Get the Competitive
Advantage You Need for
Success in Cybersecurity

Start Here. Go Anywhere.

The University at Buffalo Cybersecurity Bootcamp is designed to expand a learner’s skills and provide all of the fundamentals needed to establish a career in cybersecurity, no matter your current level of technological proficiency.

Our expert instructors will guide you through the training in a cloud-based platform where you can safely practice defending and attacking both systems and applications. You’ll receive instruction in ethical hacking and game theory and will be able to translate the skills from the bootcamp to an actual career defending against attackers, finding weaknesses in systems and securing the infrastructure from outside threats.

This professional development program does not bear academic credit.

Find a job you
enjoy doing,
and you will
never have to
work a day
in your life.

- Mark Twain

img

Accelerate Your Future with
Our Experiential Curriculum
Learn About the Perks of our Cybersecurity Bootcamp

Our Cybersecurity Bootcamp will provide you with the education, skills and knowledge
needed to pursue a career in cybersecurity. This includes the fundamentals of the field, as
well as advanced skills that employers demand.

Become a Cybersecurity Professional

Start building the skills you need to excel in the field of cybersecurity under the guidance of industry
experts eager to train the next generation of cybersecurity professionals.

Hands-On Courses

Gain real-world experience in an accelerated, online environment designed to launch the careers of professionals of all backgrounds and experience levels. Confidently enter the workforce with the hands-on training required to excel in the field of cybersecurity.

Virtual Classroom

Benefit from top-tier instructional methodologies enhanced with cloud-based chat software that allows live, virtual, hands-on interaction between you and your instructors. Virtually attend classes in the evenings and on the weekends from the comfort of your own home.

Cyber Labs

Learn to identify vulnerabilities on web, server, mobile and desktop platforms and create secure defenses that protect against a variety of threats through real-world simulations. Complete cyber labs designed by cybersecurity experts to gain the knowledge you need to succeed.

Industry-Leading Instructors

Benefit from expert instructors’ current industry knowledge as well as from their unique insider’s understanding of the fast-paced field of cybersecurity. Experience personalized mentorship and guidance as you learn what it takes to become a cybersecurity professional.

Build the Skills
That Employers Need

Benefit from a comprehensive career services package handled by a dedicated team of
professional development experts.

Networking Opportunities

Gain access to a network of local and global hiring partners looking to employ newly-qualified cybersecurity professionals. Attend virtual networking events designed to introduce you to the variety of opportunities available to you upon program completion.

Dedicated
Support

Routinely meet with a student success manager dedicated to ensuring you have the tools and support you need to thrive in the program and beyond. Know you have a team of professionals backing you in your journey into the field of cybersecurity.

Career
Coaching

Find professional development support within a team of career coaches eager to help you achieve your career goals in cybersecurity. Get help with your resume, prepare for interviews, gain assistance building your LinkedIn profile and more.

Job Placement Assistance

Work with our Career Services team to determine what opportunities are available to you. Our placement assistance will help you locate career opportunities and thoroughly prepare you for the interview process ahead of time.

Explore
the Curriculum
Get the Course Catalog

img

Program Overview

30-Hour Introductory Course
| 370-Hour Extended Program

  • Introductory Course

    Take the Cybersecurity Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors, and more.

    You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended program.

    When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.
  • The Fundamentals Courses

    The fundamentals courses help learners understand the basics of cybersecurity. This phase of the program covers Microsoft Windows, Linux and basic network and cloud security and acts as training to prepare learners for the more rigorous infrastructure phase.
  • Microsoft Security

    Many companies across the globe rely on the Windows Server framework to manage their enterprise networks and computers. This Microsoft security course offers hands-on education with widely used and modern variants of the server operating system, as well as Microsoft Windows. You’ll learn how to administrate, secure and apply best practices with the Microsoft ecosystem of products.
  • Computer Networking

    Computer networks are critical to virtually any organization that operates on the internet, whether it’s healthcare, manufacturing, finance or technology. The computer networking course will give you an overview of computer network basics, including protocols, network designs, topologies and network devices.

