Become an exceptional
candidate and optimize
your career growth

From fundamentals to advanced development,
build a valuable skillset

Industry experts provide cybersecurity training and mentorship through a safe, cloud-based platform where you can hone cutting-edge skills. Upon completing your online cybersecurity training, you will be equipped with the knowledge and technical skills to defend organizations and the public from real threats, design secure system solutions, and identify weaknesses.

Employment of
cybersecurity
professionals is
expected to grow
33% from 2020
to 2030.

- U.S. Bureau of
Labor Statistics

img

Train with top
industry tools

Get expert-level skills in the leading cybersecurity software. Our program gives you access to the cutting-edge tools that cybersecurity professionals are using right now.

Learn to defend
against cyberattacks

Thrive in the expanding world
of cybersecurity

Hands-on
learning

Our innovative approach to instruction provides you with critical, hands-on training in a live, online environment. The curriculum is designed for professionals of all backgrounds in every stage of their careers.

Virtual classroom

Interact with your instructors and peers in a real-time environment using cloud-based chat software. Enjoy weeknight classes built to fit into your busy life from the comfort of your own home.

Cyber labs

Our Cyber Labs, curated by cybersecurity experts, help you gain valuable experience through real-world simulations. Our in-depth training teaches you how to identify the different vulnerabilities on desktop, mobile, server, and web platforms, and the techniques needed to protect against threats.

Industry-leading instructors

Our instructors give you the inside track on a complex field. As you sharpen your practical and theoretical skills with their expert guidance, you benefit from their current industry knowledge and expert perspectives. Each cohort will be assigned an Associate Instructor that will stay with you for the entire complete program.

Receive personalized support
every step of the way

Comprehensive career services designed to support your
unique goals

Networking advantages

As the demand for cybersecurity professionals increases, local and global employers are looking to connect with qualified candidates. Throughout the program, you will receive access to virtual networking events where you can explore cybersecurity career opportunities.

Dedicated support

Once you invest in our online cybersecurity bootcamp, you get the full-fledged support of a team dedicated to your success. From day one, your student success manager ensures you have the tools you need to excel within the program—and beyond.

Professional coaching

Our program features a team of passionate career coaches who are eager to help you achieve your professional goals. Get access to a wide array of professional development opportunities including interview prep, LinkedIn profile optimization, and resume writing.

Career search assistance

Our Career Outcomes team is here to support your journey, whether you are preparing to apply for your first cybersecurity role or looking to advance an existing career. From exclusive networking opportunities to practice interviews, the personalized services our team offers helps you become a more marketable candidate.

Check out our

course catalog

Find out what
you will learn

img

Program overview

4-Week Introductory Course |
32-Week Complete Program

  • Introductory Course

    The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the extended program and pursue a career in cybersecurity.

    This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.
  • Fundamentals Phase

    In the Fundamentals Phase, your understanding of cybersecurity's bedrock principles will expand. This comprehensive exploration encapsulates numerous concepts that are critical to performing effectively as a cybersecurity professional: a thorough examination of networks and their operations, common operating systems, mechanisms of communication over networks, and the methods of data storage and usage in cloud environments.

    Conclude this phase with a firm understanding of fundamental cybersecurity concepts.
  • Computer Networking Fundamentals

    This course serves as an in-depth primer on computer networking, equipping you with hands-on proficiency in configuring and safeguarding network devices for peak performance. Participants will gain insights into network structures, protocols, and security measures while refining their skills in device configuration and troubleshooting. Through engaging, experiential activities, participants will cultivate their critical thinking and problem-solving capacities to address frequent networking quandaries.

    Participants will:

    Discover how various entities interface and interact in the digital realm
    Grasp the diversity of networks and their profound influence on our interlinked world
    Master the art of documentation related to configuration settings
    Experience the significance of audits in maintaining the highest standards of network performance and safety
    Recognize the critical role system and communication protection plays in information security
    Learn to effectively modify and update policies in response to the ever-changing landscape

    The knowledge imparted in this course lays the groundwork for learners to start their journey towards acquiring the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity.
  • Microsoft Security Systems Administration

    This course delivers practical training centered on safeguarding Microsoft Windows environments, equipping participants with the tactical know-how to deploy security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. Participants will also learn to regulate and manage networks for optimal security and stability using system administration tools. Upon course completion, participants will have a foundational understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments across various professional contexts.

