SDSU Global Campus Cybersecurity Bootcamp
Accelerated Program | Online Classes | In-Depth Training


Become a Cyber Professional in Just Nine Months
Set the Stage for a Successful Career
The SDSU Global Campus Cybersecurity Bootcamp, powered by ThriveDX, prepares learners to enter the cyber workforce in nine months. Learn from industry-leading instructors in a virtual classroom setting that includes real-world cyberattack simulations, a comprehensive and immersive curriculum, industry networking opportunities, and ongoing career guidance and professional development.
Build Job-Ready Skills With an Accelerated Curriculum
Practice with the latest tools and techniques and get the hands-on cybersecurity training you need to become a qualified, hire-ready professional.

Become a Cyber Defender With Hands-On Training

Learn by Doing
Spend nine months practicing the future-forward skills that will impress hiring managers. By the end of the program, you'll be equipped to apply your knowledge and hands-on experience immediately in a cybersecurity role.

Virtual Classroom
This part-time program offers virtual classes, self-study options, and recorded sessions so that you have a firm grasp of cybersecurity. Communication tools foster collaborative learning, helping you find community in the field.

Expert Instructors
Learn from cybersecurity experts with years of industry experience. Their insights and guidance will prepare you for the job market.

TDX Arena
Apply classroom knowledge in real-world scenarios through TDX Arena, the bootcamp’s proprietary online training platform. Engage in cyberattack simulations and focused, immersive, gamified learning to sharpen your skills.
Personalized Support Every Step of the Way

Professional Network
Attend live virtual events with career fairs, industry panels, mock interview days, skill-building webinars, and more.

Career Coaching
Achieve your career goals with the support of a dedicated team of professionals on a mission to get you ready for job opportunities. Our Career Coaches will help with your resume, LinkedIn profile, interview prep, and more to help you find the career of your dreams.

Student Support
Learners are paired with Student Success Managers who can provide access to additional resources and facilitate tutoring sessions and exam retests. They help you thrive throughout the program and beyond by keeping you accountable and providing constant guidance.

Job Search Assistance
Get help finding the cybersecurity roles that are right for you and your career aspirations. An expert Career Outcomes team can help you scout for job opportunities and get your foot in the door for your first cybersecurity role.

