Key Information
Cybersecurity Bootcamp
$7,995 210 Hours
Overview
Become an Information Security Analyst or Cybersecurity Engineer. Gain a technical foundation in Linux, Python, computer networking, AWS, and web application architecture and learn professional cybersecurity tools and solutions.
Prerequisite
Open to Beginners
Location
185 Madison Ave, NYC or Live Online
Schedule
Next start date: Feb 7–Apr 1, Weekdays
Other scheduling options: Weekdays only
View full schedule
Certification
New York-licensed Certificate Program
Free Retake Within 1 Year See our class policies for more details
Workbook Included
Courses Included (Certificates & packages only)
  • 24 HoursIntro to Cybersecurity & Networks
  • 18 HoursLinux Operating System & Bash Scripting
  • 30 HoursPython Immersive
  • 30 HoursPython for Network Security
  • 30 HoursCybersecurity with Python
  • 24 HoursOffensive Security with Python
  • 24 HoursDigital Forensics
  • 18 HoursCloud Computing with AWS
  • 12 HoursCybersecurity Industry & Job Prep
Discounts See our discounts policies for more details
  • This is a discounted package of classes that is 15–25% off the individual class prices. Other discounts do not apply.
Payment Plan See our payment plan FAQ for more details
This program is eligible for our “pay-as-you-go” payment plan.
12-Month Financing See our Climb Credit FAQ for more details
This program is eligible for financing through Climb Credit.
Target Audience

The Cybersecurity Bootcamp is for individuals who want to learn how to secure systems and networks. This program is best suited for:

  • Individuals looking to learn a wide range of skills within the field of cybersecurity.
  • Anyone looking to start a career as a Cybersecurity Analyst, Cybersecurity Engineer, or other cybersecurity professional.
  • People who are technically oriented and want to increase their knowledge of programming, network security, and security operations.
What You’ll Learn
  • Security tools for analyzing networks and protecting systems
  • How to gauge application and network security through penetration testing
  • Security Operations Center (SOC) processes, technologies, and workflows 
  • How to recognize attacker tools, tactics, and procedures
  • Techniques for monitoring, analyzing, and responding to logs and alerts
  • How to gather detailed information about devices in a network
  • How to discover, exploit, and mitigate web application vulnerabilities

Add Class or Certificate to Compare