ONLINE / PART-TIME

Cybersecurity Bootcamp Online Part-Time

Apply TodayDownload Course Packet
  • Part-Time24 Weeks30 hours/wk
  • Online Attendance

NEXT PROGRAM DATESMore Dates

Overview

Cybersecurity is an In-Demand field

The importance of cybersecurity today cannot be overstated, which makes it a good time to join a cybersecurity bootcamp. As our reliance on technology grows, there’s a corresponding need to secure and defend networks and data against leaks, theft, and attacks. That’s good news for those seeking a cybersecurity certification education! The U.S. Bureau of Labor Statistics projects employment of information security analysts cybersecurity jobs will grow 351% through 2029 from 2021-2031*. In short, there’s job security in cybersecurity.

After completing Coding Dojo’s Cybersecurity bootcamp, students are mission-ready to identify, assess, report, and mitigate technology and information security risks.

*Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts, at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (visited February 7, 2023). This data represents national figures and is not based on school-specific information. Conditions in your area may vary.

Career Image
YOUR TEAM

Our Cyber Security Team

EXPLORE BOOTCAMP

Questions? Get Answers

WHY US?

The Dojo Difference

By completing Coding Dojo’s Cybersecurity program, you’ll stand out from other bootcamp graduates and be mission-ready for a challenging and rewarding career path from day one.

CURRICULUM

Curriculum Overview

From helping you study to prepare for the CompTIA Security+ and CySA+ certifications and beyond, our Cybersecurity program teaches students critical skills to assist in the identification, assessment, reporting, and mitigation of technology and information security risks. This professional-grade program provides information, strategies, and tactics to identify and manage information system vulnerabilities, create effective defenses and preventative measures, and deploy countermeasures against attackers.

    • PRECOURSE: Weeks -2-0

      The pre-course will cover the schedule, stack expectations, certification process, and graduation requirements of the program. You’ll also review some basic cybersecurity resources and complete reading and assignments to familiarize yourself with the framework and foundations of cybersecurity. Finally, you’ll get your virtual machine (VM) up and running.

    • Track 1: Core Weeks 1-8

      In the Core track, you will build foundational knowledge across key areas of cybersecurity. This track covers both hardware and software, configuring multiple operating systems, understanding network architecture, and the basic principles to identify vulnerabilities and risks.

      • What You’ll Learn:
      • Cybersecurity basics including: Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure Software, Testing, Cryptography
      • How to build out a Kali Linux machine while learning about networking and data security.
      • Network configurations and data security, including Network Design, Firewall Configuration, Access Control
      • Viruses and Ransomware, intrusion detection, useful tools, introduction to embedded (control) systems, secure shell, mobile & endpoint security.
      • Virtual Machines, malicious code, Disaster Recovery, and Powershell
      • Identifying and responding to incidents, technical and legal elements of forensics
      • Learn how resiliency, automation, and backups provide essential and fundamental protection
      • Start learning what a career in cybersecurity looks like
      • Hands-on Experience:
      • VM Setup
      • Windows & Mac Directions
      • Network Settings
      • Scanning Networks
      • Packet Sniffing
      • Nessus Installation
      • Password Cracking
      • Basic ACL
      • Firewall Configuration Kali
      • Secure Network Design
      • Snort Installation
      • SSH
      • Endpoint Protection
      • Malicious Code
      • Powershell Security
      • Configuring an Intrusion Detection System
      • Incident Response
      • Digital Forensics
    • Track 2: INTERMEDIATE Weeks 9-16

      By completing this track, students will be able to demonstrate to prospective employers basic security skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies and regulations.

      • What You’ll Learn:
      • Understand roles and responsibilities, security controls, indicators of compromise, understanding threats, attack tools, monitoring networks
      • Protect networks, monitor and analyze various services for signs of compromise, run scripts, understand and use SIEM (Security Information and Event Management)
      • Examine forensic tools and techniques, digging into indicators of compromise, understanding detection and containment, learning digital evidence collection, understanding frameworks, policies and procedures, exploring attacker lateral movement and pivoting.
      • Learn intermediate incident response as well as effective recovery.
      • How to conduct a risk analysis and vulnerability assessment
      • Understand regulations in cybersecurity
      • Learn technical and non-technical controls, the relationship of security and privacy, & how to configure and analyze share permissions
      • Learn cloud technologies and how to protect your cloud-based solutions with OWASP
      • Hands-on Experience:
      • IoC Investigation
      • Network Group Assignment
      • Wireshark Analysis
      • Log Analysis
      • Windows Security Logs
      • Analyzing Email Headers
      • SIEM Group Assignment
      • Digital Evidence Collection
      • Incident Response Write-Up
      • Risk Management
      • Nmap Formatting
      • Credential Security
      • Wireshark
      • Research Assignment (Regulations)
      • Linux Audit
      • Configuring and Analyzing Share Permission
      • OWASP Research
      • Web Assessment
    • Track 3: PROFESSIONAL Weeks 17-24

      By the end of the program, students will be able to configure and apply threat intelligence, conduct vulnerability assessments and mitigation, investigate data to provide continuous security monitoring, analyze potential indicators of compromise, apply incident response protocols in support of risk mitigation, and conduct basic threat hunting. You’ll end your bootcamp with your second belt exam and will receive the vouchers for your CompTIA Security+ and CySA+ exams.

