Cybersecurity Bootcamp

Curriculum // Class Format // FAQ

Apply Now, or sign up to view the Course Catalog.

career karma best coding bootcamp 2022 inc 5000 - america's fastest-growing private companies course report best online bootcamp 2022

Program Overview

Learn Cybersecurity,
future-proof your career.

We're always iterating in response to the evolving market trends in technology. You'll learn the hottest tools of today, but more importantly you'll gain a lasting foundation for the tools of tomorrow.

Our instructors are experienced Cybersecurity professionals delivering curriculum developed by and for Cybersecurity professionals. You'll be taught by industry professionals, supported by ownership and staff who sincerely care about your success.

Classes are live-streamed online each day, marrying the flexibility of online learning with the interactivity of classroom instruction. Need a place to study? Co-working space is available for students at any U.S. WeWork location.

From exposure to our ever-growing network of employers to resume and portfolio reviews, our dedicated Student Success Team is here to help you throughout class and into the job search.

What is Cybersecurity

Businesses and Government are at greater risk of cyber attacks than ever before. From ransomware to cyber espionage, cybersecurity professionals are the first line of defense. It will be your job to protect critical infrastructure, the technologies we use every day, and investigate or mitigate the damage when compromises do occur.

Is Cybersecurity right for you

This program is for people who want to make a difference in a field that is critical to the continued success of our digital way of life. Class is suitable for motivated learners who are serious about launching a career in the broad field of cybersecurity. No prior computer science or security experience required.

100% Financing Approval
Available With Climb*

Learn More About Tuition

Online Flexibility
Meets Live Expert Instruction

Submit Your Application Today

Transparent & Audited
Job Search Outcomes

View Audited Jobs Report

*Borrower must be a U.S. resident and at least 18 years of age. Rates will vary depending on financial standings and credit history.

Decrative image

Working in Cybersecurity

Cybersecurity is one of the fastest growing fields in the technology industry, and the demand for qualified professionals far outpaces the supply. "Red team," or offensive security professionals, test systems for existing vulnerabilities. "Blue team," or defensive security specialists, focus on securing systems from attack. Our curriculum covers both offensive and defensive tools, tactics, and strategies.

Speak With Admissions

Cybersecurity Careers

Many cyber security careers start out in Security or Network Operations Centers (SOCs), but there are many different industry roles and entry points. The average day for a "SOC Analyst" involves monitoring networks in real time, responding to alerts about potentially malicious traffic, performing initial triage, and ensuring the right specialists and stakeholders are aware of developing situations.

Security+ Certification

DigitalCrafts is a CompTIA training partner, and the only bootcamp that dedicates the final two weeks of the curriculum to hands-on preparation for the Security+ certification, an important industry accolade. Students will work on CompTIA Security+ materials, practice tests, labs, and receive test vouchers towards the exam, which should be scheduled by graduation.

High Level Curriculum

At DigitalCrafts, you will learn the most cutting edge tools and strategies for the job market today. More importantly, you'll learn how to stay cutting edge for the job market tomorrow.

Module 1

Hardware and Operating Systems

  • Positional Numbering Systems
  • Understanding Hardware
  • BIOS and the Boot Process
  • Volatile vs Non-volatile Storage
  • Windows Administration
  • SysInternals Suite: Procmon and ProcExp
  • Basic Powershell Skills
  • Linux Foundations
  • Linux Firewall Tools
  • SSH and Key-based Access
  • Understanding password storage

The Hardware and Operating Systems Module will take a hands-on approach to learning fundamental concepts that are key to understanding system security. We will first learn how hardware interfaces with software, and what binary is and how it works. Next, we will cover how the Windows operating system works, and some of its key security features and flaws. Finally, we will get familiar with the Linux operating system, the important ways that it differs from Windows, and how to secure it.

Module 2

Networking Foundations

  • OSI Model and TCP/IP Model
  • Hubs, switches, and routers
  • Perform Subnetting
  • Cisco IOS and Router Configs/ACLs
  • Firewall Use and Placement
  • Server/Client Relationships
  • Common Network Services and Ports
  • Internet Routing Protocols
  • Network Protections and Security Models
  • Virtual Private Networks
  • Wireshark Proficiency
  • TCP and UDP Header Analysis
  • Wireshark Filters and Data Carving

The Networking Foundations module will cover the theory and practical application of how computers communicate. We will cover the OSI model, routing and switching technology, as well as network security models, and important network services. The module will also take an in-depth look at subnetting. Finally, the module will cover how to capture and analyze network traffic with Wireshark.

