Get the Competitive
Advantage You Need for
Success in Cybersecurity

Start Here. Go Anywhere.

The University at Buffalo Cybersecurity Bootcamp is designed to expand a learner’s skills and provide all of the fundamentals needed to establish a career in cybersecurity, no matter your current level of technological proficiency.

Our expert instructors will guide you through the training in a cloud-based platform where you can safely practice defending and attacking both systems and applications. You’ll receive instruction in ethical hacking and game theory and will be able to translate the skills from the bootcamp to an actual career defending against attackers, finding weaknesses in systems and securing the infrastructure from outside threats.

This professional development program does not bear academic credit.

With over 700,000 job
openings nationwide,
there’s never been a
better time to join
the cybersecurity
industry.

Source:
Cyberseek.org

img

Accelerate Your Future with
Our Experiential Curriculum
Learn About the Perks of our Cybersecurity Bootcamp

Our Cybersecurity Bootcamp will provide you with the education, skills and knowledge
needed to pursue a career in cybersecurity. This includes the fundamentals of the field, as
well as advanced skills that employers demand.

Become a Cybersecurity Professional

Start building the skills you need to excel in the field of cybersecurity under the guidance of industry
experts eager to train the next generation of cybersecurity professionals.

Hands-On Courses

Gain real-world experience in an accelerated, online environment designed to launch the careers of professionals of all backgrounds and experience levels. Confidently enter the workforce with the hands-on training required to excel in the field of cybersecurity.

Virtual Classroom

Benefit from top-tier instructional methodologies enhanced with cloud-based chat software that allows live, virtual, hands-on interaction between you and your instructors. Virtually attend classes on weeknights from the comfort of your own home.

Cyber Labs

Learn to identify vulnerabilities on web, server, mobile and desktop platforms and create secure defenses that protect against a variety of threats through real-world simulations. Complete cyber labs designed by cybersecurity experts to gain the knowledge you need to succeed.

Industry-Leading Instructors

Benefit from expert instructors’ current industry knowledge as well as from their unique insider’s understanding of the fast-paced field of cybersecurity. Experience personalized mentorship and guidance as you learn what it takes to become a cybersecurity professional. An Associate Instructor will accompany the cohort from start to finish, ensuring a seamless learning experience and fostering a strong connection with the participants.

Build the Skills
That Employers Need

Benefit from a comprehensive career services package handled by a dedicated team of
professional development experts.

Networking Opportunities

Gain access to a network of local and global hiring partners looking to employ newly-qualified cybersecurity professionals. Attend virtual networking events designed to introduce you to the variety of opportunities available to you upon program completion.

Dedicated
Support

Routinely meet with a Student Success Manager dedicated to ensuring you have the tools and support you need to thrive in the program and beyond. Know you have a team of professionals backing you in your journey into the field of cybersecurity.

Career
Coaching

Find professional development support within a team of career coaches eager to help you achieve your career goals in cybersecurity. Get help with your resume, prepare for interviews, gain assistance building your LinkedIn profile and more.

Job Search Assistance

Work with our Career Outcomes team to determine what opportunities are available to you. Our search assistance will help you locate career opportunities and thoroughly prepare you for the interview process ahead of time.

Explore
the Curriculum

Get the Course Catalog

img

Program Overview

4-Week Introductory Course
| 32-Week Complete Program

  • Introductory Course

    The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.

    The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

    Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the Complete Program.
  • Fundamentals Phase

    During the Fundamentals Phase, you will embark on an in-depth exploration of the fundamental principles of cybersecurity. This immersive journey will encompass various crucial concepts essential for securing and defending as a cybersecurity professional. Topics covered include the exploration of networks and their functionalities, common operating systems, the intricate mechanisms of device communication over networks, and the storage and utilization of data in cloud environments.

    By successfully completing this phase, you will acquire a solid foundation in essential cybersecurity concepts, empowering you to navigate the field with confidence.
  • Computer Networking Fundamentals

    This course presents a comprehensive introduction to computer networking, offering learners a holistic understanding of configuring and managing network devices to achieve optimal performance and security. Through practical exercises, participants will enhance their skills in device configuration and troubleshooting while gaining insights into network architectures, protocols, and security measures. They will engage in hands-on activities that promote critical thinking and problem-solving, enabling them to tackle common networking challenges effectively.

