Cybersecurity Bootcamp | University of Chicago (2023)

  • Home
  • /
  • Cybersecurity Bootcamp

Become an exceptional
candidate and optimize
your career growth

From fundamentals to advanced development,
build a valuable skillset

Industry experts provide cybersecurity training and mentorship through a safe, cloud-based platform where you can hone cutting-edge skills. Upon completing your online cybersecurity training, you will be equipped with the knowledge and technical skills to defend organizations and the public from real threats, design secure system solutions, and identify weaknesses.

Employment of
cybersecurity
professionals is
expected to grow
33% from 2020
to 2030.

- U.S. Bureau of
Labor Statistics

Cybersecurity Bootcamp | University of Chicago (1)

Train with top
industry tools

Get expert-level skills in the leading cybersecurity software. Our program gives you access to the cutting-edge tools that cybersecurity professionals are using right now.

Cybersecurity Bootcamp | University of Chicago (2) Cybersecurity Bootcamp | University of Chicago (3) Cybersecurity Bootcamp | University of Chicago (4) Cybersecurity Bootcamp | University of Chicago (5) Cybersecurity Bootcamp | University of Chicago (6) Cybersecurity Bootcamp | University of Chicago (7) Cybersecurity Bootcamp | University of Chicago (8)

Learn to defend
against cyberattacks

Thrive in the expanding world
of cybersecurity

Cybersecurity Bootcamp | University of Chicago (9)

Hands-on
learning

Our innovative approach to instruction provides you with critical, hands-on training in a live, online environment. The curriculum is designed for professionals of all backgrounds in every stage of their careers.

Cybersecurity Bootcamp | University of Chicago (10)

Cyber labs

Our Cyber Labs, curated by cybersecurity experts, help you gain valuable experience through real-world simulations. Our in-depth training teaches you how to identify the different vulnerabilities on desktop, mobile, server, and web platforms, and the techniques needed to protect against threats.

Cybersecurity Bootcamp | University of Chicago (11)

Virtual classroom

Interact with your instructors and peers in a real-time environment using cloud-based chat software. Enjoy a weekend and evening class schedule built to fit into your busy life while attending online cybersecurity classes from the comfort of your own home.

Cybersecurity Bootcamp | University of Chicago (12)

Industry-leading instructors

Our instructors give you the inside track on a complex field. As you sharpen your practical and theoretical skills with their expert guidance, you benefit from their current industry knowledge and expert perspectives.

Receive personalized support
every step of the way

Comprehensive career services designed to support your
unique goals

Cybersecurity Bootcamp | University of Chicago (13)

Networking advantages

As the demand for cybersecurity professionals increases, local and global employers are looking to connect with qualified candidates. Upon program completion, you will receive access to virtual networking events where you can explore cybersecurity career opportunities.

(Video) Why I HATE Cyber Security Bootcamps

Cybersecurity Bootcamp | University of Chicago (14)

Professional coaching

Our program features a team of passionate career coaches who are eager to help you achieve your professional goals. Get access to a wide array of professional development opportunities including interview prep, LinkedIn profile optimization, and resume writing.

Cybersecurity Bootcamp | University of Chicago (15)

Dedicated support

Once you invest in our online cybersecurity bootcamp, you get the full-fledged support of a team dedicated to your success. From day one, your student success manager ensures you have the tools you need to excel within the program—and beyond.

Cybersecurity Bootcamp | University of Chicago (16)

Career search assistance

Our Career Outcomes team is here to support your journey, whether you are preparing to apply for your first cybersecurity role or looking to advance an existing career. From exclusive networking opportunities to practice interviews, the personalized services our team offers helps you become a more marketable candidate.

Check out our

course catalog

Find out what
you will learn

Cybersecurity Bootcamp | University of Chicago (17)

Program overview

30-Hour Introductory Course |
370-Hour Extended Program

  • Introductory Course

    The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the extended program and pursue a career in cybersecurity.

    This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.

  • Part One: Fundamentals

    This phase of the program helps you understand the basics of cybersecurity. In Fundamentals, you gain a basic understanding of basic network and cloud security, Linux, and Microsoft Windows. This phase of the program acts as training to prepare you for the more rigorous Infrastructure Phase.

  • Microsoft Security

    Globally, a multitude of companies trust Windows Server exclusively to manage their computers and networks. The Microsoft cybersecurity course gives you a hands-on education with widely used versions of the Microsoft Windows and Server operating systems. You will discover how to administrate, secure, and become a skillful practitioner of the Microsoft ecosystem of products.

  • Computer Networking

    Computer networks are used across industries from finance, healthcare, and technology to hospitality, manufacturing, and travel. In the Computer Networking course, you cover the basics of computer networks, including devices, network designs, protocols, and topologies. This forms a foundation for you to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

  • Cloud Security

    More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, and Microsoft Azure. The Cloud Security online course prepares you to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, it provides a baseline level of cloud security knowledge that will give you the ability to prepare for the AWS Cloud Practitioner certification exam.*

  • Linux Security

    In the Linux cybersecurity course, you gain knowledge and practical skills in one of the most-used operating systems in the world. We cover all the basics of using and manipulating the Linux operating system and various different Linux distributions. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Upon completion of this course, you can start preparing for the LPI Linux Essentials certification exam.*

  • Part Two: Cybersecurity Infrastructure

    The Infrastructure phase of the program focuses on security concepts and practices. In the Infrastructure phase, you will study Critical Infrastructure Security (CIS), Python, and network security.

