Get the Skills and Experience
You Need to Thrive in
Cybersecurity

Start Here. Go Anywhere.

No matter your level of technological proficiency, the University of Colorado Boulder Cybersecurity Bootcamp can expand your professional skill set and allow you to build a solid foundation for a career in cybersecurity.

Our expert instructors will guide you through the training, where you’ll learn how to defend the virtual world and secure data in a safe, cloud-based platform. You’ll ground yourself in ethical hacking and game theory principles and learn how to fend off real-world attacks, shore up digital defenses and find weaknesses in applications. All the skills that employers are hiring for in today’s connected world.

With over 700,000 job
openings nationwide,
there’s never been a
better time to join
the
cybersecurity
industry.

Source:
Cyberseek.org

img

Accelerate Your Future with
Our Hands-On Curriculum
Explore the Perks of our
Cybersecurity Bootcamp

The Cybersecurity Bootcamp can provide you with the advanced knowledge and skills
necessary to become a full-fledged cybersecurity professional. You’ll learn everything from
the fundamentals to the high-tech skills demanded by employers.

Become a
Cybersecurity Professional

Start building the skills you need to excel in the field of cybersecurity under the guidance
of industry experts eager to train the next generation of cybersecurity professionals.

Hands-On Courses

Gain real-world experience in an accelerated, online environment designed to launch the careers of professionals of all backgrounds and experience levels. Confidently enter the workforce with the hands-on training required to excel in the field of cybersecurity.

Virtual Classroom

Benefit from top-tier instructional methodologies enhanced with cloud-based chat software that allows virtual, hands-on interaction between you and your instructors. This program offers virtual weekday classes on a part-time schedule. Attend exclusive live virtual events with subject matter experts to access networking opportunities, career prep advice and the latest in AI tech.

TDX Arena

Grow your cybersecurity skill set by practicing with TDX Arena, our proprietary virtual training platform. Experience real-world cyberattacks through immersive gamified learning, practice what you learn in class, and test your growing knowledge and skills.

Industry-Leading
Instructors

Learn from instructors who are cybersecurity professionals, bringing years of industry knowledge directly into the classroom. Learners benefit from their unique insights, first-hand experience, as well as their mentorship and guidance.

Build the Skills
That Employers Need

Benefit from a comprehensive career services package handled by a dedicated team of
professional development experts.

Networking Opportunities

Gain access to a network of local and global hiring partners looking to employ newly qualified cybersecurity professionals. Attend virtual networking events designed to introduce you to the variety of opportunities available to you upon program completion.

Dedicated
Support

Routinely meet with a student success manager dedicated to ensuring you have the tools and support you need to thrive in the program and beyond. Know you have a team of professionals backing you in your journey into the field of cybersecurity.

Career
Coaching

Find professional development support within a team of career coaches eager to help you achieve your career goals in cybersecurity. Get help with your resume, prepare for interviews, gain assistance building your LinkedIn profile and more.

Job Search Assistance

Work with our Career Outcomes team to determine what opportunities are available to you. Our search assistance will help you locate career opportunities and thoroughly prepare you for the interview process ahead of time.

Explore
the Curriculum

Get the Course Catalog

img

Program Overview

4-Week Introductory Course
| 32-Week Complete Program

The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

This course gives you a glimpse into the virtual classes and the hands-on training you’ll get in the cybersecurity bootcamp, that way you can make an informed and confident decision before you sign up.

Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the complete course.
In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.

Complete this phase with a foundational understanding of essential cybersecurity concepts.
This course offers a comprehensive introduction to computer networking, providing practical experience in configuring and managing network devices for optimal performance and security. Learners will gain an understanding of network architectures, protocols and security while honing their device configuration and troubleshooting skills. Through hands-on activities, they will apply critical thinking and problem-solving skills to address common networking challenges.