    Participants will:

    Gain insights into the makeup of Microsoft's infrastructure and its constituent parts
    Develop effective methods to shield Microsoft's infrastructure from potential hazards
    Acquire the ability to administer diverse types of accounts corresponding to business roles
    Explore strategies for preserving a secure and reliable network environment
    Discover how automation and scripting can boost both security and efficiency in cybersecurity roles
    Understand the role of Active Directory in managing permissions and regulating access to network resources
    Learn to enhance system security and operational productivity using Powershell
  • Securing Your Network

    In this course, you will continue to augment your knowledge of networks. You will explore various aspects of wired and wireless networks, including their inherent security challenges and vulnerabilities. The course will guide you through designing access controls, encompassing all facets of network security—from people and data to devices. Moreover, you will learn how to safely construct and fortify networks, discussing topics like cryptography and privacy restrictions.

    Participants will:

    Cultivate an understanding of network security measures and the requisite strategies for network protection
    Start mastering techniques for effective network monitoring
    Gain insights into how to proficiently manage system accounts
    Understand how security attributes can fortify network defenses
    Familiarize themselves with an array of common tools and technologies that bolster network safety
    Develop the competence to construct a secure network architecture
    Learn the rudiments of MHN networks and how to effectively implement them
    Comprehend the interaction between Telnet and POP3 machines

    The knowledge gained in this course lays the groundwork for learners to commence preparation for the following certifications*: CompTIA® Network+, Cisco Certified CyberOps Associate.
  • Integrating Your Infrastructure Security

    This course empowers learners with the skills needed to proficiently manage Linux operating systems, apply rudimentary Python programming, delve into cloud computing, and strengthen system defenses against threats and vulnerabilities. Furthermore, participants will learn to monitor, detect, and analyze threats and vulnerabilities within these settings, while also acquainting themselves with remediation strategies. Lastly, participants will initiate an understanding of the transformative role DevSecOps plays in the cybersecurity domain.

    Participants will:

    Cultivate a comprehensive understanding of Linux operating system management and the monitoring, detection, and analysis of threats and vulnerabilities in Linux and cloud-based settings
    Receive an introduction to Python programming
    Develop a foundational understanding of cloud computing settings and generate an instance using Amazon Web Services (AWS)
    Comprehend remediation strategies and methods to communicate protection measures to safeguard other systems
    Learn to design automations for efficient system management and protection
    Investigate the design tenets of scalable cloud solutions and the integration of various settings
    Become conversant with DevSecOps

    The knowledge gleaned from this course equips learners to commence preparation for the following certification*: AWS Cloud Practitioner.
  • Infrastructure Phase

    The Infrastructure Phase imparts the essential knowledge and practical experience required to establish and maintain secure infrastructures and technologies.

    Upon completing this phase, you will possess an understanding of critical security measures, endpoint security, and other pivotal concepts fundamental to protecting organizations.
  • Designing Your Cybersecurity Infrastructure

    This course delves deeply into the critical components of defending endpoint devices, enforcing data loss prevention methodologies, and employing advanced instruments and strategies to protect an organization's digital resources. By the course's conclusion, participants will have a holistic understanding of endpoint device defense, data loss prevention, and the security implications for industrial systems and IoT devices.

    Participants will:

    Investigate endpoint devices to comprehend how to assess, recognize threats to, and secure them
    Learn to record and monitor configurations and tool choices
    Understand how to devise rules and constraints that shield endpoint devices from potential damage
    Discover how to collaborate with external information systems while preserving the security of endpoint devices
    Develop the competency to enforce data loss prevention techniques
    Become conversant with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)

    The knowledge imparted in this course lays the groundwork for learners to begin preparation for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP.
  • Advanced Phase

    Courses in the Advanced Phase further equip you to counter attacks, proactively pinpoint vulnerabilities using ethical hacking, and enhance system defenses. You will transition from understanding the theoretical aspects of cybersecurity technologies to comprehending the motivations and social engineering tactics employed by malevolent actors. You will be introduced to various types of attacks, the attack kill chain, attack execution, responses to active attacks, and mitigation tactics.

