Background Image

Cybersecurity Bootcamp  Full-Time 

Curriculum // Class Format // FAQ

We Secure The Web. So Can You.

Apply Now, Or Subscribe To View Course Catalog.

Career Karma Best Bootcamp Award
Inc 5000 Top Education Company Award
Course Report Top Bootcamp Award

The teachers and career success staff are fantastic and do everything in their power to ensure that you have what you need to succeed out in the real world. I can't recommend this place enough!

Learn Cybersecurity,
future-proof your career.

  • Modern Curriculum

    We're always iterating in response to the evolving market trends in security, addressing new threats and the latest technology. You'll learn the tools and strategies in demand today, and gain a lasting foundation for the future.

  • Expert Instruction

    Our instructors are experienced Cybersecurity professionals delivering curriculum developed by and for Cybersecurity professionals. You'll be taught by industry experts, supported by ownership and staff who sincerely care about your success.

  • Flexible Online Format

    Classes are live-streamed online each day, marrying for the flexibility of online learning with the interactivity of classroom instruction. Our unique Hybrid format may also be available to students in select communities.

  • Career Services

    From exposure to our ever-growing network of employers to resume reviews and career lectures, our dedicated Student Success Team is here to help you throughout class and into the job search.

Accelerated Classes
Learn In Weeks, Not Years

View Upcoming Start Dates »

Online Flexibility Meets
Live Expert Instruction

300+ Reviews on Course Report »

Transparent & Audited
Job Search Outcomes

View Audited Jobs Report »
Background Image

Working in Cybersecurity

Cybersecurity is one of the fastest growing fields in the technology industry, and the demand for qualified professionals far outpaces the supply. "Red team," or offensive security professionals, test systems for existing vulnerabilities. "Blue team," or defensive security specialists, focus on securing systems from attack. Our curriculum covers both offensive and defensive tools, tactics, and strategies.

Cybersecurity Careers

Many cyber security careers start out in Security or Network Operations Centers (SOCs), but there are many different industry roles and entry points. The average day for a "SOC Analyst" involves monitoring networks in real time, responding to alerts about potentially malicious traffic, performing initial triage, and ensuring the right specialists and stakeholders are aware of developing situations.

Security+ Certification

DigitalCrafts is a CompTIA training partner, and the only bootcamp that dedicates the final two weeks of the curriculum to hands-on preparation for the Security+ certification, an important industry accolade. Students will work on CompTIA Security+ materials, practice tests, labs, and receive test vouchers towards the exam, which should be scheduled by graduation.

High Level Curriculum

At DigitalCrafts, you will learn the most cutting edge tools and strategies for the job market today. More importantly, you'll learn how to stay cutting edge for the job market tomorrow.

  • Hardware and Operating Systems
    (3 wks)

  • Networking Foundations
    (2 wks)

  • Programming

    (2 wks)

  • Offensive Security Operations
    (3 wks)

  • Defensive Security Operations
    (4 wks)

  • CompTIA Security+ Certification
    (2 wks)
  • Module 1 — Hardware and Operating Systems

    ✓ Positional Numbering Systems
    ✓ Understanding Hardware
    ✓ BIOS and the Boot Process
    ✓ Volatile vs Non-volatile Storage
    ✓ Windows Administration

    ✓ SysInternals Suite: Procmon and ProcExp
    ✓ Basic Powershell Skills
    ✓ Linux Foundations
    ✓ Linux Firewall Tools
    ✓ SSH and Key-based Access
    ✓ Understanding password storage

    The Hardware and Operating Systems Module will take a hands-on approach to learning fundamental concepts that are key to understanding system security. We will first learn how hardware interfaces with software, and what binary is and how it works. Next, we will cover how the Windows operating system works, and some of its key security features and flaws. Finally, we will get familiar with the Linux operating system, the important ways that it differs from Windows, and how to secure it.

  • Module 2 — Networking Foundations

    ✓ OSI Model and TCP/IP Model
    ✓ Hubs, switches, and routers
    ✓ Perform Subnetting
    ✓ Cisco IOS and Router Configs/ACLs
    ✓ Firewall Use and Placement
    ✓ Server/Client Relationships
    ✓ Common Network Services and Ports

    ✓ Internet Routing Protocols
    ✓ Network Protections and Security Models
    ✓ Virtual Private Networks
    ✓ Wireshark Proficiency
    ✓ TCP and UDP Header Analysis
    ✓ Wireshark Filters and Data Carving

    The Networking Foundations module will cover the theory and practical application of how computers communicate. We will cover the OSI model, routing and switching technology, as well as network security models, and important network services. The module will also take an in-depth look at subnetting. Finally, the module will cover how to capture and analyze network traffic with Wireshark.