Learners will:
  • Learn how different entities connect and interact across digital landscapes
  • Gain an understanding of the various types of networks and their impact on our interconnected world
  • Harness the power of configuration settings documentation
  • Be exposed to the role of audits in ensuring optimal network performance and security
  • Find out why system and communications protection plays a pivotal role in safeguarding information
  • Learn how to effectively update and adapt policies to keep pace with the ever-evolving landscape


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Network+, ISC2 Certified in Cybersecurity℠
This course offers hands-on training focused on securing Microsoft Windows environments, providing learners with the practical knowledge and skills needed to implement security features and tools, including Microsoft Defender, BitLocker and Windows Firewall. They will also be able to configure and manage networks to ensure security and stability using system admin tools. By the end of the course, participants will understand the basics of Microsoft’s infrastructure and be able to implement and maintain secure Windows environments in various professional roles.

Learners Will:
  • Gain an understanding of Microsoft's infrastructure and its components
  • Learn effective strategies to protect Microsoft's infrastructure from potential threats
  • Develop skills to manage various types of accounts based on business function
  • Explore ways to maintain a secure and safe network environment
  • Discover how automations and scripting can enhance both security and efficiency in cybersecurity roles
  • Understand how Active Directory helps manage permissions and control access to network resources
  • Learn how to improve system security and operational efficiencies with Powershell
This course equips learners with the necessary skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing and enhance system security against threats and vulnerabilities. Additionally, they will learn how to monitor, scan and analyze threats and vulnerabilities in these environments, while also becoming familiar with remediation techniques. Finally, learners will begin to understand how DevSecOps impacts the cybersecurity landscape.

Learners will:
  • Gain an understanding of how to manage Linux operating systems, as well as how to monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments
  • Be introduced to Python programming
  • Develop a basic understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
  • Understand how to remediate and share details to protect other systems
  • Learn how to create automations to efficiently manage and protect systems
  • Explore the design principles of scalable cloud solutions and the integration of different environments
  • Become familiar with DevSecOps


Information covered in this course helps prepare learners to begin studying for the following certification:* AWS Cloud Practitioner
The Infrastructure Phase gives learners the necessary knowledge and hands-on experience to create and sustain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, they focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions.

Learners complete this phase with knowledge of critical security measures, endpoint security and other important concepts that are key to safeguarding organizations.
In this course, you continue to build on your knowledge of networks to deepen that understanding. As you explore networks, you will familiarize yourself with the different components of wired and wireless networks including their security constraints and vulnerabilities. You will then continue on to developing access controls to ensure that you have considered all pieces of what it means to secure a network from people and data to devices. In addition, you will look at how to safely build and secure networks including discussions around cryptography and privacy constraints.

Learners Will:
  • Develop an understanding of network security measures, including strategies needed to keep networks safe
  • Begin to master network monitoring techniques
  • Gain an understanding of how to effectively manage accounts within a system
  • See how security attributes can help strengthen network defenses
  • Become familiar with a range of common tools and technologies that support network safety
  • Acquire the skills to build a secure network architecture
  • Learn the basics of MHN networks and how to set them up effectively
  • Understand the relationship between Telnet and POP3 machines


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Network+, Cisco Certified CyberOps Associate
This course delves into the essential aspects of safeguarding endpoint devices, implementing data loss prevention techniques and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention and the security considerations for industrial systems and IoT devices.

Learners will:
  • Explore endpoint devices to gain an understanding of how to evaluate, identify threats to, and protect them
  • Learn to document and track configurations and tool options Understand how to establish rules and restrictions that safeguard endpoint devices from potential harm
  • Discover how to work with external information systems while maintaining the security of endpoint devices
  • Develop the skills to implement of data loss prevention techniques
  • Become familiar with the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 CISSP
In the Social Engineering and Ethical Hacking course, participants explore the inner workings of hackers' minds and acquire an understanding of game theory principles as they relate to cybersecurity defense and solutions. By the end of the course, learners will have an understanding of social engineering techniques and ethical hacking principles, empowering them to enhance cybersecurity defenses and protect against potential threats.

Learners will:
  • Gain insights into the motivations of potential attackers and their actions
  • Develop an understanding of how to use a malicious hacker’s "state of mind" to enhance system protection
  • Discover how ethical hacking can proactively support applications, systems, and organizational infrastructure
  • Explore how reconnaissance, penetration testing, and defense system bypassing can help keep systems safe
  • Learn how to identify vulnerabilities in web applications and cloud-based systems
  • Build skills to effectively report risks and provide defense recommendations
    Understand how social engineering techniques can be used to deceive individuals


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® CySA+, PenTest+
Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection.

