- Home /
- Cybersecurity Bootcamp
Become an exceptional
candidate and optimize
your career growth
From fundamentals to advanced development,
build a valuable skillset
Industry experts provide cybersecurity training and mentorship through a safe, cloud-based platform where you can hone cutting-edge skills. Upon completing your online cybersecurity training, you will be equipped with the knowledge and technical skills to defend organizations and the public from real threats, design secure system solutions, and identify weaknesses.
Employment of
cybersecurity
professionals is
expected to grow
33% from 2020
to 2030.
- U.S. Bureau of
Labor Statistics
Train with top
industry tools
Get expert-level skills in the leading cybersecurity software. Our program gives you access to the cutting-edge tools that cybersecurity professionals are using right now.
Learn to defend
against cyberattacks
Thrive in the expanding world
of cybersecurity
Hands-on
learning
Our innovative approach to instruction provides you with critical, hands-on training in a live, online environment. The curriculum is designed for professionals of all backgrounds in every stage of their careers.
Cyber labs
Our Cyber Labs, curated by cybersecurity experts, help you gain valuable experience through real-world simulations. Our in-depth training teaches you how to identify the different vulnerabilities on desktop, mobile, server, and web platforms, and the techniques needed to protect against threats.
Virtual classroom
Interact with your instructors and peers in a real-time environment using cloud-based chat software. Enjoy a weekend and evening class schedule built to fit into your busy life while attending online cybersecurity classes from the comfort of your own home.
Industry-leading instructors
Our instructors give you the inside track on a complex field. As you sharpen your practical and theoretical skills with their expert guidance, you benefit from their current industry knowledge and expert perspectives.
Receive personalized support
every step of the way
Comprehensive career services designed to support your
unique goals
Networking advantages
As the demand for cybersecurity professionals increases, local and global employers are looking to connect with qualified candidates. Upon program completion, you will receive access to virtual networking events where you can explore cybersecurity career opportunities.
Professional coaching
Our program features a team of passionate career coaches who are eager to help you achieve your professional goals. Get access to a wide array of professional development opportunities including interview prep, LinkedIn profile optimization, and resume writing.
Dedicated support
Once you invest in our online cybersecurity bootcamp, you get the full-fledged support of a team dedicated to your success. From day one, your student success manager ensures you have the tools you need to excel within the program—and beyond.
Career search assistance
Our Career Outcomes team is here to support your journey, whether you are preparing to apply for your first cybersecurity role or looking to advance an existing career. From exclusive networking opportunities to practice interviews, the personalized services our team offers helps you become a more marketable candidate.
Check out our
course catalog
Find out what
you will learn
Program overview
30-Hour Introductory Course |
370-Hour Extended Program
- Introductory Course
The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the extended program and pursue a career in cybersecurity.
This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.
- Part One: Fundamentals
This phase of the program helps you understand the basics of cybersecurity. In Fundamentals, you gain a basic understanding of basic network and cloud security, Linux, and Microsoft Windows. This phase of the program acts as training to prepare you for the more rigorous Infrastructure Phase.
- Microsoft Security
Globally, a multitude of companies trust Windows Server exclusively to manage their computers and networks. The Microsoft cybersecurity course gives you a hands-on education with widely used versions of the Microsoft Windows and Server operating systems. You will discover how to administrate, secure, and become a skillful practitioner of the Microsoft ecosystem of products.
- Computer Networking
Computer networks are used across industries from finance, healthcare, and technology to hospitality, manufacturing, and travel. In the Computer Networking course, you cover the basics of computer networks, including devices, network designs, protocols, and topologies. This forms a foundation for you to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.
- Cloud Security
More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, and Microsoft Azure. The Cloud Security online course prepares you to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, it provides a baseline level of cloud security knowledge that will give you the ability to prepare for the AWS Cloud Practitioner certification exam.*
- Linux Security
In the Linux cybersecurity course, you gain knowledge and practical skills in one of the most-used operating systems in the world. We cover all the basics of using and manipulating the Linux operating system and various different Linux distributions. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Upon completion of this course, you can start preparing for the LPI Linux Essentials certification exam.*
- Part Two: Cybersecurity Infrastructure
The Infrastructure phase of the program focuses on security concepts and practices. In the Infrastructure phase, you will study Critical Infrastructure Security (CIS), Python, and network security.
- Network Security
Almost everything happens on a network, either locally or on the internet. You will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you an appealing skillset to take to the job market.
- Cyber Infrastructure and Technology
Fire and rescue, medical facilities, and power plants are all considered critical infrastructure. The Cyber Infrastructure and Technology course gives direct training in environmental security and safeguarding the supply chain and the Industrial Internet of Things (IIoT) skills you can take to the business world. This class prepares you to start training for the CompTIA Security+ exam.*
- Intro to Python for Security
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro Python for Security course gives you the tools needed to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
- Part Three: Advanced Cybersecurity
This phase of the program builds skills and experience in advanced security concepts, such as digital forensics, ethical hacking, game theory, and incident response. This phase provides you with a complete view of cybersecurity and prepares you for a cybersecurity career.
(Video) cybersecurity degrees - are they worthless? - Offensive Security: Ethical Hacking
Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different positions. This course gives you a broad foundation to pursue a career trajectory with ethical hacking as your primary role.
- DFIR and Threat Hunting
When a cyberattack happens, first responders are key. The Digital Forensics and Incident Response (DFIR) course ensures you have all the tools you need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.
- Game Theory Strategy in Cybersecurity
Game theory can provide invaluable insight into cyber attacks. Our Game Theory Strategy in Cybersecurity course delves into its philosophical and mathematical foundations as well as its practical uses in modeling and understanding attacks. The course also addresses the soft skills in cybersecurity and focuses on developing creative, thinking skills to help you become a skilled, solution-driven cybersecurity professional.