    Throughout the course, learners will:
    • Acquire knowledge on how various entities connect and interact within digital landscapes.
    • Develop an understanding of different network types and their profound impact on our interconnected world.
    • Leverage the potential of configuration settings documentation for enhanced network management.
    • Explore the role of audits in ensuring both performance and security of networks.
    • Recognize the critical role of system and communications protection in safeguarding information.
    • Learn strategies for updating and adapting policies to keep pace with the ever-evolving network landscape.


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠
  • Microsoft Security Systems Administration

    This course provides hands-on training that focuses on securing Microsoft Windows environments, equipping learners with practical knowledge and skills to implement essential security features and tools, such as Microsoft Defender, BitLocker and Windows Firewall. Participants will also gain expertise in configuring and managing networks using system administration tools to ensure security and stability. By the end of the course, learners will have a solid grasp of Microsoft's infrastructure and will be capable of implementing and maintaining secure Windows environments across various professional roles.

    Throughout the course, learners will:
    • Develop a comprehensive understanding of Microsoft's infrastructure and its core components.
    • Learn effective strategies and techniques to protect Microsoft's infrastructure from potential threats.
    • Acquire skills to manage different types of accounts based on business function requirements.
    • Explore methods for maintaining a secure and safe network environment.
    • Discover how automation and scripting can enhance both security and efficiency in cybersecurity roles.
    • Understand the role of Active Directory in managing permissions and controlling access to network resources.
    • Learn how to enhance system security and operational efficiencies using PowerShell.
  • Securing Your Network

    In this course, you will build upon your existing knowledge of networks to deepen your understanding of this domain. By exploring networks, you will become acquainted with the various components of wired and wireless networks, including their security constraints and vulnerabilities. You will then proceed to develop access controls, ensuring a comprehensive approach to network security that encompasses the protection of people, data, and devices. Additionally, you will examine the safe construction and securing of networks, with discussions on cryptography and privacy considerations.

    Throughout the course, learners will:
    • Develop a thorough understanding of network security measures and the necessary strategies to ensure network safety.
    • Master network monitoring techniques to detect and respond to potential security threats.
    • Gain basic proficiency in effectively managing accounts within a system for enhanced network security.
    • Recognize how security attributes can strengthen network defenses.
    • Familiarize themselves with a variety of common tools and technologies that support network safety.
    • Acquire the skills needed to build a secure network architecture.
    • Learn the fundamentals of MHNs (Multi-Homed Network) and how to set them up effectively.
    • Understand the relationship between Telnet and POP3 machines in the context of network security.


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate
  • Integrating Your Infrastructure Security

    In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against various threats and vulnerabilities. They will develop the knowledge to monitor, scan and analyze threats and vulnerabilities specifically in Linux and cloud-based environments, while also gaining familiarity with remediation techniques. Additionally, learners will delve into the understanding of how DevSecOps impacts the cybersecurity landscape.

    Throughout the course, learners will:
    • Obtain proficiency in managing Linux operating systems and implementing security measures to protect them.
    • Learn the basics of Python programming, which can be applied to cybersecurity tasks.
    • Develop a foundational understanding of cloud computing environments and gain hands-on experience in creating an instance using Amazon Web Services (AWS).
    • Understand the process of remediating security issues and effectively sharing details to protect other systems.
    • Acquire the skills to automate various cybersecurity tasks for efficient management and protection of systems.
    • Explore the design principles of scalable cloud solutions and gain insights into integrating different environments.
    • Become familiar with the concept of DevSecOps and its significance in the cybersecurity field.


    Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner
  • Infrastructure Phase

    The Infrastructure Phase of the course provides learners with the essential knowledge and practical experience to establish and maintain secure infrastructures and technologies.

    Upon completion of this phase, learners will possess a comprehensive understanding of critical security measures, endpoint security, and other vital concepts crucial for effectively safeguarding organizations.
  • Designing Your Cybersecurity Infrastructure

    This course provides an in-depth exploration of crucial elements involved in securing endpoint devices, implementing effective data loss prevention techniques, and employing advanced tools and strategies to safeguard an organization's digital assets. By the conclusion of the course, participants will possess a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations surrounding industrial systems and IoT devices.