You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities.

Upon successful completion of this phase, you will receive your Cybersecurity Bootcamp certificate of completion.
The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations and report their findings. These skills will help students to recognize, analyze and ideate about security incidents to prevent future breaches.

Learners will:
  • Be immersed in the fundamentals of offensive security
  • Gain an understanding of the basics of digital forensics
  • Explore file and stolen data recovery strategies Learn how to effectively handle various types of attacks targeting organizations
  • Get insight into the strategies attackers use to attain access to critical systems and data
  • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+ and ISC2 SSCP
The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats and develop robust plans to safeguard an organization's infrastructure.

Learners will:
  • Develop a comprehensive understanding of the threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
  • Enhance their ability to proactively identify and respond to threats, fostering a proactive security approach.
  • Acquire the knowledge and skills to develop effective plans and procedures to handle security situations efficiently, ensuring a swift and coordinated response.
  • Cultivate the ability to evaluate information sources and tools, enabling them to strengthen their defense strategies.


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP, ISC2 CISSP
The Cybersecurity Bootcamp includes an elective CompTIA® Security+ Exam Prep Course* designed to prepare students to obtain this valuable industry certification and a voucher for the CompTIA® Security+ certification exam.

Certificate Highlights:
  • Establishes the core knowledge required for any cybersecurity role
  • The only foundational cybersecurity certification that emphasizes hands-on practical skills
  • A globally recognized certification that establishes the core knowledge required in the field and provides a springboard to intermediate-level cybersecurity jobs
Icon
Introductory Course
(4 Weeks)
The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.

This course gives you a glimpse into the virtual classes and the hands-on training you’ll get in the cybersecurity bootcamp, that way you can make an informed and confident decision before you sign up.

Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the complete course.
Icon
Fundamentals Phase
(12 Weeks)
In the Fundamentals Phase you’ll learn the basics of cybersecurity. This deep dive includes a number of concepts needed in order to secure and defend as a cybersecurity professional. First, you will explore network basics and their functions, then focus on learning Microsoft's infrastructure and how to manage a Linux operating system.

Complete this phase with a foundational understanding of essential cybersecurity concepts.
Icon
Computer Networking Fundamentals
This course offers a comprehensive introduction to computer networking, providing practical experience in configuring and managing network devices for optimal performance and security. Learners will gain an understanding of network architectures, protocols and security while honing their device configuration and troubleshooting skills. Through hands-on activities, they will apply critical thinking and problem-solving skills to address common networking challenges.

Learners will:
  • Learn how different entities connect and interact across digital landscapes
  • Gain an understanding of the various types of networks and their impact on our interconnected world
  • Harness the power of configuration settings documentation
  • Be exposed to the role of audits in ensuring optimal network performance and security
  • Find out why system and communications protection plays a pivotal role in safeguarding information
  • Learn how to effectively update and adapt policies to keep pace with the ever-evolving landscape


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Network+, ISC2 Certified in Cybersecurity℠
Icon
Microsoft Security Systems Administration
This course offers hands-on training focused on securing Microsoft Windows environments, providing learners with the practical knowledge and skills needed to implement security features and tools, including Microsoft Defender, BitLocker and Windows Firewall. They will also be able to configure and manage networks to ensure security and stability using system admin tools. By the end of the course, participants will understand the basics of Microsoft’s infrastructure and be able to implement and maintain secure Windows environments in various professional roles.

Learners Will:
  • Gain an understanding of Microsoft's infrastructure and its components
  • Learn effective strategies to protect Microsoft's infrastructure from potential threats
  • Develop skills to manage various types of accounts based on business function
  • Explore ways to maintain a secure and safe network environment
  • Discover how automations and scripting can enhance both security and efficiency in cybersecurity roles
  • Understand how Active Directory helps manage permissions and control access to network resources
  • Learn how to improve system security and operational efficiencies with Powershell
Icon
Integrating Your Infrastructure Security
This course equips learners with the necessary skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing and enhance system security against threats and vulnerabilities. Additionally, they will learn how to monitor, scan and analyze threats and vulnerabilities in these environments, while also becoming familiar with remediation techniques. Finally, learners will begin to understand how DevSecOps impacts the cybersecurity landscape.

