Become a Cybersecurity Professional

Envision Your Successful
Cybersecurity Career

Taking part in the Cybersecurity Bootcamp at the University of Wisconsin—Madison equips you with the skills to thrive in a cybersecurity career in 36 weeks. The online classes, led by expert instructors, feature hands-on exercises that mimic tasks real industry tasks, including real-world cyberattack simulations. Our courses are also regularly updated to incorporate the latest advancements in cyber tech, including AI tools and practices. Our bootcamp provides a comprehensive cybersecurity education and ongoing career guidance through continued professional development.

This professional development program does not bear academic credit.

With over 700,000
job openings
nationwide, there’s
never been a better
time to join the
cybersecurity
industry.

Source: Cyberseek.org

img

Our Accelerated Curriculum Gets You Job-Ready, Fast

Build the Cybersecurity Skills Employers Want

Train with all the right tools and top cybersecurity software and gain the advanced skills that will help you stand out to employers.

Earn Hands-On
Experience
as a Cybersecurity Defender

Defend Against Cyberattacks in
Simulated, Real-World Exercises

Hands-On Classes

Our bootcamp is designed to prepare you for the real world. These classes provide you with a set of engaging and challenging projects, encouraging you to develop offensive and defensive cybersecurity skills you can apply on the job from day one.

TDX Arena and Cyber Labs

Learners develop job-ready skills by practicing what they learn in class with Cyber Labs and TDX Arena, our proprietary virtual training platform, housing everything from everyday practice exercises to real-world cyberattacks simulations and immersive gamified learning.

Virtual Classroom

Grow your cybersecurity knowledge with virtual weekday classes on a part-time schedule. Our online learning ecosystem includes class recordings and a suite of virtual communication tools that enable you to access a supportive community of professionals and peers. Plus, our courses are regularly updated to incorporate the latest advancements in cyber tech, including AI tools and practices.

Expert Instructors

Learn from instructors who are cybersecurity professionals, bringing years of industry knowledge directly into the classroom. Learners benefit from their unique insights, first-hand experience, as well as their mentorship and guidance. Each cohort will have a consistent Associate Instructor that will stay with them for the entire Complete Program.

Personalized Support
Every Step of the Way

Thrive With a Built-in Community
of Professionals

Professional Community

Open yourself up to new possibilities for your future cybersecurity career! We host many virtual networking events to help you mingle with other cybersecurity professionals and make amazing connections, including with local and national hiring partners.

Career Coaching

Get the support of a team of career advisors and coaches. They are here to help you get the career of your dreams and coach you to be a top candidate: from polishing your resume and LinkedIn profile to interview prep and so much more.

Learner Support

Student Success Managers are an invaluable resource built into the very fabric of our bootcamp. From helping learners access additional resources and tutoring sessions to keeping you accountable and arranging test retakes, they ensure you always get the support you need.

Job Search Assistance

Our Career Outcomes team is your bridge to jumpstarting your professional path in cybersecurity at world-class tech companies. They can help you locate the best opportunities for your career path and guide you to land your first position in cybersecurity.

Explore the Classes
That
Will Train You
in Cybersecurity

Download the Course Catalog

img

Program Overview

4 Week Introductory Course |
32 Week Complete Program

  • Introductory Course

    The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

    When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.
  • Fundamentals Phase

    In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional: an exploration of networks and their functions, common operating systems, how devices communicate over networks, as well as how data is stored and utilized in the cloud.

    Complete this phase with a foundational understanding of essential cybersecurity concepts.
  • Microsoft Security Systems Administration

    This course offers hands-on training focused on securing Microsoft Windows environments, providing learners with the practical knowledge and skills needed to implement security features and tools, including Microsoft Defender, BitLocker, and Windows Firewall. They will also be able to configure and manage networks to ensure security and stability using system admin tools. By the end of the course, participants will understand the basics of Microsoft’s infrastructure and be able to implement and maintain secure Windows environments in various professional roles.

    Learners Will:
    • Gain an understanding of Microsoft's infrastructure and its components Learn effective strategies to protect Microsoft's infrastructure from potential threats
    • Develop skills to manage various types of accounts based on business function
    • Explore ways to maintain a secure and safe network environment
    • Discover how automations and scripting can enhance both security and efficiency in cybersecurity roles
    • Understand how Active Directory helps manage permissions and control access to network resources
    • Learn how to improve system security and operational efficiencies with Powershell
  • Computer Networking Fundamentals

    This course offers a comprehensive introduction to computer networking, providing practical experience in configuring and managing network devices for optimal performance and security. Learners will gain an understanding of network architectures, protocols, and security while honing their device configuration and troubleshooting skills. Through hands-on activities, they will apply critical thinking and problem-solving skills to address common networking challenges.