    Throughout the course, learners will:
    • Thoroughly examine endpoint devices to gain the necessary knowledge for evaluating and identifying threats, and implementing protective measures.
    • Acquire skills in documenting and tracking configurations and selecting appropriate tools for endpoint device security.
    • Understand the establishment of rules and restrictions that effectively safeguard endpoint devices from potential harm.
    • Discover methods for working with external information systems while maintaining endpoint device security.
    • Develop proficiency in implementing data loss prevention techniques.
    • Familiarize oneself with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP
  • Advanced Phase

    The Advanced Phase courses go beyond theoretical knowledge of cybersecurity technologies and focus on developing skills to effectively respond to attacks, proactively identify vulnerabilities through ethical hacking, and enhance system protection. Participants will gain an understanding of the motivations and social engineering techniques employed by malicious actors. They will also learn about different types of attacks, the attack kill chain, implementing attacks, responding to ongoing attacks, and implementing mitigation strategies.

    Upon successfully completing this phase, participants will receive their Cybersecurity Bootcamp certificate of completion, acknowledging their proficiency in advanced cybersecurity concepts and skills.
  • Social Engineering and Ethical Hacking

    In the Social Engineering and Ethical Hacking course, participants will delve into the inner workings of hackers' minds and explore the principles of game theory as they relate to cybersecurity defense and solutions. By the end of the course, learners will possess a comprehensive understanding of social engineering techniques and ethical hacking principles, enabling them to strengthen cybersecurity defenses and mitigate potential threats.

    Throughout the course, learners will:
    • Gain valuable insights into the motivations and actions of potential attackers.
    • Develop an understanding of leveraging a malicious hacker's mindset to enhance system protection.
    • Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure. Explore reconnaissance, penetration testing, and defense system bypassing as strategies to maintain system security.
    • Learn to identify vulnerabilities in web applications and cloud-based systems.
    • Acquire the skills to effectively report risks and provide recommendations for defense.
    • Understand the application of social engineering techniques in deceiving individuals.


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+
  • Digital Forensics and Incident Response

    The Digital Forensics & Incident Response course provides learners with indispensable tools to efficiently respond to attacks, conduct thorough investigations, collect evidence, and generate comprehensive reports. By the conclusion of the course, participants will possess the necessary knowledge to effectively handle incidents, carry out investigations, and communicate their findings. These acquired skills will enable students to identify, analyze and strategize against security incidents, thereby mitigating the risk of future breaches.

    Throughout the course, learners will:
    • Gain a solid foundation in offensive security fundamentals.
    • Develop an understanding of the fundamental principles of digital forensics. Explore strategies for file and stolen data recovery.
    • Learn effective techniques for handling various types of attacks targeted at organizations.
    • Gain insight into the strategies employed by attackers to gain access to critical systems and data.
    • Explore the essentials of malware analysis to enhance threat detection and mitigation.


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP
  • Threat Hunting and Intelligence

    The Threat Hunting and Intelligence course empowers learners with the essential knowledge required to identify and mitigate vulnerabilities present in an organization's infrastructure. By the conclusion of the course, participants will possess the expertise to effectively recognize vulnerabilities, respond to threats, and establish robust plans to safeguard the organization's infrastructure.

    Throughout the course, learners will:
    • Develop an understanding of the various threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
    • Enhance the ability to proactively identify and respond to threats, taking a proactive approach to threat hunting.
    • Acquire the skills necessary to develop comprehensive plans and procedures to handle security incidents, ensuring a swift and coordinated response.
    • Cultivate the ability to evaluate sources of information and select appropriate tools to fortify defenses and enhance threat intelligence capabilities.


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP
  • Elective CompTIA® Security+ Certification Exam Prep Course

    The Cybersecurity Bootcamp incorporates an optional CompTIA® Security+ Exam Prep Course*, specifically designed to equip students with the necessary skills and knowledge to obtain this esteemed industry certification. Additionally, the bootcamp provides a voucher for the CompTIA® Security+ certification exam.

    Throughout the course, learners will:
    • Establish a solid foundation of core knowledge essential for various cybersecurity roles.
    • Emphasize hands-on practical skills, setting the CompTIA® Security+ certification apart as the sole foundational cybersecurity certification with this focus.
    • Attain a globally recognized certification that validates the fundamental knowledge required in the cybersecurity field, opening doors to intermediate-level cybersecurity positions.


    *The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.
Icon

Introductory Course (4 Weeks)

The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.

The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the Complete Program.

Icon

Fundamentals Phase (16 Weeks)

During the Fundamentals Phase, you will embark on an in-depth exploration of the fundamental principles of cybersecurity. This immersive journey will encompass various crucial concepts essential for securing and defending as a cybersecurity professional. Topics covered include the exploration of networks and their functionalities, common operating systems, the intricate mechanisms of device communication over networks, and the storage and utilization of data in cloud environments.

