You are on page 1of 8

Part-Time Online

Cybersecurity
Bootcamp
24 Weeks to a Cyber Career

Part-Time Career Services Learn by Doing


class commitment Included 50-75% Lab Work

Over 8,000 alumni, hired by tech companies worldwide

*As of 2020 alumni data


Overview
The importance of cybersecurity today
cannot be overstated. As our reliance on
technology grows, there’s a corresponding
need to secure and defend networks and
data against leaks, theft, and attacks. That’s
good news for cybersecurity specialists -
the U.S. Bureau of Labor Statistics projects
cybersecurity jobs will grow 31% through
2029. In short, there’s job security in
cybersecurity.

What You’ll Get

Top Industry Certifications Learn By Doing


Learn skills applicable to certifications such Gain hands-on experience with a host of
as the Network+, Linux+, Server+, Cloud+, and popular tools such as Wireshark, Kali Linux,
certified Ethical Hacker (CEH)., and receive Metasploit, and more within a sandbox
vouchers for CompTIA Security+ and CySA+. environment.

Cyber-Specific Career Services End-to-End, Extensive Curriculum


Receive personalized career support from Cover the latest real-world deployment
a dedicated cybersecurity career services of cybersecurity management practices,
manager, and keep your career service including defensive and offensive tactics, NIST
access for life. Cybersecurity Framework, and event & incident
management
A Professional-Grade Vouchers Included!
Curriculum
From CompTIA Security+ to CySA+ certifications and
beyond, our Cybersecurity program teaches students
critical skills to assist in the identification, assessment,
reporting, and mitigation of technology and information
security risks.

This professional-grade program provides information,


strategies, and tactics to identify and manage
information system vulnerabilities, create effective
defenses and preventative measures, and deploy
countermeasures against attackers.

After completing Coding Dojo’s Cybersecurity program,


students are mission-ready to identify, assess, report,
and mitigate technology and information security risks.

Your Progression Plan


Week-By-Week Curriculum
Curriculum is subject to change

WEEK 1 WEEK 5
Fundamentals of Hardware Virtual Machines
Learn about hardware and operating system Get into more Windows administration tools.
fundamentals to build your baseline. Labs:
Labs: • Configuring Identity and Access Management
• Exploring the Lab Environment Controls
• Scanning and Identifying Network Nodes • Implementing a Secure Network Design
• Intercepting and Interpreting Network Traffic • Configuring a Firewall
with Packet Sniffing
• Analyzing the Results of a Credentialed WEEK 6
Vulnerability Scan
Exploitation
WEEK 2 Use Metasploit to run exploit code.
Kali Linux Introduction Labs:
• Configuring an Intrusion Detection System
Build out your Kali Linux machine while also • Implementing Secure Network Addressing
learning about networking and data security. Services
Labs: • Implementing a Virtual Private Network
• Managing the Life Cycle of a Certificate • Implementing a Secure SSH Server
• Managing Certificates with OpenSSL
• Auditing Passwords with a Password Cracking WEEK 7
Utility
• Managing Centralized Authentication
Building a Defensible Network
Learn the basics of different network architecture
WEEK 3 and design principles.

Networking & Security Labs:


• Implementing Endpoint Protection
Learn about network configurations and data • Securing the Network Infrastructure
security. • Identifying Application Attack Indicators
Labs:
• Installing, Using, and Blocking a Malware-
WEEK 8
based Backdoor
• Performing Network Reconnaissance and Identifying Risks to your Network
Vulnerability Scanning
Take the necessary steps to identify the risks to
your network.
WEEK 4
Labs:
Cybersecurity Concepts • Identifying a Browser Attack
• Implementing PowerShell Security
Enter into the cybersecurity realm by thinking
• Identifying Malicious Code
about vulnerabilities and risks.
Labs:
• Managing Access Controls in Windows Server
• Configuring a System for Auditing Policies
• Managing Access Controls in Linux
Week-By-Week Curriculum
Curriculum is subject to change