    Learners will:
    • Learn how different entities connect and interact across digital landscapes
    • Gain an understanding of the various types of networks and their impact on our interconnected world
    • Harness the power of configuration settings documentation
    • Be exposed to the role of audits in ensuring optimal network performance and security
    • Find out why system and communications protection plays a pivotal role in safeguarding information
    • Learn how to effectively update and adapt policies to keep pace with the ever-evolving landscape


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠
  • Securing Your Network

    In this course, you continue to build on your knowledge of networks to deepen that understanding. As you explore networks, you will familiarize yourself with the different components of wired and wireless networks including their security constraints and vulnerabilities. You will then continue on to developing access controls to ensure that you have considered all pieces of what it means to secure a network from people and data to devices. In addition, you will look at how to safely build and secure networks including discussions around cryptography and privacy constraints.
    Learners Will:
    • Develop an understanding of network security measures, including strategies needed to keep networks safe
    • Begin to master network monitoring techniques
    • Gain an understanding of how to effectively manage accounts within a system
    • See how security attributes can help strengthen network defenses
    • Become familiar with a range of common tools and technologies that support network safety
    • Acquire the skills to build a secure network architecture
    • Learn the basics of MHN networks and how to set them up effectively
    • Understand the relationship between Telnet and POP3 machines


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, Cisco Certified CyberOps Associate
  • Integrating Your Infrastructure Security

    This course equips learners with the necessary skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. Additionally, they will learn how to monitor, scan, and analyze threats and vulnerabilities in these environments, while also becoming familiar with remediation techniques. Finally, learners will begin to understand how DevSecOps impacts the cybersecurity landscape.
    Learners will:
    • Gain an understanding of how to manage Linux operating systems, as well as how to monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments
    • Be introduced to Python programming
    • Develop a basic understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
    • Understand how to remediate and share details to protect other systems
    • Learn how to create automations to efficiently manage and protect systems
    • Explore the design principles of scalable cloud solutions and the integration of different environments
    • Become familiar with DevSecOps


    Information covered in this course helps prepare learners to begin studying for the following certification*: AWS Cloud Practitioner
  • Infrastructure Phase

    In the Infrastructure Phase, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.
  • Designing Your Cybersecurity Infrastructure

    This course delves into the essential aspects of safeguarding endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations for industrial systems and IoT devices.

    Learners will:
    • Explore endpoint devices to gain an understanding of how to evaluate, identify threats to, and protect them
    • Learn to document and track configurations and tool options
    • Understand how to establish rules and restrictions that safeguard endpoint devices from potential harm
    • Discover how to work with external information systems while maintaining the security of endpoint devices
    • Develop the skills to implement of data loss prevention techniques
    • Become familiar with the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP
  • Advanced Phase

    In the Advanced Phase, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. You will learn various attack types, the attack kill chain, attack implementation, response to ongoing attacks, and mitigation strategies.

    When you successfully complete the Advanced Phase, you’ll receive your Cybersecurity Bootcamp certificate of completion.
  • Social Engineering and Ethical Hacking

    In the Social Engineering and Ethical Hacking course, participants explore the inner workings of hackers' minds and acquire an understanding of game theory principles as they relate to cybersecurity defense and solutions. By the end of the course, learners will have an understanding of social engineering techniques and ethical hacking principles, empowering them to enhance cybersecurity defenses and protect against potential threats.

    Learners will:
    • Gain insights into the motivations of potential attackers and their actions
    • Develop an understanding of how to use a malicious hacker’s "state of mind" to enhance system protection
    • Discover how ethical hacking can proactively support applications, systems, and organizational infrastructure
    • Explore how reconnaissance, penetration testing, and defense system bypassing can help keep systems safe
    • Learn how to identify vulnerabilities in web applications and cloud-based systems
    • Build skills to effectively report risks and provide defense recommendations
    • Understand how social engineering techniques can be used to deceive individuals


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® CySA+, PenTest+
  • Digital Forensics and Incident Response

    The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.

    Learners will:
    • Be immersed in the fundamentals of offensive security
    • Gain an understanding of the basics of digital forensics
    • Explore file and stolen data recovery strategies
    • Learn how to effectively handle various types of attacks targeting organizations
    • Get insight into the strategies attackers use to attain access to critical systems and data
    • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP
  • Threat Hunting and Intelligence

    The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure.

    Learners will:
    • Develop a comprehensive understanding of the threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
    • Enhance their ability to proactively identify and respond to threats, fostering a proactive security approach.
    • Acquire the knowledge and skills to develop effective plans and procedures to handle security situations efficiently, ensuring a swift and coordinated response.
    • Cultivate the ability to evaluate information sources and tools, enabling them to strengthen their defense strategies.