By successfully completing this phase, you will acquire a solid foundation in essential cybersecurity concepts, empowering you to navigate the field with confidence.

Icon

Computer Networking Fundamentals

This course presents a comprehensive introduction to computer networking, offering learners a holistic understanding of configuring and managing network devices to achieve optimal performance and security. Through practical exercises, participants will enhance their skills in device configuration and troubleshooting while gaining insights into network architectures, protocols, and security measures. They will engage in hands-on activities that promote critical thinking and problem-solving, enabling them to tackle common networking challenges effectively.

Throughout the course, learners will:

  • Acquire knowledge on how various entities connect and interact within digital landscapes.
  • Develop an understanding of different network types and their profound impact on our interconnected world.
  • Leverage the potential of configuration settings documentation for enhanced network management.
  • Explore the role of audits in ensuring both performance and security of networks.
  • Recognize the critical role of system and communications protection in safeguarding information.
  • Learn strategies for updating and adapting policies to keep pace with the ever-evolving network landscape.


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠

Icon

Microsoft Security Systems Administration

This course provides hands-on training that focuses on securing Microsoft Windows environments, equipping learners with practical knowledge and skills to implement essential security features and tools, such as Microsoft Defender, BitLocker and Windows Firewall. Participants will also gain expertise in configuring and managing networks using system administration tools to ensure security and stability. By the end of the course, learners will have a solid grasp of Microsoft's infrastructure and will be capable of implementing and maintaining secure Windows environments across various professional roles.

Throughout the course, learners will:

  • Develop a comprehensive understanding of Microsoft's infrastructure and its core components.
  • Learn effective strategies and techniques to protect Microsoft's infrastructure from potential threats.
  • Acquire skills to manage different types of accounts based on business function requirements.
  • Explore methods for maintaining a secure and safe network environment.
  • Discover how automation and scripting can enhance both security and efficiency in cybersecurity roles.
  • Understand the role of Active Directory in managing permissions and controlling access to network resources.
  • Learn how to enhance system security and operational efficiencies using PowerShell.

Icon

Securing Your Network

In this course, you will build upon your existing knowledge of networks to deepen your understanding of this domain. By exploring networks, you will become acquainted with the various components of wired and wireless networks, including their security constraints and vulnerabilities. You will then proceed to develop access controls, ensuring a comprehensive approach to network security that encompasses the protection of people, data, and devices. Additionally, you will examine the safe construction and securing of networks, with discussions on cryptography and privacy considerations.

Throughout the course, learners will:

  • Develop a thorough understanding of network security measures and the necessary strategies to ensure network safety.
  • Master network monitoring techniques to detect and respond to potential security threats.
  • Gain basic proficiency in effectively managing accounts within a system for enhanced network security.
  • Recognize how security attributes can strengthen network defenses.
  • Familiarize themselves with a variety of common tools and technologies that support network safety.
  • Acquire the skills needed to build a secure network architecture.
  • Learn the fundamentals of MHNs (Multi-Homed Network) and how to set them up effectively.
  • Understand the relationship between Telnet and POP3 machines in the context of network security.


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate

Icon

Integrating Your Infrastructure Security

In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against various threats and vulnerabilities. They will develop the knowledge to monitor, scan and analyze threats and vulnerabilities specifically in Linux and cloud-based environments, while also gaining familiarity with remediation techniques. Additionally, learners will delve into the understanding of how DevSecOps impacts the cybersecurity landscape.

Throughout the course, learners will:

  • Obtain proficiency in managing Linux operating systems and implementing security measures to protect them.
  • Learn the basics of Python programming, which can be applied to cybersecurity tasks.
  • Develop a foundational understanding of cloud computing environments and gain hands-on experience in creating an instance using Amazon Web Services (AWS).
  • Understand the process of remediating security issues and effectively sharing details to protect other systems.
  • Acquire the skills to automate various cybersecurity tasks for efficient management and protection of systems.
  • Explore the design principles of scalable cloud solutions and gain insights into integrating different environments.
  • Become familiar with the concept of DevSecOps and its significance in the cybersecurity field.


Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner

Icon

Infrastructure Phase (4 Weeks)

The Infrastructure Phase of the course provides learners with the essential knowledge and practical experience to establish and maintain secure infrastructures and technologies.