Module 3

Programming Literacy

  • Software Development Lifecycle
  • Software Security Models
  • Common Languages and Uses
  • Interpreted vs Compiled Languages
  • Sequential Statements, Branching, Looping
  • HTML, CSS, JavaScript, Python basics

The Programming Literacy module will give students a general understanding of how software gets developed, and some of the common mistakes that get made along the way. It will cover the Software Development Lifecycle, software security best practices, and the different types of programming languages that students might encounter. Lastly, students will gain familiarity with basic web development technologies, including HTML, CSS, and Javascript.

Module 4

Offensive Security Operations

  • Kali Linux Platform
  • Penetration Testing Execution Standard (PTES)
  • Passive Enumeration using OSINT techniques
  • Active enumeration using nMap
  • Identify and Categorize Exploits
  • Identifying System Vulnerabilities
  • Common Misconfigurations
  • Proficiency with Metasploit Framework
  • Hashing Algorithms and PW 'Cracking'
  • Common Post-exfiltration Activities
  • OWASP Top Vulnerabilitie
  • SQL Injection Attacks
  • Social Engineering Techniques
  • Burp Suite, Nikto, ZAP Enumeration Tools

The Offensive Security module covers the "red team" offensive tactics and strategies employed by ethical hackers and penetration testers. Students will take a hands-on lab approach to computer exploitation methodology, learning how to think outside the box to gain access to remote systems. To successfully defend against attacks, it's important to be able to understand and think like an attacker, so students will learn the tools and techniques needed to search for and report on vulnerabilities in secure environments.

Module 5

Defensive Security Operations

  • Importance of 2FA and secure cryptograph
  • Understand firewalls, IDS's, SIEM's
  • Proficiency with Splunk
  • Analyze malicious traffic in Wireshark
  • The zero trust security model
  • 6 steps to incident response
  • Forensics with memory and disk capture tools
  • behavior analysis of malware samples
  • Harden systems using CIS benchmarks
  • Vulnerability scans using Nessus
  • Group Policy Management
  • Configuration Management and Patch Management
  • Defence in Depth Principle
  • NIST risk management and controls framework
  • Business Continuity and Disaster Recovery
  • Vendor Risk Management
  • Contractual, legal, and regulatory compliance

The Defensive Security, or "blue team" module will cover the defensive concepts and techniques that students will need to be successful in Cybersecurity careers. While entry level "red team" positions do exist, many junior Cybersecurity roles will require a more defensive focus. We will cover secure cryptography, access control models, the threat landscape, network monitoring with Splunk, incident response and forensics methodologies, vulnerability scanning with Nessus, risk and threat assessment, and regulatory compliance auditing.

Module 6

CompTIA Security+ Certification

  • Understand concepts and techniques covered by the exam
  • Understand test taking strategies and best practices
  • Demonstrate preparedness by completing practice tests
  • Exam voucher (plus retake) included at no extra cost

The CompTIA Security+ certification is the first and most important accolade rising Cybersecurity professionals should earn. Certifications tend to be more important in some industries than in others, and there's no doubt that most Cybersecurity employers like seeing them on incoming resumes. Other programs often claim to "align" their curriculum with industry certifications, but DigitalCrafts is unique in dedicating two weeks towards test preparation, leveraging official CompTIA study materials, labs, and practice tests available to CompTIA Training Partners. Each student will receive a test voucher (with one retake), and you can expect to graduate with the exam on your calendar.

Live Online Classes

Full-Time | Part-Time

Times are listed in Eastern Time Zone, but students join from all over. The below schedules are meant to demonstrate a typical day, but every class is different.

Full-Time // 16-Weeks

10:00am–1:00pm

Weekdays | Lectures & Assignments

Students often start the day with a combination of live lectures delivered through Zoom. They may work on exercises to reinforce the learning. Self-led assignments and activities are designed to help enforce cybersecurity topics through active participation and hands-on learning.