  • Module 3 — Programming Literacy

    ✓ Software Development Lifecycle
    ✓ Software Security Models
    ✓ Common Languages and Uses

    ✓ Interpreted vs Compiled Languages
    ✓ Sequential Statements, Branching, Looping
    ✓ HTML, CSS, JavaScript, Python basics

    The Programming Literacy module will give students a general understanding of how software gets developed, and some of the common mistakes that get made along the way. It will cover the Software Development Lifecycle, software security best practices, and the different types of programming languages that students might encounter. Lastly, students will gain familiarity with basic web development technologies, including HTML, CSS, and Javascript.

  • Module 4 — Offensive Security Operations

    ✓ Kali Linux Platform
    ✓ Penetration Testing Execution Standard (PTES)
    ✓ Passive Enumeration using OSINT techniques
    ✓ Active enumeration using nMap
    ✓ Identify and Categorize Exploits
    ✓ Identifying System Vulnerabilities
    ✓ Common Misconfigurations

    ✓ Proficiency with Metasploit Framework
    ✓ Hashing Algorithms and PW 'Cracking'
    ✓ Common Post-exfiltration Activities
    ✓ OWASP Top Vulnerabilities
    ✓ SQL Injection Attacks
    ✓ Social Engineering Techniques
    ✓ Burp Suite, Nikto, ZAP Enumeration Tools

    The Offensive Security module covers the "red team" offensive tactics and strategies employed by ethical hackers and penetration testers. Students will take a hands-on lab approach to computer exploitation methodology, learning how to think outside the box to gain access to remote systems. To successfully defend against attacks, it's important to be able to understand and think like an attacker, so students will learn the tools and techniques needed to search for and report on vulnerabilities in secure environments.

  • Module 5 — Defensive Security Operations

    ✓ Importance of 2FA and secure cryptography
    ✓ Understand firewalls, IDS’s, SIEM’s
    ✓ Proficiency with Splunk
    ✓ Analyze malicious traffic in Wireshark
    ✓ The zero trust security model
    ✓ 6 steps to incident response
    ✓ Forensics with memory and disk capture tools
    ✓ behavior analysis of malware samples

    ✓ Harden systems using CIS benchmarks
    ✓ Vulnerability scans using Nessus
    ✓ Group Policy Management
    ✓ Configuration Management and Patch Management
    ✓ Defence in Depth Principle
    ✓ NIST risk management and controls framework
    ✓ Business Continuity and Disaster Recovery
    ✓ Vendor Risk Management
    ✓ Contractual, legal, and regulatory compliance

    The Defensive Security, or "blue team" module will cover the defensive concepts and techniques that students will need to be successful in Cybersecurity careers. While entry level "red team" positions do exist, many junior Cybersecurity roles will require a more defensive focus. We will cover secure cryptography, access control models, the threat landscape, network monitoring with Splunk, incident response and forensics methodologies, vulnerability scanning with Nessus, risk and threat assessment, and regulatory compliance auditing.

  • Module 6 — CompTIA Security+ Certification

    ✓ Understand concepts and techniques covered by the exam
    ✓ Understand test taking strategies and best practices
    ✓ Demonstrate preparedness by completing practice tests
    ✓ Exam voucher (plus retake) included at no extra cost

    The CompTIA Security+ certification is the first and most important accolade rising Cybersecurity professionals should earn. Certifications tend to be more important in some industries than in others, and there's no doubt that most Cybersecurity employers like seeing them on incoming resumes. Other programs often claim to "align" their curriculum with industry certifications, but DigitalCrafts is unique in dedicating two weeks towards test preparation, leveraging official CompTIA study materials, labs, and practice tests available to CompTIA Training Partners. Each student will receive a test voucher (with one retake), and you can expect to graduate with the exam on your calendar.

16-Weeks, Full-Time, Live Online

Times are listed in Eastern Time Zone, but students join from all over. The below schedule is meant to demonstrate a typical day, but every class is different.


Lectures / Assignments

Students often start the day with a combination of live lectures delivered through Zoom, and self-led assignments and exercises designed to ensure the topic being covered is deeply instilled through hands-on learning. There are many different learning styles, and we work hard to craft curriculum that is highly effective for everyone.


Projects / Labs

We believe in learning by doing, and simulating the real world work environment as effectively as possible. During labs, you can expect to use the same tools and processes the pros use, working on real threats and problems that companies face every day. Working alone or in groups, you'll build in-demand skills that you'll be proud to discuss in your interviews.


Maximum Effort Required

This program will challenge you, and after a full day of class our students are often charged with completing additional assignments designed to push their abilities as far as possible given such a condensed amount of time. This commitment of time and energy requires grit and determination, but you can do it if you believe in yourself and put in the work.