Learners will:
  • Gain an understanding of how to manage Linux operating systems, as well as how to monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments
  • Be introduced to Python programming
  • Develop a basic understanding of cloud computing environments and create an instance using Amazon Web Services (AWS)
  • Understand how to remediate and share details to protect other systems
  • Learn how to create automations to efficiently manage and protect systems
  • Explore the design principles of scalable cloud solutions and the integration of different environments
  • Become familiar with DevSecOps


Information covered in this course helps prepare learners to begin studying for the following certification:* AWS Cloud Practitioner
Icon
Infrastructure Phase
(12 weeks)
The Infrastructure Phase gives learners the necessary knowledge and hands-on experience to create and sustain secure infrastructures and technologies. After learning how to monitor, manage, and build secure networks, they focus on understanding the perspective of hackers as a way to implement cybersecurity defense and solutions.

Learners complete this phase with knowledge of critical security measures, endpoint security and other important concepts that are key to safeguarding organizations.
Icon
Securing Your Network
In this course, you continue to build on your knowledge of networks to deepen that understanding. As you explore networks, you will familiarize yourself with the different components of wired and wireless networks including their security constraints and vulnerabilities. You will then continue on to developing access controls to ensure that you have considered all pieces of what it means to secure a network from people and data to devices. In addition, you will look at how to safely build and secure networks including discussions around cryptography and privacy constraints.

Learners Will:
  • Develop an understanding of network security measures, including strategies needed to keep networks safe
  • Begin to master network monitoring techniques
  • Gain an understanding of how to effectively manage accounts within a system
  • See how security attributes can help strengthen network defenses
  • Become familiar with a range of common tools and technologies that support network safety
  • Acquire the skills to build a secure network architecture
  • Learn the basics of MHN networks and how to set them up effectively
  • Understand the relationship between Telnet and POP3 machines


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Network+, Cisco Certified CyberOps Associate
Icon
Designing Your Cybersecurity Infrastructure
This course delves into the essential aspects of safeguarding endpoint devices, implementing data loss prevention techniques and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention and the security considerations for industrial systems and IoT devices.

Learners will:
  • Explore endpoint devices to gain an understanding of how to evaluate, identify threats to, and protect them
  • Learn to document and track configurations and tool options Understand how to establish rules and restrictions that safeguard endpoint devices from potential harm
  • Discover how to work with external information systems while maintaining the security of endpoint devices
  • Develop the skills to implement of data loss prevention techniques
  • Become familiar with the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT)


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 CISSP
Icon
Social Engineering and Ethical Hacking
In the Social Engineering and Ethical Hacking course, participants explore the inner workings of hackers' minds and acquire an understanding of game theory principles as they relate to cybersecurity defense and solutions. By the end of the course, learners will have an understanding of social engineering techniques and ethical hacking principles, empowering them to enhance cybersecurity defenses and protect against potential threats.

Learners will:
  • Gain insights into the motivations of potential attackers and their actions
  • Develop an understanding of how to use a malicious hacker’s "state of mind" to enhance system protection
  • Discover how ethical hacking can proactively support applications, systems, and organizational infrastructure
  • Explore how reconnaissance, penetration testing, and defense system bypassing can help keep systems safe
  • Learn how to identify vulnerabilities in web applications and cloud-based systems
  • Build skills to effectively report risks and provide defense recommendations
    Understand how social engineering techniques can be used to deceive individuals


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® CySA+, PenTest+
Icon
Advanced Phase
(8 Weeks)
Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection.

You will move beyond cyber tech theories to understanding digital forensics and response tools needed to conduct post-attack investigations and more. You will also learn various attack types, the attack kill chain, attack implementation, how to respond to ongoing attacks, mitigation strategies, and how to identify vulnerabilities.

Upon successful completion of this phase, you will receive your Cybersecurity Bootcamp certificate of completion.
Icon
Digital Forensics and Incident Response
The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations and report their findings. These skills will help students to recognize, analyze and ideate about security incidents to prevent future breaches.