    Upon successful culmination of this phase, you will be awarded your Cybersecurity Bootcamp certificate of completion.
  • Social Engineering and Ethical Hacking

    In the Social Engineering and Ethical Hacking course, participants delve into the psychology of hackers and grasp the principles of game theory as they apply to cybersecurity defense and strategies. By the course's conclusion, learners will understand social engineering tactics and the fundamentals of ethical hacking, enabling them to bolster cybersecurity defenses and guard against potential threats.

    Participants will:

    Gain an understanding of the motivations and actions of prospective attackers
    Develop insights into how adopting a malicious hacker’s perspective can fortify system security
    Discover how ethical hacking can proactively fortify applications, systems, and organizational infrastructure
    Investigate how reconnaissance, penetration testing, and evasion of defense systems can contribute to system safety
    Learn to identify vulnerabilities in web applications and cloud-based systems
    Cultivate the ability to effectively communicate risks and suggest defense strategies
    Understand how social engineering techniques can manipulate individuals

    The knowledge gained in this course prepares learners to commence their journey towards the following certifications*: CompTIA® CySA+, PenTest+.
  • Digital Forensics and Incident Response

    The Digital Forensics & Incident Response course endows learners with the vital tools needed to efficiently counter attacks, perform investigations, collect evidence, and generate detailed reports. Upon course completion, participants will possess the required knowledge to address incidents, conduct investigations, and report their findings. These abilities will aid students in identifying, scrutinizing, and brainstorming about security incidents to avert future violations.

    Participants will:

    Engage in the rudiments of offensive security
    Acquire an understanding of digital forensics fundamentals
    Investigate file recovery strategies and the retrieval of stolen data
    Learn to proficiently manage various types of attacks directed at organizations
    Gain insights into the strategies attackers employ to gain access to critical systems and data
    Explore the basics of malware analysis to improve your capacity to identify and neutralize potential threats

    The knowledge imparted in this course prepares learners to start their journey towards the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP.
  • Threat Hunting and Intelligence

    The Threat Hunting and Intelligence course arms learners with the necessary knowledge to detect and neutralize vulnerabilities in an organization's infrastructure. By the course's conclusion, learners will be adept at recognizing vulnerabilities, reacting to threats, and formulating solid plans to protect an organization's infrastructure.

    Participants will:

    Cultivate an extensive understanding of the threats and vulnerabilities that can surface within an organization's network infrastructure, including hardware devices, software applications, and network services.
    Improve their capacity to proactively pinpoint and respond to threats, thereby promoting a proactive security stance.
    Gain the knowledge and skills to design effective plans and procedures to handle security situations efficiently, ensuring a rapid and coordinated response.
    Develop the ability to evaluate information sources and tools, allowing them to bolster their defense tactics.

    The knowledge acquired in this course prepares learners to start their preparation for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP.
  • Elective CompTIA® Security+ Certification Exam Prep Course

    The Cybersecurity Bootcamp includes an optional CompTIA® Security+ Exam Preparation Course** designed to prepare learners for this highly-valued industry certification. A voucher for the CompTIA® Security+ certification exam is included.

    Certificate Highlights:

    Lays the groundwork for the crucial knowledge required in any cybersecurity role The only basic cybersecurity certification that underscores hands-on practical abilities
    A globally acknowledged certification that instills the essential knowledge required in the sector and serves as a launchpad for mid-level cybersecurity positions
Icon

Introductory Course (4 Weeks)

The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the extended program and pursue a career in cybersecurity.

This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.

Icon

Fundamentals Phase (16 weeks)

In the Fundamentals Phase, your understanding of cybersecurity's bedrock principles will expand. This comprehensive exploration encapsulates numerous concepts that are critical to performing effectively as a cybersecurity professional: a thorough examination of networks and their operations, common operating systems, mechanisms of communication over networks, and the methods of data storage and usage in cloud environments.

