Become a Cybersecurity
Professional in 10 Months

Set the Stage
for a Successful
Cybersecurity Career

The SDSU Global Campus Cybersecurity Bootcamp, in partnership with ThriveDX, prepares learners to thrive in a cybersecurity career in less than a year. Learn from industry-leading instructors in a virtual classroom setting that includes real-world cyberattack simulations, a comprehensive and immersive curriculum, industry networking opportunities, and ongoing career guidance and professional development.

With over 700,000 job
openings nationwide,
there’s never been a
better time to join the
cybersecurity
industry

Source:
Cyberseek.org

img

Fast-Track Your
Cybersecurity Training
Build Job-Ready Skills with an Accelerated Curriculum

Practice with the latest tools and techniques and get the hands-on cybersecurity training you need to
build advanced skills and become a sought-after, qualified professional.

Get Practical
Experience as a
Cyber Defender

Learn to Fight Hackers
Train with
Real-World Cyberattack Simulations

Cyber Labs
and TDX Arena

Apply what you learn in class to the real world. Improve your cybersecurity skills by practicing through Cyber Labs and TDX Arena, this bootcamp’s proprietary online training platform. You’ll experience cyberattack simulations and focused training through immersive, gamified learning.

Expert Instructors

Get trained in cybersecurity by expert instructors with years of experience in the cybersecurity field. Their first-hand industry knowledge and unique perspectives will enrich your learning experience and guide you as you prepare to enter the cybersecurity job market.

Learn By Doing

Practice the skills that will impress future employers. The hands-on approach to cybersecurity education ensures that by the time you complete the program, you will possess job-ready skills that you can use in your cybersecurity position from day one.

Virtual Classroom

With remote and live classes, this part-time program offers a virtual learning ecosystem, including class recordings. A host of communication tools fosters interactions among learners and instructors, helping you to create a community of cybersecurity professionals.

360° Support to Help
You Succeed

A Bootcamp Designed to Help
You Thrive

Professional Network

Join virtual networking events and grow your professional connections in the world of cybersecurity. Take advantage of a community of industry partners and cybersecurity experts and uncover professional opportunities for your future career.

Student Support

Student success managers can help you access additional resources as needed, such as exam retests and tutoring sessions, and are dedicated to seeing you thrive in the program and beyond.

Career Coaching

During the program, you will work with a dedicated team of career coaches to get ready for job-hunting. From perfecting your resume and polishing your LinkedIn profile to practicing interview questions—they are instrumental in helping you achieve the career of your dreams.

Job Search Assistance

Get help finding the cybersecurity roles that are right for you and your career aspirations. An expert Career Outcomes team can help you scout for the job opportunities you need to break into cybersecurity.

Explore The Bootcamp’s Classes
Download the
Course Catalog

img

Program Overview

30-Hour Introductory Course
| 370-Hour Extended Program

  • Introductory Course

    The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.

    The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

    Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course.
  • Part 1: Fundamentals

    In the Fundamentals part of the bootcamp, individuals learn the basics of cybersecurity. It includes training on Microsoft Windows, Linux, and basic network and cloud security.

    This phase acts as foundational training for the more rigorous portions of the program.
  • Microsoft Security

    Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure.

    The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server.

    Learners will gain the best practices for administrating and securing the Microsoft ecosystem of products.
  • Computer Networking

    Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices.

    Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.
  • Cloud Security

    Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming commonplace as more organizations adopt them.

    The Cloud Security course prepares learners to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that individuals can understand how to implement security for cloud-based platforms.

    Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*.
  • Linux Security

    The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Individuals will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available.

    Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam*.
  • Part 2: Cybersecurity Infrastructure

    In the Cybersecurity Infrastructure part of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced Cybersecurity part of the program.
  • Network Security

    Networks are the foundation for nearly everything on the internet. This phase of the course covers the technologies needed to protect the integrity of a company's infrastructure by preventing network breaches and a wide variety of potential threats.

    Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation.
  • Cyber Infrastructure & Technology

    This course provides learners with the knowledge and practical training needed to design and maintain secure infrastructures and technologies.

    Security countermeasures such as SIEM, SOAR, endpoint security, and more provide an essential understanding of how to effectively protect organizations.

    This course begins to cover the CompTIA Security+ and CySA+ certificate objectives.
  • Intro to Python for Security

    Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro to Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
  • Part 3: Advanced Cybersecurity

    In the Advanced Cybersecurity part of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.
  • Offensive Security: Ethical Hacking

    This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Offensive Security: Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.
  • DFIR and Threat Hunting

    When there’s a cyberattack, first responders are the first in line to analyze and contain the incident.

    The DFIR and Threat Hunting course gives learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering, and report the results.
  • Game Theory Strategy in Cybersecurity

    In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is.

