ONLINE / PART-TIME

Cybersecurity Bootcamp Online Part-Time

Apply TodayDownload Course Packet
  • Part-Time24 Weeks20 hours/wk
  • Online Attendance

NEXT PROGRAM DATESMore Dates

Overview

Cybersecurity Jobs are Rewarding, Lucrative, & In-Demand

The importance of cybersecurity today cannot be overstated, which makes it a good time to join a cybersecurity bootcamp. As our reliance on technology grows, there’s a corresponding need to secure and defend networks and data against leaks, theft, and attacks. That’s good news for those seeking cybersecurity certification-the U.S. Bureau of Labor Statistics projects cybersecurity jobs will grow 31% through 2029. In short, there’s job security in cybersecurity.

After completing Coding Dojo’s Cybersecurity bootcamp, students are mission-ready to identify, assess, report, and mitigate technology and information security risks.

Career Image
YOUR TEAM

Our Cyber Security Team

EXPLORE BOOTCAMP

Questions? Get Answers

WHY US?

The Dojo Difference

A Coding Dojo Cybersecurity certification can make you stand out from other bootcamps’ grads and makes you mission-ready for a challenging and rewarding career on day one

CURRICULUM

Curriculum Overview

From CompTIA Security+ to CySA+ certifications and beyond, our Cybersecurity program teaches students critical skills to assist in the identification, assessment, reporting, and mitigation of technology and information security risks. This professional-grade program provides information, strategies, and tactics to identify and manage information system vulnerabilities, create effective defenses and preventative measures, and deploy countermeasures against attackers.

    • PRECOURSE: Weeks -2-0

      The pre-course will cover the schedule, stack expectations, certification process, and graduation requirements of the program. You’ll also review some basic cybersecurity resources and complete reading and assignments to familiarize yourself with the framework and foundations of cybersecurity. Finally, you’ll get your virtual machine (VM) up and running.

    • Track 1: Core Weeks 1-8

      In the Core track, you will build foundational knowledge across key areas of cybersecurity. This track covers both hardware and software, configuring multiple operating systems, understanding network architecture, and the basic principles to identify vulnerabilities and risks.

      • What You’ll Learn:
      • Cybersecurity basics including: Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure Software, Testing, Cryptography
      • How to build out a Kali Linux machine while learning about networking and data security.
      • Network configurations and data security, including Network Design, Firewall Configuration, Access Control
      • Viruses and Ransomware, intrusion detection, useful tools, introduction to embedded (control) systems, secure shell, mobile & endpoint security.
      • Virtual Machines, malicious code, Disaster Recovery, and Powershell
      • Identifying and responding to incidents, technical and legal elements of forensics
      • Learn how resiliency, automation, and backups provide essential and fundamental protection
      • Start learning what a career in cybersecurity looks like
      • Hands-on Experience:
      • VM Setup
      • Windows & Mac Directions
      • Network Settings
      • Scanning Networks
      • Packet Sniffing
      • Nessus Installation
      • Password Cracking
      • Basic ACL
      • Firewall Configuration Kali
      • Secure Network Design
      • Snort Installation
      • SSH
      • Endpoint Protection
      • Malicious Code
      • Powershell Security
      • Configuring an Intrusion Detection System
      • Incident Response
      • Digital Forensics
    • Track 2: INTERMEDIATE Weeks 9-16

      By completing this track, students will be able to demonstrate to prospective employers basic security skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies and regulations.

