Become a Cybersecurity
Professional in 36 Weeks

Set the Stage
for a Successful
Cybersecurity Career

The SDSU Global Campus Cybersecurity Bootcamp, in partnership with ThriveDX, prepares learners to thrive in a cybersecurity career in less than a year. Learn from industry-leading instructors in a virtual classroom setting that includes real-world cyberattack simulations, a comprehensive and immersive curriculum, industry networking opportunities, and ongoing career guidance and professional development.

With over 700,000 job
openings nationwide,
there’s never been a
better time to join the
cybersecurity
industry

Source:
Cyberseek.org

img

Fast-Track Your
Cybersecurity Training
Build Job-Ready Skills with an Accelerated Curriculum

Practice with the latest tools and techniques and get the hands-on cybersecurity training you need to
build advanced skills and become a sought-after, qualified professional.

Get Practical
Experience as a
Cyber Defender

Learn to Fight Hackers
Train with
Real-World Cyberattack Simulations

Cyber Labs
and TDX Arena

Apply what you learn in class to the real world. Improve your cybersecurity skills by practicing through Cyber Labs and TDX Arena, this bootcamp’s proprietary online training platform. You’ll experience cyberattack simulations and focused training through immersive, gamified learning.

Expert Instructors

Learn from instructors who are cybersecurity professionals, bringing years of industry knowledge directly into the classroom. Learners benefit from their unique insights, first-hand experience, as well as their mentorship and guidance.

Learn By Doing

Practice the skills that will impress future employers. The hands-on approach to cybersecurity education ensures that by the time you complete the program, you will possess job-ready skills that you can use in your cybersecurity position from day one.

Virtual Classroom

Through virtual classes and self-study, this part-time program offers a learning ecosystem, including class recordings. A host of communication tools fosters interactions among learners and instructors, helping you to create a community of cybersecurity professionals.

360° Support to Help
You Succeed

A Bootcamp Designed to Help
You Thrive

Professional Network

Join virtual networking events and grow your professional connections in the world of cybersecurity. Take advantage of a community of industry partners and cybersecurity experts and uncover professional opportunities for your future career.

Student Support

Student success managers can help you access additional resources as needed, such as exam retests and tutoring sessions, and are dedicated to seeing you thrive in the program and beyond.

Career Coaching

During the program, you will work with a dedicated team of career coaches to get ready for job-hunting. From perfecting your resume and polishing your LinkedIn profile to practicing interview questions—they are instrumental in helping you achieve the career of your dreams.

Job Search Assistance

Get help finding the cybersecurity roles that are right for you and your career aspirations. An expert Career Outcomes team can help you scout for the job opportunities you need to break into cybersecurity.

Explore The Bootcamp’s Classes

Download the
Course Catalog

img

Program Overview

4 Week Introductory Course
| 32 Week Complete Program

  • Introductory Course

    The Introductory Course allows you to get a feel for the virtual learning environment.

    The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.

    The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

    Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course.
  • Fundamentals Phase

    In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.

    Complete this phase with a foundational understanding of essential cybersecurity concepts.
  • Computer Networking Fundamentals

    In this course, you will receive a comprehensive introduction to computer networking, equipping you with practical experience in configuring and managing network devices for optimal performance and security. Throughout the course, you will develop a solid understanding of network architectures, protocols, and security measures, while enhancing your skills in device configuration and troubleshooting. Through hands-on activities, you will apply critical thinking and problem-solving abilities to overcome common networking challenges.

    During the course, you will:
    • Explore how different entities connect and interact in digital environments
    • Understand the various types of networks and their impact on our interconnected world
    • Harness the power of configuration settings documentation
    • Gain insight into the role of audits in ensuring optimal network performance and security
    • Discover the importance of system and communications protection in safeguarding information
    • Learn effective strategies for updating and adapting policies to keep up with the evolving landscape


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠
  • Microsoft Security Systems Administration

    In this course, you will receive practical, hands-on training specifically designed to secure Microsoft Windows environments. You will gain the knowledge and skills necessary to effectively implement security features and tools like Microsoft Defender, BitLocker, and Windows Firewall. Additionally, you will learn how to configure and manage networks to ensure both security and stability using system administration tools. By the end of the course, you will have a solid understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments in various professional capacities.

