your knowledge of networks. You will explore various aspects of wired and wireless networks, including their inherent security challenges and vulnerabilities. The course will guide you through designing access controls, encompassing all facets of network security—from people and data to devices. Moreover, you will learn how to safely construct and fortify networks, discussing topics like cryptography and privacy restrictions.

Participants will:

  • Cultivate an understanding of network security measures and the requisite strategies for network protection
  • Start mastering techniques for effective network monitoring
  • Gain insights into how to proficiently manage system accounts
  • Understand how security attributes can fortify network defenses
  • Familiarize themselves with an array of common tools and technologies that bolster network safety
  • Develop the competence to construct a secure network architecture
  • Learn the rudiments of MHN networks and how to effectively implement them
  • Comprehend the interaction between Telnet and POP3 machines

The knowledge gained in this course lays the groundwork for students to commence preparation for the following certifications:* CompTIA® Network+, Cisco Certified CyberOps Associate.

Icon

Designing Your Cybersecurity Infrastructure

This course delves deeply into the critical components of defending endpoint devices, enforcing data loss prevention methodologies, and employing advanced instruments and strategies to protect an organization's digital resources. By the course's conclusion, participants will have a holistic understanding of endpoint device defense, data loss prevention, and the security implications for industrial systems and IoT devices.

Participants will:

  • Investigate endpoint devices to comprehend how to assess, recognize threats to, and secure them
  • Learn to record and monitor configurations and tool choices
  • Understand how to devise rules and constraints that shield endpoint devices from potential damage
  • Discover how to collaborate with external information systems while preserving the security of endpoint devices
  • Develop the competency to enforce data loss prevention techniques
  • Become conversant with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)

The knowledge imparted in this course lays the groundwork for students to begin preparation for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 CISSP.

Icon

Social Engineering and Ethical Hacking

In the Social Engineering and Ethical Hacking course, participants delve into the psychology of hackers and grasp the principles of game theory as they apply to cybersecurity defense and strategies. By the course's conclusion, learners will understand social engineering tactics and the fundamentals of ethical hacking, enabling them to bolster cybersecurity defenses and guard against potential threats.

Participants will:

  • Gain an understanding of the motivations and actions of prospective attackers
  • Develop insights into how adopting a malicious hacker’s perspective can fortify system security
  • Discover how ethical hacking can proactively fortify applications, systems, and organizational infrastructure
  • Investigate how reconnaissance, penetration testing, and evasion of defense systems can contribute to system safety
  • Learn to identify vulnerabilities in web applications and cloud-based systems
  • Cultivate the ability to effectively communicate risks and suggest defense strategies
  • Understand how social engineering techniques can manipulate individuals


The knowledge gained in this course prepares students to commence their journey towards the following certifications:* CompTIA® CySA+, PenTest+.

Icon

Advanced Phase (8 Weeks)

Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities.

Upon successful culmination of this phase, you will be awarded your Cybersecurity Bootcamp credential certifying completion.

Icon

Digital Forensics and Incident Response

The Digital Forensics & Incident Response course endows learners with the vital tools needed to efficiently counter attacks, perform investigations, collect evidence, and generate detailed reports. Upon course completion, participants will possess the required knowledge to address incidents, conduct investigations, and report their findings. These abilities will aid students in identifying, scrutinizing, and brainstorming about security incidents to avert future violations.

Participants will:

  • Engage in the rudiments of offensive security
  • Acquire an understanding of digital forensics fundamentals
  • Investigate file recovery strategies and the retrieval of stolen data
  • Learn to proficiently manage various types of attacks directed at organizations
  • Gain insights into the strategies attackers employ to gain access to critical systems and data
  • Explore the basics of malware analysis to improve your capacity to identify and neutralize potential threats


The knowledge imparted in this course prepares students to start their journey toward the following certifications:* CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP.

Icon

Threat Hunting and Intelligence

The Threat Hunting and Intelligence course arms students with the necessary knowledge to detect and neutralize vulnerabilities in an organization's infrastructure. By the course's conclusion, students will be adept at recognizing vulnerabilities, reacting to threats, and formulating solid plans to protect an organization's infrastructure.

Participants will:

  • Cultivate an extensive understanding of the threats and vulnerabilities that can surface within an organization's network infrastructure, including hardware devices, software applications, and network services.
  • Improve their capacity to proactively pinpoint and respond to threats, thereby promoting a proactive security stance.
  • Gain the knowledge and skills to design effective plans and procedures to handle security situations efficiently, ensuring a rapid and coordinated response.
  • Develop the ability to evaluate information sources and tools, allowing them to bolster their defense tactics.


