Download the
Course Catalog
Start Your CybersecuritySoftware Development Training Today!
Are you ready to gain hands-on experience with the digital marketing industry's top tools, techniques, and technologies?
Become a Cybersecurity
Professional in 36 Weeks
Set the Stage
for a Successful
Cybersecurity Career
The SDSU Global Campus Cybersecurity Bootcamp, in partnership with ThriveDX, prepares learners to thrive in a cybersecurity career in less than a year. Learn from industry-leading instructors in a virtual classroom setting that includes real-world cyberattack simulations, a comprehensive and immersive curriculum, industry networking opportunities, and ongoing career guidance and professional development.
With over 700,000 job
openings nationwide,
there’s never been a
better time to join the
cybersecurity
industry
Source:
Cyberseek.org
Fast-Track Your
Cybersecurity Training
Build Job-Ready Skills with an Accelerated Curriculum
Practice with the latest tools and techniques and get the hands-on cybersecurity training you need to
build advanced skills and become a sought-after, qualified professional.
Get Practical
Experience as a
Cyber Defender
Learn to Fight Hackers
Train with
Real-World Cyberattack Simulations
Cyber Labs
and TDX Arena
Apply what you learn in class to the real world. Improve your cybersecurity skills by practicing through Cyber Labs and TDX Arena, this bootcamp’s proprietary online training platform. You’ll experience cyberattack simulations and focused training through immersive, gamified learning.
Expert Instructors
Learn from instructors who are cybersecurity professionals, bringing years of industry knowledge directly into the classroom. Learners benefit from their unique insights, first-hand experience, as well as their mentorship and guidance.
Learn By Doing
Practice the skills that will impress future employers. The hands-on approach to cybersecurity education ensures that by the time you complete the program, you will possess job-ready skills that you can use in your cybersecurity position from day one.
Virtual Classroom
Through virtual classes and self-study, this part-time program offers a learning ecosystem, including class recordings. A host of communication tools fosters interactions among learners and instructors, helping you to create a community of cybersecurity professionals.
360° Support to Help
You Succeed
A Bootcamp Designed to Help
You Thrive
Professional Network
Join virtual networking events and grow your professional connections in the world of cybersecurity. Take advantage of a community of industry partners and cybersecurity experts and uncover professional opportunities for your future career.
Student Support
Student success managers can help you access additional resources as needed, such as exam retests and tutoring sessions, and are dedicated to seeing you thrive in the program and beyond.
Career Coaching
During the program, you will work with a dedicated team of career coaches to get ready for job-hunting. From perfecting your resume and polishing your LinkedIn profile to practicing interview questions—they are instrumental in helping you achieve the career of your dreams.
Job Search Assistance
Get help finding the cybersecurity roles that are right for you and your career aspirations. An expert Career Outcomes team can help you scout for the job opportunities you need to break into cybersecurity.
Explore The Bootcamp’s Classes
Download the
Course Catalog
Program Overview
4 Week Introductory Course
| 32 Week Complete Program
-
Introductory Course
The Introductory Course allows you to get a feel for the virtual learning environment.
The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.
The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.
Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course. -
Fundamentals Phase
In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.
Complete this phase with a foundational understanding of essential cybersecurity concepts. -
Computer Networking Fundamentals
In this course, you will receive a comprehensive introduction to computer networking, equipping you with practical experience in configuring and managing network devices for optimal performance and security. Throughout the course, you will develop a solid understanding of network architectures, protocols, and security measures, while enhancing your skills in device configuration and troubleshooting. Through hands-on activities, you will apply critical thinking and problem-solving abilities to overcome common networking challenges.
During the course, you will:- Explore how different entities connect and interact in digital environments
- Understand the various types of networks and their impact on our interconnected world
- Harness the power of configuration settings documentation
- Gain insight into the role of audits in ensuring optimal network performance and security
- Discover the importance of system and communications protection in safeguarding information
- Learn effective strategies for updating and adapting policies to keep up with the evolving landscape
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠ -
Microsoft Security Systems Administration
In this course, you will receive practical, hands-on training specifically designed to secure Microsoft Windows environments. You will gain the knowledge and skills necessary to effectively implement security features and tools like Microsoft Defender, BitLocker, and Windows Firewall. Additionally, you will learn how to configure and manage networks to ensure both security and stability using system administration tools. By the end of the course, you will have a solid understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments in various professional capacities.