    During the course, you will:
    • Acquire a comprehensive understanding of Microsoft's infrastructure and its key components
    • Learn effective strategies to safeguard Microsoft's infrastructure from potential threats
    • Develop the skills necessary to manage different types of accounts based on business functions
    • Explore methods to maintain a secure and safe network environment
    • Discover how automations and scripting can enhance security and efficiency in cybersecurity roles
    • Gain insights into how Active Directory facilitates permission management and access control for network resources
    • Learn how to enhance system security and operational efficiency using Powershell
  • Integrating Your Infrastructure Security

    In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. They will gain knowledge and practical experience in monitoring, scanning, and analyzing threats and vulnerabilities in Linux and cloud-based environments. Remediation techniques will also be covered to address security issues effectively. Additionally, learners will be introduced to the concept of DevSecOps and its impact on the cybersecurity landscape.

    During the course, you will:
    • Begin to master the management of Linux operating systems and the ability to identify, monitor, and analyze threats and vulnerabilities in Linux and cloud-based environments
    • Gain proficiency in basic Python programming for automating tasks and enhancing system security
    • Develop a foundational understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
    • Acquire knowledge and skills in remediation techniques and sharing details to protect other systems
    • Explore the creation of automations to efficiently manage and safeguard systems
    • Understand the design principles of scalable cloud solutions and the integration of different environments
    • Familiarize yourself with the concept of DevSecOps and its importance in modern cybersecurity


    Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner
  • Infrastructure Phase

    The Infrastructure Phase gives learners the necessary knowledge and hands-on experience to create and sustain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, they focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions. Learners complete this phase with knowledge of critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.
  • Securing Your Network

    In this course, you will expand your knowledge of networks and delve deeper into their intricacies. You will explore the various components of wired and wireless networks, their vulnerabilities, and security constraints. The focus will be on developing access controls to ensure comprehensive network security, encompassing people, data, and devices. Additionally, you will learn about building and securing networks, including topics such as cryptography and privacy considerations.

    During the course, you will:
    • Develop an understanding of network security measures and effective strategies to maintain network safety
    • Begin to master network monitoring techniques for proactive security
    • Gain knowledge on managing accounts within a system for improved security
    • Explore how security attributes contribute to strengthening network defenses
      Familiarize yourself with common tools and technologies that support network safety
    • Acquire skills to design a secure network architecture
    • Learn the fundamentals of setting up MHN networks for effective threat detection Understand the relationship between
    • Telnet and POP3 machines in the context of network security


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate
  • Designing Your Cybersecurity Infrastructure

    This course provides a deep dive into the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of how to protect endpoint devices, prevent data loss, and address the security considerations associated with industrial systems and IoT devices.

    During the course, you will:
    • Gain insights into evaluating, identifying threats, and protecting endpoint devices
    • Learn effective documentation and tracking of configurations and tool options
    • Establish rules and restrictions to safeguard endpoint devices from potential harm
    • Work with external information systems while ensuring the security of endpoint devices
    • Develop skills for implementing data loss prevention techniques
    • Acquire knowledge about the threats and security measures related to Industrial
    • Control Systems (ICS) and Industrial Internet of Things (IIOT)


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP
  • Social Engineering and Ethical Hacking

    In the Social Engineering and Ethical Hacking course, participants will delve into the mindset of hackers and explore game theory principles that relate to cybersecurity defense and solutions. By the end of the course, learners will possess knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and guard against potential threats.

