Change Your Career.
Change Your Life!

Learn From Industry-Leading Instructors
in a Virtual Classroom Setting

The Cybersecurity Professional Bootcamp is designed to launch your cybersecurity career regardless of your level of tech-savvy, providing you with the training you need to make a career change. The program is geared to take you from zero experience to job-ready professional in just 10 months.

Our comprehensive bootcamp starts by teaching you the fundamentals of cybersecurity and guides you to progress all the way to the advanced tasks you will be performing on the job.

With over 700,000
job openings
nationwide, there’s
never been a better
time to join the
cybersecurity
industry.

- Cyberseek.org

img

Join the Field of Cybersecurity
With Job-Ready Skills
Gain a Competitive Edge
to Change Careers

Learn advanced skills to defend against cyber threats and hackers. Our comprehensive curriculum covers everything from the basics to in-demand, advanced skills.

Become a Cyber Defender
With Hands-On Training

Gain the Skills You Need to Succeed in Cybersecurity
Learn With Real-World Cyberattack Simulations

Cyber Labs and TDX Arena

Experience real-world cyberattack scenarios and test your growing knowledge with Cyber Labs and TDX Arena. On this proprietary virtual training platform, you’ll be immersed in gamified learning and focused training.

Expert Instructors

Our instructors are cybersecurity professionals active in the field. You’ll get their first-hand industry knowledge and unique insider’s perspective, and experience their mentorship and guidance as you learn what it takes to succeed in cybersecurity.

Hands-On Courses

Our bootcamp’s courses follow a hands-on approach to cybersecurity education, so you can build the job-ready skills you need to stand out from the crowd. Practical exercises help you develop the competencies and capabilities to succeed in the cybersecurity field.

Virtual Classroom

This is a fully remote, part-time program. Our classes are delivered live, and communications between you, your instructors and your peers are facilitated through virtual tools—so you can build a real community of cybersecurity professionals while learning from home.

Personalized Support Every Step of the Way

Join a Network of Professionals Committed to Your Success

Professional Network

We organize virtual networking events so you can become part of a community of cybersecurity professionals, including local and national hiring partners. Meet new people and access unadvertised career opportunities to explore upon program completion.

Student Support

Our dedicated team of student success managers is here to help you thrive throughout the program and beyond. From facilitating exam retests and tutoring sessions to keeping you accountable, they are an essential and valuable resource for all learners.

Career Coaching

This program comes with a built-in team of career coaches committed to getting you ready for job opportunities. Need help with your resume? They got it covered. Want to practice interview questions? They are here for you. Plus so much more to help you achieve the career you want.

Job Search Assistance

Finding the right opportunities is not always easy. Our career outcomes team can connect you to help get your foot in the door for the cybersecurity roles you want. They are ready to help you launch your new career in this skyrocketing field.

Discover Everything
You’ll Learn

Read the Course Catalog

img

Program Overview

30-Hour Introductory Course |
370-Hour Extended Program

  • Introductory Course

    The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future. The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics.
  • Part 1: Fundamentals

    In the Fundamentals Phase of the bootcamp, learners acquire the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.
  • Microsoft Security

    Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design and devices.

    Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.
  • Computer Networking

    Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design and devices.

    Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam.*
  • Cloud Security

    Cloud solutions like Amazon Web Services, Google Cloud and Microsoft Azure are all becoming commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms.

    Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam.*
  • Linux Security

    The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available.

    Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam.*
  • Part 2: Cybersecurity Infrastructure

    In the Infrastructure Phase of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.
  • Network Security

    Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. They will have the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.
  • Cyber Infrastructure & Technology

    Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to protect these important facets of everyday life. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things and environment security. This skill set is in high demand across the business world, as well as in the cybersecurity industry.