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP
  • Elective CompTIA® Security+ Certification Exam Prep Course

    The Cybersecurity Bootcamp includes an elective CompTIA® Security+ Exam Prep Course** designed to prepare students to obtain this valuable industry certification and a voucher for the CompTIA® Security+ certification exam.

    Certificate Highlights:
    • Establishes the core knowledge required for any cybersecurity role
    • The only foundational cybersecurity certification that emphasizes hands-on practical skills
    • A globally recognized certification that establishes the core knowledge required in the field and provides a springboard to intermediate-level cybersecurity jobs
Icon

Introductory Course (4 Weeks)

The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.

Icon

Fundamentals Phase (16 Weeks)

In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional: an exploration of networks and their functions, common operating systems, how devices communicate over networks, as well as how data is stored and utilized in the cloud.

Complete this phase with a foundational understanding of essential cybersecurity concepts.

Icon

Microsoft Security Systems Administration

This course offers hands-on training focused on securing Microsoft Windows environments, providing learners with the practical knowledge and skills needed to implement security features and tools, including Microsoft Defender, BitLocker, and Windows Firewall. They will also be able to configure and manage networks to ensure security and stability using system admin tools. By the end of the course, participants will understand the basics of Microsoft’s infrastructure and be able to implement and maintain secure Windows environments in various professional roles.

Learners Will:

  • Gain an understanding of Microsoft's infrastructure and its components Learn effective strategies to protect Microsoft's infrastructure from potential threats
  • Develop skills to manage various types of accounts based on business function
  • Explore ways to maintain a secure and safe network environment
  • Discover how automations and scripting can enhance both security and efficiency in cybersecurity roles
  • Understand how Active Directory helps manage permissions and control access to network resources
  • Learn how to improve system security and operational efficiencies with Powershell

Icon

Computer Networking Fundamentals

This course offers a comprehensive introduction to computer networking, providing practical experience in configuring and managing network devices for optimal performance and security. Learners will gain an understanding of network architectures, protocols, and security while honing their device configuration and troubleshooting skills. Through hands-on activities, they will apply critical thinking and problem-solving skills to address common networking challenges.

Learners will:

  • Learn how different entities connect and interact across digital landscapes
  • Gain an understanding of the various types of networks and their impact on our interconnected world
  • Harness the power of configuration settings documentation
  • Be exposed to the role of audits in ensuring optimal network performance and security
  • Find out why system and communications protection plays a pivotal role in safeguarding information
  • Learn how to effectively update and adapt policies to keep pace with the ever-evolving landscape


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠

Icon

Securing Your Network

In this course, you continue to build on your knowledge of networks to deepen that understanding. As you explore networks, you will familiarize yourself with the different components of wired and wireless networks including their security constraints and vulnerabilities. You will then continue on to developing access controls to ensure that you have considered all pieces of what it means to secure a network from people and data to devices. In addition, you will look at how to safely build and secure networks including discussions around cryptography and privacy constraints.
Learners Will:

  • Develop an understanding of network security measures, including strategies needed to keep networks safe
  • Begin to master network monitoring techniques
  • Gain an understanding of how to effectively manage accounts within a system
  • See how security attributes can help strengthen network defenses
  • Become familiar with a range of common tools and technologies that support network safety
  • Acquire the skills to build a secure network architecture
  • Learn the basics of MHN networks and how to set them up effectively
  • Understand the relationship between Telnet and POP3 machines


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, Cisco Certified CyberOps Associate

Icon

Integrating Your Infrastructure Security

This course equips learners with the necessary skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. Additionally, they will learn how to monitor, scan, and analyze threats and vulnerabilities in these environments, while also becoming familiar with remediation techniques. Finally, learners will begin to understand how DevSecOps impacts the cybersecurity landscape.
Learners will:

  • Gain an understanding of how to manage Linux operating systems, as well as how to monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments
  • Be introduced to Python programming
  • Develop a basic understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
  • Understand how to remediate and share details to protect other systems
  • Learn how to create automations to efficiently manage and protect systems
  • Explore the design principles of scalable cloud solutions and the integration of different environments
  • Become familiar with DevSecOps


Information covered in this course helps prepare learners to begin studying for the following certification*: AWS Cloud Practitioner

Icon

Infrastructure Phase (4 Weeks)

In the Infrastructure Phase, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.

Icon

Designing Your Cybersecurity Infrastructure

This course delves into the essential aspects of safeguarding endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations for industrial systems and IoT devices.

