Get the Skills and Experience
You Need to Thrive in
Cybersecurity

Start Here. Go Anywhere.

No matter your level of technological proficiency, the University of Colorado Boulder Cybersecurity Bootcamp can expand your professional skill set and allow you to build a solid foundation for a career in cybersecurity.

Our expert instructors will guide you through the training, where you’ll learn how to defend the virtual world and secure data in a safe, cloud-based platform. You’ll ground yourself in ethical hacking and game theory principles and learn how to fend off real-world attacks, shore up digital defenses and find weaknesses in applications. All the skills that employers are hiring for in today’s connected world.

With over 460,000 job
openings nationwide,
there’s never been a
better time to join
the
cybersecurity
industry

Source:
Cyberseek.org

img

Accelerate Your Future with
Our Hands-On Curriculum
Explore the Perks of our
Cybersecurity Bootcamp

The Cybersecurity Bootcamp can provide you with the advanced knowledge and skills
necessary to become full-fledged cybersecurity professional. You’ll learn everything from
the fundamentals to the high-tech skills demanded by employers.

Become a
Cybersecurity Professional

Start building the skills you need to excel in the field of cybersecurity under the guidance
of industry experts eager to train the next generation of cybersecurity professionals.

Hands-On Courses

Gain real-world experience in an accelerated, online environment designed to launch the careers of professionals of all backgrounds and experience levels. Confidently enter the workforce with the hands-on training required to excel in the field of cybersecurity.

Virtual Classroom

Benefit from top-tier instructional methodologies enhanced with cloud-based chat software that allows live, virtual, hands-on interaction between you and your instructors. Virtually attend classes in the evenings and on the weekends from the comfort of your own home.

Cyber Labs

Learn to identify vulnerabilities on the web, server, mobile and desktop platforms and create secure defenses that protect against a variety of threats through real-world simulations. Complete cyber labs designed by cybersecurity experts to gain the knowledge you need to succeed.

Industry-Leading
Instructors

Benefit from expert instructor's current industry knowledge as well as from their unique insider’s understanding of the fast-paced field of cybersecurity. Experience personalized mentorship and guidance as you learn what it takes to become a cybersecurity professional.

Build the Skills
That Employers Need

Benefit from a comprehensive career services package handled by a dedicated team of
professional development experts.

Networking Opportunities

Gain access to a network of local and global hiring partners looking to employ newly qualified cybersecurity professionals. Attend virtual networking events designed to introduce you to the variety of opportunities available to you upon program completion.

Dedicated
Support

Routinely meet with a student success manager dedicated to ensuring you have the tools and support you need to thrive in the program and beyond. Know you have a team of professionals backing you in your journey into the field of cybersecurity.

Career
Coaching

Find professional development support within a team of career coaches eager to help you achieve your career goals in cybersecurity. Get help with your resume, prepare for interviews, gain assistance building your LinkedIn profile and more.

Job Placement Assistance

Work with our Career Services team to determine what opportunities are available to you. Our placement assistance will help you locate career opportunities and thoroughly prepare you for the interview process ahead of time.

Explore
the Curriculum
Get the Course Catalog

img

Program Overview

30-Hour Introductory Course
| 370-Hour Extended Program

  • Introductory Course

    Take the Cybersecurity Bootcamp for a test drive with the introductory course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors and more.

    You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended program.

    When the introductory course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.
  • The Fundamentals Phase

    In the Fundamentals Phase of the program, learners will develop an understanding of the basics of cybersecurity. This portion covers Microsoft Windows, Linux and basic network and cloud security, and acts as training to prepare learners for the more rigorous Infrastructure phase.
  • Microsoft Security

    Many companies across the globe use Windows Servers exclusively to maintain their computers and networks. In the Microsoft Security course, learners will receive a hands-on education with widely used and modern versions of both Microsoft Windows and Microsoft Server. Learners will get experience to administer and secure Microsoft operating systems and will discover how to become good practitioners with Microsoft’s product ecosystem.
  • Computer Networking

    Computer networks form the basis of many systems across industries—from finance to hospitality. The Computer Networking course will give learners a broad overview of networking, including network designs, topologies, protocols and devices.