    This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam.*
  • Intro to Python for Security

    Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

    Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.
  • Part 3: Advanced Cybersecurity

    In the Advanced Phase of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.
  • Offensive Security: Ethical Hacking

    This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.
  • DFIR and Threat Hunting

    When there’s a cyberattack, first responders are the first in line to analyze and contain the incident. The Digital Forensics & Incident Response course gives learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering and report the results.
  • Game Theory Strategy in Cybersecurity

    In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
  • Career Outcomes Workshop

    Get the competitive edge you need to succeed in technical interviews with this specialized workshop. TDX Arena also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.
Icon

Introductory Course 30 Hours

The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future. The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics.

Icon

Part 1: Fundamentals

In the Fundamentals Phase of the bootcamp, learners acquire the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.

Icon

Microsoft Security 40 Hours

Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design and devices.

Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.

Icon

Computer Networking 50 Hours

Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design and devices.

Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam.*

Icon

Cloud Security 15 Hours

Cloud solutions like Amazon Web Services, Google Cloud and Microsoft Azure are all becoming commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms.

Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam.*

Icon

Linux Security 30 Hours

The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available.

Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam.*

Icon

Part 2: Cybersecurity Infrastructure

In the Infrastructure Phase of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.

Icon

Network Security 35 Hours

Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. They will have the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.

Icon

Cyber Infrastructure & Technology 40 Hours

Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to protect these important facets of everyday life. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things and environment security. This skill set is in high demand across the business world, as well as in the cybersecurity industry.

This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam.*

Icon

Intro to Python for Security 25 Hours

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.

Icon

Part 3: Advanced Cybersecurity

In the Advanced Phase of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.

Icon

Offensive Security: Ethical Hacking 50 Hours

This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.

Icon

DFIR and Threat Hunting 60 Hours

When there’s a cyberattack, first responders are the first in line to analyze and contain the incident. The Digital Forensics & Incident Response course gives learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering and report the results.

Icon

Game Theory Strategy in Cybersecurity 10 Hours

In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.

Icon

Career Outcomes Workshop 15 Hours

Get the competitive edge you need to succeed in technical interviews with this specialized workshop. TDX Arena also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.

*Although the course curriculum provides the knowledge necessary to do well on industry exams, this isn’t a test preparation program, where the main focus is how a learner performs on an exam. Certification exams are not taken as part of the program and will require additional costs not included in the program tuition.

The Essential Knowledge You Need
for Industry Certifications

Our bootcamp is not a certification-prep program.

However, we know that when hiring new cybersecurity professionals, many companies prioritize candidates with industry-recognized certifications. To help boost your credentials, we’ve created in-depth resources to help you learn skills that are applicable to the following certification exams.

  • LPI Linux Essentials

    The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills and overall Linux administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
  • CompTIA Network+

    The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication and virtualization technologies.
  • CompTIA Security+

    The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration and penetration testing.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For learners who have achieved one year of experience after completion of their program.

    Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

    The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring and administration of information technology infrastructure according to information security best practices, policies and procedures.

    ** In order to be certified, learners must have a minimum of at least one year of cumulative work experience in one or more of the seven disciplines of the SSCP Common Body of Knowledge (CBK).

LPI Linux Essentials

The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills and overall Linux administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.

CompTIA Network+

The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication and virtualization technologies.

CompTIA Security+

The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration and penetration testing.

(ISC)² SSCP – Systems Security Certified Practitioner**

For learners who have achieved one year of experience after completion of their program.

Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring and administration of information technology infrastructure according to information security best practices, policies and procedures.

** In order to be certified, learners must have a minimum of at least one year of cumulative work experience in one or more of the seven disciplines of the SSCP Common Body of Knowledge (CBK).

Program Tuition

Invest in yourself and your professional growth. Join our bootcamp and get the job-ready skills you need to become a cybersecurity professional.

30-Hour Introductory Course

$180

370-Hour Extended Program

$17,800

Requirements

Internet access

Drive, ambition and passion

Introductory course and admission exam

img
Skip to content