Discover Everything You’ll Learn
Download the course catalog.
Program Overview
4-Week Introductory Course | 32-Week Complete Program
- Introductory Course4 Weeks
The Introductory Course allows you to get a feel for the virtual learning environment.
The course covers topics like the fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.
Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the Complete Program.
- Fundamentals Phase12 Weeks
The Fundamentals Phase covers essential cybersecurity principles, including network basics and their functions, Microsoft’s infrastructure, and Linux operating system management. You’ll leave this phase with a solid foundation to help you advance in the world of cybersecurity.
Complete this phase with a foundational understanding of essential cybersecurity concepts.
- Computer Networking Fundamentals
In this course, you will receive a comprehensive introduction to computer networking, equipping you with practical experience in configuring and managing network devices for optimal performance and security. Throughout the course, you will develop a solid understanding of network architectures, protocols, and security measures, while enhancing your skills in device configuration and troubleshooting. Through hands-on activities, you will apply critical thinking and problem-solving abilities to overcome common networking challenges.
Learners will:Â
- Explore how different entities connect and interact in digital environments.
- Understand the various types of networks and their impact on our interconnected world.
- Harness the power of configuration settings documentation.
- Gain insight into the role of audits in ensuring optimal network performance and security.
- Discover the importance of system and communications protection in safeguarding information.
- Learn effective strategies for updating and adapting policies to keep up with the evolving landscape.
Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA®  Network+, ISC2 Certified in Cybersecurityâ„
- Microsoft Security Systems Administration
In this course, you will receive practical, hands-on training on securing Microsoft Windows environments. You will gain the knowledge and skills necessary to effectively implement security features and tools like Microsoft Defender, BitLocker, and Windows Firewall. Additionally, you will learn how to configure and manage networks to ensure both security and stability using system administration tools. By the end of the course, you will have a solid understanding of Microsoft infrastructure and the ability to establish and maintain secure Windows environments in various professional capacities.
Learners will:
- Acquire a comprehensive understanding of Microsoft infrastructure and its key components.
- Learn effective strategies to safeguard Microsoft’s infrastructure from potential threats.
- Develop the skills necessary to manage different types of accounts based on business functions.
- Explore methods to maintain a secure and safe network environment.
- Discover how automations and scripting can enhance security and efficiency in cybersecurity roles.
- Gain insights into how Active Directory facilitates permission management and access control for network resources.
Learn how to enhance system security and operational efficiency using Powershell.
- Integrating Your Infrastructure Security
In this course, learners will acquire the essential skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. They will gain knowledge and practical experience in monitoring, scanning, and analyzing threats and vulnerabilities in Linux and cloud-based environments. Remediation techniques will also be covered to address security issues effectively. Additionally, learners will be introduced to the concept of DevSecOps and its impact on the cybersecurity landscape.
Learners will:
- Understand the management of Linux operating systems and gain the ability to identify, monitor, and analyze threats and vulnerabilities in Linux and cloud-based environments.
- Gain proficiency in basic Python programming for automating tasks and enhancing system security.
- Develop a foundational understanding of cloud computing environments and create an instance using Amazon Web Services (AWS).
- Acquire knowledge and skills in remediation techniques and sharing details to protect other systems.
- Explore the creation of automations to efficiently manage and safeguard systems.
- Understand the design principles of scalable cloud solutions and the integration of different environments.
- Familiarize yourself with the concept of DevSecOps and its importance in modern cybersecurity.
Information covered in this course helps prepare learners to begin studying for the following certification:* AWS Cloud Practitioner
- Infrastructure Phase12 Weeks
The Infrastructure Phase provides you with the knowledge and hands-on experience to create and sustain secure infrastructures and technologies. You’ll gain practical skills in applying critical security measures, as well as an understanding of a hacker’s perspective, to safeguard organizational systems.
- Securing Your Network
In this course, you will expand your knowledge of networks and delve deeper into their intricacies. You will explore the various components of wired and wireless networks, their vulnerabilities, and security constraints. The focus will be on developing access controls to ensure comprehensive network security, encompassing people, data, and devices. Additionally, you will learn about building and securing networks, including topics such as cryptography and privacy considerations.
Learners will:
- Develop an understanding of network security measures and effective strategies to maintain network safety.
- Begin to master network monitoring techniques for proactive security.
- Gain knowledge on managing accounts within a system for improved security.
- Explore how security attributes contribute to strengthening network defenses.
- Familiarize yourself with common tools and technologies that support network safety.
- Acquire skills to design a secure network architecture.
- Learn the fundamentals of setting up MHN networks for effective threat detection.
- Understand the relationship between Telnet and POP3 machines in the context of network security.
Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Network+, Cisco Certified CyberOps Associate
- Designing Your Cybersecurity Infrastructure
This course provides a deep dive into the essential aspects of securing endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization’s digital assets. By the end of the course, participants will have a comprehensive understanding of how to protect endpoint devices, prevent data loss, and address the security considerations associated with industrial systems and IoT devices.
Learners will:Â
- Gain insights into evaluating, identifying threats, and protecting endpoint devices.
- Learn effective documentation and tracking of configurations and tool options.
- Establish rules and restrictions to safeguard endpoint devices from potential harm.
- Work with external information systems while ensuring the security of endpoint devices.
- Develop skills for implementing data loss prevention techniques.
- Acquire knowledge about the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).
Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA®  Security+, CompTIA®  CySA+, ISC2 CISSP
- Social Engineering and Ethical Hacking
In the Social Engineering and Ethical Hacking course, you will delve into the mindset of hackers and explore game theory principles that relate to cybersecurity defense and solutions. By the end of the course, you will possess knowledge of social engineering techniques and ethical hacking principles, empowering them to strengthen cybersecurity defenses and guard against potential threats.
Learners will:Â
- Gain insights into the motivations and actions of potential attackers.
- Understand how to leverage the mindset of malicious hackers to enhance system protection.
- Discover the proactive role of ethical hacking in supporting applications, systems, and organizational infrastructure.
- Explore techniques such as reconnaissance, penetration testing, and defense system bypassing for maintaining system security.
- Learn to identify vulnerabilities in web applications and cloud-based systems.
- Develop skills to effectively report risks and provide defense recommendations.
- Recognize the deceptive nature of social engineering techniques and their impact on individuals’ security.
Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA®  CySA+, PenTest+
- Advanced Phase8 Weeks
The Advanced Phase equips you with the knowledge and tools to respond to attacks and secure systems against future threats using digital forensics and post-attack response tools.