    During the course, you will:
    • Gain insights into the motivations and actions of potential attackers
    • Understand how to leverage the mindset of malicious hackers to enhance system protection
    • Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure
    • Explore techniques such as reconnaissance, penetration testing, and defense system bypassing for maintaining system security
    • Learn to identify vulnerabilities in web applications and cloud-based systems
    • Develop skills to effectively report risks and provide defense recommendations
    • Recognize the deceptive nature of social engineering techniques and their impact on individuals' security


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+
  • Advanced Phase

    Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities. By successfully completing this phase, you will earn your certificate of completion for the Cybersecurity Bootcamp.
  • Digital Forensics and Incident Response

    The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.

    During the course, you will:
    • Be immersed in the fundamentals of offensive security
    • Gain an understanding of the basics of digital forensics Explore file and stolen data recovery strategies
    • Learn how to effectively handle various types of attacks targeting organizations
    • Get insight into the strategies attackers use to attain access to critical systems and data
    • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP
  • Threat Hunting and Intelligence

    The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure. During the course, you will:
    • Gain an understanding of the threats and vulnerabilities that can emerge within an organization's network infrastructure, including hardware devices, software applications, and network services
    • Grow their ability to proactively identify and respond to threats
    • Learn to develop plans and procedures to effectively handle situations, ensuring a swift and coordinated response
    • Develop the skills to evaluate sources of information and tools needed to bolster their defenses


    Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP
  • Elective CompTIA® Security+ Certification Exam Prep Course

    As part of the Cybersecurity Bootcamp, learners have the opportunity to enroll in an elective CompTIA® Security+ Exam Prep Course*. This course is specifically designed to equip students with the necessary skills and knowledge to successfully obtain the highly regarded CompTIA® Security+ industry certification. Additionally, students will receive a voucher to take the CompTIA® Security+ certification exam.

    During the course, you will:
    • Develop a solid foundation of knowledge essential for any cybersecurity role
    • Gain hands-on practical skills emphasized by the only foundational cybersecurity certification
    • Attain a globally recognized certification that establishes the fundamental knowledge required in the field and serves as a gateway to intermediate-level cybersecurity positions
Icon

Introductory Course (4 Weeks)

The Introductory Course allows you to get a feel for the virtual learning environment.

The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.

The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course.

Icon

Fundamentals Phase (12 Weeks)

In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.

Complete this phase with a foundational understanding of essential cybersecurity concepts.

Icon

Computer Networking Fundamentals

In this course, you will receive a comprehensive introduction to computer networking, equipping you with practical experience in configuring and managing network devices for optimal performance and security. Throughout the course, you will develop a solid understanding of network architectures, protocols, and security measures, while enhancing your skills in device configuration and troubleshooting. Through hands-on activities, you will apply critical thinking and problem-solving abilities to overcome common networking challenges.

During the course, you will:

  • Explore how different entities connect and interact in digital environments
  • Understand the various types of networks and their impact on our interconnected world
  • Harness the power of configuration settings documentation
  • Gain insight into the role of audits in ensuring optimal network performance and security
  • Discover the importance of system and communications protection in safeguarding information
  • Learn effective strategies for updating and adapting policies to keep up with the evolving landscape


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠

Icon

Microsoft Security Systems Administration

In this course, you will receive practical, hands-on training specifically designed to secure Microsoft Windows environments. You will gain the knowledge and skills necessary to effectively implement security features and tools like Microsoft Defender, BitLocker, and Windows Firewall. Additionally, you will learn how to configure and manage networks to ensure both security and stability using system administration tools. By the end of the course, you will have a solid understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments in various professional capacities.

During the course, you will:

  • Acquire a comprehensive understanding of Microsoft's infrastructure and its key components
  • Learn effective strategies to safeguard Microsoft's infrastructure from potential threats
  • Develop the skills necessary to manage different types of accounts based on business functions
  • Explore methods to maintain a secure and safe network environment
  • Discover how automations and scripting can enhance security and efficiency in cybersecurity roles
  • Gain insights into how Active Directory facilitates permission management and access control for network resources
  • Learn how to enhance system security and operational efficiency using Powershell

Icon

Integrating Your Infrastructure Security

In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. They will gain knowledge and practical experience in monitoring, scanning, and analyzing threats and vulnerabilities in Linux and cloud-based environments. Remediation techniques will also be covered to address security issues effectively. Additionally, learners will be introduced to the concept of DevSecOps and its impact on the cybersecurity landscape.

