Get the Course Catalog
Get the Skills and Experience
You Need to Thrive in
Start Here. Go Anywhere.
No matter your level of technological proficiency, the University of Colorado Boulder Cybersecurity Bootcamp can expand your professional skill set and allow you to build a solid foundation for a career in cybersecurity.
Our expert instructors will guide you through the training, where you’ll learn how to defend the virtual world and secure data in a safe, cloud-based platform. You’ll ground yourself in ethical hacking and game theory principles and learn how to fend off real-world attacks, shore up digital defenses and find weaknesses in applications. All the skills that employers are hiring for in today’s connected world.
With over 700,000 job
there’s never been a
better time to join
Start building the skills you need to excel in the field of cybersecurity under the guidance
of industry experts eager to train the next generation of cybersecurity professionals.
Build the Skills
That Employers Need
Benefit from a comprehensive career services package handled by a dedicated team of
professional development experts.
Gain access to a network of local and global hiring partners looking to employ newly qualified cybersecurity professionals. Attend virtual networking events designed to introduce you to the variety of opportunities available to you upon program completion.
Routinely meet with a student success manager dedicated to ensuring you have the tools and support you need to thrive in the program and beyond. Know you have a team of professionals backing you in your journey into the field of cybersecurity.
Find professional development support within a team of career coaches eager to help you achieve your career goals in cybersecurity. Get help with your resume, prepare for interviews, gain assistance building your LinkedIn profile and more.
Job Search Assistance
Work with our Career Outcomes team to determine what opportunities are available to you. Our search assistance will help you locate career opportunities and thoroughly prepare you for the interview process ahead of time.
Get the Course Catalog
30-Hour Introductory Course
| 370-Hour Extended Program
The course covers topics such as fundamentals of information security and risk management, an introduction to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and the concept and role of offensive security.
Following the Introductory Course, learners assess their understanding with a summary exam before proceeding to the extended course. In the Fundamentals part of the bootcamp, individuals learn the basics of cybersecurity. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program. Many companies across the globe use Windows Servers exclusively to maintain their computers and networks. In the Microsoft Security course, learners will receive a hands-on education with widely used and modern versions of both Microsoft Windows and Microsoft Server. Learners will get experience to administer and secure Microsoft operating systems and will discover how to become good practitioners with Microsoft’s product ecosystem. Computer networks form the basis of many systems across industries—from finance to hospitality. The Computer Networking course will give learners a broad overview of networking, including network designs, topologies, protocols and devices.
In the Computer Networking course, learners will build a foundation to later study and take the CompTIA Network+ exam* after also finishing the Network Security course. Cloud-based infrastructure is becoming more common among different organizations and companies. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service providers like Amazon Web Services, Google Cloud or Microsoft Azure. Additionally, learners will become familiar with some of the options for securing cloud-based solutions.
Upon completion of this course, learners will have the foundational cloud security knowledge to begin preparing for the AWS Cloud Practitioner certification exam*. Linux is the most used operating system in the world and is also an important tool for cybersecurity professionals. In the Linux Security course, learners will become familiar with the basics of using and manipulating the Linux operating system and will also learn about various Linux distributions.
Upon finishing this course, learners will also be able to begin preparing for the LPI Linux Essentials certification exam*. In the Cybersecurity Infrastructure part of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced Cybersecurity part of the program. Networks are the foundation for nearly everything on the internet. This phase of the course covers the technologies needed to protect the integrity of a company's infrastructure by preventing network breaches and a wide variety of potential threats. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. This course provides learners with the knowledge and practical training needed to design and maintain secure infrastructures and technologies. Security countermeasures such as SIEM, SOAR, endpoint security, and more provide an essential understanding of how to effectively protect organizations. This course begins to cover the CompTIA Security+ and CySA+ certificate objectives. Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Intro to Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python. In the Advanced Cybersecurity part of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry. Ethical Hacking describes the field of attacking and penetrating systems to secure them against outside threats. In the Offensive Security: Ethical Hacking course, learners will dive deeper into the mindset of criminal hackers and learn the crafts of cybersecurity professionals like penetration testers and GRC auditors. This course helps learners build the foundation they need to pursue an ethical hacking role.
Upon completing this course, learners will also be well-prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*. Not all cyberattacks can be prevented, and if one occurs, first responders are key to assessing the damage. In the DFIR and Threat Hunting course, learners will receive all the tools and knowledge needed to respond to incidents, gather evidence for investigations and accurately report the results. In the cybersecurity field, game theory is used to describe the interactions between an organization and unidentified or unknown threats. In the Game Theory Strategy in Cybersecurity course, learners will begin building a foundation in the philosophy and mathematics of game theory. They’ll also learn how to use game theory to describe threats, cyber incidents and begin developing the creative and novel thinking skills they’ll need to become creative and skilled cybersecurity professionals. Get the competitive edge you need to succeed. This specialized course provides learners with the career planning, training, and tools needed to enter the field of cybersecurity—along with personalized interview coaching, professional networking, and one-on-one consultations devoted to perfecting LinkedIn profiles and resume. Put your best foot forward as you prepare to seek entry into the field of cybersecurity.
Part 1: Fundamentals
Part 2: Cybersecurity Infrastructure
Cyber Infrastructure & Technology
Intro to Python for Security
Part 3: Advanced Cybersecurity
Offensive Security: Ethical Hacking
DFIR and Threat Hunting
Game Theory Strategy in Cybersecurity
Get Ready for Global
Those new to the cybersecurity field are more likely to be hired if they obtain internationally recognized certifications. In an effort to boost your credentials, we’ve developed an in-depth hub of resources that can help you prepare for industry-standard certification exams.
The Cybersecurity Bootcamp features a pair of two-week breaks during which learners will have the chance to take non-mandatory asynchronous classes focused on certification preparation. The TDX Arena platform also features study guides, question banks, a “Cyberpedia” with cybersecurity knowledge and challenges designed to help learners practice for their exams.
It’s recommended that learners pursue one certification during each phase of the bootcamp, per their own career goals.
Candidates with proven security knowledge and practical, hands-on security experience can consider the (ISC)² SSCP exam. This certificate demonstrates that a candidate has experience in implementing, monitoring and administering IT infrastructure in accordance with information security policies, procedures and best practices.
LPI Linux Essentials
AWS Certified Cloud Practitioner
Cisco Certified CyberOps Associate
(ISC)² SSCP – Systems Security Certified Practitioner**
Invest in your professional development and get the job-ready skill set you need to enter the field of cybersecurity.
30-Hour Introductory Course
370-Hour Extended Program
Drive, ambition and passion
Pass the admission exam after the
Tuition, fees and deposits are subject to change.