Bootcamp

Cybersecurity

Big data requires big security, but cyber crimes still cost the global economy more than $6 trillion every year. Learn how to secure both systems and data in the Cybersecurity Bootcamp program, delivered by Thinkful, a Chegg® service, in collaboration with Nexford University.

  • 100% online & entry-level
  • Pay as little as $320/mo
  • Next start date: March 1
background

Become a cybersecurity professional in 30 weeks.

The Cybersecurity Bootcamp program is delivered by THINKFUL, a Chegg® service, in collaboration with Nexford University. Delivered over the course of 30 weeks, and through a combination of guided learning, labs, and exercises, you’ll gain the skills needed to protect computer systems and safeguard critical information from theft, damage, and disruption.

Note: The Cybersecurity Bootcamp program begins March 1. Admissions requirements are defined by Thinkful and may differ from those required by Nexford University. The Cybersecurity Bootcamp is non-credit bearing. However, the American Council on Education (ACE) recommends up to 9 semester hours in the lower-division baccalaureate/associate degree category where the following course subjects are taught:

  • Fundamentals of Cybersecurity (3 Credits)
  • Introduction to Networking and Analysis (3 Credits)
  • Security Governance and Compliance (3 Credits)

See ACE for more information.

Let’s start with the facts:

$6T

Cybercrime was a $6 trillion challenge in 2021 (up from just $3 trillion in 2015), according to Cybersecurity Ventures. (Cybersecurity Ventures)

3.5M

From 2013 to 2021, the number of unfilled cybersecurity jobs rose 350%, to 3.5 million, according to Cybersecurity Ventures. (Cybersecurity Ventures)

57%

According to ISACA, a majority of businesses (57%) with open cybersecurity roles are unable to fill them. (WEF)

Program Objectives

Understand IT Systems

Learn the basics of networking by understanding IT system components and connecting to a network.

Secure Applications

Learn security fundamentals, endpoint security, and access management.

Manage Risk

Manage risk using vulnerability and penetration testing.

Conduct Assessment

Learn how to evaluate compromised systems and respond to security incidents.

Required Courses

Networking Fundamentals

The initial course in this program focuses on foundational computer and operating system concepts and networking basics. This course begins with an overview of computing devices such as inputs, storage, and operating systems including Windows and Mac. It further delves into IT systems components like desktop virtualization and cloud computing. Learners then understand how to connect to a network with the appropriate settings configuration and master fundamental concepts in working with network addressing and services. Finally, learners explore the basics of network security as a building block for the next course.

Application Security

This next course explores security fundamentals and endpoint security as it relates to application security. Learners will be able to identify, apply, and describe fundamental principles of cybersecurity. This includes threat landscape principles, classification of cyber-attacks, and malware definition. This content will be built upon to explore the role cryptography plays in cybersecurity and apply best practices for endpoint security. Emerging from this course, learners will understand how to use secure identity and access management best practices as part of overall application security.

Risk Management

This course provides a view into risk management best practices and applies these to vulnerability and penetration testing. Learners begin with an overview of third-party risk assessment and data protection best practices. These concepts are then applied to vulnerability management through scanning a virtual environment, and subsequently to vulnerability scoring methodologies. Finally, learners apply penetration testing tools within Kali Linux to scan a network and analyze output from various log files in a hands-on application of the tools learned in this course.

Defense and Incident Response

This course begins with an introduction to security assessments and planning methodologies. It then overviews indicators of compromise and the incident response process. Learners write an incident report and communicate key findings to stakeholders. These techniques are then applied to both attacking and defending a network. Finally, learners demonstrate their ability to respond to advanced incident scenarios as it relates to incident lifecycle management as a cybersecurity analyst. Emerging from this program, learners will graduate with critical cybersecurity skills, increased confidence, and a certificate to help them break into the cybersecurity field.

Rewarding Careers in Cybersecurity

Cybersecurity is more than a job – it’s an entire career field for millions of people around the world. As a graduate of the Cybersecurity Bootcamp program, relevant jobs might include:

Cybersecurity Specialist

Implement security audits across both hardware and software. Monitor for abnormalities and maintain proper security.

Incident Responder

Prevent, contain, stop, and recover from security incidents.

Threat Hunter

Identify threats to an organization and its systems that technology might overlook or miss.

Penetration Tester / Ethical Hacker

Test security systems within your organization to identify vulnerabilities before the bad guys do.

IT Auditor

Conduct risk assessments for your organization and ensure compliance with both internal standards and external legal requirements.

The courses are designed to help learners pass the corresponding industry exams, namely, Networking+, Security+, and CySA.

Who is the Cybersecurity Bootcamp Program For?

Learners who successfully complete the Cybersecurity Bootcamp program pair an intellectual curiosity with a desire to gain hands-on practical skills using the latest tools and technologies. You should be able to devote approximately 10 hours per week for 30 weeks (300 hours total) to complete the coursework, homework assignments, and skills assessments necessary for graduation.

Note: Admissions requirements are defined by Thinkful and are subject to the following qualifications.

Learners must be at least 18 years old at the time of application.

Learners must have proof of high school diploma or equivalent (GED), or a diploma from an institution of higher education accredited by an accrediting association recognized by the U.S. Department of Education. Thinkful will accept an attestation of the proper educational requirements.

Learners must be proficient in written and spoken English.

Learners must demonstrate the ability to manage their time, communicate effectively with others, and accept constructive criticism.

Learners must complete coursework on a computer. See below for technical specifications for the equipment needed.

Learners are expected to demonstrate operating proficiency on a computer.

Program Details

Thinkful's Cybersecurity Bootcamp program takes place over seven months / 30 weeks with an expected time commitment per week.

Learners complete Thinkful's Cybersecurity Bootcamp program part-time, earning valuable skills to boost their career paths by investing as little as 10 hours per week.

Yes, Thinkful's Cybersecurity Bootcamp program is 100% online. Access course content and learn from anywhere as long as you have an appropriate web-enabled device.

Engage with course content at the time and place that best suits you and your schedule with fully independent study. What matters is the skills you learn — not your presence in a classroom.

When you complete Thinkful's Cybersecurity Bootcamp program as well as valuable industry skills and insights, you will receive a certificate of completion. This is a non-credit-bearing qualification; however, the American Council on Education (ACE) recommends up to 9 semester hours in the lower-division baccalaureate/associate degree category.


See ACE for more details.

Ready to get started?