  • Network Security

    Almost everything happens on a network, either locally or on the internet. You will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you an appealing skillset to take to the job market.

  • Cyber Infrastructure and Technology

    Fire and rescue, medical facilities, and power plants are all considered critical infrastructure. The Cyber Infrastructure and Technology course gives direct training in environmental security and safeguarding the supply chain and the Industrial Internet of Things (IIoT) skills you can take to the business world. This class prepares you to start training for the CompTIA Security+ exam.*

  • Intro to Python for Security

    Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro Python for Security course gives you the tools needed to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

  • Part Three: Advanced Cybersecurity

    This phase of the program builds skills and experience in advanced security concepts, such as digital forensics, ethical hacking, game theory, and incident response. This phase provides you with a complete view of cybersecurity and prepares you for a cybersecurity career.

    (Video) cybersecurity degrees - are they worthless?
  • Offensive Security: Ethical Hacking

    Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different positions. This course gives you a broad foundation to pursue a career trajectory with ethical hacking as your primary role.

  • DFIR and Threat Hunting

    When a cyberattack happens, first responders are key. The Digital Forensics and Incident Response (DFIR) course ensures you have all the tools you need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.

  • Game Theory Strategy in Cybersecurity

    Game theory can provide invaluable insight into cyber attacks. Our Game Theory Strategy in Cybersecurity course delves into its philosophical and mathematical foundations as well as its practical uses in modeling and understanding attacks. The course also addresses the soft skills in cybersecurity and focuses on developing creative, thinking skills to help you become a skilled, solution-driven cybersecurity professional.

  • Career Outcomes Workshop

    This specialized workshop is dedicated to preparing you for every aspect of technical interviews. TDX Arena hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help you land a position in the cybersecurity field.

Cybersecurity Bootcamp | University of Chicago (18)

Introductory Course (30 Hours)

The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the extended program and pursue a career in cybersecurity.

This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.

Cybersecurity Bootcamp | University of Chicago (19)

Part One: Fundamentals

This phase of the program helps you understand the basics of cybersecurity. In Fundamentals, you gain a basic understanding of basic network and cloud security, Linux, and Microsoft Windows. This phase of the program acts as training to prepare you for the more rigorous Infrastructure Phase.

Cybersecurity Bootcamp | University of Chicago (20)

Microsoft Security (40 Hours)

Globally, a multitude of companies trust Windows Server exclusively to manage their computers and networks. The Microsoft cybersecurity course gives you a hands-on education with widely used versions of the Microsoft Windows and Server operating systems. You will discover how to administrate, secure, and become a skillful practitioner of the Microsoft ecosystem of products.

Cybersecurity Bootcamp | University of Chicago (21)

Computer Networking (50 Hours)

Computer networks are used across industries from finance, healthcare, and technology to hospitality, manufacturing, and travel. In the Computer Networking course, you cover the basics of computer networks, including devices, network designs, protocols, and topologies. This forms a foundation for you to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

Cybersecurity Bootcamp | University of Chicago (22)

Cloud Security (15 Hours)

More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, and Microsoft Azure. The Cloud Security online course prepares you to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, it provides a baseline level of cloud security knowledge that will give you the ability to prepare for the AWS Cloud Practitioner certification exam.*

Cybersecurity Bootcamp | University of Chicago (23)

Linux Security (30 Hours)

In the Linux cybersecurity course, you gain knowledge and practical skills in one of the most-used operating systems in the world. We cover all the basics of using and manipulating the Linux operating system and various different Linux distributions. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Upon completion of this course, you can start preparing for the LPI Linux Essentials certification exam.*

Cybersecurity Bootcamp | University of Chicago (24)

Part Two: Cybersecurity Infrastructure

The Infrastructure phase of the program focuses on security concepts and practices. In the Infrastructure phase, you will study Critical Infrastructure Security (CIS), Python, and network security.

Cybersecurity Bootcamp | University of Chicago (25)

Network Security (35 Hours)

Almost everything happens on a network, either locally or on the internet. You will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you an appealing skillset to take to the job market.

Cybersecurity Bootcamp | University of Chicago (26)

Cyber Infrastructure and Technology (40 Hours)

Fire and rescue, medical facilities, and power plants are all considered critical infrastructure. The Cyber Infrastructure and Technology course gives direct training in environmental security and safeguarding the supply chain and the Industrial Internet of Things (IIoT) skills you can take to the business world. This class prepares you to start training for the CompTIA Security+ exam.*

Cybersecurity Bootcamp | University of Chicago (27)

Intro to Python for Security (25 Hours)

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro Python for Security course gives you the tools needed to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

Cybersecurity Bootcamp | University of Chicago (28)

(Video) The Cybersecurity Salary Myth

Part Three: Advanced Cybersecurity

This phase of the program builds skills and experience in advanced security concepts, such as digital forensics, ethical hacking, game theory, and incident response. This phase provides you with a complete view of cybersecurity and prepares you for a cybersecurity career.