Conclude this phase with a firm understanding of fundamental cybersecurity concepts.

Icon

Computer Networking Fundamentals

This course serves as an in-depth primer on computer networking, equipping you with hands-on proficiency in configuring and safeguarding network devices for peak performance. Participants will gain insights into network structures, protocols, and security measures while refining their skills in device configuration and troubleshooting. Through engaging, experiential activities, participants will cultivate their critical thinking and problem-solving capacities to address frequent networking quandaries.

Participants will:

Discover how various entities interface and interact in the digital realm
Grasp the diversity of networks and their profound influence on our interlinked world
Master the art of documentation related to configuration settings
Experience the significance of audits in maintaining the highest standards of network performance and safety
Recognize the critical role system and communication protection plays in information security
Learn to effectively modify and update policies in response to the ever-changing landscape

The knowledge imparted in this course lays the groundwork for learners to start their journey towards acquiring the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity.

Icon

Microsoft Security Systems Administration

This course delivers practical training centered on safeguarding Microsoft Windows environments, equipping participants with the tactical know-how to deploy security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. Participants will also learn to regulate and manage networks for optimal security and stability using system administration tools. Upon course completion, participants will have a foundational understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments across various professional contexts.

Participants will:

Gain insights into the makeup of Microsoft's infrastructure and its constituent parts
Develop effective methods to shield Microsoft's infrastructure from potential hazards
Acquire the ability to administer diverse types of accounts corresponding to business roles
Explore strategies for preserving a secure and reliable network environment
Discover how automation and scripting can boost both security and efficiency in cybersecurity roles
Understand the role of Active Directory in managing permissions and regulating access to network resources
Learn to enhance system security and operational productivity using Powershell

Icon

Securing Your Network

In this course, you will continue to augment your knowledge of networks. You will explore various aspects of wired and wireless networks, including their inherent security challenges and vulnerabilities. The course will guide you through designing access controls, encompassing all facets of network security—from people and data to devices. Moreover, you will learn how to safely construct and fortify networks, discussing topics like cryptography and privacy restrictions.

Participants will:

Cultivate an understanding of network security measures and the requisite strategies for network protection
Start mastering techniques for effective network monitoring
Gain insights into how to proficiently manage system accounts
Understand how security attributes can fortify network defenses
Familiarize themselves with an array of common tools and technologies that bolster network safety
Develop the competence to construct a secure network architecture
Learn the rudiments of MHN networks and how to effectively implement them
Comprehend the interaction between Telnet and POP3 machines

The knowledge gained in this course lays the groundwork for learners to commence preparation for the following certifications*: CompTIA® Network+, Cisco Certified CyberOps Associate.

Icon

Integrating Your Infrastructure Security

This course empowers learners with the skills needed to proficiently manage Linux operating systems, apply rudimentary Python programming, delve into cloud computing, and strengthen system defenses against threats and vulnerabilities. Furthermore, participants will learn to monitor, detect, and analyze threats and vulnerabilities within these settings, while also acquainting themselves with remediation strategies. Lastly, participants will initiate an understanding of the transformative role DevSecOps plays in the cybersecurity domain.

Participants will:

Cultivate a comprehensive understanding of Linux operating system management and the monitoring, detection, and analysis of threats and vulnerabilities in Linux and cloud-based settings
Receive an introduction to Python programming
Develop a foundational understanding of cloud computing settings and generate an instance using Amazon Web Services (AWS)
Comprehend remediation strategies and methods to communicate protection measures to safeguard other systems
Learn to design automations for efficient system management and protection
Investigate the design tenets of scalable cloud solutions and the integration of various settings
Become conversant with DevSecOps

The knowledge gleaned from this course equips learners to commence preparation for the following certification*: AWS Cloud Practitioner.

Icon

Infrastructure Phase (4 Weeks)

The Infrastructure Phase imparts the essential knowledge and practical experience required to establish and maintain secure infrastructures and technologies.

Upon completing this phase, you will possess an understanding of critical security measures, endpoint security, and other pivotal concepts fundamental to protecting organizations.