      • What You’ll Learn:
      • Understand roles and responsibilities, security controls, indicators of compromise, understanding threats, attack tools, monitoring networks
      • Protect networks, monitor and analyze various services for signs of compromise, run scripts, understand and use SIEM (Security Information and Event Management)
      • Examine forensic tools and techniques, digging into indicators of compromise, understanding detection and containment, learning digital evidence collection, understanding frameworks, policies and procedures, exploring attacker lateral movement and pivoting.
      • Learn intermediate incident response as well as effective recovery.
      • How to conduct a risk analysis and vulnerability assessment
      • Understand regulations in cybersecurity
      • Learn technical and non-technical controls, the relationship of security and privacy, & how to configure and analyze share permissions
      • Learn cloud technologies and how to protect your cloud-based solutions with OWASP
      • Hands-on Experience:
      • IoC Investigation
      • Network Group Assignment
      • Wireshark Analysis
      • Log Analysis
      • Windows Security Logs
      • Analyzing Email Headers
      • SIEM Group Assignment
      • Digital Evidence Collection
      • Incident Response Write-Up
      • Risk Management
      • Nmap Formatting
      • Credential Security
      • Wireshark
      • Research Assignment (Regulations)
      • Linux Audit
      • Configuring and Analyzing Share Permission
      • OWASP Research
      • Web Assessment
    • Track 3: PROFESSIONAL Weeks 17-24

      By the end of the program, students will be able to configure and apply threat intelligence, conduct vulnerability assessments and mitigation, investigate data to provide continuous security monitoring, analyze potential indicators of compromise, apply incident response protocols in support of risk mitigation, and conduct basic threat hunting. You’ll end your bootcamp with your second belt exam and will receive the vouchers for your CompTIA Security+ and CySA+ exams.

      • What You’ll Learn:
      • Discuss the ethics of hacking
      • Penetration testing, Metasploitable2 and Eternal Blue
      • Understanding the underlying capabilities of search engines, WHOIS, DNS, nmap, dirbuster and gobuster, nikto, social engineering, specialized scanners, SNB enumeration
      • Proactive threat hunting.
      • Local File Inclusion and Remote File Inclusion, SQL injection techniques and defenses, hacking and testing mobile devices.
      • Counter and create a buffer overflow attack
      • Add to your malware knowledge with advanced techniques and tools.
      • Elevate privilege to fully exploit platforms, monitor the network, or access other systems during an attack.
      • Learn various sources for exploits and how to use them, including password attacks.
      • Hands-on Experience:
      • Metasploitable3 & Good Gone Bad
      • Eternal Blue
      • Footprinting Assignment
      • Specialized Scanners
      • SMB Enumeration
      • Vulnerability Scanning 1 of 2
      • Vulnerability Scanning 2
      • BurpSuite Setup
      • LFI/RFI
      • SQL Injection
      • Windows BOF
      • Analyzing Output from Web Application Assessment Tools
      • Malware Analysis
      • Linux Privesc
      • Windows Privesc
      • How Many Shells?
      • Password Attacks
    • Graduation!Week 24

      Way to go! By now you have the hands-on experience, knowledge and career service support to start sending in those job applications. Continue to leverage your career services manager and your fellow graduates as you schedule and take your CompTIA Security+ and CySA+ exams. Armed with these certifications, you’ll be well on your way to a successful career in cybersecurity.

Download Course Packet
TYPICAL week

Our Part-Time Format

Support

Here to Support You

  • Benchmarks

    Take short quizzes to track your progress and get real time feedback. These questions are the basis for your belt exams, so you’ll be prepped and ready!

  • Office Hours

    Hang out after lectures to get your questions answered by your instructor.

  • Group Labs

    Lab hours are often where the learning really happens! This is where you can work in groups or solo to attack and defend against each other.

  • 24/7 Cohort Access

    From Day 1, you’ll join a community full of your fellow classmates and instructors, as well as have 24/7 access to our Learning Platform.

  • Student Services Team

    If you ever find yourself struggling, reach out to our student services team! They are here to help with time management, tech issues, and more.

  • Career Services Manager

    Starting Day 1 of your bootcamp, your Career Services Manager will help you create a tailored roadmap to the job of your dreams.