Elective Workshops

Exclusive benefit for Students & Alumni

A career in security requires a lifetime commitment to learning new strategies, processes, and tools. We hold periodic elective workshops for students and alumni to help provide continuing education opportunities in myriad complementary topics. Every technology professional has heard the interview question, "Do you have experience with _?"

This is our way of filling in the blank.

Additional Course Information

  • What is DigitalCrafts?

    DigitalCrafts is a technology bootcamp and training provider. DigitalCrafts bootcamps are amongst the best-reviewed in the country, and offer intensive live instruction educational experiences for students across the country. DigitalCrafts enterprise solutions include custom training and onboarding programs, as well as software staffing services for companies of all sizes.

  • Can I keep my day job while a student?

    Probably not for full-time classes, which are truly an immersive, Monday through Friday experience. If dedicating 40+ hours per week isn't in the cards, stay tuned for the launch of our part-time format, expected in 2022.

  • Is prior experience required?

    No, though prior experience is welcome, it is not required to apply to DigitalCrafts. Incoming students are assigned the applicable 'Intro Course' to help ensure everyone has some exposure before class starts.

  • How much is tuition?

    Base tuition for the Full-Time program is $15,950. After being accepted, a $250 deposit and (if financing) approval from one of our financing partners is required to secure your seat.

    The remaining tuition may be paid in full before class starts or financed over 3 to 15 years through one of our lending partners (you're welcome to use your own if you'd like).

    Discounts: If you apply, are accepted, and submit your $250 deposit to secure your seat within 5 business days of receiving your acceptance letter, we will take $250 off tuition. If you enroll before the early enrollment deadline listed on our schedule, you'll receive an additional $250 off tuition. Note: Scholarship recipients are not eligble for any additional discounts.

    More on tuition, financing, and scholarships.

  • Is financing available?

    Yes! We’ve partnered with Climb Credit to provide affordable financing options for our students. Reach out to learn more, you can give us a holler at or (833) 327 - 2387.

    There are also plenty of options outside of our partnerships, such as WeFinance, Upstart, SoFi, or asking your employer to help fund your education. It never looks bad to ask for more training, and you might just be surprised by what you hear!

    Please note: if you are accepted and intend to finance your tuition through one of our financing partners, you will need to be approved as a borrower to officially secure your seat in class.

  • What about scholarships?

    Part of our mission as a school is to make a career in software as accessible as possible to the underrepresented and the highly gifted.

    As such, we're proud to offer automatic partial scholarships for all underrepresented people in tech, including Black, Latinx, and Women students. We also sponsor The Builder Scholarship, awarded by committee to builders with especially compelling stories, achievements, and goals. More on tuition and scholarship awards.

  • How many students are in a class?

    Our average class size is currently 17-18 students. Your cohort may have more or less, as there is some seasonality in enrollment, but we always maintain an efficient and effective classroom environment.

  • What equipment do I need?

    Windows or Mac laptop or desktop computer using Intel or AMD 32 bit or 64 bit processors. Mac M1 and Windows ARM systems will not be supported due to virtualization requirements. Students may use Linux x86 systems if desired but curriculum is written assuming a Windows or Mac OS.

    8GB of RAM minimum, 16GB recommended.
    At least 80GB of free storage space.
    Reliable broadband internet for streaming class.
    Camera and microphone (laptop built-in is fine).

    Chromebooks and iPads are not sufficient.

  • Is career support provided?

    All students receive the same level of career support, which includes resume guidance, career lectures, and exposure to our ever-growing list of employer partners. In addition, our dedicated Student Services Team is available to provide detailed feedback on everything from cover letters to emails to employers. We can't nail the interview for you, but we'll do what we can to help along the way.

  • How is DigitalCrafts different from other programs?

    A successful entrepreneur once told our founders that "succeeding in business is simple. Do what you say you're going to do, and treat every customer like they're your first and last. If you say you're going to perform a service for somebody, do it well - most people won't."

    We believe the above state of mind, a firm belief in honesty and transparency, and the hard work of our instructors and staff is what has set us apart. It doesn't hurt that our instructors are the best, our class sizes are smaller, and the cost per hour of instruction is well below our competitors.

    In addition, because DigitalCrafts also provides staffing services to corporate clients, we remain a valuable resource for our alumni throughout their careers. We want to help our students find their 1st job, and every job after that.

    Our alumni reviews tell it better than we can.

  • How can I ask more questions?

    Reach out anytime, our team is here to help. You can schedule a call, send us an email , or just give us a ring: (833) 327 - 2387. We look forward to meeting you.

Background Image

We secure the web. So can you.

Apply Today