Icon

Designing Your Cybersecurity Infrastructure

This course delves deeply into the critical components of defending endpoint devices, enforcing data loss prevention methodologies, and employing advanced instruments and strategies to protect an organization's digital resources. By the course's conclusion, participants will have a holistic understanding of endpoint device defense, data loss prevention, and the security implications for industrial systems and IoT devices.

Participants will:

Investigate endpoint devices to comprehend how to assess, recognize threats to, and secure them
Learn to record and monitor configurations and tool choices
Understand how to devise rules and constraints that shield endpoint devices from potential damage
Discover how to collaborate with external information systems while preserving the security of endpoint devices
Develop the competency to enforce data loss prevention techniques
Become conversant with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)

The knowledge imparted in this course lays the groundwork for learners to begin preparation for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP.

Icon

Advanced Phase (12 Weeks)

Courses in the Advanced Phase further equip you to counter attacks, proactively pinpoint vulnerabilities using ethical hacking, and enhance system defenses. You will transition from understanding the theoretical aspects of cybersecurity technologies to comprehending the motivations and social engineering tactics employed by malevolent actors. You will be introduced to various types of attacks, the attack kill chain, attack execution, responses to active attacks, and mitigation tactics.

Upon successful culmination of this phase, you will be awarded your Cybersecurity Bootcamp certificate of completion.

Icon

Social Engineering and Ethical Hacking

In the Social Engineering and Ethical Hacking course, participants delve into the psychology of hackers and grasp the principles of game theory as they apply to cybersecurity defense and strategies. By the course's conclusion, learners will understand social engineering tactics and the fundamentals of ethical hacking, enabling them to bolster cybersecurity defenses and guard against potential threats.

Participants will:

Gain an understanding of the motivations and actions of prospective attackers
Develop insights into how adopting a malicious hacker’s perspective can fortify system security
Discover how ethical hacking can proactively fortify applications, systems, and organizational infrastructure
Investigate how reconnaissance, penetration testing, and evasion of defense systems can contribute to system safety
Learn to identify vulnerabilities in web applications and cloud-based systems
Cultivate the ability to effectively communicate risks and suggest defense strategies
Understand how social engineering techniques can manipulate individuals

The knowledge gained in this course prepares learners to commence their journey towards the following certifications*: CompTIA® CySA+, PenTest+.

Icon

Digital Forensics and Incident Response

The Digital Forensics & Incident Response course endows learners with the vital tools needed to efficiently counter attacks, perform investigations, collect evidence, and generate detailed reports. Upon course completion, participants will possess the required knowledge to address incidents, conduct investigations, and report their findings. These abilities will aid students in identifying, scrutinizing, and brainstorming about security incidents to avert future violations.

Participants will:

Engage in the rudiments of offensive security
Acquire an understanding of digital forensics fundamentals
Investigate file recovery strategies and the retrieval of stolen data
Learn to proficiently manage various types of attacks directed at organizations
Gain insights into the strategies attackers employ to gain access to critical systems and data
Explore the basics of malware analysis to improve your capacity to identify and neutralize potential threats

The knowledge imparted in this course prepares learners to start their journey towards the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP.

Icon

Threat Hunting and Intelligence

The Threat Hunting and Intelligence course arms learners with the necessary knowledge to detect and neutralize vulnerabilities in an organization's infrastructure. By the course's conclusion, learners will be adept at recognizing vulnerabilities, reacting to threats, and formulating solid plans to protect an organization's infrastructure.

Participants will:

Cultivate an extensive understanding of the threats and vulnerabilities that can surface within an organization's network infrastructure, including hardware devices, software applications, and network services.
Improve their capacity to proactively pinpoint and respond to threats, thereby promoting a proactive security stance.
Gain the knowledge and skills to design effective plans and procedures to handle security situations efficiently, ensuring a rapid and coordinated response.
Develop the ability to evaluate information sources and tools, allowing them to bolster their defense tactics.

The knowledge acquired in this course prepares learners to start their preparation for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP.

Icon

Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)

The Cybersecurity Bootcamp includes an optional CompTIA® Security+ Exam Preparation Course** designed to prepare learners for this highly-valued industry certification. A voucher for the CompTIA® Security+ certification exam is included.