Cybersecurity Bootcamp | University of Chicago (29)

Offensive Security: Ethical Hacking (50 Hours)

Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different positions. This course gives you a broad foundation to pursue a career trajectory with ethical hacking as your primary role.

Cybersecurity Bootcamp | University of Chicago (30)

DFIR and Threat Hunting (60 Hours)

When a cyberattack happens, first responders are key. The Digital Forensics and Incident Response (DFIR) course ensures you have all the tools you need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.

Cybersecurity Bootcamp | University of Chicago (31)

Game Theory Strategy in Cybersecurity (10 Hours)

Game theory can provide invaluable insight into cyber attacks. Our Game Theory Strategy in Cybersecurity course delves into its philosophical and mathematical foundations as well as its practical uses in modeling and understanding attacks. The course also addresses the soft skills in cybersecurity and focuses on developing creative, thinking skills to help you become a skilled, solution-driven cybersecurity professional.

Cybersecurity Bootcamp | University of Chicago (32)

Career Outcomes Workshop (15 Hours)

This specialized workshop is dedicated to preparing you for every aspect of technical interviews. TDX Arena hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help you land a position in the cybersecurity field.

*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation program, where the primary focus is the students’ performance on the exam. Certification exams are not conducted as part of the program and require additional costs not included in tuition.

Prepare for internationally
recognized
certification exams

This bootcamp is not a certification-prep program. However, our program can help you gain skills and knowledge applicable to industry certifications. To assist you with expanding your credentials beyond our program, you will have access to a curated library of resources that can further help you prepare for cybersecurity certification exams. To become a standout candidate, we recommend that you obtain one certification in every phase of the program.

  • LPI Linux EssentialsCertification

    The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.

  • AWS Certified CloudPractitioner Certification

    The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.

  • CompTIA Network+Certification

    The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.

  • CompTIA Security+Certification

    The CompTIA Security+, the next step up from the CompTIA Network+, is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests your skills in penetration testing and system, network and security administration.

  • (ISC)² SSCP — Systems Security Certified Practitioner** Certification

    For those who achieved 1 year of experience—Post-Program Completion.

    The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

LPI Linux Essentials
Certification

The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.

AWS Certified Cloud
Practitioner Certification

The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.

CompTIA Network+
Certification

The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.

CompTIA Security+
Certification

The CompTIA Security+, the next step up from the CompTIA Network+, is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests your skills in penetration testing and system, network and security administration.

(ISC)² SSCP — Systems Security Certified Practitioner** Certification

For those who achieved 1 year of experience—Post-Program Completion.

The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

** Students must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Cybersecurity
program cost

Careers in tech are expanding rapidly and the field needs experienced professionals to fill critical roles. Invest in your future—and ours—by learning to defend against cyberattacks and protect critical infrastructure, assets, and communities.

30-Hour Introductory Course

$180

370-Hour Extended Program

$17,800

Requirements

Internet access

Introductory course

Admission assessment

Tuition, fees, and deposits are subject to change.

Cybersecurity Bootcamp | University of Chicago (33)

(Video) WGU Cybersecurity & Information Assurance Degree just changed. 👀
Cybersecurity Bootcamp | University of Chicago (34)

To learn more about the University of Chicago Cybersecurity Bootcamp, contact our advisors at 773.389.4960 or fill out the form below.

Cybersecurity Bootcamp | University of Chicago (35)

Cybersecurity Bootcamp | University of Chicago (36)

The University of Chicago
Professional Education
455 N Cityfront Plaza Dr.
Suite 950
Chicago, IL 60611

Cybersecurity Bootcamp | University of Chicago (37) 773.389.4960

Programs

Cybersecurity BootcampSoftware Development Bootcamp

Pages

HomeFAQThe ClassroomContact UsCareer SupportAbout Us

Cybersecurity Bootcamp | University of Chicago (38) Cybersecurity Bootcamp | University of Chicago (39) Cybersecurity Bootcamp | University of Chicago (40) Cybersecurity Bootcamp | University of Chicago (41)

Powered by

Cybersecurity Bootcamp | University of Chicago (42)

(Video) Is a Cyber Security Degree Worth it? (My Tips)

Privacy Policy

Videos

1. One Year After Coding Bootcamp | Did I Get A Job?
(KemiNaturally)
2. cybersecurity is hard.
(Grant Collins)
3. Cyber Security Salaries- Expectations (2021)
(Ryan Crandall)
4. Is Coding Bootcamp Worth It in 2022?
(Peter Elbaum)
5. NEW Remote Cybersecurity Bootcamp!
(Evolve Security)
6. 10 REASONS WHY I LIKE THE CYBERSECURITY FIELD
(The Digital Empress)
Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated: 2023/05/17

Views: 5849

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.