      • What You’ll Learn:
      • Discuss the ethics of hacking
      • Penetration testing, Metasploitable2 and Eternal Blue
      • Understanding the underlying capabilities of search engines, WHOIS, DNS, nmap, dirbuster and gobuster, nikto, social engineering, specialized scanners, SNB enumeration
      • Proactive threat hunting.
      • Local File Inclusion and Remote File Inclusion, SQL injection techniques and defenses, hacking and testing mobile devices.
      • Counter and create a buffer overflow attack
      • Add to your malware knowledge with advanced techniques and tools.
      • Elevate privilege to fully exploit platforms, monitor the network, or access other systems during an attack.
      • Learn various sources for exploits and how to use them, including password attacks.
      • Hands-on Experience:
      • Metasploitable3 & Good Gone Bad
      • Eternal Blue
      • Footprinting Assignment
      • Specialized Scanners
      • SMB Enumeration
      • Vulnerability Scanning 1 of 2
      • Vulnerability Scanning 2
      • BurpSuite Setup
      • LFI/RFI
      • SQL Injection
      • Windows BOF
      • Analyzing Output from Web Application Assessment Tools
      • Malware Analysis
      • Linux Privesc
      • Windows Privesc
      • How Many Shells?
      • Password Attacks
    • Graduation!Week 24

      Way to go! By now you have the hands-on experience, knowledge and career service support to start sending in those job applications. Continue to leverage your career services manager and your fellow graduates as you schedule and take your CompTIA Security+ and CySA+ exams. Armed with these certifications, you’ll be well on your way to a successful career in cybersecurity.

Download Course Packet
TYPICAL week

Our Part-Time Format

Support

Here to Support You

  • Benchmarks

    Take short quizzes to track your progress and get real time feedback. These questions are the basis for your belt exams, so you’ll be prepped and ready!

  • Office Hours

    Hang out after lectures to get your questions answered by your instructor.

  • Group Labs

    Lab hours are often where the learning really happens! This is where you can work in groups or solo to attack and defend against each other.

  • 24/7 Cohort Access

    From Day 1, you’ll join a community full of your fellow classmates and instructors, as well as have 24/7 access to our Learning Platform.

  • Student Services Team

    If you ever find yourself struggling, reach out to our student services team! They are here to help with time management, tech issues, and more.

  • Career Services Manager

    Starting Day 1 of your bootcamp, your Career Services Manager will help you create a tailored roadmap.

CAREER SERVICES

Dedicated Cybersecurity Career Services

We have had the privilege of helping over 13K+ students upgrade their careers & their lives. In 16 weeks, all while learning the most-indemand STEM skills, you will be working on your job search for when graduation comes and goes.

Other bootcamps only give you career services for the first 6 months after graduation. Our services team is there for you throughout your career, whether it’s 6 months or 6 years down the line, because we are truly invested in your success.

  • life-support-icon

    No Expiration Datelifetime community + support

  • map-icon

    Unlimited Supportstarting day one

  • mentor-icon

    One on OneCareer Service Manager Coaching

Payment

Tuition + Financing

Not sure which financing option is right for you? Check out Financing 101 or book a call with admissions!

  • Installment Plans $250$99 deposit
    $16,995

    Installment plans are available via Miashare. All plans carry 0% interest and do not require a credit check.

  • Climb Credit Loan $250 $99 deposit Cover up to100% of tuition less deposit

    Apply for a tuition loan in just five minutes with our credit partner, Climb. Qualify for a monthly payment plan customized to your needs. Take note that it could take up to 5 business days to process.

Scholarships

Kickstart Scholarship Fund
Awards up to $1500, for those making less than $40,000/year

The Kickstart Fund is a needs based scholarship intended to support financially disadvantaged students. Prospective incoming students can qualify for $1000 or $1500 based on the program selected if their income is less than $40,000 per year. A recent pay stub, W2, or bank statement must be submitted for proof of eligibility.

To apply for the Kickstart Scholarship Fund, visit here.

Career Reinvention Scholarship
Awards $1000

For experienced professionals who are eager and excited to reinvent their careers in the technology industry.

Military Heroes Scholarship
Awards $1000

Honoring our military veterans and current service members transitioning into technology. A copy of DD-214, DD-256, or NGB-22 is required with the application.

*Scholarship awards will be subtracted from your final tuition payment for your chosen program.

Women in Tech Scholarship
Awards $1000

For the SHEros who require financial assistance to launch their career paths in tech.

Diversity Scholarship
Awards $1000

To support and cheer on those within underrepresented groups within the tech industry, including, but not limited to Black, Hispanic, Asian, Indigenous, and LGBTQIA+ communities pursuing technology careers.