- Career Outcomes Workshop
This specialized workshop is dedicated to preparing you for every aspect of technical interviews. TDX Arena hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help you land a position in the cybersecurity field.
Introductory Course (30 Hours)
The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the extended program and pursue a career in cybersecurity. This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.
Part One: Fundamentals
This phase of the program helps you understand the basics of cybersecurity. In Fundamentals, you gain a basic understanding of basic network and cloud security, Linux, and Microsoft Windows. This phase of the program acts as training to prepare you for the more rigorous Infrastructure Phase.
Microsoft Security (40 Hours)
Globally, a multitude of companies trust Windows Server exclusively to manage their computers and networks. The Microsoft cybersecurity course gives you a hands-on education with widely used versions of the Microsoft Windows and Server operating systems. You will discover how to administrate, secure, and become a skillful practitioner of the Microsoft ecosystem of products.
Computer Networking (50 Hours)
Computer networks are used across industries from finance, healthcare, and technology to hospitality, manufacturing, and travel. In the Computer Networking course, you cover the basics of computer networks, including devices, network designs, protocols, and topologies. This forms a foundation for you to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.
Cloud Security (15 Hours)
More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, and Microsoft Azure. The Cloud Security online course prepares you to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, it provides a baseline level of cloud security knowledge that will give you the ability to prepare for the AWS Cloud Practitioner certification exam.*
Linux Security (30 Hours)
In the Linux cybersecurity course, you gain knowledge and practical skills in one of the most-used operating systems in the world. We cover all the basics of using and manipulating the Linux operating system and various different Linux distributions. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Upon completion of this course, you can start preparing for the LPI Linux Essentials certification exam.*
Part Two: Cybersecurity Infrastructure
The Infrastructure phase of the program focuses on security concepts and practices. In the Infrastructure phase, you will study Critical Infrastructure Security (CIS), Python, and network security.
Network Security (35 Hours)
Almost everything happens on a network, either locally or on the internet. You will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you an appealing skillset to take to the job market.
Cyber Infrastructure and Technology (40 Hours)
Fire and rescue, medical facilities, and power plants are all considered critical infrastructure. The Cyber Infrastructure and Technology course gives direct training in environmental security and safeguarding the supply chain and the Industrial Internet of Things (IIoT) skills you can take to the business world. This class prepares you to start training for the CompTIA Security+ exam.*
Intro to Python for Security (25 Hours)
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro Python for Security course gives you the tools needed to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Part Three: Advanced Cybersecurity
This phase of the program builds skills and experience in advanced security concepts, such as digital forensics, ethical hacking, game theory, and incident response. This phase provides you with a complete view of cybersecurity and prepares you for a cybersecurity career.
Offensive Security: Ethical Hacking (50 Hours)
Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different positions. This course gives you a broad foundation to pursue a career trajectory with ethical hacking as your primary role.
DFIR and Threat Hunting (60 Hours)
When a cyberattack happens, first responders are key. The Digital Forensics and Incident Response (DFIR) course ensures you have all the tools you need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.
Game Theory Strategy in Cybersecurity (10 Hours)
Game theory can provide invaluable insight into cyber attacks. Our Game Theory Strategy in Cybersecurity course delves into its philosophical and mathematical foundations as well as its practical uses in modeling and understanding attacks. The course also addresses the soft skills in cybersecurity and focuses on developing creative, thinking skills to help you become a skilled, solution-driven cybersecurity professional.
Career Outcomes Workshop (15 Hours)
This specialized workshop is dedicated to preparing you for every aspect of technical interviews. TDX Arena hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help you land a position in the cybersecurity field.
*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation program, where the primary focus is the students’ performance on the exam. Certification exams are not conducted as part of the program and require additional costs not included in tuition.
Prepare for internationally
recognized
certification exams
This bootcamp is not a certification-prep program. However, our program can help you gain skills and knowledge applicable to industry certifications. To assist you with expanding your credentials beyond our program, you will have access to a curated library of resources that can further help you prepare for cybersecurity certification exams. To become a standout candidate, we recommend that you obtain one certification in every phase of the program.
- LPI Linux EssentialsCertification
The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.
- AWS Certified CloudPractitioner Certification
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.
- CompTIA Network+Certification
The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.
- CompTIA Security+Certification
The CompTIA Security+, the next step up from the CompTIA Network+, is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests your skills in penetration testing and system, network and security administration.
- (ISC)² SSCP — Systems Security Certified Practitioner** Certification
For those who achieved 1 year of experience—Post-Program Completion.
The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
LPI Linux Essentials
Certification
The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.
AWS Certified Cloud
Practitioner Certification
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.
CompTIA Network+
Certification
The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.
CompTIA Security+
Certification
The CompTIA Security+, the next step up from the CompTIA Network+, is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests your skills in penetration testing and system, network and security administration.
(ISC)² SSCP — Systems Security Certified Practitioner** Certification
For those who achieved 1 year of experience—Post-Program Completion. The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
** Students must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
Cybersecurity
program cost
Careers in tech are expanding rapidly and the field needs experienced professionals to fill critical roles. Invest in your future—and ours—by learning to defend against cyberattacks and protect critical infrastructure, assets, and communities.
30-Hour Introductory Course
$180
370-Hour Extended Program
$17,800
Requirements
Internet access
Introductory course
Admission assessment
Tuition, fees, and deposits are subject to change.
To learn more about the University of Chicago Cybersecurity Bootcamp, contact our advisors at 773.389.4960 or fill out the form below.