    The Game Theory Strategy in Cybersecurity course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
  • Career Outcomes

    Get the competitive edge you need to succeed.

    This specialized course provides learners with the career planning, training, and tools needed to enter the field of cybersecurity—along with personalized interview coaching, professional networking, and one-on-one consultations devoted to perfecting LinkedIn profiles and resumes.

    Put your best foot forward as you prepare to seek entry into the field of cybersecurity.
Icon

Introductory Course 30 Hours

The Introductory Course allows you to take the Cybersecurity Bootcamp for a test drive and get a feel for the remote learning environment.

The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course.

Icon

Part 1: Fundamentals

In the Fundamentals part of the bootcamp, individuals learn the basics of cybersecurity. It includes training on Microsoft Windows, Linux, and basic network and cloud security.

This phase acts as foundational training for the more rigorous portions of the program.

Icon

Microsoft Security 40 Hours

Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure.

The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server.

Learners will gain the best practices for administrating and securing the Microsoft ecosystem of products.

Icon

Computer Networking 50 Hours

Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices.

Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.

Icon

Cloud Security 15 Hours

Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming commonplace as more organizations adopt them.

The Cloud Security course prepares learners to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that individuals can understand how to implement security for cloud-based platforms.

Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*.

Icon

Linux Security 30 Hours

The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Individuals will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available.

Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam*.

Icon

Part 2: Cybersecurity Infrastructure

In the Cybersecurity Infrastructure part of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced Cybersecurity part of the program.

Icon

Network Security 35 Hours

Networks are the foundation for nearly everything on the internet. This phase of the course covers the technologies needed to protect the integrity of a company's infrastructure by preventing network breaches and a wide variety of potential threats.

Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation.

Icon

Cyber Infrastructure & Technology 40 Hours

This course provides learners with the knowledge and practical training needed to design and maintain secure infrastructures and technologies.

Security countermeasures such as SIEM, SOAR, endpoint security, and more provide an essential understanding of how to effectively protect organizations.

This course begins to cover the CompTIA Security+ and CySA+ certificate objectives.

Icon

Intro to Python for Security 25 Hours

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro to Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

Icon

Part 3: Advanced Cybersecurity

In the Advanced Cybersecurity part of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.

Icon

Offensive Security: Ethical Hacking 50 Hours

This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Offensive Security: Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.

Icon

DFIR and Threat Hunting 60 Hours

When there’s a cyberattack, first responders are the first in line to analyze and contain the incident.

The DFIR and Threat Hunting course gives learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering, and report the results.

Icon

Game Theory Strategy in Cybersecurity 10 Hours

In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is.

The Game Theory Strategy in Cybersecurity course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.

Icon

Career Outcomes 15 Hours

Get the competitive edge you need to succeed.

This specialized course provides learners with the career planning, training, and tools needed to enter the field of cybersecurity—along with personalized interview coaching, professional networking, and one-on-one consultations devoted to perfecting LinkedIn profiles and resumes.

Put your best foot forward as you prepare to seek entry into the field of cybersecurity.

*Although the course curriculum provides the knowledge necessary to do well on industry exams, this isn’t a test preparation program, where the main focus is how a student performs on an exam. Certification exams are not taken as part of the program and will require additional costs not included in the program tuition.

Gain Skills Applicable to Industry Certifications

This bootcamp is not a certification-prep program, however, we know that attaining industry-recognized certifications can help newly qualified cybersecurity professionals stand out from the crowd. In an effort to boost your credentials, we’ve created in-depth resources to help you learn skills applicable to the following certification exams.

  • LPI Linux Essentials

    The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
  • CompTIA Network+

    The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
  • CompTIA Security+

    The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing.
  • CompTIA CySA+

    The CompTIA CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings.

    Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.
  • Cisco Certified CyberOps Associate

    The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn.

    The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For individuals who have achieved one year of experience after completion of their program.

    Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

    The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.

LPI Linux Essentials

The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.

CompTIA Network+

The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.

CompTIA Security+

The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing.

CompTIA CySA+

The CompTIA CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings.

Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.

Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn.

The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.

(ISC)² SSCP – Systems Security Certified Practitioner**

For individuals who have achieved one year of experience after completion of their program.

Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.

** In order to be certified, learners must have a minimum of at least one year of cumulative work experience in one or more of the seven disciplines of the SSCP Common Body of Knowledge (CBK)

Program Tuition

Put yourself first with cybersecurity training for the real world. Enroll in the bootcamp and build the job-ready skills you need to launch a career in cybersecurity.

30-Hour Introductory Course

$180

370-Hour Extended Program

$15,820

Requirements

Internet access

Drive, ambition,
and passion

Introductory course
and admission exam

img
Skip to content