    This course will also give you a solid foundation to begin studying for the CompTIA Network+ exam, which you can take after you complete the course.*
  • Cloud Security

    Cloud-based solutions are becoming more essential as many businesses and organizations move their infrastructure to services like Amazon Web Services (AWS), Google Cloud or Microsoft Azure. The cloud security course can help prepare you for a cloud-based future by letting you learn how to identify, compare, contrast, discuss and use common cloud service provider platforms and cloud security offerings—all with the goal of implementing security for cloud-based solutions.

    Upon completion of the course, learners will also have the foundational knowledge necessary to begin studying for the AWS Certified Cloud Practitioner certification.*
  • Linux Security

    The Linux operating system is an essential tool for cybersecurity professionals, so it’s important to have an in-depth understanding of it to thrive in the field. The Linux security course will teach you the basics of using and manipulating Linux, as well as information about various Linux distributions (also known as distros).

    Upon completing the course, learners can also begin studying for the LPI Linux Essentials certification exam.*
  • Fundamentals Phase Final Project - Building Your Own Environment

    In this project, you’ll design and create an insecure, small business infrastructure that you can use to practice cyberattacks and forensics. This project can also be included in your portfolio to demonstrate your skills and abilities.
  • Cybersecurity Infrastructure Courses

    In the infrastructure phase of this bootcamp, you’ll begin focusing exclusively on security practices and concepts. In this phase, you’ll learn about Python programming, network security and critical infrastructure security (CIS). Additionally, this phase will provide you with the necessary skills and knowledge to prepare for the more rigorous advanced phase.
  • Network Security

    Networks provide a foundation for most computer-related systems and infrastructure, whether at the small business or corporate level. The network security course will give you the skills to design, suggest and implement controls that will allow you to build secure networks from the design phase to the post-implementation phase. This course’s curriculum focuses on getting you ready for technical positions by offering all of the skills demanded by many potential employers.

    Additionally, learners will leave this course with the necessary knowledge to begin studying for the EC-Council CND exam*.
  • Cyber Infrastructure & Technology

    Through an in-depth examination of various defensive infrastructures, you will learn how to design a secure architecture and understand the security measures that can be used to harden networks, devices and cloud infrastructures. You will also learn how to work with Security Information & Event Management (SIEM) solutions through an emphasis on Splunk, a widely used open-source solution.

    Upon completing this course, you’ll be prepared to start studying for the CompTIA Security+ exam.*
  • Introduction to Python for Security

    Learning programming is an essential skill for cybersecurity professionals and Python happens to be one of the best programming languages to learn. In the introduction to Python for security course, you’ll learn how to develop customized cybersecurity tools to scan systems and networks, analyze data and review hosts on a network. You’ll be able to create and modify these scripts on the fly and the course also provides an introduction to the basic programming concepts of Python.
  • Infrastructure Phase Final Project

    In the infrastructure final project, you’ll take the unsecured small business infrastructure you created in the last phase and learn how to secure it against a threat scenario, allowing you to demonstrate infrastructure hardening.
  • Advanced Cybersecurity Courses

    In the advanced phase of the bootcamp, learners will start building skills and experience in advanced security concepts like ethical hacking, incident response, digital forensics and game theory. This phase will give you a complete overview of the cybersecurity field and will prepare you to transition into a full-fledged cybersecurity career.
  • Offensive Security: Ethical Hacking

    Ethical hacking is the art of penetrating systems and breaking into networks for benevolent purposes—the goal is to mimic real-world cyberattacks and identify weaknesses. From penetration testers to GRC auditors, ethical hackers dive deep into the mindset of criminal attackers to secure businesses and systems. The ethical hacking course will give you the firm foundation you’ll need to pursue a career path with ethical hacking as a primary role.

    Upon completing this course, learners will also be prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*.
  • DFIR & Threat Hunting

    Another aspect of cybersecurity occurs when a cyberattack does happen. In these cases, first responders and incident response staff are critical. The digital forensics & incident response (DFIR) course will give you the tools and knowledge needed to respond to cyberattack incidents, gather evidence for forensic investigations and accurately report the results.

