Online Cybersecurity Bootcamp
Big data requires big security, but cyber crimes still cost the global economy more than $6 trillion every year. Learn how to secure both systems and data in the Cybersecurity Bootcamp program, delivered by Thinkful, a Chegg® service, in collaboration with Nexford University.
100% online & entry-level
Price: As little as $250/month for Nexford learners
Next start date: July 1
Become a cybersecurity professional in 30 weeks with Nexford & THINKFUL
The Cybersecurity Bootcamp program is delivered by THINKFUL, a Chegg® service, in collaboration with Nexford University. Delivered over the course of 30 weeks, and through a combination of guided learning, labs, and exercises, you’ll gain the skills needed to protect computer systems and safeguard critical information from theft, damage, and disruption. This program is not for credit.
Let's start with the facts about the Cybersecurity Industry
Cybercrime was a $6 trillion challenge in 2021 (up from just $3 trillion in 2015), according to Cybersecurity Ventures. (Cybersecurity Ventures)
From 2013 to 2021, the number of unfilled cybersecurity jobs rose 350%, to 3.5 million, according to Cybersecurity Ventures. (Cybersecurity Ventures)
According to ISACA, a majority of businesses (57%) with open cybersecurity roles are unable to fill them. (WEF)
Fadl Al Tarzi Speaks on How Nexford University Bridges the Gap in Global Cybersecurity Sector
“In a few years, there will be about 1.5 million job vacancies in cybersecurity. The digital transformation accelerated by Covid has resulted in a huge level of exposure for organisations.”
Online Cybersecurity Training Objectives
Understand IT Systems
Learn the basics of networking by understanding IT system components and connecting to a network.
Learn security fundamentals, endpoint security, and access management.
Manage risk using vulnerability and penetration testing.
Learn how to evaluate compromised systems and respond to security incidents.
Cybersecurity Bootcamp Course Curriculum
The initial course in this program focuses on foundational computer and operating system concepts and networking basics. This course begins with an overview of computing devices such as inputs, storage, and operating systems including Windows and Mac. It further delves into IT systems components like desktop virtualization and cloud computing. Learners then understand how to connect to a network with the appropriate settings configuration and master fundamental concepts in working with network addressing and services. Finally, learners explore the basics of network security as a building block for the next course.
This next course explores security fundamentals and endpoint security as it relates to application security. Learners will be able to identify, apply, and describe fundamental principles of cybersecurity. This includes threat landscape principles, classification of cyber-attacks, and malware definition. This content will be built upon to explore the role cryptography plays in cybersecurity and apply best practices for endpoint security. Emerging from this course, learners will understand how to use secure identity and access management best practices as part of overall application security.
This course provides a view into risk management best practices and applies these to vulnerability and penetration testing. Learners begin with an overview of third-party risk assessment and data protection best practices. These concepts are then applied to vulnerability management through scanning a virtual environment, and subsequently to vulnerability scoring methodologies. Finally, learners apply penetration testing tools within Kali Linux to scan a network and analyze output from various log files in a hands-on application of the tools learned in this course.
Defense and Incident Response
This course begins with an introduction to security assessments and planning methodologies. It then overviews indicators of compromise and the incident response process. Learners write an incident report and communicate key findings to stakeholders. These techniques are then applied to both attacking and defending a network. Finally, learners demonstrate their ability to respond to advanced incident scenarios as it relates to incident lifecycle management as a cybersecurity analyst. Emerging from this program, learners will graduate with critical cybersecurity skills, increased confidence, and a certificate to help them break into the cybersecurity field.
Rewarding Careers in Cybersecurity
Cybersecurity is more than a job – it’s an entire career field for millions of people around the world. As a graduate of the Cybersecurity Bootcamp program, relevant jobs might include:
Implement security audits across both hardware and software. Monitor for abnormalities and maintain proper security.
Prevent, contain, stop, and recover from security incidents.
Identify threats to an organization and its systems that technology might overlook or miss.
Penetration Tester / Ethical Hacker
Test security systems within your organization to identify vulnerabilities before the bad guys do.
Conduct risk assessments for your organization and ensure compliance with both internal standards and external legal requirements.
Cybersecurity credit transfer
When you complete Thinkful's Cybersecurity Bootcamp program, you'll receive a certificate of completion that proves you have what it takes to tackle the toughest security challenges and the knowledge and insights you need to succeed in the fast-paced world of cybersecurity. But that's not all...
Even though the certificate is non-credit-bearing, it's still a valuable asset to add to your resume. In fact, the American Council on Education (ACE) has advised that this certificate can be transferred to 9 credits in a related lower-division baccalaureate/associate degree category.