During the course, you will:- Acquire a comprehensive understanding of Microsoft's infrastructure and its key components
- Learn effective strategies to safeguard Microsoft's infrastructure from potential threats
- Develop the skills necessary to manage different types of accounts based on business functions
- Explore methods to maintain a secure and safe network environment
- Discover how automations and scripting can enhance security and efficiency in cybersecurity roles
- Gain insights into how Active Directory facilitates permission management and access control for network resources
- Learn how to enhance system security and operational efficiency using Powershell
-
Integrating Your Infrastructure Security
In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. They will gain knowledge and practical experience in monitoring, scanning, and analyzing threats and vulnerabilities in Linux and cloud-based environments. Remediation techniques will also be covered to address security issues effectively. Additionally, learners will be introduced to the concept of DevSecOps and its impact on the cybersecurity landscape.
During the course, you will:- Begin to master the management of Linux operating systems and the ability to identify, monitor, and analyze threats and vulnerabilities in Linux and cloud-based environments
- Gain proficiency in basic Python programming for automating tasks and enhancing system security
- Develop a foundational understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
- Acquire knowledge and skills in remediation techniques and sharing details to protect other systems
- Explore the creation of automations to efficiently manage and safeguard systems
- Understand the design principles of scalable cloud solutions and the integration of different environments
- Familiarize yourself with the concept of DevSecOps and its importance in modern cybersecurity
Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner -
Infrastructure Phase
The Infrastructure Phase gives learners the necessary knowledge and hands-on experience to create and sustain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, they focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions. Learners complete this phase with knowledge of critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations. -
Securing Your Network
In this course, you will expand your knowledge of networks and delve deeper into their intricacies. You will explore the various components of wired and wireless networks, their vulnerabilities, and security constraints. The focus will be on developing access controls to ensure comprehensive network security, encompassing people, data, and devices. Additionally, you will learn about building and securing networks, including topics such as cryptography and privacy considerations.
During the course, you will:- Develop an understanding of network security measures and effective strategies to maintain network safety
- Begin to master network monitoring techniques for proactive security
- Gain knowledge on managing accounts within a system for improved security
-
Explore how security attributes contribute to strengthening network defenses
Familiarize yourself with common tools and technologies that support network safety - Acquire skills to design a secure network architecture
- Learn the fundamentals of setting up MHN networks for effective threat detection Understand the relationship between
- Telnet and POP3 machines in the context of network security
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate -
Designing Your Cybersecurity Infrastructure
This course provides a deep dive into the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of how to protect endpoint devices, prevent data loss, and address the security considerations associated with industrial systems and IoT devices.
During the course, you will:- Gain insights into evaluating, identifying threats, and protecting endpoint devices
- Learn effective documentation and tracking of configurations and tool options
- Establish rules and restrictions to safeguard endpoint devices from potential harm
- Work with external information systems while ensuring the security of endpoint devices
- Develop skills for implementing data loss prevention techniques
- Acquire knowledge about the threats and security measures related to Industrial
- Control Systems (ICS) and Industrial Internet of Things (IIOT)
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP -
Social Engineering and Ethical Hacking
In the Social Engineering and Ethical Hacking course, participants will delve into the mindset of hackers and explore game theory principles that relate to cybersecurity defense and solutions. By the end of the course, learners will possess knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and guard against potential threats.
