Explore the Course Catalog
Change Your Career.
Change Your Life!
Learn From Industry-Leading Instructors
in a Virtual Classroom Setting
The Cybersecurity Professional Bootcamp is designed to launch the cybersecurity careers of individuals with little to no professional background in the field, providing you with the education you need to make a career change. The program is geared to take you from zero experience to job-ready professional in less than one year.
In the bootcamp, you will learn everything you need to know to succeed in the industry, starting with the fundamentals, all the way to the advanced tasks you will be performing on the job.
Find a job you
enjoy doing,
and you will
never have to
work a day
in your life.
- Mark Twain
Join the Rewarding Field of
Cybersecurity in Under a Year!
Explore the Benefits of
Joining Our Program
Our Cybersecurity Professional Bootcamp is designed for candidates who:
Have little to no professional
background in the cyber field
Want to transition into a more reliable
and rewarding career
Are looking to develop the skills they
need to protect against cyber threats
Defend Against Cyber
Threats
and Criminals Around the World
Join the Booming Field
of Cybersecurity
82%
82% of employers report a
shortage of cybersecurity skills
39s
Hackers attack every
39 seconds
3.5m
3.5 million unfilled cybersecurity jobs predicted globally by 2021
$3.9m
The average cost of a data
breach is $3.9 million
Gain the Skills You Need
to Succeed in the Field
Become a Cyber Defender With Hands-On Training
When hiring new cybersecurity professionals, many companies prioritize candidates who have experiential knowledge and can put it into practice. Our career-prep program understands that knowing how to apply real-world cyber skills is what can help set you apart from other candidates.
The Cybersecurity Professional Bootcamp employs a comprehensive learning model that will provide you with valuable experience and give students all the tools necessary to get started in the field immediately upon graduation. Students will have access to simulation labs that model true-to-life scenarios to help provide a practical understanding of the information and how to apply it in the workplace.
Program Overview
30-Hour Introductory Course
| 370-Hour Extended Program
-
Introductory Course
Take the Cybersecurity Professional Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors and more.
You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the Cybersecurity Professional Bootcamp.
When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career. -
Microsoft Security
Globally, a multitude of companies trusts Windows Server exclusively to manage their computers and networks. The Microsoft Security course gives learners a hands-on education with modern and widely used versions of the Microsoft Windows and Server operating systems. Learners will discover how to administrate, secure, and become good practitioners with the Microsoft ecosystem of products. -
Computer Networking
Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few.
In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course. -
Linux Security
In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam*. -
Cloud Security
More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam*. -
Fundamentals Phase Final Project
Building Your Own Environment:Learners will create an insecure small business infrastructure on which they will secure while practicing cyberattacks and forensics. Upon completion of the program, learners will be able to include this project in their portfolio to demonstrate their skill and ability. -
Cybersecurity Infrastructure Phase
The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase. -
Network Security
This course gives learners the necessary knowledge to begin studying for the EC-Council CND exam.
Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the digital skillset needed to appeal most to potential employers. -
Critical Infrastructure Security
Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.
After this course, learners will be prepared to begin studying for the CompTIA Security+ exam*. -
Python for Security
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python. -
Infrastructure Phase Final Project
Using the infrastructure created in the previous final project, learners will take a threat scenario and secure the infrastructure to demonstrate infrastructure hardening. -
Career Services Workshop
This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while CyWar hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field. -
Advanced Cybersecurity Phase
The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers. -
Ethical Hacking
Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.
After this course, learners will be prepared to finish studying for the EC-Council CEH(Certified Ethical Hacker) certification exam*. -
Digital Forensics & Incident Response
When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.
After this course, learners will be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*. -
Advanced Phase Final Project: Attack & Response
Learners will take the secure infrastructure they have created in previous projects, design an attack to compromise the infrastructure, gather forensic evidence, and write a complete investigative report.
Upon completion of the program, learners will have the reports, code, and designs from their projects to form a portfolio that they can show prospective employers. -
Game Theory
How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.
Introductory Course
8 Lessons - 30 Hours
Take the Cybersecurity Professional Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors and more.
You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the Cybersecurity Professional Bootcamp.
When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.
Microsoft Security
10 Lessons - 40 Hours
Globally, a multitude of companies trusts Windows Server exclusively to manage their computers and networks. The Microsoft Security course gives learners a hands-on education with modern and widely used versions of the Microsoft Windows and Server operating systems. Learners will discover how to administrate, secure, and become good practitioners with the Microsoft ecosystem of products.