CAREER SERVICES

Dedicated Cybersecurity Career Services

We have had the privilege of helping over 8,000+ students upgrade their careers & their lives. In 14 weeks, all while learning the most-indemand STEM skills, you will be working on your job search for when graduation comes and goes.

Other bootcamps only give you career services for the first 6 months after graduation. Our services team is there for you throughout your career, whether it’s 6 months or 6 years down the line, because we are truly invested in your success.

  • life-support-icon

    No Expiration Datelifetime community + support

  • map-icon

    Unlimited Supportstarting day one

  • mentor-icon

    One on OneCareer Service Manager Coaching

Payment

Tuition + Financing

Not sure which financing option is right for you? Check out Financing 101 or book a call with admissions!

  • Pay in Full Pay within 10 days of acceptance to save $500 off tuition!
    $16,495
  • Installment Plans $500 deposit
    $16,995

    Installment plans are available via Miashare. All plans carry 0% interest and do not require a credit check.

  • Ascent Funding $500 deposit Cover up to100% of tuition less deposit

    Borrow up to the total cost of tuition. Learn More.

  • Climb Credit Loan $500 deposit Cover up to100% of tuition less deposit

    Apply for a tuition loan in just five minutes with our credit partner, Climb. Qualify for a monthly payment plan customized to your needs. Take note that it could take up to 5 business days to process.

Scholarships

Fresh Start Fund
Awards up to $1500, for those making less than $40,000/year

The Fresh Start Fund was established to help prospective students bridge gaps in income or other hardships due to the COVID-19 pandemic.

To apply for the Fresh Start Fund, visit here.

Career Re-invention Scholarship
Awards $1000

The Career Reinvention scholarship is intended for experienced professionals who have “hit a wall” and are eager to reinvent their careers, but are unable to afford the professional assistance required to refine their skill sets.

Military Re-training Scholarship
Awards $1000

The Military Retraining Scholarship is intended to assist military veterans and current servicemen/women to transition their careers to web software development.

*Scholarship awards will be subtracted from your final tuition payment for your chosen program.

Women in Tech Scholarship
Awards $1000

The Women in Tech Scholarship is intended for aspiring female computer programmers who require financial assistance to launch their careers. This initiative is offered to support women in the technology industry, who as a demographic are highly underrepresented.

Diversity Scholarship
Awards $1000

The Diversity Scholarship is intended to support and encourage underrepresented groups in the technology industry.

  • Fresh Start FundUp to $1500, for those making less than $40,000/year

    The Fresh Start Fund was established to help prospective students bridge gaps in income or other hardships due to the COVID-19 pandemic.

    To apply for the Fresh Start Fund, visit here.

  • Career Re-invention Scholarship$1,000

    The Career Reinvention scholarship is intended for experienced professionals who have “hit a wall” and are eager to reinvent their careers, but are unable to afford the professional assistance required to refine their skill sets.

  • Military Re-training Scholarship$1,000

    The Military Retraining Scholarship is intended to assist military veterans and current servicemen/women to transition their careers to web software development.

  • Women in Tech Scholarship$1,000

    The Women in Tech Scholarship is intended for aspiring female computer programmers who require financial assistance to launch their careers. This initiative is offered to support women in the technology industry, who as a demographic are highly underrepresented.

  • Diversity Scholarship$1,000

    The Diversity Scholarship is intended to support and encourage underrepresented groups in the technology industry.

  • Early Start Scholarship$1,000

    The Early Start Scholarship is intended for driven and determined freshly graduated high school students and young adults who are eager to get a jumpstart on their careers.

Application Process

How to Enroll

Are you ready for a challenging and rewarding career in Cybersecurity? Applying to the Coding Dojo Online Part-Time Cybersecurity Program is simple:

  • admissions-step-one-icon

    Explore (optional)

    Schedule a Q&A call with Admissions to get quick answers about the bootcamp or join the next Open House.

  • admissions-step-two-icon

    Apply

    Ready to join? Submit your application and pick your start date to join.