During the course, you will:- Gain insights into the motivations and actions of potential attackers
- Understand how to leverage the mindset of malicious hackers to enhance system protection
- Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure
- Explore techniques such as reconnaissance, penetration testing, and defense system bypassing for maintaining system security
- Learn to identify vulnerabilities in web applications and cloud-based systems
- Develop skills to effectively report risks and provide defense recommendations
- Recognize the deceptive nature of social engineering techniques and their impact on individuals' security
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+ -
Advanced Phase
Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities. By successfully completing this phase, you will earn your certificate of completion for the Cybersecurity Bootcamp. -
Digital Forensics and Incident Response
The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.
During the course, you will:- Be immersed in the fundamentals of offensive security
- Gain an understanding of the basics of digital forensics Explore file and stolen data recovery strategies
- Learn how to effectively handle various types of attacks targeting organizations
- Get insight into the strategies attackers use to attain access to critical systems and data
- Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP -
Threat Hunting and Intelligence
The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure. During the course, you will:- Gain an understanding of the threats and vulnerabilities that can emerge within an organization's network infrastructure, including hardware devices, software applications, and network services
- Grow their ability to proactively identify and respond to threats
- Learn to develop plans and procedures to effectively handle situations, ensuring a swift and coordinated response
- Develop the skills to evaluate sources of information and tools needed to bolster their defenses
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP -
Elective CompTIA® Security+ Certification Exam Prep Course
As part of the Cybersecurity Bootcamp, learners have the opportunity to enroll in an elective CompTIA® Security+ Exam Prep Course*. This course is specifically designed to equip students with the necessary skills and knowledge to successfully obtain the highly regarded CompTIA® Security+ industry certification. Additionally, students will receive a voucher to take the CompTIA® Security+ certification exam.
During the course, you will:- Develop a solid foundation of knowledge essential for any cybersecurity role
- Gain hands-on practical skills emphasized by the only foundational cybersecurity certification
- Attain a globally recognized certification that establishes the fundamental knowledge required in the field and serves as a gateway to intermediate-level cybersecurity positions
Introductory Course (4 Weeks)
The Introductory Course allows you to get a feel for the virtual learning environment.
The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.
The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.
Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course.
Fundamentals Phase (12 Weeks)
In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.
Complete this phase with a foundational understanding of essential cybersecurity concepts.
Computer Networking Fundamentals
In this course, you will receive a comprehensive introduction to computer networking, equipping you with practical experience in configuring and managing network devices for optimal performance and security. Throughout the course, you will develop a solid understanding of network architectures, protocols, and security measures, while enhancing your skills in device configuration and troubleshooting. Through hands-on activities, you will apply critical thinking and problem-solving abilities to overcome common networking challenges.
During the course, you will:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠
Microsoft Security Systems Administration
In this course, you will receive practical, hands-on training specifically designed to secure Microsoft Windows environments. You will gain the knowledge and skills necessary to effectively implement security features and tools like Microsoft Defender, BitLocker, and Windows Firewall. Additionally, you will learn how to configure and manage networks to ensure both security and stability using system administration tools. By the end of the course, you will have a solid understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments in various professional capacities.
During the course, you will:
Integrating Your Infrastructure Security
In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. They will gain knowledge and practical experience in monitoring, scanning, and analyzing threats and vulnerabilities in Linux and cloud-based environments. Remediation techniques will also be covered to address security issues effectively. Additionally, learners will be introduced to the concept of DevSecOps and its impact on the cybersecurity landscape.
During the course, you will:
Information covered in this course helps prepare learners to begin studying for the following certifications: AWS Cloud Practitioner
Infrastructure Phase (12 Weeks)
The Infrastructure Phase gives learners the necessary knowledge and hands-on experience to create and sustain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, they focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions. Learners complete this phase with knowledge of critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.
Securing Your Network
In this course, you will expand your knowledge of networks and delve deeper into their intricacies. You will explore the various components of wired and wireless networks, their vulnerabilities, and security constraints. The focus will be on developing access controls to ensure comprehensive network security, encompassing people, data, and devices. Additionally, you will learn about building and securing networks, including topics such as cryptography and privacy considerations.