    In the Computer Networking course, learners will build a foundation to later study and take the CompTIA Network+ exam* after also finishing the Network Security course.
  • Cloud Security

    Cloud-based infrastructure is becoming more common among different organizations and companies. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service providers like Amazon Web Services, Google Cloud or Microsoft Azure. Additionally, learners will become familiar with some of the options for securing cloud-based solutions.

    Upon completion of this course, learners will have the foundational cloud security knowledge to begin preparing for the AWS Cloud Practitioner certification exam*.
  • Linux Security

    Linux is the most used operating system in the world and is also an important tool for cybersecurity professionals. In the Linux Security course, learners will become familiar with the basics of using and manipulating the Linux operating system and will also learn about various Linux distributions.

    Upon finishing this course, learners will also be able to begin preparing for the LPI Linux Essentials certification exam*.
  • The Fundamentals Final Project - Building Your Own Environment

    In the final project of the Fundamentals Phase, learners will craft an insecure, small business infrastructure that they’ll secure while also getting hands-on practice in cyber attacks and forensics. Upon completing the Fundamentals phase, learners will be able to include this project in their portfolio to demonstrate what they’ve learned.
  • Cybersecurity Infrastructure Phase

    In the Infrastructure Phase of the bootcamp, learners will begin to narrow their focus on security concepts and best practices. The Infrastructure Phase will see learners study skills like Python, network security and critical infrastructure security (CIS). This phase also gives learners the practical skills and experience needed for the Advanced phase.
  • Network Security

    Networks are a critical part of both local computer systems and the internet as a whole. In other words, pretty much everything happens on a network. In this course, learners will study how to design, suggest and implement controls for secure networks from the design phase to post-implementation. You’ll leave the course with the digital skills needed for many technical positions.

    Additionally, the Network Security course gives learners the experience needed to begin preparing for the EC-Council CND exam*.
  • Cyber Infrastructure & Technology

    Cyber Infrastructure & Technology refers to highly important aspects of society. Think power plants, hospitals and fire and rescue organizations. The Critical Infrastructure Course will allow learners to develop the skills needed to be proficient in the Industrial Internet of Things, supply chain and environmental security. Learners will be able to take these skills to employers in the business world or government.

    Upon completing this course, learners will be prepared to begin studying for the CompTIA Security+ exam*.
  • Introduction to Python for Security

    Programming is an important skill for cybersecurity professionals—oftentimes, the best tool is the one you build yourself. In the Introduction to Python for Security course, learners will become familiar with basic programming concepts in Python. Additionally, they’ll receive the knowledge necessary to create and customize scripts on the fly—including tools to analyze data, scan systems or review devices on a network.
  • Cybersecurity Infrastructure Final Project

    In this final project, learners will use the small business infrastructure created in the previous phase and demonstrate infrastructure hardening by securing it against a threat scenario.
  • Advanced Cybersecurity Phase

    In the Advanced Phase of the bootcamp, learners will continue to build on the skills they learned in previous phases and gain experience in advanced security concepts—including ethical hacking, game theory, incident response and digital forensics. This phase will provide learners with a complete overview of the cybersecurity field and prepare them to pursue a career in the industry.
  • Offensive Security: Ethical Hacking

    Ethical Hacking describes the field of attacking and penetrating systems to secure them against outside threats. In the Offensive Security: Ethical Hacking course, learners will dive deeper into the mindset of criminal hackers and learn the crafts of cybersecurity professionals like penetration testers and GRC auditors. This course helps learners build the foundation they need to pursue an ethical hacking role.

    Upon completing this course, learners will also be well-prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*.
  • DFIR and Threat Hunting

    Not all cyberattacks can be prevented, and if one occurs, first responders are key to assessing the damage. In the Digital Forensics and Incident Response (DFIR) course, learners will receive all the tools and knowledge needed to respond to incidents, gather evidence for investigations and accurately report the results.