    Upon finishing this course, learners will be prepared to continue studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.
  • Game Theory Strategy in Cybersecurity

    Game theory is the study of specific mathematical models and it can provide valuable insight to cybersecurity professionals looking to defend against unknown or unidentified threats. The game theory course gives you foundational knowledge in philosophy and mathematics and provides practical experience in using game theory to describe cyber threats and cyber incidents. You’ll also develop cybersecurity “soft skills” by sharpening your creative thinking and problem-solving abilities—allowing you to become a solution-driven and skilled professional.
  • Advanced Phase Final Project: Attack & Response

    In the final project, you’ll continue working with the infrastructure you created in previous phases. For the final project, you’ll design an attack to compromise the infrastructure. From there, you’ll gather forensic evidence and write an investigative report detailing the incident.

    Upon finishing the program, learners will be able to take the code, reports and designs from their final projects and create a portfolio to show potential employers.
  • Career Services

    The career planning, training and tools you need to enter the field of cybersecurity—along with personalized interview coaching, professional networking, internship placement assistance and one-on-one consultations devoted to perfecting LinkedIn profiles and resumes—help you to put your best foot forward as you prepare to seek entry into the field of cybersecurity.
Icon

Introductory Course

(8 Lessons - 30 Hours)

Take the Cybersecurity Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors, and more.

You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended program.

When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.

Icon

The Fundamentals Courses

The fundamentals courses help learners understand the basics of cybersecurity. This phase of the program covers Microsoft Windows, Linux and basic network and cloud security and acts as training to prepare learners for the more rigorous infrastructure phase.

Icon

Microsoft Security

(11 Lessons - 40 Hours)

Many companies across the globe rely on the Windows Server framework to manage their enterprise networks and computers. This Microsoft security course offers hands-on education with widely used and modern variants of the server operating system, as well as Microsoft Windows. You’ll learn how to administrate, secure and apply best practices with the Microsoft ecosystem of products.

Icon

Computer Networking

(12 Lessons - 50 Hours)

Computer networks are critical to virtually any organization that operates on the internet, whether it’s healthcare, manufacturing, finance or technology. The computer networking course will give you an overview of computer network basics, including protocols, network designs, topologies and network devices.

This course will also give you a solid foundation to begin studying for the CompTIA Network+ exam, which you can take after you complete the course.*

Icon

Cloud Security

(4 Lessons - 15 Hours)

Cloud-based solutions are becoming more essential as many businesses and organizations move their infrastructure to services like Amazon Web Services (AWS), Google Cloud or Microsoft Azure. The cloud security course can help prepare you for a cloud-based future by letting you learn how to identify, compare, contrast, discuss and use common cloud service provider platforms and cloud security offerings—all with the goal of implementing security for cloud-based solutions.

Upon completion of the course, learners will also have the foundational knowledge necessary to begin studying for the AWS Certified Cloud Practitioner certification.*

Icon

Linux Security

(8 Lessons - 30 Hours)

The Linux operating system is an essential tool for cybersecurity professionals, so it’s important to have an in-depth understanding of it to thrive in the field. The Linux security course will teach you the basics of using and manipulating Linux, as well as information about various Linux distributions (also known as distros).

Upon completing the course, learners can also begin studying for the LPI Linux Essentials certification exam.*

Icon

Fundamentals Phase Final Project - Building Your Own Environment

(2 Lessons - 10 Hours)

In this project, you’ll design and create an insecure, small business infrastructure that you can use to practice cyberattacks and forensics. This project can also be included in your portfolio to demonstrate your skills and abilities.

Icon

Cybersecurity Infrastructure Courses

In the infrastructure phase of this bootcamp, you’ll begin focusing exclusively on security practices and concepts. In this phase, you’ll learn about Python programming, network security and critical infrastructure security (CIS). Additionally, this phase will provide you with the necessary skills and knowledge to prepare for the more rigorous advanced phase.

Icon

Network Security

(9 Lessons - 35 Hours)

Networks provide a foundation for most computer-related systems and infrastructure, whether at the small business or corporate level. The network security course will give you the skills to design, suggest and implement controls that will allow you to build secure networks from the design phase to the post-implementation phase. This course’s curriculum focuses on getting you ready for technical positions by offering all of the skills demanded by many potential employers.