During the course, you will:

  • Begin to master the management of Linux operating systems and the ability to identify, monitor, and analyze threats and vulnerabilities in Linux and cloud-based environments
  • Gain proficiency in basic Python programming for automating tasks and enhancing system security
  • Develop a foundational understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
  • Acquire knowledge and skills in remediation techniques and sharing details to protect other systems
  • Explore the creation of automations to efficiently manage and safeguard systems
  • Understand the design principles of scalable cloud solutions and the integration of different environments
  • Familiarize yourself with the concept of DevSecOps and its importance in modern cybersecurity


Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner

Icon

Infrastructure Phase (12 Weeks)

The Infrastructure Phase gives learners the necessary knowledge and hands-on experience to create and sustain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, they focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions. Learners complete this phase with knowledge of critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.

Icon

Securing Your Network

In this course, you will expand your knowledge of networks and delve deeper into their intricacies. You will explore the various components of wired and wireless networks, their vulnerabilities, and security constraints. The focus will be on developing access controls to ensure comprehensive network security, encompassing people, data, and devices. Additionally, you will learn about building and securing networks, including topics such as cryptography and privacy considerations.

During the course, you will:

  • Develop an understanding of network security measures and effective strategies to maintain network safety
  • Begin to master network monitoring techniques for proactive security
  • Gain knowledge on managing accounts within a system for improved security
  • Explore how security attributes contribute to strengthening network defenses
    Familiarize yourself with common tools and technologies that support network safety
  • Acquire skills to design a secure network architecture
  • Learn the fundamentals of setting up MHN networks for effective threat detection Understand the relationship between
  • Telnet and POP3 machines in the context of network security


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate

Icon

Designing Your Cybersecurity Infrastructure

This course provides a deep dive into the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of how to protect endpoint devices, prevent data loss, and address the security considerations associated with industrial systems and IoT devices.

During the course, you will:

  • Gain insights into evaluating, identifying threats, and protecting endpoint devices
  • Learn effective documentation and tracking of configurations and tool options
  • Establish rules and restrictions to safeguard endpoint devices from potential harm
  • Work with external information systems while ensuring the security of endpoint devices
  • Develop skills for implementing data loss prevention techniques
  • Acquire knowledge about the threats and security measures related to Industrial
  • Control Systems (ICS) and Industrial Internet of Things (IIOT)


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP

Icon

Social Engineering and Ethical Hacking

In the Social Engineering and Ethical Hacking course, participants will delve into the mindset of hackers and explore game theory principles that relate to cybersecurity defense and solutions. By the end of the course, learners will possess knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and guard against potential threats.

During the course, you will:

  • Gain insights into the motivations and actions of potential attackers
  • Understand how to leverage the mindset of malicious hackers to enhance system protection
  • Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure
  • Explore techniques such as reconnaissance, penetration testing, and defense system bypassing for maintaining system security
  • Learn to identify vulnerabilities in web applications and cloud-based systems
  • Develop skills to effectively report risks and provide defense recommendations
  • Recognize the deceptive nature of social engineering techniques and their impact on individuals' security


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+

Icon

Advanced Phase (8 Weeks)

Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities. By successfully completing this phase, you will earn your certificate of completion for the Cybersecurity Bootcamp.

Icon

Digital Forensics and Incident Response

The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.