    After completion of this course, learners will also be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.
  • Game Theory Strategy in Cybersecurity

    In the cybersecurity field, game theory is used to describe the interactions between an organization and unidentified or unknown threats. In the Game Theory Strategy in Cybersecurity course, learners will begin building a foundation in the philosophy and mathematics of game theory. They’ll also learn how to use game theory to describe threats, cyber incidents and begin developing the creative and novel thinking skills they’ll need to become creative and skilled cybersecurity professionals.
  • Advanced Cybersecurity Final Project: Attack and Response

    This project will see learners build on the secure infrastructure they created in the previous phases by designing an attack to compromise it, gathering forensic evidence and completing an investigative report about the incident.

    Upon completing the program, learners will be able to use the reports, code and designs from the bootcamp’s final projects to build a portfolio that they can use to demonstrate their skills and abilities to prospective employers.
  • Career Services

    Our Career Services is designed to prepare learners for every facet of technical interviews. Additionally, the CyWar hub also features a dedicated suite of resources that includes career guides and asynchronous classes that can help learners land a position in the cybersecurity field.
Icon

Introductory Course

8 Lessons - 30 Hours

Take the Cybersecurity Bootcamp for a test drive with the introductory course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors and more.

You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended program.

When the introductory course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.

Icon

The Fundamentals Phase

In the Fundamentals Phase of the program, learners will develop an understanding of the basics of cybersecurity. This portion covers Microsoft Windows, Linux and basic network and cloud security, and acts as training to prepare learners for the more rigorous Infrastructure phase.

Icon

Microsoft Security

11 Lessons - 40 Hours

Many companies across the globe use Windows Servers exclusively to maintain their computers and networks. In the Microsoft Security course, learners will receive a hands-on education with widely used and modern versions of both Microsoft Windows and Microsoft Server. Learners will get experience to administer and secure Microsoft operating systems and will discover how to become good practitioners with Microsoft’s product ecosystem.

Icon

Computer Networking

12 Lessons - 50 Hours

Computer networks form the basis of many systems across industries—from finance to hospitality. The Computer Networking course will give learners a broad overview of networking, including network designs, topologies, protocols and devices.

In the Computer Networking course, learners will build a foundation to later study and take the CompTIA Network+ exam* after also finishing the Network Security course.

Icon

Cloud Security

4 Lessons - 15 Hours

Cloud-based infrastructure is becoming more common among different organizations and companies. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service providers like Amazon Web Services, Google Cloud or Microsoft Azure. Additionally, learners will become familiar with some of the options for securing cloud-based solutions.

Upon completion of this course, learners will have the foundational cloud security knowledge to begin preparing for the AWS Cloud Practitioner certification exam*.

Icon

Linux Security

8 Lessons - 30 Hours

Linux is the most used operating system in the world and is also an important tool for cybersecurity professionals. In the Linux Security course, learners will become familiar with the basics of using and manipulating the Linux operating system and will also learn about various Linux distributions.

Upon finishing this course, learners will also be able to begin preparing for the LPI Linux Essentials certification exam*.

Icon

The Fundamentals Final Project - Building Your Own Environment

In the final project of the Fundamentals Phase, learners will craft an insecure, small business infrastructure that they’ll secure while also getting hands-on practice in cyber attacks and forensics. Upon completing the Fundamentals phase, learners will be able to include this project in their portfolio to demonstrate what they’ve learned.

Icon

Cybersecurity Infrastructure Phase

In the Infrastructure Phase of the bootcamp, learners will begin to narrow their focus on security concepts and best practices. The Infrastructure Phase will see learners study skills like Python, network security and critical infrastructure security (CIS). This phase also gives learners the practical skills and experience needed for the Advanced phase.

Icon

Network Security

9 Lessons - 35 Hours

Networks are a critical part of both local computer systems and the internet as a whole. In other words, pretty much everything happens on a network. In this course, learners will study how to design, suggest and implement controls for secure networks from the design phase to post-implementation. You’ll leave the course with the digital skills needed for many technical positions.

