Compare Classes & Certificates

Which course is right for you? This tool allows you to compare any class or certificate program in our catalogue with the important information you need to make the right decision.

Key Information
Cybersecurity Bootcamp
$7,995 300 Hours
Become an Information Security Analyst or Cybersecurity Engineer. Gain a technical foundation in Linux, Python, computer networking, AWS, and web application architecture and learn professional cybersecurity tools and solutions.
Open to Beginners
185 Madison Ave, NYC or Live Online
Not currently scheduled
New York-licensed Certificate Program
Free Retake Within 1 Year See our class policies for more details
Workbook Included
Courses Included (Certificates & packages only)
  • 24 HoursIntro to Cybersecurity & Networks
  • 18 HoursLinux Operating System & Bash Scripting
  • 30 HoursPython Immersive
  • 30 HoursPython for Network Security
  • 30 HoursCybersecurity with Python
  • 24 HoursOffensive Security with Python
  • 24 HoursDigital Forensics
  • 18 HoursCloud Computing with AWS
  • 12 HoursCybersecurity Industry & Job Prep
Payment Plan See our payment plan FAQ for more details
This program is eligible for our “pay-as-you-go” payment plan.
Financing See our Leif FAQ for more details
This program is eligible for 18-month financing through Leif.
Target Audience

The Cybersecurity Bootcamp is for individuals who want to learn how to secure systems and networks. This program is best suited for:

  • Individuals looking to learn a wide range of skills within the field of cybersecurity.
  • Anyone looking to start a career as a Cybersecurity Analyst, Cybersecurity Engineer, or other cybersecurity professional.
  • People who are technically oriented and want to increase their knowledge of programming, network security, and security operations.
What You’ll Learn
  • Security tools for analyzing networks and protecting systems
  • How to gauge application and network security through penetration testing
  • Security Operations Center (SOC) processes, technologies, and workflows 
  • How to recognize attacker tools, tactics, and procedures
  • Techniques for monitoring, analyzing, and responding to logs and alerts
  • How to gather detailed information about devices in a network
  • How to discover, exploit, and mitigate web application vulnerabilities

Add Class or Certificate to Compare

Popular Course Comparisons

Yelp Facebook LinkedIn YouTube Twitter Instagram