Quick facts about this program
-
Method
Live online classes with self-paced coursework.
-
Duration
6 months (~500+ hours of training)
-
Experience
None. This is a program for cybersecurity beginners.
Cybersecurity for beginners: An overview
Build the in-demand skills you need for a career in cybersecurity in just over 6 months. In Cybersecurity Foundations 101, you’ll learn about the professional security tools used to identify and protect vulnerable systems. Then, in Cybersecurity Foundations 102, you’ll build your hands-on operating system and networking skills using the Infosec cyber range.
In Cybersecurity Foundations 201 and 301, you’ll learn how to troubleshoot Windows machines and overcome cyber challenges before joining the fictional company GlobalX, where you’ll play your part in administrating, designing and defending networks as it grows into a multinational enterprise. In Cybersecurity Foundations 401, you’ll dig into popular cybersecurity concepts, including frameworks, data encryption, cloud security, network security, threat modeling, shell scripting, penetration testing and incident response.
If you continue in the optional Cybersecurity Foundations 501, you’ll also discover how generative AI models support cybersecurity practices by providing new ways of defending digital assets.
Why enroll in this training program
-
Get training for in-demand cybersecurity jobs
Receive over 200 hours of live training from industry experts to help you attain the skills you'll need throughout your career.
-
Career coaching
Explore the type of cybersecurity career that best fits your goals.
-
Receive a CompTIA Security+ exam voucher
Receive a CompTIA Security+ exam voucher to provide solid evidence of the skills and experiences you’ve gained by taking our immersive boot camp.
What to expect in this immersive boot camp
Immersive Boot Camps are specifically designed for individuals at the entry-level or those transitioning careers. Learn how to administer systems using Agile project management and build cybersecurity administration skills across areas like governance, risk and compliance (GRC), data security, cloud security and threat hunting.
Learn how to think like an ethical hacker
Learn how to think like an ethical hacker as you carry out social engineering, penetration testing and brute force attacks
Perform essential computer operations
Perform essential computer operations, including endpoint and remote desktop support, troubleshooting, backup and recovery and more.
Understand how networks work
Understand how networks work, from network ports, routers and protocols to cloud infrastructure and deployment.
Who is this program for?
Have more questions? We're here to help
Complete the form and book a meeting with a member of our team to explore your learning opportunities.
Sorry, we're unable to load the form at the moment. Please check your browser's settings to confirm the form is not blocked. You can contact us and report the issue here: infosec.info@cengage.com.
Thank you! One of our advisors will contact you shortly to continue the application process.
How to enroll
Submit your application
Receive a call from an advisor
Start your career transformation
Award-winning training you can trust
Program syllabus
(Pre-work) Cybersecurity Foundations 101: Modern Computing Technologies and Operating Systems
1 Week
Understand the role of information security in the modern technology environment. You will learn to identify vulnerable systems and protect them from vulnerabilities. Through instructor guidance and example approaches, you will see the results of their research. You will also collaborate with other students through a facilitated activity to understand the dynamics of being a technology specialist in a professional work environment.
Prerequisites:
- None
Outcomes
Upon satisfactory completion of this training, you should be able to:
- Describe and define
- Cybersecurity best practices
- Discovery of how attackers find weaknesses and attack them
- Explore career pathways to in-demand jobs in pentesting and cybersecurity
- Execute
- Learn to think like a cybercriminal, using tools like social engineering, cryptography and brute-force attacks
- Research and report on real-world exploits
(Pre-work) Cybersecurity Foundations 102: Introduction to Cybersecurity
1 Week
Get your hands dirty and start working in our award-winning cyber range. In this training, you will perform your first lab and work through basic operating systems and networking operations.
Prerequisites:
- None
Outcomes
- Have confidence in performing basic computer technical operations within an operating system
- Dive deeper into how computer workstations function
- Get introduced to IT operations concepts like provisioning, virtualization, working with hardware interfaces and more
- Develop proficiency in installing new software and peripherals
- Be fully prepared for the challenges ahead in Cyber Foundations 201
- Have a wider network of new and experienced information systems professionals, and prepare your resume for all the awesome new skills you are about to learn
Cybersecurity Foundations 201: Foundations of Computer Operations
6 Weeks
In this hands-on training, you will build foundational Windows troubleshooting skills by exploring and overcoming challenging scenario-based labs. Key skills such as communication, knowledge and process documentation, fundamental terminal operations, performance monitoring, system process management, issue handling, backup/imaging/recovery tools and software application operations are developed.
Prerequisites
- Cybersecurity Foundations 101
- Cybersecurity Foundations 102
Students with previous relevant or equivalent experience can test out of this requirement in their application.