Learners will:

  • Explore endpoint devices to gain an understanding of how to evaluate, identify threats to, and protect them
  • Learn to document and track configurations and tool options
  • Understand how to establish rules and restrictions that safeguard endpoint devices from potential harm
  • Discover how to work with external information systems while maintaining the security of endpoint devices
  • Develop the skills to implement of data loss prevention techniques
  • Become familiar with the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP

Icon

Advanced Phase (12 Weeks)

In the Advanced Phase, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. You will learn various attack types, the attack kill chain, attack implementation, response to ongoing attacks, and mitigation strategies.

When you successfully complete the Advanced Phase, you’ll receive your Cybersecurity Bootcamp certificate of completion.

Icon

Social Engineering and Ethical Hacking

In the Social Engineering and Ethical Hacking course, participants explore the inner workings of hackers' minds and acquire an understanding of game theory principles as they relate to cybersecurity defense and solutions. By the end of the course, learners will have an understanding of social engineering techniques and ethical hacking principles, empowering them to enhance cybersecurity defenses and protect against potential threats.

Learners will:

  • Gain insights into the motivations of potential attackers and their actions
  • Develop an understanding of how to use a malicious hacker’s "state of mind" to enhance system protection
  • Discover how ethical hacking can proactively support applications, systems, and organizational infrastructure
  • Explore how reconnaissance, penetration testing, and defense system bypassing can help keep systems safe
  • Learn how to identify vulnerabilities in web applications and cloud-based systems
  • Build skills to effectively report risks and provide defense recommendations
  • Understand how social engineering techniques can be used to deceive individuals


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® CySA+, PenTest+

Icon

Digital Forensics and Incident Response

The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.

Learners will:

  • Be immersed in the fundamentals of offensive security
  • Gain an understanding of the basics of digital forensics
  • Explore file and stolen data recovery strategies
  • Learn how to effectively handle various types of attacks targeting organizations
  • Get insight into the strategies attackers use to attain access to critical systems and data
  • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP

Icon

Threat Hunting and Intelligence

The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure.

Learners will:

  • Develop a comprehensive understanding of the threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
  • Enhance their ability to proactively identify and respond to threats, fostering a proactive security approach.
  • Acquire the knowledge and skills to develop effective plans and procedures to handle security situations efficiently, ensuring a swift and coordinated response.
  • Cultivate the ability to evaluate information sources and tools, enabling them to strengthen their defense strategies.


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP

Icon

Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)

The Cybersecurity Bootcamp includes an elective CompTIA® Security+ Exam Prep Course** designed to prepare students to obtain this valuable industry certification and a voucher for the CompTIA® Security+ certification exam.

Certificate Highlights:

  • Establishes the core knowledge required for any cybersecurity role
  • The only foundational cybersecurity certification that emphasizes hands-on practical skills
  • A globally recognized certification that establishes the core knowledge required in the field and provides a springboard to intermediate-level cybersecurity jobs

*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.

**The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.

Build Skills to Help You
with Certification Exams

If you are new to the cybersecurity industry, obtaining industry-recognized certifications* can help boost your credentials and give you a competitive advantage over other candidates. Our courses cover concepts to help you gain foundational knowledge of the following certifications you may wish to pursue following completion of the Cybersecurity Bootcamp.

  • LPI Linux Essentials

    The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
  • CompTIA® Network+

    The CompTIA® Network+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings. Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.
  • Cisco Certified CyberOps Associate

    The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn. The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.
  • CompTIA® CySA+

    The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings. The exam is designed to provide a higher focus at an intermediate level on applying behavioral analytics to networks than the CompTIA® Security+ exam. Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For learners who have achieved one year of experience after completion of their program.

    Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

    The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
  • GIAC Security Essentials

    The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.
  • Certified Incident Handler

    The GIAC Incident Handler certification validates a practitioner's ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
  • Certified Information Security Manager

    Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

LPI Linux Essentials

The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.

CompTIA® Network+

The CompTIA® Network+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings. Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.

Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn. The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.

CompTIA® CySA+

The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings. The exam is designed to provide a higher focus at an intermediate level on applying behavioral analytics to networks than the CompTIA® Security+ exam. Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.

(ISC)² SSCP – Systems Security Certified Practitioner**

For learners who have achieved one year of experience after completion of their program.

Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.

GIAC Security Essentials

The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.

Certified Incident Handler

The GIAC Incident Handler certification validates a practitioner's ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.

Certified Information Security Manager

Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.

*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.

** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Program Tuition

Seize this chance to invest in your professional development! Our career-prep bootcamp can jumpstart your future as a cybersecurity professional.

4-Week Introductory Course

$180

32-Week Complete Program

$17,800

Requirements

Internet access

Drive, ambition, and passion

Introductory course and an admission exam

Tuition, fees, and deposits subject to change.

img
Skip to content