Upon completion of this phase, learners will possess a comprehensive understanding of critical security measures, endpoint security, and other vital concepts crucial for effectively safeguarding organizations.

Icon

Designing Your Cybersecurity Infrastructure

This course provides an in-depth exploration of crucial elements involved in securing endpoint devices, implementing effective data loss prevention techniques, and employing advanced tools and strategies to safeguard an organization's digital assets. By the conclusion of the course, participants will possess a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations surrounding industrial systems and IoT devices.

Throughout the course, learners will:

  • Thoroughly examine endpoint devices to gain the necessary knowledge for evaluating and identifying threats, and implementing protective measures.
  • Acquire skills in documenting and tracking configurations and selecting appropriate tools for endpoint device security.
  • Understand the establishment of rules and restrictions that effectively safeguard endpoint devices from potential harm.
  • Discover methods for working with external information systems while maintaining endpoint device security.
  • Develop proficiency in implementing data loss prevention techniques.
  • Familiarize oneself with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP

Icon

Advanced Phase (12 Weeks)

The Advanced Phase courses go beyond theoretical knowledge of cybersecurity technologies and focus on developing skills to effectively respond to attacks, proactively identify vulnerabilities through ethical hacking, and enhance system protection. Participants will gain an understanding of the motivations and social engineering techniques employed by malicious actors. They will also learn about different types of attacks, the attack kill chain, implementing attacks, responding to ongoing attacks, and implementing mitigation strategies.

Upon successfully completing this phase, participants will receive their Cybersecurity Bootcamp certificate of completion, acknowledging their proficiency in advanced cybersecurity concepts and skills.

Icon

Social Engineering and Ethical Hacking

In the Social Engineering and Ethical Hacking course, participants will delve into the inner workings of hackers' minds and explore the principles of game theory as they relate to cybersecurity defense and solutions. By the end of the course, learners will possess a comprehensive understanding of social engineering techniques and ethical hacking principles, enabling them to strengthen cybersecurity defenses and mitigate potential threats.

Throughout the course, learners will:

  • Gain valuable insights into the motivations and actions of potential attackers.
  • Develop an understanding of leveraging a malicious hacker's mindset to enhance system protection.
  • Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure. Explore reconnaissance, penetration testing, and defense system bypassing as strategies to maintain system security.
  • Learn to identify vulnerabilities in web applications and cloud-based systems.
  • Acquire the skills to effectively report risks and provide recommendations for defense.
  • Understand the application of social engineering techniques in deceiving individuals.


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+

Icon

Digital Forensics and Incident Response

The Digital Forensics & Incident Response course provides learners with indispensable tools to efficiently respond to attacks, conduct thorough investigations, collect evidence, and generate comprehensive reports. By the conclusion of the course, participants will possess the necessary knowledge to effectively handle incidents, carry out investigations, and communicate their findings. These acquired skills will enable students to identify, analyze and strategize against security incidents, thereby mitigating the risk of future breaches.

Throughout the course, learners will:

  • Gain a solid foundation in offensive security fundamentals.
  • Develop an understanding of the fundamental principles of digital forensics. Explore strategies for file and stolen data recovery.
  • Learn effective techniques for handling various types of attacks targeted at organizations.
  • Gain insight into the strategies employed by attackers to gain access to critical systems and data.
  • Explore the essentials of malware analysis to enhance threat detection and mitigation.


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP

Icon

Threat Hunting and Intelligence

The Threat Hunting and Intelligence course empowers learners with the essential knowledge required to identify and mitigate vulnerabilities present in an organization's infrastructure. By the conclusion of the course, participants will possess the expertise to effectively recognize vulnerabilities, respond to threats, and establish robust plans to safeguard the organization's infrastructure.

Throughout the course, learners will:

  • Develop an understanding of the various threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
  • Enhance the ability to proactively identify and respond to threats, taking a proactive approach to threat hunting.
  • Acquire the skills necessary to develop comprehensive plans and procedures to handle security incidents, ensuring a swift and coordinated response.
  • Cultivate the ability to evaluate sources of information and select appropriate tools to fortify defenses and enhance threat intelligence capabilities.


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP

Icon

Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)

The Cybersecurity Bootcamp incorporates an optional CompTIA® Security+ Exam Prep Course*, specifically designed to equip students with the necessary skills and knowledge to obtain this esteemed industry certification. Additionally, the bootcamp provides a voucher for the CompTIA® Security+ certification exam.