During the course, you will:

  • Be immersed in the fundamentals of offensive security
  • Gain an understanding of the basics of digital forensics Explore file and stolen data recovery strategies
  • Learn how to effectively handle various types of attacks targeting organizations
  • Get insight into the strategies attackers use to attain access to critical systems and data
  • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP

Icon

Threat Hunting and Intelligence

The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure. During the course, you will:

  • Gain an understanding of the threats and vulnerabilities that can emerge within an organization's network infrastructure, including hardware devices, software applications, and network services
  • Grow their ability to proactively identify and respond to threats
  • Learn to develop plans and procedures to effectively handle situations, ensuring a swift and coordinated response
  • Develop the skills to evaluate sources of information and tools needed to bolster their defenses


Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP

Icon

Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)

As part of the Cybersecurity Bootcamp, learners have the opportunity to enroll in an elective CompTIA® Security+ Exam Prep Course*. This course is specifically designed to equip students with the necessary skills and knowledge to successfully obtain the highly regarded CompTIA® Security+ industry certification. Additionally, students will receive a voucher to take the CompTIA® Security+ certification exam.

During the course, you will:

  • Develop a solid foundation of knowledge essential for any cybersecurity role
  • Gain hands-on practical skills emphasized by the only foundational cybersecurity certification
  • Attain a globally recognized certification that establishes the fundamental knowledge required in the field and serves as a gateway to intermediate-level cybersecurity positions

*For details, please visit thrivedx.com/cybersecurity-program-disclaimers.

Gain Skills Applicable to Industry Certifications

This bootcamp is not a certification-prep program, however, by earning industry-recognized certifications*, you can enhance your credentials and gain a competitive edge over other candidates. Our courses focus on key concepts that will provide you with a strong foundation for pursuing the following certifications after completing the Cybersecurity Bootcamp.

  • LPI Linux Essentials

    The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
  • CompTIA® Network+

    The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
  • CompTIA® CySA+

    The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings.

    Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.
  • Cisco Certified CyberOps Associate

    The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn.

    The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For individuals who have achieved one year of experience after completion of their program.

    Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

    The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
  • GIAC Security Essentials

    The GIAC Security Essentials (GSEC) certification goes beyond basic information security knowledge and validates a practitioner's expertise in practical security tasks. GSEC certification holders demonstrate their qualification for hands-on IT systems roles with a focus on security responsibilities.
  • Certified Incident Handler

    The GIAC Incident Handler (GCIH) certification confirms a practitioner's proficiency in detecting, responding to, and resolving computer security incidents through a comprehensive set of essential security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents, including understanding common attack techniques, vectors, and tools, as well as defending against and responding to such attacks when they arise.
  • Certified Information Security Manager

    Today's IT professionals are increasingly concerned about data breaches, ransomware attacks, and other ever-changing security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to assess risks, establish efficient governance practices, and proactively respond to incidents in a timely manner.

LPI Linux Essentials

The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.

CompTIA® Network+

The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.

CompTIA® CySA+

The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings.

Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.

Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn.

The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.

(ISC)² SSCP – Systems Security Certified Practitioner**

For individuals who have achieved one year of experience after completion of their program.

Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.

GIAC Security Essentials

The GIAC Security Essentials (GSEC) certification goes beyond basic information security knowledge and validates a practitioner's expertise in practical security tasks. GSEC certification holders demonstrate their qualification for hands-on IT systems roles with a focus on security responsibilities.

Certified Incident Handler

The GIAC Incident Handler (GCIH) certification confirms a practitioner's proficiency in detecting, responding to, and resolving computer security incidents through a comprehensive set of essential security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents, including understanding common attack techniques, vectors, and tools, as well as defending against and responding to such attacks when they arise.

Certified Information Security Manager

Today's IT professionals are increasingly concerned about data breaches, ransomware attacks, and other ever-changing security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to assess risks, establish efficient governance practices, and proactively respond to incidents in a timely manner.

*For details, please visit thrivedx.com/cybersecurity-program-disclaimers. ** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Cybersecurity Bootcamp Cost

Begin the online cybersecurity bootcamp with a 4-week Introductory Course to build foundational skills before enrolling in the Extended Program. No previous experience is required.

4-Week Introductory Course

$180

32-Week Complete Program

$18,320

Requirements

Internet access

Drive, ambition,
and passion

Introductory course
and admission exam

img
Skip to content