Certificate Highlights:

Lays the groundwork for the crucial knowledge required in any cybersecurity role The only basic cybersecurity certification that underscores hands-on practical abilities
A globally acknowledged certification that instills the essential knowledge required in the sector and serves as a launchpad for mid-level cybersecurity positions

*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.

**The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.

Prepare for internationally
recognized
certification exams

This bootcamp is not a certification-prep program. However, our program can help you gain skills and knowledge applicable to industry certifications. To assist you with expanding your credentials beyond our program, you will have access to a curated library of resources that can further help you prepare for cybersecurity certification exams. To become a standout candidate, we recommend that you obtain one certification in every phase of the program.

  • LPI Linux Essentials
    Certification

    The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.
  • AWS Certified Cloud
    Practitioner Certification

    The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.
  • CompTIA® Network+
    Certification

    The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.
  • CompTIA® CySA+

    This certification is crafted to offer a more intensive focus on applying behavioral analytics to networks at an intermediate level than the CompTIA® Security+ exam. It encapsulates essential cybersecurity skills while highlighting the importance of software and application security. Furthermore, it covers automation, threat hunting, and industry IT compliance.
  • (ISC)² SSCP – Systems Security Certified Practitioner** Certification

    For those who achieved 1 year of experience—Post-Program Completion.

    The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
  • GIAC Security Essentials

    The GIAC Security Essentials (GSEC) certification confirms a practitioner's understanding of information security beyond mere terms and concepts. Those holding a GSEC certification are illustrating that they are competent in hands-on roles related to security operations within IT systems.
  • Certified Incident Handler

    The GIAC Incident Handler certification corroborates a practitioner's capacity to identify, react to, and resolve computer security incidents employing an array of critical security skills. Holders of the GCIH certification possess the requisite knowledge to handle security incidents, underpinning this with an understanding of typical attack methodologies, vectors, and tools, and are equipped to defend against and respond to such attacks when they transpire.
  • Certified Information Security Manager

    In the face of data breaches, ransomware attacks, and other incessantly changing security threats that are a constant concern for today's IT professionals, a Certified Information Security Manager® (CISM®) certification empowers you with the ability to evaluate risks, enforce efficient governance, and actively manage incidents.

LPI Linux Essentials
Certification

The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.

AWS Certified Cloud
Practitioner Certification

The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.

CompTIA® Network+
Certification

The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.

CompTIA® CySA+

This certification is crafted to offer a more intensive focus on applying behavioral analytics to networks at an intermediate level than the CompTIA® Security+ exam. It encapsulates essential cybersecurity skills while highlighting the importance of software and application security. Furthermore, it covers automation, threat hunting, and industry IT compliance.

(ISC)² SSCP – Systems Security Certified Practitioner** Certification

For those who achieved 1 year of experience—Post-Program Completion.

The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

GIAC Security Essentials

The GIAC Security Essentials (GSEC) certification confirms a practitioner's understanding of information security beyond mere terms and concepts. Those holding a GSEC certification are illustrating that they are competent in hands-on roles related to security operations within IT systems.

Certified Incident Handler

The GIAC Incident Handler certification corroborates a practitioner's capacity to identify, react to, and resolve computer security incidents employing an array of critical security skills. Holders of the GCIH certification possess the requisite knowledge to handle security incidents, underpinning this with an understanding of typical attack methodologies, vectors, and tools, and are equipped to defend against and respond to such attacks when they transpire.

Certified Information Security Manager

In the face of data breaches, ransomware attacks, and other incessantly changing security threats that are a constant concern for today's IT professionals, a Certified Information Security Manager® (CISM®) certification empowers you with the ability to evaluate risks, enforce efficient governance, and actively manage incidents.

*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.

** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Cybersecurity
program cost

Careers in tech are expanding rapidly and the field needs experienced professionals to fill critical roles. Invest in your future—and ours—by learning to defend against cyberattacks and protect critical infrastructure, assets, and communities.

4-Week Introductory Course

$180

32-Week Complete Program

$17,800

Requirements

Internet access

Introductory course

Tuition, fees, and deposits are subject to change.

img
Skip to content