Big data requires big security, but cyber crimes still cost the global economy more than $6 trillion every year. Learn how to secure both systems and data in the Cybersecurity Bootcamp program, delivered by Thinkful, a Chegg® service, in collaboration with Nexford University.
- 100% online & entry-level
- Pay as little as $320/mo
- Next start date: March 1
Become a cybersecurity professional in 30 weeks.
The Cybersecurity Bootcamp program is delivered by THINKFUL, a Chegg® service, in collaboration with Nexford University. Delivered over the course of 30 weeks, and through a combination of guided learning, labs, and exercises, you’ll gain the skills needed to protect computer systems and safeguard critical information from theft, damage, and disruption.
Note: The Cybersecurity Bootcamp program begins March 1. Admissions requirements are defined by Thinkful and may differ from those required by Nexford University. The Cybersecurity Bootcamp is non-credit bearing. However, the American Council on Education (ACE) recommends up to 9 semester hours in the lower-division baccalaureate/associate degree category where the following course subjects are taught:
- Fundamentals of Cybersecurity (3 Credits)
- Introduction to Networking and Analysis (3 Credits)
- Security Governance and Compliance (3 Credits)
See ACE for more information.
Let’s start with the facts:
Understand IT Systems
Learn the basics of networking by understanding IT system components and connecting to a network.
Learn security fundamentals, endpoint security, and access management.
Manage risk using vulnerability and penetration testing.
Learn how to evaluate compromised systems and respond to security incidents.
The initial course in this program focuses on foundational computer and operating system concepts and networking basics. This course begins with an overview of computing devices such as inputs, storage, and operating systems including Windows and Mac. It further delves into IT systems components like desktop virtualization and cloud computing. Learners then understand how to connect to a network with the appropriate settings configuration and master fundamental concepts in working with network addressing and services. Finally, learners explore the basics of network security as a building block for the next course.
This next course explores security fundamentals and endpoint security as it relates to application security. Learners will be able to identify, apply, and describe fundamental principles of cybersecurity. This includes threat landscape principles, classification of cyber-attacks, and malware definition. This content will be built upon to explore the role cryptography plays in cybersecurity and apply best practices for endpoint security. Emerging from this course, learners will understand how to use secure identity and access management best practices as part of overall application security.
This course provides a view into risk management best practices and applies these to vulnerability and penetration testing. Learners begin with an overview of third-party risk assessment and data protection best practices. These concepts are then applied to vulnerability management through scanning a virtual environment, and subsequently to vulnerability scoring methodologies. Finally, learners apply penetration testing tools within Kali Linux to scan a network and analyze output from various log files in a hands-on application of the tools learned in this course.
Defense and Incident Response
This course begins with an introduction to security assessments and planning methodologies. It then overviews indicators of compromise and the incident response process. Learners write an incident report and communicate key findings to stakeholders. These techniques are then applied to both attacking and defending a network. Finally, learners demonstrate their ability to respond to advanced incident scenarios as it relates to incident lifecycle management as a cybersecurity analyst. Emerging from this program, learners will graduate with critical cybersecurity skills, increased confidence, and a certificate to help them break into the cybersecurity field.
Rewarding Careers in Cybersecurity
Cybersecurity is more than a job – it’s an entire career field for millions of people around the world. As a graduate of the Cybersecurity Bootcamp program, relevant jobs might include:
Implement security audits across both hardware and software. Monitor for abnormalities and maintain proper security.
Prevent, contain, stop, and recover from security incidents.
Identify threats to an organization and its systems that technology might overlook or miss.
Penetration Tester / Ethical Hacker
Test security systems within your organization to identify vulnerabilities before the bad guys do.
Conduct risk assessments for your organization and ensure compliance with both internal standards and external legal requirements.
The courses are designed to help learners pass the corresponding industry exams, namely, Networking+, Security+, and CySA.
Who is the Cybersecurity Bootcamp Program For?
Learners who successfully complete the Cybersecurity Bootcamp program pair an intellectual curiosity with a desire to gain hands-on practical skills using the latest tools and technologies. You should be able to devote approximately 10 hours per week for 30 weeks (300 hours total) to complete the coursework, homework assignments, and skills assessments necessary for graduation.
Note: Admissions requirements are defined by Thinkful and are subject to the following qualifications.