Additionally, the Network Security course gives learners the experience needed to begin preparing for the EC-Council CND exam*.

Icon

Cyber Infrastructure & Technology

10 Lessons - 40 Hours

Cyber Infrastructure & Technology refers to highly important aspects of society. Think power plants, hospitals and fire and rescue organizations. The Critical Infrastructure Course will allow learners to develop the skills needed to be proficient in the Industrial Internet of Things, supply chain and environmental security. Learners will be able to take these skills to employers in the business world or government.

Upon completing this course, learners will be prepared to begin studying for the CompTIA Security+ exam*.

Icon

Introduction to Python for Security

7 Lessons - 25 Hours

Programming is an important skill for cybersecurity professionals—oftentimes, the best tool is the one you build yourself. In the Introduction to Python for Security course, learners will become familiar with basic programming concepts in Python. Additionally, they’ll receive the knowledge necessary to create and customize scripts on the fly—including tools to analyze data, scan systems or review devices on a network.

Icon

Cybersecurity Infrastructure Final Project

In this final project, learners will use the small business infrastructure created in the previous phase and demonstrate infrastructure hardening by securing it against a threat scenario.

Icon

Advanced Cybersecurity Phase

In the Advanced Phase of the bootcamp, learners will continue to build on the skills they learned in previous phases and gain experience in advanced security concepts—including ethical hacking, game theory, incident response and digital forensics. This phase will provide learners with a complete overview of the cybersecurity field and prepare them to pursue a career in the industry.

Icon

Offensive Security: Ethical Hacking

12 Lessons - 50 Hours

Ethical Hacking describes the field of attacking and penetrating systems to secure them against outside threats. In the Offensive Security: Ethical Hacking course, learners will dive deeper into the mindset of criminal hackers and learn the crafts of cybersecurity professionals like penetration testers and GRC auditors. This course helps learners build the foundation they need to pursue an ethical hacking role.

Upon completing this course, learners will also be well-prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*.

Icon

DFIR and Threat Hunting

15 Lessons - 60 Hours

Not all cyberattacks can be prevented, and if one occurs, first responders are key to assessing the damage. In the Digital Forensics and Incident Response (DFIR) course, learners will receive all the tools and knowledge needed to respond to incidents, gather evidence for investigations and accurately report the results.

After completion of this course, learners will also be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.

Icon

Game Theory Strategy in Cybersecurity

2 Lessons - 10 Hours

In the cybersecurity field, game theory is used to describe the interactions between an organization and unidentified or unknown threats. In the Game Theory Strategy in Cybersecurity course, learners will begin building a foundation in the philosophy and mathematics of game theory. They’ll also learn how to use game theory to describe threats, cyber incidents and begin developing the creative and novel thinking skills they’ll need to become creative and skilled cybersecurity professionals.

Icon

Advanced Cybersecurity Final Project: Attack and Response

This project will see learners build on the secure infrastructure they created in the previous phases by designing an attack to compromise it, gathering forensic evidence and completing an investigative report about the incident.

Upon completing the program, learners will be able to use the reports, code and designs from the bootcamp’s final projects to build a portfolio that they can use to demonstrate their skills and abilities to prospective employers.

Icon

Career Services

3 Sessions - 15 Hours

Our Career Services is designed to prepare learners for every facet of technical interviews. Additionally, the CyWar hub also features a dedicated suite of resources that includes career guides and asynchronous classes that can help learners land a position in the cybersecurity field.

*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation program, where the primary focus is the learners’ performance on the exam. Certification exams are not conducted as part of the program and require additional costs not included in tuition.

Get Ready for Global
Cybersecurity Certifications

Those new to the cybersecurity field are more likely to be hired if they obtain internationally recognized certifications. In an effort to boost your credentials, we’ve developed an in-depth hub of resources that can help you prepare for industry-standard certification exams.

The Cybersecurity Bootcamp features a pair of two-week breaks during which learners will have the chance to take non-mandatory asynchronous classes focused on certification preparation. The CyWar platform also features study guides, question banks, a “Cyberpedia” with cybersecurity knowledge and challenges designed to help learners practice for their exams.