WEEK 9 WEEK 13
Scanning the Network Threat Intelligence
Begin scanning a network periphery to find Utilize threat intelligence and classification to
vulnerabilities. support organizational security.
Labs: Labs:
• Identifying Application Attacks • Investigating Threat Data and Intelligence
• Managing Data Sources for Incident Response Sources
• Configuring Mitigation Controls • Developing a Network Threat Model
• Analyzing Output from Network Security
Monitoring Tools
WEEK 10
• Discovering the Lab Environment
Cloud Computing
WEEK 14
Learn about the Cloud and its implications for risks
and vulnerabilities, install Kali Linux with Cloud Intelligence & Indicator Management
Computing.
Implement controls to mitigate attacks and
Labs: software vulnerabilities.
• Acquiring Digital Forensics Evidence
• Backing Up and Restoring Data in Windows Labs:
and Linux • Analyzing Output from Security Appliance Logs
• Managing Incident Response, Mitigation and • Analyzing Output from Endpoint Security
Recovery Monitoring Tools

WEEK 11 WEEK 15

Certification Review Security Best Practices


Tie off remaining concepts as you prepare for the Learn best practices of software, hardware, and
CompTIA Security+ exam. Take the belt exam as infrastructure assurance.
your practice exam. Labs:
• Analyzing Email Headers
• Configuring SIEM Agents and Collectors
WEEK 12
• Analyzing, Filtering, and Searching Event Log
CompTIA Security+ Certification and syslog Output
A crucial point in your learning timeline: schedule, WEEK 16
review, and complete your Security+ exam.
Cloud Access & Techniques
Revisit cloud technologies and how to protect your
cloud-based solutions.
Labs:
• Collecting and Validating Digital Evidence
• Analyzing Network-related IoCs
Week-By-Week Curriculum
Curriculum is subject to change

WEEK 17 WEEK 21
Attacking & Protecting Incident Response
Learn about DoS attacks and mitigation as well as Apply incident response procedures
deploying honeypot solutions to intercept hackers. Labs:
Labs: • Configuring and Analyzing Share Permissions
• Analyzing Host and Application IoCs • Assessing the Impact of Web Application
• Following an Incident Response Process Vulnerabilities
• Analyzing Output from Web Application
WEEK 18 Assessment Tools

Impact Analysis & SIEM WEEK 22


Implement configuration changes to existing Digital Forensics
controls to improve security based on data
analysis you make part of everyday security Collect and analyze indicators of compromise.
monitoring activities. Labs:
Labs: • Analyzing Output from Cloud Infrastructure
Assessment Tools
• Following an Incident Response Process
• Assessing the Impact of Threats to Cloud
• Observing IoCs during a Security Incident Infrastructure

WEEK 19
WEEK 23
Proactive Threat Hunting Certification Review
Become proactive in your approach to
Tie off remaining concepts as you prepare for the
cybersecurity by seeking threats.
CompTIA CySA+ exam. Take your second belt
Labs: exam as prep.
• Reviewing Risk Management Processes
• Analyzing Output from Topology and Host
Enumeration Tools WEEK 24
• Testing Credential Security CompTIA CySA+ Certification
• Configuring Vulnerability Scanning and
Analyzing Outputs The final step in your bootcamp journey - your
CySA+ certification!
WEEK 20
Security Monitoring
Deploy Security Content Automation Protocol (SCAP)
Labs:
• Assessing Vulnerability Scan Outputs
• Assessing the Impact of Regulation on
Vulnerability Management
• Performing Account and Permissions Audits
• Configuring Network Segmentation and Security
% %
Our Outcomes are third-party
verfied by the independent
firm, Delivery Associates, for
89.1 95.3
accuracy and transparency. within 6 months of within one year of
graduating graduating

Student Employment Status # of Students % of Students

Student employed in a relevant position within six months of


229 89.1%
graduation

Student was not employed until more than six months after
16 6.2%
graduation, but was then employed in a relevant position

Student employed within six months of graduation, but not in a


11 4.3%
relevant position

Student was not employed until more than six months after
1 0.4%
graduation, and was not then employed in a relevant position

Totals 257 100%

View Our Outcomes


How to Enroll
Explore Apply
1 Schedule a Q&A call with 2 Ready to join? Submit
Admissions to get quick your application and pick
answers about the bootcamp your start date to join.
or join the next open house.

Complete your Interview Deposit to Enroll


3 Schedule an interview with 4 If accepted, submit your
admissions. The interview is deposit to save your seat and
non-technical - no technical gain access to bootcamp prep
experience is required. materials for your start date.

Apply Now

Financing Options
Schedule a call with an Admissions Advisor to discuss
which payment or financing option is right for you.

TALK TO US

Pay in Full Installments 3rd Party Financing


Save on tuition by Spread payments over the Finance bootcamp with
paying in full upon course with standard and a third party loan from a
enrollment custom installment plans variety of lenders

You might also like