Outcomes
Learn to support technology operations by resolving issues with hardware, software and virtual or cloud systems. Upon satisfactory completion of this training, you should be able to:
Describe and define
Technical service and support
- Customer service
- Endpoint technical support
- Issue tracking system
- ITIL service management framework
- Knowledge management, documentation and standard operating procedures (SOP)
- Remote desktop support and diagnostics
- Service level agreement (SLA)
- Technical project support
- Technical reporting and communication
- Troubleshooting methodology
Hardware and software
- Endpoint imaging, backup, and recovery
- Windows 10 troubleshooting and configuration
- Performance monitoring and tuning
- Software application deployment, updating, and removal
Infrastructure connectivity
- Active directory user support
- Cloud instance deployment
- Network protocols and concepts (TCP/IP, DHCP, DNS, LAN, SMTP, WAN, VPN)
- Network ports, ethernet
- Network troubleshooting
- Network routers
Execute
- Deliver remote IT service and support
- Set up and configure computer virtualization using VirtualBox
- Deploy an EC2 instance using Lightsail on AWS cloud
- Apply a standardized troubleshooting and workstation deployment methodology
- Utilize backup and recovery tools for disk imaging
- Perform data restoration, startup repair and secure disposal
- Deploy, configure, and troubleshoot Windows 10 OS
- Install, update, troubleshoot and uninstall software applications
- Evaluate endpoint performance metrics to identify anomalous readings and troubleshoot a malfunctioning system
- Incorporate infrastructure connectivity concepts, including RDP and SSH
- Evaluate and configure network adapter settings
- Deploy pfSense firewall and establish network connectivity through it
- Automate tasks in Linux using Bash scripting in an IDE
- Practice using Linux and Windows terminal commands
- Perform basic GitHub operations
- Be prepared for the Cyber Foundations 301
Cybersecurity Foundations 301: Networking and Systems Administration
6 Weeks
Gain hands-on server and networking skills in this exciting training that follows the journey of the fictional GlobeX Corporation as it grows from a startup to a multinational enterprise with a fully functional network and information systems. As their new administrator, you’ll get ready to deploy systems and design new networks in a fast-paced learning environment that mirrors critical on-the-job scenarios.
Prerequisites
- Cybersecurity Foundations 101
- Cybersecurity Foundations 102
- Cybersecurity Foundations 201
Students with previous relevant or equivalent experience can test out of this requirement in their application.
Outcomes
At the end of this training, you will be prepared for a career as a network operations specialist or systems administrator. Upon satisfactory completion of this training, you should be able to:
Describe and define
Systems administration
- Agile project management
- Linux and Windows network services, like AD, DHCP, DNS, email, LDAP, web servers
- LAN connectivity to cloud resources on AWS
- Identity management
- IT infrastructure and systems design
- Microsoft Windows Server 2019
- Patch management
- Software administration
- Virtual machine administration
Networking
- Router and firewall administration with pfSense
- Network traffic analysis tools
- Network access controls
- Network design
- Network infrastructure troubleshooting
- Network service administration (TCP/IP, DHCP, DNS)
- Virtual private network (VPN) client and tunnel
Scripting & automation
- Bash
- OS task automation
- Powershell
- Python
Execute
- Apply lightweight Agile project management methodologies
- Administer critical IT and network systems
- Practice identity management in Active Directory (AD)/LDAP protocol
- Design and deploy a client-server network, including a domain controller (DC)
- Create and push group policy to endpoints
- Analyze how cloud systems can integrate into on-premise systems
- Automate OS tasks using scripting languages Bash, Powershell, and Python
- Design and deploy network infrastructure using the open-source pfSense virtual appliance
- Extend the capabilities of pfSense using packages
- Troubleshoot challenging network connectivity problems
- Oversee patch management of Windows endpoints
Cybersecurity Foundations 401: Cybersecurity Engineering
12 Weeks
Designed to prepare you for today's most in-demand security skills, this hands-on training emphasizes practical SecOps foundations. You will gain cutting-edge skills by analyzing systems vulnerabilities, implementing defenses against common threats and using industry-relevant tooling.
Prerequisites
- Cybersecurity Foundations 101
- Cybersecurity Foundations 102
- Cybersecurity Foundations 201
- Cybersecurity Foundations 301
Students with previous relevant or equivalent experience can test out of this requirement in their application.