  • Kickstart Scholarship FundUp to $1500, for those making less than $40,000/year

    The Kickstart Fund is a needs based scholarship intended to support financially disadvantaged students. Prospective incoming students can qualify for $1000 or $1500 based on the program selected if their income is less than $40,000 per year. A recent pay stub, W2, or bank statement must be submitted for proof of eligibility.

    To apply for the Kickstart Scholarship Fund, visit here.

  • Career Reinvention Scholarship$1,000

    For experienced professionals who are eager and excited to reinvent their careers in the technology industry.

  • Military Heroes Scholarship$1,000

    Honoring our military veterans and current service members transitioning into technology. A copy of DD-214, DD-256, or NGB-22 is required with the application.

  • Women in Tech Scholarship$1,000

    For the SHEros who require financial assistance to launch their career paths in tech.

  • Diversity Scholarship$1,000

    To support and cheer on those within underrepresented groups within the tech industry, including, but not limited to Black, Hispanic, Asian, Indigenous, and LGBTQIA+ communities pursuing technology careers.

  • Early Start Scholarship$1,000

    The Early Start Scholarship is intended for driven and determined freshly graduated high school students and young adults who are eager to get a jumpstart on their careers.

Institutional grants or scholarships are based on established criteria as published in the Institution’s Catalog or on its website and are awarded after verification that the conditions of eligibility have been met.

Application Process

How to Enroll

Are you ready for a challenging and rewarding career in Cybersecurity? Applying to the Coding Dojo Online Part-Time Cybersecurity Program is simple:

  • admissions-step-one-icon

    Explore (optional)

    Schedule a Q&A call with Admissions to get quick answers about the bootcamp or join the next Open House.

  • admissions-step-two-icon

    Apply

    Ready to join? Submit your application and pick your start date to join.

  • admissions-step-three-icon

    Interview

    Meet an Admission Advisor to make sure you’re ready for the challenges of the program. An acceptance decision will be made within 2-3 business days.

  • admissions-step-four-icon

    Deposit to Enroll

    If accepted, submit your deposit to officially save your seat and gain access to bootcamp-prep materials for your start date.

Upcoming Program Dates

  • Oct 16, 2023 to Apr 12, 2024 Enroll By Oct 11, 2023
    $16,995
    Apply Now
  • Nov 13, 2023 to May 17, 2024 Enroll By Nov 8, 2023
    $16,995
    Apply Now
  • Dec 18, 2023 to Jun 21, 2024 Enroll By Dec 13, 2023
    $16,995
    Apply Now

Still Have Questions?

Attend an Open House Talk to Admissions

What are you waiting for?

Let’s get started.

Part-Time Remote Cybersecurity Bootcamp (24 Weeks)

Apply Now
Faqs

You've Got Questions We've Got Answers

  • What is Cybersecurity?

    Cybersecurity is a fast-growing and hugely important tect sector. It involves the creation of networks, policies, and technologies that help protect company’s systems and information, including user information. Beyond creation and architecture, cybersecurity also involves the frequent monitoring and improvement of security systems.

  • Why is Cybersecurity Important?

    As more (or all) information is stored digitally, more people will try to take advantage of that and acquire that information. Compared to most tech jobs, cybersecurity is still in its relative infancy, which means the technologies have plenty of room to improve and companies need as much security as possible.

  • How Hard is Cybersecurity to Learn?

    While there is certainly a lot to learn when studying cybersecurity, it is a very beginner friendly topic. Once you have a solid cybersecurity foundation you’ll be able to figure out which aspects of cybersecurity appeal most to you .

  • Does Cybersecurity Require Coding?

    At first, no. You can graduate from our cybersecurity bootcamp without coding skills. However, being a competent coder is very helpful as you progress through your cybersecurity career.

  • Do I Need Cybersecurity Experience Before Enrolling?

    No! Our cybersecurity bootcamp is beginner and advanced friendly. All students are given two weeks of precourse work that will get you up to speed on cybersecurity before classes start.

  • What Cybersecurity Certifications Can I Get After This Bootcamp?

    After graduation, you can prepare to take the bootcamp level cybersecurity certification, CompTIA Security+. Beyond that, you can also prepare for the CySA+ certification, which may help you pursue an entry-level cybersecurity position.

  • Is a Cybersecurity Bootcamp Worth It?

    According to the U.S. Bureau of Labor Statistics, cybersecurity is predicted to be the fastest growing tech job over the next decade.

  • How Long Does it Take to Learn Cybersecurity?

    Our online cybersecurity bootcamp lasts 24 weeks with the expectation that you spend 30 hours per week learning. There is also two weeks of precourse work that will set you up for success on day one.

  • How Much Does the Cybersecurity Bootcamp Cost?

    Depending on the payment structure you choose, our cybersecurity bootcamp costs anywhere from $15,495 to $16,995. Many students are eligible for scholarships that reduce the costs of the bootcamp.