2:00pm–5:00pm

Weekdays | Projects & Labs

We believe in learning by doing and simulating a real-world work environment through project work. During labs, you can expect to use cybersecurity tools and processes professionals use to address cyber threats and problems that companies may face. Working alone or in groups, you'll work to build a foundation of cybersecurity skills and knowledge to take to potential employers.

Part-Time // 26-Weeks

6:30pm–9:30pm

Tuesday & Thursday Evenings

The part-time program follows the same curriculum as the full-time program, but day-to-day activities will vary. Evenings may primarily involve lectures in the first few weeks with interactive lab work and exercises and then progress into group projects.

10:00am–2:00pm

Saturdays

Saturdays in the cybersecurity program will pick up lectures and exercises from earlier in the week. Later weeks are typically reserved for project and lab time. Students must also complete assigned homework and projects outside of class hours to help retain learned security concepts.

Accelerated Learning and Continued Development

Workload

Maximum Effort Required

This program will challenge you, and after a full day of class our students are often charged with completing additional assignments designed to push their abilities as far as possible given such a condensed amount of time. This commitment of time and energy requires grit and determination, but you can do it if you believe in yourself and put in the work.

Elective Workshops

Exclusive Benefit for Students & Alumni

A career in software requires a lifetime commitment to learning new skills and technologies. You don't want to look up one day and find yourself a Blackberry developer in the age of the iPhone! We hold exclusive periodic elective workshops for students and alumni to help provide continuing education opportunities in myriad complementary topics. Every technology professional has heard the interview question, "Do you have experience with _?" This is our way of filling in the blank.

Additional Course Information

Base tuition for the full-time bootcamp is $14,950. Base tuition for the part-time bootcamp is $9,950. A refundable $99 deposit is required to enroll.

The remaining tuition may be paid in full before class starts, over 4 installments while in class, or financed over 3 to 15 years through one of our lending partners (though you're welcome to use your own if you'd prefer).

Discounts: If you enroll within 5 business days of receiving your letter of acceptance, we will take $250 off tuition. If you enroll before the early enrollment deadline listed on our schedule, you'll receive an additional $250 off tuition. Note: Scholarship recipients are not eligble for any additional savings.

More on tuition, financing, and scholarships.

No, though prior experience is welcome, it is not required to apply to DigitalCrafts. Incoming students are assigned the applicable 'Intro Course' to help ensure everyone has some exposure before class starts.

Probably not for the full-time format, which is truly an immersive Monday through Friday experience. If dedicating 40+ hours per week isn't in the cards, consider a part-time format, which is designed with working professionals in mind.

Windows (strongly suggested) or Mac laptop or desktop computer using Intel or AMD 64 bit processors. Mac M1 and Windows ARM systems will not be supported due to virtualization requirements. Students may use Linux x86 systems if desired but curriculum is written assuming a Windows, so that is our strongest suggestion.

Minimum:
Intel core i3 10th generation (or newer), 8+ GB RAM Memory, at least 150GB of free storage space.
Reliable broadband internet for streaming class.
Camera and microphone (laptop built-in should be fine).
Recommended:
Intel core i5 10th gen (or newer), 16+ GB RAM Memory, 512 GB SSD (with 80+ GB available).

Also recommend a 1 TB (min) external SSD for backups. Something like this is sufficient.

Important: Apple computers with M1 chips will not work for this class. M1 chips are not (yet) supported by several important tools required for completion. Chromebooks and iPads are also not sufficient.

The Cybesecurity Bootcamp is designed to train you in offensive and defensive cybersecurity tools, tactics and strategies to defend against cyber attacks. You’ll be able to pursue a role as a Cybersecurity professional. Duties will vary but may include:

  • Monotoring networks for malicious activity
  • Configuring firewalls
  • Designing secure network configurations
  • Conducting vulnerability assesments
  • and more

Cybersecurity Career Options - Are they right for you?

All students receive the same level of career support, which includes resume guidance, career lectures, and exposure to our ever-growing list of employer partners. In addition, our dedicated Student Services Team is available to provide detailed feedback on everything from cover letters to emails to employers. We can't nail the interview for you, but we'll do what we can to help along the way.