Cybersecurity Bootcamp

Curriculum // Class Format // FAQ

Apply Now, or sign up to view the Course Catalog.

career karma best coding bootcamp 2022 inc 5000 - america's fastest-growing private companies course report best online bootcamp 2022

Program Overview

Learn Cybersecurity,
future-proof your career.

We're always iterating in response to the evolving market trends in technology. You'll learn the hottest tools of today, but more importantly you'll gain a lasting foundation for the tools of tomorrow.

Our instructors are experienced Cybersecurity professionals delivering curriculum developed by and for Cybersecurity professionals. You'll be taught by industry professionals, supported by ownership and staff who sincerely care about your success.

Students can select between attending a live-streamed online class OR attending an in-person bootcamp at our Atlanta campus.

Attending online but need a place to study? Co-working space is available for students at any U.S. WeWork location.

From exposure to our ever-growing network of employers to resume and portfolio reviews, our dedicated Student Success Team is here to help you throughout class and into the job search.

What is Cybersecurity

Businesses and Government are at greater risk of cyber attacks than ever before. From ransomware to cyber espionage, cybersecurity professionals are the first line of defense. It will be your job to protect critical infrastructure, the technologies we use every day, and investigate or mitigate the damage when compromises do occur.

Is Cybersecurity right for you

This program is for people who want to make a difference in a field that is critical to the continued success of our digital way of life. Class is suitable for motivated learners who are serious about launching a career in the broad field of cybersecurity. No prior computer science or security experience required.

Payment Options, Financing, &
Scholarships Available

Learn More About Tuition

Live Expert Instruction
by Industry Professionals

Submit Your Application Today

Dedicated Career Services
and Job Search Support

Learn More About Student Success
Decrative image

Working in Cybersecurity

Cybersecurity is one of the fastest growing fields in the technology industry, and the demand for qualified professionals far outpaces the supply. "Red team," or offensive security professionals, test systems for existing vulnerabilities. "Blue team," or defensive security specialists, focus on securing systems from attack. Our curriculum covers both offensive and defensive tools, tactics, and strategies.

Speak With Admissions

Cybersecurity Careers

Many cyber security careers start out in Security or Network Operations Centers (SOCs), but there are many different industry roles and entry points. The average day for a "SOC Analyst" involves monitoring networks in real time, responding to alerts about potentially malicious traffic, performing initial triage, and ensuring the right specialists and stakeholders are aware of developing situations.

Security+ Certification

DigitalCrafts is a CompTIA training partner, and the only bootcamp that dedicates the final two weeks of the curriculum to hands-on preparation for the Security+ certification, an important industry accolade. Students will work on CompTIA Security+ materials, practice tests, labs, and receive test vouchers towards the exam, which should be scheduled by graduation.

High Level Curriculum

At DigitalCrafts, you will learn the most cutting edge tools and strategies for the job market today. More importantly, you'll learn how to stay cutting edge for the job market tomorrow.

Module 1

Hardware and Operating Systems

  • Positional Numbering Systems
  • Understanding Hardware
  • BIOS and the Boot Process
  • Volatile vs Non-volatile Storage
  • Windows Administration
  • SysInternals Suite: Procmon and ProcExp
  • Basic Powershell Skills
  • Linux Foundations
  • Linux Firewall Tools
  • SSH and Key-based Access
  • Understanding password storage

The Hardware and Operating Systems Module will take a hands-on approach to learning fundamental concepts that are key to understanding system security. We will first learn how hardware interfaces with software, and what binary is and how it works. Next, we will cover how the Windows operating system works, and some of its key security features and flaws. Finally, we will get familiar with the Linux operating system, the important ways that it differs from Windows, and how to secure it.

Module 2

Networking Foundations

  • OSI Model and TCP/IP Model
  • Hubs, switches, and routers
  • Perform Subnetting
  • Cisco IOS and Router Configs/ACLs
  • Firewall Use and Placement
  • Server/Client Relationships
  • Common Network Services and Ports
  • Internet Routing Protocols
  • Network Protections and Security Models
  • Virtual Private Networks
  • Wireshark Proficiency
  • TCP and UDP Header Analysis
  • Wireshark Filters and Data Carving

The Networking Foundations module will cover the theory and practical application of how computers communicate. We will cover the OSI model, routing and switching technology, as well as network security models, and important network services. The module will also take an in-depth look at subnetting. Finally, the module will cover how to capture and analyze network traffic with Wireshark.