Throughout the course, learners will:

  • Establish a solid foundation of core knowledge essential for various cybersecurity roles.
  • Emphasize hands-on practical skills, setting the CompTIA® Security+ certification apart as the sole foundational cybersecurity certification with this focus.
  • Attain a globally recognized certification that validates the fundamental knowledge required in the cybersecurity field, opening doors to intermediate-level cybersecurity positions.


*The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.

*The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.
Get Ready for Industry-Standard

Cybersecurity Certifications

New and aspiring cybersecurity professionals can get the competitive edge they need to succeed by attaining industry-standard certifications that demonstrate to employers that you have in-demand skills and knowledge.*

  • LPI Linux Essentials

    The Linux LPI Essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.
  • CompTIA® Network+

    The CompTIA® Network+ certification exam tests a learner’s experience with configuring, managing and troubleshooting networks and network devices. Additionally, it also expects aspiring cybersecurity professionals to familiarize themselves with emerging trends such as mobile, cloud, virtualization and communication technologies.
  • CompTIA® CySA+

    The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor and respond to network traffic findings. Skills in software and application security, automation, threat hunting and IT regulatory compliance are also assessed.
  • Cisco Certified CyberOps Associate

    The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn. The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.
  • ISC2 SSCP – Systems Security Certified Practitioner**

    For learners who have achieved at least one year of experience after completion of the program.

    Candidates with proven security knowledge and practical, hands-on security experience can consider the ISC2 SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.
  • GIAC Security Essentials

    The GIAC Security Essentials (GSEC) certification serves as a validation of a practitioner's in-depth understanding of information security beyond basic terminology and concepts. By earning the GSEC certification, professionals demonstrate their qualifications for hands-on IT systems roles specifically related to security tasks.
  • Certified Incident Handler

    The GIAC Incident Handler certification confirms the proficiency of practitioners in detecting, responding to, and resolving computer security incidents through the utilization of a diverse set of essential security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents by comprehending common attack techniques, vectors and tools. Furthermore, they are equipped to defend against and respond to such attacks promptly and efficiently.
  • Certified Information Security Manager

    IT professionals today are acutely aware of the persistent risks posed by data breaches, ransomware attacks, and other rapidly evolving security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to evaluate risks, establish robust governance measures, and proactively respond to incidents. This certification equips you with the expertise to effectively assess, manage and mitigate security risks, ensuring the protection of valuable information assets.

LPI Linux Essentials

The Linux LPI Essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.

CompTIA® Network+

The CompTIA® Network+ certification exam tests a learner’s experience with configuring, managing and troubleshooting networks and network devices. Additionally, it also expects aspiring cybersecurity professionals to familiarize themselves with emerging trends such as mobile, cloud, virtualization and communication technologies.

CompTIA® CySA+

The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor and respond to network traffic findings. Skills in software and application security, automation, threat hunting and IT regulatory compliance are also assessed.

Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn. The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.

ISC2 SSCP – Systems Security Certified Practitioner**

For learners who have achieved at least one year of experience after completion of the program.

Candidates with proven security knowledge and practical, hands-on security experience can consider the ISC2 SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.

GIAC Security Essentials Lorem Ipsum

The GIAC Security Essentials (GSEC) certification serves as a validation of a practitioner's in-depth understanding of information security beyond basic terminology and concepts. By earning the GSEC certification, professionals demonstrate their qualifications for hands-on IT systems roles specifically related to security tasks.

Certified Incident Handler Lorem Ipsum

The GIAC Incident Handler certification confirms the proficiency of practitioners in detecting, responding to, and resolving computer security incidents through the utilization of a diverse set of essential security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents by comprehending common attack techniques, vectors and tools. Furthermore, they are equipped to defend against and respond to such attacks promptly and efficiently.

Certified Information Security Manager Lorem Ipsum

IT professionals today are acutely aware of the persistent risks posed by data breaches, ransomware attacks, and other rapidly evolving security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to evaluate risks, establish robust governance measures, and proactively respond to incidents. This certification equips you with the expertise to effectively assess, manage and mitigate security risks, ensuring the protection of valuable information assets.

*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition. ** Learners must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Program Tuition

Enroll in the Introductory Course for $180. If you decide to continue on to the Complete Program, the cost will be $17,800. Equaling to $17,980 in total.

Tuition, fees and deposits are subject to change.

img
Skip to content