Learners will:
  • Be immersed in the fundamentals of offensive security
  • Gain an understanding of the basics of digital forensics
  • Explore file and stolen data recovery strategies Learn how to effectively handle various types of attacks targeting organizations
  • Get insight into the strategies attackers use to attain access to critical systems and data
  • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+ and ISC2 SSCP
Icon
Threat Hunting and Intelligence
The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats and develop robust plans to safeguard an organization's infrastructure.

Learners will:
  • Develop a comprehensive understanding of the threats and vulnerabilities that can arise within an organization's network infrastructure, encompassing hardware devices, software applications, and network services.
  • Enhance their ability to proactively identify and respond to threats, fostering a proactive security approach.
  • Acquire the knowledge and skills to develop effective plans and procedures to handle security situations efficiently, ensuring a swift and coordinated response.
  • Cultivate the ability to evaluate information sources and tools, enabling them to strengthen their defense strategies.


Information covered in this course helps prepare learners to begin studying for the following certifications:* CompTIA® Security+, CompTIA® CySA+, ISC2 SSCP, ISC2 CISSP
Icon
Elective CompTIA® Security+ Certification Exam Prep Course
(8 weeks)
The Cybersecurity Bootcamp includes an elective CompTIA® Security+ Exam Prep Course* designed to prepare students to obtain this valuable industry certification and a voucher for the CompTIA® Security+ certification exam.

Certificate Highlights:
  • Establishes the core knowledge required for any cybersecurity role
  • The only foundational cybersecurity certification that emphasizes hands-on practical skills
  • A globally recognized certification that establishes the core knowledge required in the field and provides a springboard to intermediate-level cybersecurity jobs
*For details, please visit thrivedx.com/cybersecurity-program-disclaimers.

Get Ready for Global
Cybersecurity Certifications

Those new to the cybersecurity field are more likely to be hired if they obtain internationally recognized certifications. In an effort to boost your credentials, we’ve developed an in-depth hub of resources that can help you prepare for industry-standard certification exams.

The TDX Arena platform also features study guides, question banks, a “Cyberpedia” with cybersecurity knowledge and challenges designed to help learners practice for their exams.

It’s recommended that learners pursue one certification during each phase of the bootcamp, per their own career goals.

The Linux LPI Essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration. The AWS Certified Cloud Practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers. The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication and virtualization technologies. Designed to provide a higher focus at an intermediate level on applying behavioral analytics to networks than the CompTIA® Security+ exam, this exam will cover core cybersecurity skills while placing a greater significance on software and application security. Additionally it will cover automation, threat hunting and IT compliance within the industry. The CompTIA CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings. Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed. For learners who have achieved at least one year of experience after completion of the program.

Candidates with proven security knowledge and practical, hands-on security experience can consider the ISC2 SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.
The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks. The GIAC Incident Handler certification validates a practitioner's ability to detect, respond and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur. Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.
LPI Linux Essentials
The Linux LPI Essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.
CompTIA Network+
The CompTIA® Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication and virtualization technologies.
CompTIA® CySA+
Designed to provide a higher focus at an intermediate level on applying behavioral analytics to networks than the CompTIA® Security+ exam, this exam will cover core cybersecurity skills while placing a greater significance on software and application security. Additionally it will cover automation, threat hunting and IT compliance within the industry.
CompTIA CySA+
The CompTIA CySA+ certification exam measures a learner’s ability to proactively capture, monitor, and respond to network traffic findings. Skills in software and application security, automation, threat hunting, and IT regulatory compliance are also assessed.
ISC2 SSCP – Systems Security Certified Practitioner**
For learners who have achieved at least one year of experience after completion of the program.

Candidates with proven security knowledge and practical, hands-on security experience can consider the ISC2 SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.
Certified Incident Handler
The GIAC Incident Handler certification validates a practitioner's ability to detect, respond and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
Certified Information Security Manager
Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.
*For details, please visit thrivedx.com/cybersecurity-program-disclaimers. ** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Program Tuition

Invest in your professional development and get the job-ready skill set you need to enter the field of cybersecurity.

4-Week Introductory Course

$180

32-Week Complete Program

$17,800

Requirements

Internet access

Drive, ambition and passion

Pass the admission exam after the
Introductory Course

Tuition, fees and deposits are subject to change.

img