Module 3

Programming Literacy

  • Software Development Lifecycle
  • Software Security Models
  • Common Languages and Uses
  • Interpreted vs Compiled Languages
  • Sequential Statements, Branching, Looping
  • HTML, CSS, JavaScript, Python basics

The Programming Literacy module will give students a general understanding of how software gets developed, and some of the common mistakes that get made along the way. It will cover the Software Development Lifecycle, software security best practices, and the different types of programming languages that students might encounter. Lastly, students will gain familiarity with basic web development technologies, including HTML, CSS, and Javascript.

Module 4

Offensive Security Operations

  • Kali Linux Platform
  • Penetration Testing Execution Standard (PTES)
  • Passive Enumeration using OSINT techniques
  • Active enumeration using nMap
  • Identify and Categorize Exploits
  • Identifying System Vulnerabilities
  • Common Misconfigurations
  • Proficiency with Metasploit Framework
  • Hashing Algorithms and PW 'Cracking'
  • Common Post-exfiltration Activities
  • OWASP Top Vulnerabilitie
  • SQL Injection Attacks
  • Social Engineering Techniques
  • Burp Suite, Nikto, ZAP Enumeration Tools

The Offensive Security module covers the "red team" offensive tactics and strategies employed by ethical hackers and penetration testers. Students will take a hands-on lab approach to computer exploitation methodology, learning how to think outside the box to gain access to remote systems. To successfully defend against attacks, it's important to be able to understand and think like an attacker, so students will learn the tools and techniques needed to search for and report on vulnerabilities in secure environments.

Module 5

Defensive Security Operations

  • Importance of 2FA and secure cryptograph
  • Understand firewalls, IDS's, SIEM's
  • Proficiency with Splunk
  • Analyze malicious traffic in Wireshark
  • The zero trust security model
  • 6 steps to incident response
  • Forensics with memory and disk capture tools
  • behavior analysis of malware samples
  • Harden systems using CIS benchmarks
  • Vulnerability scans using Nessus
  • Group Policy Management
  • Configuration Management and Patch Management
  • Defence in Depth Principle
  • NIST risk management and controls framework
  • Business Continuity and Disaster Recovery
  • Vendor Risk Management
  • Contractual, legal, and regulatory compliance

The Defensive Security, or "blue team" module will cover the defensive concepts and techniques that students will need to be successful in Cybersecurity careers. While entry level "red team" positions do exist, many junior Cybersecurity roles will require a more defensive focus. We will cover secure cryptography, access control models, the threat landscape, network monitoring with Splunk, incident response and forensics methodologies, vulnerability scanning with Nessus, risk and threat assessment, and regulatory compliance auditing.

Module 6

CompTIA Security+ Certification

  • Understand concepts and techniques covered by the exam
  • Understand test taking strategies and best practices
  • Demonstrate preparedness by completing practice tests
  • Exam voucher (plus retake) included at no extra cost

The CompTIA Security+ certification is the first and most important accolade rising Cybersecurity professionals should earn. Certifications tend to be more important in some industries than in others, and there's no doubt that most Cybersecurity employers like seeing them on incoming resumes. Other programs often claim to "align" their curriculum with industry certifications, but DigitalCrafts is unique in dedicating two weeks towards test preparation, leveraging official CompTIA study materials, labs, and practice tests available to CompTIA Training Partners. Each student will receive a test voucher (with one retake), and you can expect to graduate with the exam on your calendar.

Live Online or In-Person Classes

Full-Time | Part-Time

The below schedule is meant to demonstrate a typical day, but every class is different.

Full-Time // 17-Weeks

10:00am–1:00pm ET

Weekdays | Lectures & Assignments

Students often start the day with live lectures followed by exercises to reinforce the learning. Self-led assignments and activities are designed to help enforce cybersecurity topics through active participation and hands-on learning.

1:45pm–6:00pm ET

Weekdays | Projects & Labs

We believe in learning by doing and simulating a real-world work environment through project work. During labs, you can expect to use cybersecurity tools and processes professionals use to address cyber threats and problems that companies may face. Working alone or in groups, you'll work to build a foundation of cybersecurity skills and knowledge to take to potential employers.

Part-Time // 26-Weeks

6:30pm–9:30pm ET

Tuesday & Thursday Evenings

The part-time program follows the same curriculum as the full-time program, but day-to-day activities will vary. Evenings may primarily involve lectures in the first few weeks with interactive lab work and exercises and then progress into group projects.

10:00am–2:00pm ET


Saturdays in the cybersecurity program will pick up lectures and exercises from earlier in the week. Later weeks are typically reserved for project and lab time. Students must also complete assigned homework and projects outside of class hours to help retain learned security concepts.

Accelerated Learning and Continued Development


Maximum Effort Required

This program will challenge you, and after a full day of class our students are often charged with completing additional assignments designed to push their abilities as far as possible given such a condensed amount of time. This commitment of time and energy requires grit and determination, but you can do it if you believe in yourself and put in the work.