It’s recommended that learners pursue one certification during each phase of the bootcamp, per their own career goals.

  • LPI Linux Essentials

    The Linux LPI Essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.
  • CompTIA Network+

    The CompTIA Network+ certification exam tests a learner’s experience with configuring, managing and troubleshooting networks and network devices. Additionally, it also expects aspiring cybersecurity professionals to familiarize themselves with emerging trends such as mobile, cloud, virtualization and communication technologies.
  • EC-Council CND - Certified Network Defender

    The Certified Network Defender certification verifies knowledge of protecting, detecting and responding to various threats on a network. It should be considered by learners who want to pursue a Network Administrator role.
  • CompTIA Security+

    Considered a next step up from the CompTIA Network+, CompTIA Security+ is an entry-level cybersecurity certification that tests a candidate’s skills over a range of technological disciplines, including networks, systems, security administration and penetration testing.
  • EC-Council CSA - Certified SOC Analyst

    Learners who would like to pursue a role in a security operations center (SOC) should consider the Certified SOC Analyst certification exam. This exam tests a learner’s knowledge of SOC operations, such as advanced incident detection, incident response and log management and correlation. It’s designed for current and aspiring Tier I and Tier II SOC analysts.
  • EC-Council CEH - Certified Ethical Hacker

    The Certified Ethical Hacker certification is designed to test knowledge of ethical hacking from a vendor-neutral perspective. It should be considered by candidates with skills in penetration testing and knowledge of related resources and tools.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For learners who have achieved at least one year of experience after completion of the program.

    Candidates with proven security knowledge and practical, hands-on security experience can consider the (ISC)² SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.

LPI Linux Essentials

The Linux LPI Essentials certificate demonstrates knowledge of the Linux operating system and various open-source applications. The examination verifies and measures the ability of a candidate to manage users and groups, as well as competency with the command line, security, permissions, administration and basic networking configuration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam measures a candidate’s knowledge of the Amazon Web Services (AWS) Cloud and its infrastructure, including experience with the security and compliance aspects of the platform. It should be considered by individuals with the aforementioned experience since it can prove competency to potential employers.

CompTIA Network+

The CompTIA Network+ certification exam tests a learner’s experience with configuring, managing and troubleshooting networks and network devices. Additionally, it also expects aspiring cybersecurity professionals to familiarize themselves with emerging trends such as mobile, cloud, virtualization and communication technologies.

EC-Council CND - Certified Network Defender

The Certified Network Defender certification verifies knowledge of protecting, detecting and responding to various threats on a network. It should be considered by learners who want to pursue a Network Administrator role.

CompTIA Security+

Considered a next step up from the CompTIA Network+, CompTIA Security+ is an entry-level cybersecurity certification that tests a candidate’s skills over a range of technological disciplines, including networks, systems, security administration and penetration testing.

EC-Council CSA - Certified SOC Analyst

Learners who would like to pursue a role in a security operations center (SOC) should consider the Certified SOC Analyst certification exam. This exam tests a learner’s knowledge of SOC operations, such as advanced incident detection, incident response and log management and correlation. It’s designed for current and aspiring Tier I and Tier II SOC analysts.

EC-Council CEH - Certified Ethical Hacker

The Certified Ethical Hacker certification is designed to test knowledge of ethical hacking from a vendor-neutral perspective. It should be considered by candidates with skills in penetration testing and knowledge of related resources and tools.

(ISC)² SSCP – Systems Security Certified Practitioner**

For learners who have achieved at least one year of experience after completion of the program.

Candidates with proven security knowledge and practical, hands-on security experience can consider the (ISC)² SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.

** Learners must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Program Tuition

Invest in your professional development and get the job-ready skill set you need to enter the field of cybersecurity.

30-Hour Introductory Course

$180

370-Hour Extended Program

$17,800

Requirements

Internet access

Drive, ambition and passion

Pass the admission exam after the
Introductory Course

Tuition, fees and deposits are subject to change.

img