During the course, you will:
Familiarize yourself with common tools and technologies that support network safety
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Network+, Cisco Certified CyberOps Associate
Designing Your Cybersecurity Infrastructure
This course provides a deep dive into the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of how to protect endpoint devices, prevent data loss, and address the security considerations associated with industrial systems and IoT devices.
During the course, you will:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP
Social Engineering and Ethical Hacking
In the Social Engineering and Ethical Hacking course, participants will delve into the mindset of hackers and explore game theory principles that relate to cybersecurity defense and solutions. By the end of the course, learners will possess knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and guard against potential threats.
During the course, you will:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® CySA+, PenTest+
Advanced Phase (8 Weeks)
Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities. By successfully completing this phase, you will earn your certificate of completion for the Cybersecurity Bootcamp.
Digital Forensics and Incident Response
The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.
During the course, you will:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP
Threat Hunting and Intelligence
The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure.
During the course, you will:
Information covered in this course helps prepare learners to begin studying for the following certifications: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP
Elective CompTIA® Security+ Certification Exam Prep Course (8 weeks)
As part of the Cybersecurity Bootcamp, learners have the opportunity to enroll in an elective CompTIA® Security+ Exam Prep Course*. This course is specifically designed to equip students with the necessary skills and knowledge to successfully obtain the highly regarded CompTIA® Security+ industry certification. Additionally, students will receive a voucher to take the CompTIA® Security+ certification exam.
During the course, you will:
Gain Skills Applicable to Industry Certifications
This bootcamp is not a certification-prep program, however, by earning industry-recognized certifications*, you can enhance your credentials and gain a competitive edge over other candidates. Our courses focus on key concepts that will provide you with a strong foundation for pursuing the following certifications after completing the Cybersecurity Bootcamp.
-
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration. -
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam. -
CompTIA® Network+
The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies. -
CompTIA® CySA+
The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings.
Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed. -
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn.
The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career. -
(ISC)² SSCP – Systems Security Certified Practitioner**
For individuals who have achieved one year of experience after completion of their program.
Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.
The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures. -
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification goes beyond basic information security knowledge and validates a practitioner's expertise in practical security tasks. GSEC certification holders demonstrate their qualification for hands-on IT systems roles with a focus on security responsibilities. -
Certified Incident Handler
The GIAC Incident Handler (GCIH) certification confirms a practitioner's proficiency in detecting, responding to, and resolving computer security incidents through a comprehensive set of essential security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents, including understanding common attack techniques, vectors, and tools, as well as defending against and responding to such attacks when they arise. -
Certified Information Security Manager
Today's IT professionals are increasingly concerned about data breaches, ransomware attacks, and other ever-changing security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to assess risks, establish efficient governance practices, and proactively respond to incidents in a timely manner.
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
CompTIA® Network+
The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
CompTIA® CySA+
The CompTIA® CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings.
Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn.
The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.
(ISC)² SSCP – Systems Security Certified Practitioner**
For individuals who have achieved one year of experience after completion of their program.
Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.
The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification goes beyond basic information security knowledge and validates a practitioner's expertise in practical security tasks. GSEC certification holders demonstrate their qualification for hands-on IT systems roles with a focus on security responsibilities.
Certified Incident Handler
The GIAC Incident Handler (GCIH) certification confirms a practitioner's proficiency in detecting, responding to, and resolving computer security incidents through a comprehensive set of essential security skills. GCIH certification holders possess the necessary knowledge to effectively manage security incidents, including understanding common attack techniques, vectors, and tools, as well as defending against and responding to such attacks when they arise.
Certified Information Security Manager
Today's IT professionals are increasingly concerned about data breaches, ransomware attacks, and other ever-changing security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to assess risks, establish efficient governance practices, and proactively respond to incidents in a timely manner.
Cybersecurity Bootcamp Cost
Begin the online cybersecurity bootcamp with a 4-week Introductory Course to build foundational skills before enrolling in the Extended Program. No previous experience is required.
4-Week Introductory Course
$180
32-Week Complete Program
$18,320
Requirements
Internet access
Drive, ambition,
and passion
Introductory course
and admission exam