Elective Workshops

Exclusive Benefit for Students & Alumni

A career in software requires a lifetime commitment to learning new skills and technologies. You don't want to look up one day and find yourself a Blackberry developer in the age of the iPhone! We hold exclusive periodic elective workshops for students and alumni to help provide continuing education opportunities in myriad complementary topics. Every technology professional has heard the interview question, "Do you have experience with _?" This is our way of filling in the blank.

Cybersecurity Bootcamp FAQs

Base tuition for all bootcamps is $9,500. A refundable $99 deposit is required to enroll.

The remaining tuition may be paid in full before class starts, with an installment plan while in class, or financed over 3 to 10 years through one of our lending partners (though you're welcome to use your own if you'd prefer).

Scholarships and other offers are available for those who qualify to help reduce costs.

No, though prior experience is welcome, it is not required to apply to DigitalCrafts. Incoming students are assigned the applicable 'Intro Course' to help ensure everyone has some exposure before class starts.

In the DigitalCrafts cybersecurity bootcamp, you will study offensive and defensive cybersecurity measures that companies and the government use to protect their servers and vital information. These measures include testing systems for vulnerabilities and securing systems from attack. You will participate in hands-on work designed to provide skills to help you prepare to pursue a career path in cybersecurity.

Your last two weeks of bootcamp will be dedicated to helping you prepare to take the CompTIA Security+ certification exam. You should schedule to take this exam with CompTIA by graduation.

The National Institute of Standards and Technology (NIST) Framework is a voluntary program and is a part of the U.S. Department of Commerce. The NIST is designed to help businesses of all sizes protect their networks and reduce their cybersecurity risks.

DigitalCrafts offers instruction and practical application in this important aspect of cybersecurity in the business world.

Online cybersecurity bootcamps start every month. Our full-time bootcamps are 17 weeks with classes held every weekday from 10:00 am- 6:00 pm ET with a 45-minute lunch break. Our part-time bootcamps are 26 weeks with classes held Mon-Thurs from 6:30 pm-9:30 pm ET and Saturdays from 10:00 am-2:00 pm ET.

Probably not for the full-time format, which is truly an immersive Monday through Friday experience. If dedicating 40+ hours per week isn't in the cards, consider a part-time format, which is designed with working professionals in mind.

Windows (strongly suggested) or Mac laptop or desktop computer using Intel or AMD 64 bit processors. Mac M1 and Windows ARM systems will not be supported due to virtualization requirements. Students may use Linux x86 systems if desired but curriculum is written assuming a Windows, so that is our strongest suggestion.

Intel core i3 10th generation (or newer), 8+ GB RAM Memory, at least 150GB of free storage space.
Reliable broadband internet for streaming class.
Camera and microphone (laptop built-in should be fine).
Intel core i5 10th gen (or newer), 16+ GB RAM Memory, 512 GB SSD (with 80+ GB available).

Also recommend a 1 TB (min) external SSD for backups. Something like this is sufficient.

Important: Apple computers with M1 chips will not work for this class. M1 chips are not (yet) supported by several important tools required for completion. Chromebooks and iPads are also not sufficient.

Cybersecurity is one of the fastest-growing fields in the technology industry and there is a high demand expected for cybersecurity professionals. In fact, employment of Information Security Analysts is projected to grow 35% from 2021 to 2031.* According to the U.S. Bureau of Labor Statistics, the median annual wage for Information Security Analysts was $102,600 in May 2021 in the U.S.*

* U.S. Bureau of Labor Statistics, Occupational Outlook Handbook for Information Security Analysts at, visited March 10, 2023. This data represents national figures and is not based on school-specific information. Conditions in your area may vary.

The Cybesecurity Bootcamp is designed to train you in offensive and defensive cybersecurity tools, tactics and strategies to defend against cyber attacks. You’ll be able to pursue a role as a Cybersecurity professional. Duties will vary but may include:

  • Monotoring networks for malicious activity
  • Configuring firewalls
  • Designing secure network configurations
  • Conducting vulnerability assesments
  • and more

Cybersecurity Career Options - Are they right for you?

All students receive the same level of career support, which includes resume guidance, career lectures, and exposure to our ever-growing list of employer partners. In addition, our dedicated Student Services Team is available to provide detailed feedback on everything from cover letters to emails to employers. We can't nail the interview for you, but we'll do what we can to help along the way.

DigitalCrafts offers students several options to pay their bootcamp tuition. For more information on those options, visit our tuition and financing page.

If you aren’t certain or not ready to take the step to a full course curriculum, DigitalCrafts offers free introductory courses designed to give you a jump start on your bootcamp education. These courses allow you to explore our different course offerings and choose the educational path right for you.