The knowledge acquired in this course prepares students to start their preparation for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP.

Icon

Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)

The Cybersecurity Bootcamp includes an optional CompTIA® Security+ Exam Preparation Course* designed to prepare students for this highly-valued industry certification. A voucher for the CompTIA® Security+ certification exam is included.

Certificate Highlights:

  • Lays the groundwork for the crucial knowledge required in any cybersecurity role
  • The only basic cybersecurity certification that underscores hands-on practical abilities
  • A globally acknowledged certification that instills the essential knowledge required in the sector and serves as a launchpad for mid-level cybersecurity positions

Prepare for internationally
recognized
certification exams

This bootcamp is not a certification-prep program. However, our bootcamp can help you gain skills and knowledge applicable to industry certifications. To assist you with expanding your credentials beyond our bootcamp, you will have access to a curated library of resources that can further help you prepare for cybersecurity certification exams. To become a standout candidate, we recommend that you obtain one certification in every phase of the bootcamp.

  • LPI Linux Essentials
    Certification

    The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.
  • AWS Certified Cloud
    Practitioner Certification

    The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.
  • CompTIA® Network+
    Certification

    The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.
  • CompTIA® CySA+

    This certification is crafted to offer a more intensive focus on applying behavioral analytics to networks at an intermediate level than the CompTIA® Security+ exam. It encapsulates essential cybersecurity skills while highlighting the importance of software and application security. Furthermore, it covers automation, threat hunting, and industry IT compliance.
  • ISC2 SSCP – Systems Security Certified Practitioner** Certification

    For those who achieved 1 year of experience—Post-Bootcamp Completion.

    The ISC2 SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
  • GIAC Security Essentials

    The GIAC Security Essentials (GSEC) certification confirms a practitioner's understanding of information security beyond mere terms and concepts. Those holding a GSEC certification are illustrating that they are competent in hands-on roles related to security operations within IT systems.
  • Certified Incident Handler

    The GIAC Incident Handler certification corroborates a practitioner's capacity to identify, react to, and resolve computer security incidents employing an array of critical security skills. Holders of the GCIH certification possess the requisite knowledge to handle security incidents, underpinning this with an understanding of typical attack methodologies, vectors, and tools, and are equipped to defend against and respond to such attacks when they transpire.
  • Certified Information Security Manager

    In the face of data breaches, ransomware attacks, and other incessantly changing security threats that are a constant concern for today's IT professionals, a Certified Information Security Manager® (CISM®) certification empowers you with the ability to evaluate risks, enforce efficient governance, and actively manage incidents.

LPI Linux Essentials
Certification

The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.

AWS Certified Cloud
Practitioner Certification

The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.

CompTIA® Network+
Certification

The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.

CompTIA® CySA+

This certification is crafted to offer a more intensive focus on applying behavioral analytics to networks at an intermediate level than the CompTIA® Security+ exam. It encapsulates essential cybersecurity skills while highlighting the importance of software and application security. Furthermore, it covers automation, threat hunting, and industry IT compliance.

ISC2 SSCP – Systems Security Certified Practitioner** Certification

For those who achieved 1 year of experience—Post-Bootcamp Completion.

The ISC2 SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

GIAC Security Essentials

The GIAC Security Essentials (GSEC) certification confirms a practitioner's understanding of information security beyond mere terms and concepts. Those holding a GSEC certification are illustrating that they are competent in hands-on roles related to security operations within IT systems.

Certified Incident Handler

The GIAC Incident Handler certification corroborates a practitioner's capacity to identify, react to, and resolve computer security incidents employing an array of critical security skills. Holders of the GCIH certification possess the requisite knowledge to handle security incidents, underpinning this with an understanding of typical attack methodologies, vectors, and tools, and are equipped to defend against and respond to such attacks when they transpire.

Certified Information Security Manager

In the face of data breaches, ransomware attacks, and other incessantly changing security threats that are a constant concern for today's IT professionals, a Certified Information Security Manager® (CISM®) certification empowers you with the ability to evaluate risks, enforce efficient governance, and actively manage incidents.

*For details, please visit https://thrivedx.com/cybersecurity-program-disclaimers.

** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Cybersecurity
bootcamp cost

Careers in tech are expanding rapidly and the field needs experienced professionals to fill critical roles. Invest in your future—and ours—by learning to defend against cyberattacks and protect critical infrastructure, assets, and communities.

4-Week Intro Course

$180

32-Week Bootcamp Program

$17,800

Requirements

Internet access

Intro course

Tuition, fees, and deposits are subject to change.

img
Skip to content