Additionally, learners will leave this course with the necessary knowledge to begin studying for the EC-Council CND exam*.

Icon

Cyber Infrastructure & Technology

(10 Lessons - 40 Hours)

Through an in-depth examination of various defensive infrastructures, you will learn how to design a secure architecture and understand the security measures that can be used to harden networks, devices and cloud infrastructures. You will also learn how to work with Security Information & Event Management (SIEM) solutions through an emphasis on Splunk, a widely used open-source solution.

Upon completing this course, you’ll be prepared to start studying for the CompTIA Security+ exam.*

Icon

Introduction to Python for Security

(7 Lessons - 25 Hours)

Learning programming is an essential skill for cybersecurity professionals and Python happens to be one of the best programming languages to learn. In the introduction to Python for security course, you’ll learn how to develop customized cybersecurity tools to scan systems and networks, analyze data and review hosts on a network. You’ll be able to create and modify these scripts on the fly and the course also provides an introduction to the basic programming concepts of Python.

Icon

Infrastructure Phase Final Project

(2 Lessons - 10 Hours)

In the infrastructure final project, you’ll take the unsecured small business infrastructure you created in the last phase and learn how to secure it against a threat scenario, allowing you to demonstrate infrastructure hardening.

Icon

Advanced Cybersecurity Courses

In the advanced phase of the bootcamp, learners will start building skills and experience in advanced security concepts like ethical hacking, incident response, digital forensics and game theory. This phase will give you a complete overview of the cybersecurity field and will prepare you to transition into a full-fledged cybersecurity career.

Icon

Offensive Security: Ethical Hacking

(12 Lessons - 50 Hours)

Ethical hacking is the art of penetrating systems and breaking into networks for benevolent purposes—the goal is to mimic real-world cyberattacks and identify weaknesses. From penetration testers to GRC auditors, ethical hackers dive deep into the mindset of criminal attackers to secure businesses and systems. The ethical hacking course will give you the firm foundation you’ll need to pursue a career path with ethical hacking as a primary role.

Upon completing this course, learners will also be prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*.

Icon

DFIR & Threat Hunting

(15 Lessons - 60 Hours)

Another aspect of cybersecurity occurs when a cyberattack does happen. In these cases, first responders and incident response staff are critical. The digital forensics & incident response (DFIR) course will give you the tools and knowledge needed to respond to cyberattack incidents, gather evidence for forensic investigations and accurately report the results.

Upon finishing this course, learners will be prepared to continue studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.

Icon

Game Theory Strategy in Cybersecurity

(2 Lessons - 10 Hours)

Game theory is the study of specific mathematical models and it can provide valuable insight to cybersecurity professionals looking to defend against unknown or unidentified threats. The game theory course gives you foundational knowledge in philosophy and mathematics and provides practical experience in using game theory to describe cyber threats and cyber incidents. You’ll also develop cybersecurity “soft skills” by sharpening your creative thinking and problem-solving abilities—allowing you to become a solution-driven and skilled professional.

Icon

Advanced Phase Final Project: Attack & Response

(2 Lessons - 10 Hours)

In the final project, you’ll continue working with the infrastructure you created in previous phases. For the final project, you’ll design an attack to compromise the infrastructure. From there, you’ll gather forensic evidence and write an investigative report detailing the incident.

Upon finishing the program, learners will be able to take the code, reports and designs from their final projects and create a portfolio to show potential employers.

Icon

Career Services

(3 Sessions - 15 Hours)

The career planning, training and tools you need to enter the field of cybersecurity—along with personalized interview coaching, professional networking, internship placement assistance and one-on-one consultations devoted to perfecting LinkedIn profiles and resumes—help you to put your best foot forward as you prepare to seek entry into the field of cybersecurity.