Computer Networking
Lessons - 35 Hours
Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few.
In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.
Linux Security
8 Lessons - 30 Hours
In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam*.
Cloud Security
7 Lessons - 25 Hours
More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam*.
Fundamentals Phase Final Project
2 Lessons - 10 Hours
Building Your Own Environment:Learners will create an insecure small business infrastructure on which they will secure while practicing cyberattacks and forensics. Upon completion of the program, learners will be able to include this project in their portfolio to demonstrate their skill and ability.
Cybersecurity Infrastructure Phase
The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase.
Network Security
8 Lessons - 30 Hours
This course gives learners the necessary knowledge to begin studying for the EC-Council CND exam.
Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the digital skillset needed to appeal most to potential employers.
Critical Infrastructure Security
9 Lessons - 35 Hours
Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.
After this course, learners will be prepared to begin studying for the CompTIA Security+ exam*.
Python for Security
7 Lessons - 25 Hours
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Infrastructure Phase Final Project
2 Lessons - 10 Hours
Using the infrastructure created in the previous final project, learners will take a threat scenario and secure the infrastructure to demonstrate infrastructure hardening.
Career Services Workshop
1 Session - 5 Hours
This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while CyWar hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field.
Advanced Cybersecurity Phase
The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers.
Ethical Hacking
12 Lessons - 50 Hours
Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.
After this course, learners will be prepared to finish studying for the EC-Council CEH(Certified Ethical Hacker) certification exam*.
Digital Forensics & Incident Response
12 Lessons - 50 Hours
When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.
After this course, learners will be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.
Advanced Phase Final Project: Attack & Response
2 Lessons - 10 Hours
Learners will take the secure infrastructure they have created in previous projects, design an attack to compromise the infrastructure, gather forensic evidence, and write a complete investigative report.
Upon completion of the program, learners will have the reports, code, and designs from their projects to form a portfolio that they can show prospective employers.
Game Theory
4 Lessons - 15 Hours
How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.
Prepare for Internationally Recognized
Cybersecurity Certifications
Cybersecurity professionals who are just starting in this industry are more likely to be hired if they also attain internationally recognized certifications. In an effort to boost your credentials even further, we have developed a robust hub of resources to help you prepare for certification exams.
During the two 2-week breaks that are built into the Cybersecurity Professional Bootcamp, learners will have a chance to take non-mandatory asynchronous lessons for certification-prep. The CyWar platform also hosts study guides, question banks, “Cyberpedia,” and challenges that will help learners practice and ace their exams.
We recommend that learners seek one certification during each phase, according to their individual career goals.
Fundamentals Phase:
-
LPI Linux Essentials
The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration. -
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers. -
CompTIA Network+
The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies. -
EC-Council CND - Certified Network Defender
The Certified Network Defender certification should be considered by learners who want to become Network Administrators who are trained in protecting, detecting, and responding to the threats on the network. -
CompTIA Security+
The CompTIA Security+ is the next step up from the CompTIA Network+ and is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests the candidate’s skill set over a range of disciplines, such as systems, networks, security administration, and penetration testing. -
EC-Council CSA - Certified SOC Analyst
The Certified SOC Analyst certification is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. -
EC-Council CEH - Certified Ethical Hacker
The Certified Ethical Hacker certification is intended for learners who want to work in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. -
(ISC)² SSCP – Systems Security Certified Practitioner**
For students who achieved 1 year of experience—Post-Program Completion. The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
** Students must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
LPI Linux Essentials
The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers.
CompTIA Network+
The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies.
EC-Council CND - Certified Network Defender
The Certified Network Defender certification should be considered by learners who want to become Network Administrators who are trained in protecting, detecting, and responding to the threats on the network.
CompTIA Security+
The CompTIA Security+ is the next step up from the CompTIA Network+ and is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests the candidate’s skill set over a range of disciplines, such as systems, networks, security administration, and penetration testing.
EC-Council CSA - Certified SOC Analyst
The Certified SOC Analyst certification is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
EC-Council CEH - Certified Ethical Hacker
The Certified Ethical Hacker certification is intended for learners who want to work in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
(ISC)² SSCP – Systems Security Certified Practitioner**
For students who achieved 1 year of experience—Post-Program Completion.
The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
** Students must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
Explore the
Course Catalog
For More Information
Course Catalog
Program Tuition
Tuition for the Cybersecurity Professional Bootcamp at the New
Jersey Institute of Technology is $17,800, not including $180 for the
Introductory Course.
Tuition, fees, and deposits subject to change.