  • admissions-step-three-icon

    Interview

    Meet an Admission Advisor to make sure you’re ready for the challenges of the program. An acceptance decision will be made within 2-3 business days.

  • admissions-step-four-icon

    Deposit to Enroll

    If accepted, submit your deposit to officially save your seat and gain access to bootcamp-prep materials for your start date.

Upcoming Program Dates

  • Dec 12, 2022 to Jun 18, 2023 Enroll By Dec 7, 2022
    $16,995
    Apply Now
  • Jan 30, 2023 to Jul 21, 2023 Enroll By Jan 25, 2023
    $16,995
    Apply Now
  • Feb 27, 2023 to Aug 18, 2023 Enroll By Feb 22, 2023
    $16,995
    Apply Now

Still Have Questions?

Attend an Open House Talk to Admissions

What are you waiting for?

Let’s get started.

Part-Time Remote Cybersecurity Bootcamp (24 Weeks)

Apply Now
Faqs

You've Got Questions We've Got Answers

  • What is Cybersecurity?

    Cybersecurity is a fast-growing and hugely important tect sector. It involves the creation of networks, policies, and technologies that help protect company’s systems and information, including user information. Beyond creation and architecture, cybersecurity also involves the frequent monitoring and improvement of security systems.

  • Why is Cybersecurity Important?

    As more (or all) information is stored digitally, more people will try to take advantage of that and acquire that information. Compared to most tech jobs, cybersecurity is still in its relative infancy, which means the technologies have plenty of room to improve and companies need as much security as possible.

  • How Hard is Cybersecurity to Learn?

    While there is certainly a lot to learn when studying cybersecurity, it is a very beginner friendly topic. Once you have a solid cybersecurity foundation you’ll be able to figure out which aspects of cybersecurity appeal most to you . As long as you boast a few soft skills, you’ll have no issue learning cybersecurity.

  • Does Cybersecurity Require Coding?

    At first, no. You’ll be able to find an entry-level cybersecurity job and graduate from our cybersecurity bootcamp without coding skills. However, being a competent coder is very helpful as you progress through your cybersecurity career.

  • Do I Need Cybersecurity Experience Before Enrolling?

    No! Our cybersecurity bootcamp is beginner and advanced friendly. All students are given two weeks of precourse work that will get you up to speed on cybersecurity before classes start.

  • What Cybersecurity Certifications Can I Get After This Bootcamp?

    Right after graduation, you’ll be more than prepared for the bootcamp level cybersecurity certification, CompTIA Security+. Beyond that, you’ll very well prepared for the CySA+ certification, which will help you find your entry-level cybersecurity job.

  • Is a Cybersecurity Bootcamp Worth It?

    According to the U.S. Bureau of Labor Statistics, cybersecurity is predicted to be the fastest growing tech job over the next decade. Our cybersecurity bootcamp will get you job ready in much less time and for much less money compared to a degree. Before you know it, you’ll have a fast-growing, high-demand career.

  • How Long Does it Take to Learn Cybersecurity?

    Our online cybersecurity bootcamp lasts 24 weeks with the expectation that you spend 20 hours per week learning. There is also two weeks of precourse work that will set you up for success on day one.

  • What Cybersecurity Jobs Can I Get After the Bootcamp?

    There are a variety of jobs you’ll be eligible for after graduating from Coding Dojo’s cybersecurity bootcamp. A few examples include:

    • Cybersecurity Specialist
    • Cyber Crime Analyst
    • Incident and Intrusion Analyst

    Some of the things you’ll work on in these jobs include incident response, security audits, and network upgrades. As you advance through your career there will be even more opportunities, including network architects and people management if desired.

  • How Much Does the Cybersecurity Bootcamp Cost?

    Depending on the payment structure you choose, our cybersecurity bootcamp costs anywhere from $15,495 to $16,995. Many students are eligible for scholarships that reduce the costs of the bootcamp.