* Certification exams are not conducted as part of the program and require additional costs not included in tuition. The program meets the objectives of the certificate throughout the program. Additionally, we are offering two non-mandatory extra sessions per certificate for Network+, Linux Essentials, CyberOps and Security+ exam preparation.
Get Ready for Industry-Standard

Cybersecurity Certifications

New and aspiring cybersecurity professionals can get the competitive edge they need to succeed by attaining industry-standard certifications that demonstrate to employers that you have in-demand skills and knowledge. To help you boost your credentials, we’ve developed an in-depth hub of resources that can help you prepare for certification exams.*

There are a pair of two-week breaks built into the Cybersecurity Bootcamp during which you’ll have the chance to take non-required asynchronous certification prep lessons. Our CyWar platform also has a wealth of study guides, question banks, a “Cyberpedia,” and various challenges that can help you practice and ace your exams.

We recommend that you seek one certification during each phase of the bootcamp according to your career goals.

  • CompTIA Network+

    The CompTIA Network+ certification exam tests a learner’s experience with configuring, managing and troubleshooting networks and network devices. Additionally, it also expects aspiring cybersecurity professionals to familiarize themselves with emerging trends such as mobile, cloud, virtualization and communication technologies.
  • AWS Certified Cloud Practitioner

    The AWS certified cloud practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.
  • LPI Linux Essentials

    The Linux LPI essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.
  • EC-Council CND - Certified Network Defender

    The Certified Network Defender certification verifies knowledge of protecting, detecting, and responding to various threats on a network. It should be considered by learners who want to pursue a Network Administrator role.
  • CompTIA Security+

    Considered a next step up from the CompTIA Network+, CompTIA Security+ is an entry-level cybersecurity certification that tests a candidate’s skills over a range of technological disciplines, including networks, systems, security administration and penetration testing.
  • EC-Council CSA - Certified SOC Analyst

    Learners who would like to pursue a role in a security operations center (SOC) should consider the Certified SOC Analyst certification exam. This exam tests a learner’s knowledge of SOC operations, such as advanced incident detection, incident response, and log management and correlation. It’s designed for current and aspiring Tier I and Tier II SOC analysts.
  • EC-Council CEH - Certified Ethical Hacker

    The Certified Ethical Hacker certification is designed to test knowledge of ethical hacking from a vendor-neutral perspective. It should be considered by candidates with skills in penetration testing and knowledge of related resources and tools.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For learners who have achieved at least one year of experience after completion of the program.

    Candidates with proven security knowledge and practical, hands-on security experience can consider the (ISC)² SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.

CompTIA Network+

The CompTIA Network+ certification exam tests a learner’s experience with configuring, managing and troubleshooting networks and network devices. Additionally, it also expects aspiring cybersecurity professionals to familiarize themselves with emerging trends such as mobile, cloud, virtualization and communication technologies.

AWS Certified Cloud Practitioner

The AWS certified cloud practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.

LPI Linux Essentials

The Linux LPI essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.

EC-Council CND - Certified Network Defender

The Certified Network Defender certification verifies knowledge of protecting, detecting, and responding to various threats on a network. It should be considered by learners who want to pursue a Network Administrator role.

CompTIA Security+

Considered a next step up from the CompTIA Network+, CompTIA Security+ is an entry-level cybersecurity certification that tests a candidate’s skills over a range of technological disciplines, including networks, systems, security administration and penetration testing.

EC-Council CSA - Certified SOC Analyst

Learners who would like to pursue a role in a security operations center (SOC) should consider the Certified SOC Analyst certification exam. This exam tests a learner’s knowledge of SOC operations, such as advanced incident detection, incident response, and log management and correlation. It’s designed for current and aspiring Tier I and Tier II SOC analysts.

EC-Council CEH - Certified Ethical Hacker

The Certified Ethical Hacker certification is designed to test knowledge of ethical hacking from a vendor-neutral perspective. It should be considered by candidates with skills in penetration testing and knowledge of related resources and tools.

(ISC)² SSCP – Systems Security Certified Practitioner**

For learners who have achieved at least one year of experience after completion of the program.

Candidates with proven security knowledge and practical, hands-on security experience can consider the (ISC)² SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.

* Certification exams are not conducted as part of the program and require additional costs not included in tuition. ** Learners must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Program Tuition

Enroll in the introductory course for $180. If you decide to continue on to the extended program, the cost will be $17,800. Equaling to $17,980 in total.

Tuition, fees and deposits are subject to change.

img
Skip to content