Upon successful completion of this phase, you will receive your Cybersecurity Professional Bootcamp Certificate of Completion.
- Digital Forensics and Incident Response
The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.Â
Learners will:Â
- Be immersed in the fundamentals of offensive security.
- Gain an understanding of the basics of digital forensics.
- Explore file and stolen data recovery strategies.
- Learn how to effectively handle various types of attacks targeting organizations.
- Get insight into the strategies attackers use to attain access to critical systems and data.
- Explore the basics of malware analysis to enhance your ability to detect and neutralize potential threats.
Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+, and ISC2 SSCP
- Threat Hunting and Intelligence
The Threat Hunting and Intelligence course empowers learners with the knowledge to detect and address vulnerabilities in an organization’s infrastructure. Upon completion of the course, learners will be able to identify vulnerabilities, respond effectively to threats and establish robust plans to protect an organization’s infrastructure.
Learners will:Â
- Gain an understanding of the threats and vulnerabilities that can emerge within an organization’s network infrastructure, including hardware devices, software applications and network services.
- Grow their ability to proactively identify and respond to threats.
- Learn to develop plans and procedures to effectively handle situations, ensuring a swift and coordinated response.
- Develop the skills to evaluate sources of information and tools needed to bolster their defenses.
Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP, ISC2 CISSP
- Elective CompTIA® Security+ Certification Exam Prep Course8 Weeks
As part of the Cybersecurity Bootcamp, learners have the opportunity to enroll in an elective CompTIA® Security+ Exam Prep Course.* This course is specifically designed to equip students with the necessary skills and knowledge to successfully obtain the highly regarded CompTIA® Security+ industry certification. Additionally, learners will receive a voucher to take the CompTIA® Security+ certification exam.
Certificate highlights:Â
- Develop a solid foundation of knowledge essential for any cybersecurity role.
- Gain hands-on practical skills emphasized by the only foundational cybersecurity certification.
Attain a globally recognized certification that establishes the fundamental knowledge required in the field and serves as a gateway to intermediate-level cybersecurity positions.
*For more information, please visit https://thrivedx.com/cybersecurity-program-disclaimers.
The Foundation You Need for Industry Exams
This bootcamp is not a certification-prep program; however, by earning industry-recognized certifications,* you can enhance your credentials and gain a competitive edge over other candidates. The courses focus on key concepts that will provide you with a strong foundation for pursuing the following certifications after completing the Cybersecurity Bootcamp.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
The Cybersecurity Bootcamp includes complimentary access to the AWS Academy curriculum and a discounted voucher for the AWS Certification exam.* Program materials help provide a real-world understanding of AWS Cloud practices so learners can pursue AWS Cloud Certification to work in entry-level roles.Â
*For more information, please visit https://thrivedx.com/cybersecurity-program-disclaimers.
Certified Information Security Manager
Today’s cyber professionals are increasingly concerned about data breaches, ransomware attacks, and other ever-changing security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to assess risks, establish efficient governance practices, and proactively respond to incidents in a timely manner.
CertNexus® CyberSec First Responder® (CFR)
The Cybersecurity Bootcamp helps learners prepare for the CertNexus® CyberSec First Responder® (CFR) certification. A 20% discount for CertNexus® certifications and prep material is available to learners upon completion of the program.*
*For more information, please visit https://thrivedx.com/cybersecurity-program-disclaimers.
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate certification allows learners to gain an understanding of how Security Operations Centre (SOC) teams detect and respond to security incidents and is considered a great starting point for cybersecurity professionals.Â
CompTIA® CySA+
Designed to provide a higher focus at an intermediate level on applying behavioral analytics to networks than the CompTIA®  Security+ exam, this exam will cover core cybersecurity skills while placing a greater significance on software and application security. Additionally, it will cover automation, threat hunting, and IT compliance within the industry.
CompTIA® Network+
The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
GIAC Certified Incident Handler
The GIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification goes beyond basic information security knowledge and validates a practitioner’s expertise in practical security tasks. GSEC certification holders demonstrate their qualification for hands-on IT systems roles with a focus on security responsibilities.
ISC2 SSCP – Systems Security Certified Practitioner
Learners with at least one year of experience after the completion of their program can take the ISC2 SSCP – Systems Security Certified Practitioner certification exam.*
The ISC2 SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
*Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
- AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
The Cybersecurity Bootcamp includes complimentary access to the AWS Academy curriculum and a discounted voucher for the AWS Certification exam.* Program materials help provide a real-world understanding of AWS Cloud practices so learners can pursue AWS Cloud Certification to work in entry-level roles.Â
*For more information, please visit https://thrivedx.com/cybersecurity-program-disclaimers.
- Certified Information Security Manager
Today’s cyber professionals are increasingly concerned about data breaches, ransomware attacks, and other ever-changing security threats. By obtaining a Certified Information Security Manager® (CISM®) certification, you will acquire the knowledge and skills necessary to assess risks, establish efficient governance practices, and proactively respond to incidents in a timely manner.
- CertNexus® CyberSec First Responder® (CFR)
The Cybersecurity Bootcamp helps learners prepare for the CertNexus® CyberSec First Responder® (CFR) certification. A 20% discount for CertNexus® certifications and prep material is available to learners upon completion of the program.*
*For more information, please visit https://thrivedx.com/cybersecurity-program-disclaimers.
- Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate certification allows learners to gain an understanding of how Security Operations Centre (SOC) teams detect and respond to security incidents and is considered a great starting point for cybersecurity professionals.Â
- CompTIA® CySA+
Designed to provide a higher focus at an intermediate level on applying behavioral analytics to networks than the CompTIA®  Security+ exam, this exam will cover core cybersecurity skills while placing a greater significance on software and application security. Additionally, it will cover automation, threat hunting, and IT compliance within the industry.
- CompTIA® Network+
The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
- GIAC Certified Incident Handler
The GIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
- GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification goes beyond basic information security knowledge and validates a practitioner’s expertise in practical security tasks. GSEC certification holders demonstrate their qualification for hands-on IT systems roles with a focus on security responsibilities.
- ISC2 SSCP – Systems Security Certified Practitioner
Learners with at least one year of experience after the completion of their program can take the ISC2 SSCP – Systems Security Certified Practitioner certification exam.*
The ISC2 SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
*Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
- LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.

Program Tuition
This is your chance to invest in your professional development and use this career-prep program to jumpstart your future as a cybersecurity professional.
$180
4-Week Introductory Course
$18,320
32-Week Complete Program
Requirements
- Internet access
- Introductory course and admission exam
Tuition, fees, and deposits are subject to change.