Outcomes
At the end of this training, you will be prepared for a career in cybersecurity. Upon satisfactory completion of this training, you should be able to:
Describe and define
Governance, risk and compliance (GRC)
- Cybersecurity frameworks (e.g., SOC2)
- CIA triad
- Systems hardening
- Risk analysis, assessment and reporting
- Security compliance and auditing
Data security
- Data classification
- Data loss prevention (DLP)
- Data privacy concepts and regulation (GDPR, CCPA)
- Encryption standards
- Password security
- Protecting data at rest and in transit
- Public Key Infrastructure (PKI)
- SSL/TLS
SecOps foundations
- Threat detection with IDS, SIEM
- Incident response lifecycle
- Indicators of compromise (IOC)
- SIEM deployment and operation
- SIEM log and event analysis
- SIEM troubleshooting, data ingestion, query writing
- Threat hunting techniques
Cloud security
- Cloud identity and access management
- Cloud security in AWS
- Data loss prevention (DLP)
- Intrusion detection & prevention systems (IDS/IPS, Snort)
- Network traffic analysis
- Virtual private cloud (VPC)
- AWS native tooling (e.g., AWS CloudTrail)
Threat modeling and analysis
- Tactics, techniques and procedures (TTPs)
- Cyber Kill-Chain
- MITRE ATT&CK
- OWASP
- STRIDE
- Threat Modeling
- Data flow diagrams
SecFoundations: Threat hunting
- Malware detection with YARA rules, VirusTotal API
- Malware traffic analysis
- Forensic investigation
- Threat hunting with Zeek, RITA
AppSec and vulnerability analysis
- Web app scanning and exploitation with Burp Suite, w3af, OWASP ZAP
- CVE, CVSS
- Vulnerability scanning tools, e.g., Nessus
- Network and application vulnerability scans and assessments
- Scanner output handling, false positives, prioritization
- Vulnerability risk rating
- Vulnerability types and concepts
Penetration testing
- Enumeration
- Exploitation
- Impact analysis
- Investigation and intelligence collection
- Legal considerations in pentest scoping
- Nmap, metasploit, datasploit
- OSINT
- Penetration test lifecycle
- Planning
- Scoping
- Target profiling and evaluation
Execute
- Assess risk using quantitative or qualitative methods
- Document risk mitigations and perform security compliance audits
- Take a security project all the way from conceptual requirements to technical implementation
- Apply modern cryptographic principles to protect data at rest and in transit
- Use data loss prevention (DLP) tools
- Perform threat analysis and threat modeling using various tools such as STRIDE, cyber kill-chain, and MITRE ATT&CK
- Explore web application security
- Administer anti-malware systems and various security tools
- Analyze IT systems security with vulnerability scanning
- Perform penetration testing
- Configure an intrusion detection/prevention system (IDS/IPS)
- Performing incident response operations and SIEM event monitoring
- Deploy, configure and query a SIEM
- Oversee cloud security efforts using AWS native tooling
(Optional) Cybersecurity Foundations 501: AI in Cybersecurity
6 Weeks
Staying ahead of threats in the ever-evolving cybersecurity landscape requires vigilance and innovation. This cutting-edge AI-driven cyber defense training is designed to arm you with the knowledge and skills to leverage generative AI technologies in the fight against cyber threats. You will delve into integrating artificial intelligence, specifically generative AI models, into cybersecurity practices, offering a new frontier in digital defense mechanisms.
Course prerequisites
- Cybersecurity Foundations 101
- Cybersecurity Foundations 102
- Cybersecurity Foundations 201
- Cybersecurity Foundations 301
- Cybersecurity Foundations 401
Outcomes
Culminate your learning experience with a capstone project that challenges you to design and implement a generative AI solution to a pressing cybersecurity problem, demonstrating your ability to innovate and protect in the digital age.
Pricing
Cybersecurity for beginners
$15,000
What's included:
- 26-week immersive program (up to 640 hours of total immersion!)
- 240 hours of live instruction
- Interactive hands-on labs
- Career Coaching
- Security+ exam voucher
- 6 weeks post program Skills validation Badge activities
- Knowledge Retention Assurance
Transform your life with affordable financing options
We want to help you eliminate any roadblocks — especially the financial ones — between you and your career goals.
That is why we offer easy financing options to help you invest in your career transformation journey.
Now offering a $2500 scholarship to eligible students.
*Rates from 0–30% APR. For example, a $800 purchase might cost $72.21/mo over 12 months at 15% APR. Payment options through Affirm are subject to an eligibility check, may not be available everywhere, and are provided by these lending partners: affirm.com/lenders. Options depend on your purchase amount, and a down payment may be required. Estimated payment amount may exclude taxes and shipping. For licenses and disclosures, see affirm.com/licenses.