Transition to a Cybersecurity Career in Less Than a Year

Kickstart Your Professional Success

At the NC State Cybersecurity Bootcamp, you can get your career started on the right foot in just 10 months with the hands-on training you need to get ahead in the cybersecurity field. Instructors active in the industry provide comprehensive training through live, online classrooms. You’ll gain exposure to practical training, simulations of real-life cyber attacks, an extensive curriculum, networking opportunities, professional guidance, and career counseling on an ongoing basis.

This non-credit professional program is offered through NC State Continuing and Lifelong Education.

With over 700,000 job
openings nationwide,
there’s never been a
better time to join the
cybersecurity
industry.

Source:
Cyberseek.org

img

Fast-Track Your Career With
a Comprehensive Bootcamp
Discover Accelerated Learning at NC State

Our 10-month bootcamp is designed to speed up your cybersecurity training and accelerate the
development of the skills necessary to kickstart a professional career in cybersecurity, covering a
broad curriculum that begins with the basics and transitions to advanced capabilities.

Gain Hands-On Experience in Cybersecurity

Learn How to Defend Via
Real-World Cyber Training

Hands-On Classes

Build job-ready skills that will help you succeed as a cybersecurity professional. Our comprehensive, fully remote program delivers real-world knowledge of cybersecurity through live classes featuring interactive, simulated exercises.

Virtual Classroom

Our part-time bootcamp provides an engaging learning experience. Thanks to dedicated online collaboration tools, our virtual classrooms encourage communication among learners and instructors so you can build real relationships while learning from home.

Expert Instructors

Our extensive curriculum is created and delivered by instructors who are seasoned cybersecurity professionals. Benefit from their mentorship and guidance while extracting their first-hand industry knowledge and expertise.

Cyber Labs and TDX Arena

Gain a competitive edge in this dynamic industry! Our bootcamp’s Cyber Labs exercises provide essential practice, while our virtual learning platform, TDX Arena, tests and levels up your practical skills with immersive gamified simulations of real-life cyber attacks.

Enjoy Personalized Support

Succeed With a Network of
Professionals Behind You

Learner
Support

Our team of success managers provides the resources you need to ace your classes and thrive in the cybersecurity workforce. They keep you accountable, facilitate tutoring sessions and exam retests and offer constant guidance.

Career
Coaching

You will have access to professional career coaches who can help you define and achieve your goals. From technical interview practice to polishing your LinkedIn profile and resume, they are ready to give you the edge you need to succeed.

Professional
Network

We offer virtual networking events to help you become part of a professional community of cybersecurity insiders. Forge new relationships, meet hiring partners operating at the national and local level and access job opportunities before they are even advertised.

Job Search
Assistance

Locating the job opportunities that align with your specific career goals is not always easy. Our Career Outcomes team can assist you in finding the best opportunities for you, and even make crucial introductions to secure your first cybersecurity role.

Discover
Our Courses

Dive Into the Bootcamp Catalog

img

Program Overview

30-Hour Introductory Course
| 370-Hour Extended Program

  • Introductory Course

    Take the Cybersecurity Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors and more.

    You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended program.

    When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.
  • Part 1: Fundamentals

    In the Fundamentals Phase of the bootcamp, learners acquire the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.
  • Microsoft Security

    Many companies across the globe rely on Windows Server to manage their computers, networks and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Learners will gain best practices for administrating and securing the Microsoft ecosystem of products.
  • Computer Networking

    Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design and devices. Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.
  • Linux Security

    The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available. Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam*.
  • Cloud Security

    Cloud solutions like Amazon Web Services, Google Cloud and Microsoft Azure are all becoming commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms. Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*.
  • Part 2: Cybersecurity Infrastructure

    In the Infrastructure phase of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.
  • Network Security

    Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. They will have the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.
  • Cyber Infrastructure & Technology

    This course provides learners with the knowledge and practical training needed to design and maintain secure infrastructures and technologies. Security countermeasures such as SIEM, SOAR, endpoint security and more provide an essential understanding of how to effectively protect organizations. This course begins to cover the CompTIA Security+ and CySA+ certificate objectives.
  • Intro to Python for Security

    Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python. Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.
  • Part 3: Advanced Cybersecurity

    In the Advanced phase of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.
  • Offensive Security: Ethical Hacking

    This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.
  • DFIR and Threat Hunting

    When there’s a cyberattack, first responders are there to analyze and contain the incident. The DFIR and Threat Hunting course gives learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering and report the results.
  • Game Theory Strategy in Cybersecurity

    In cybersecurity, game theory allows professionals to analyze the nature of cyber attacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is. The Game Theory Strategy in Cybersecurity course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
  • Career Outcomes

    Get the competitive edge you need to succeed. This specialized course provides learners with the career planning, training and tools needed to enter the field of cybersecurity—along with personalized interview coaching, professional networking and one-on-one consultations devoted to perfecting LinkedIn profiles and resume. Put your best foot forward as you prepare to seek entry into the field of cybersecurity.
Icon

Introductory Course (30 Hours)

Take the Cybersecurity Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors and more.

You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended program.

When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.

Icon

Part 1: Fundamentals

In the Fundamentals Phase of the bootcamp, learners acquire the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.

Icon

Microsoft Security (40 Hours)

Many companies across the globe rely on Windows Server to manage their computers, networks and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Learners will gain best practices for administrating and securing the Microsoft ecosystem of products.

Icon

Computer Networking (50 Hours)

Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design and devices. Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.

Icon

Linux Security (30 Hours)

The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available. Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam*.

Icon

Cloud Security (15 Hours)

Cloud solutions like Amazon Web Services, Google Cloud and Microsoft Azure are all becoming commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms. Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*.

Icon

Part 2: Cybersecurity Infrastructure

In the Infrastructure phase of the program, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.

Icon

Network Security (35 Hours)

Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. They will have the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.

Icon

Cyber Infrastructure & Technology (40 Hours)

This course provides learners with the knowledge and practical training needed to design and maintain secure infrastructures and technologies. Security countermeasures such as SIEM, SOAR, endpoint security and more provide an essential understanding of how to effectively protect organizations. This course begins to cover the CompTIA Security+ and CySA+ certificate objectives.

Icon

Intro to Python for Security (25 Hours)

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python. Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.

Icon

Part 3: Advanced Cybersecurity

In the Advanced phase of the bootcamp, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.

Icon

Offensive Security: Ethical Hacking (50 Hours)

This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.

Icon

DFIR and Threat Hunting (60 Hours)

When there’s a cyberattack, first responders are there to analyze and contain the incident. The DFIR and Threat Hunting course gives learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering and report the results.

Icon

Game Theory Strategy in Cybersecurity (10 Hours)

In cybersecurity, game theory allows professionals to analyze the nature of cyber attacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is. The Game Theory Strategy in Cybersecurity course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.

Icon

Career Outcomes (15 Hours)

Get the competitive edge you need to succeed. This specialized course provides learners with the career planning, training and tools needed to enter the field of cybersecurity—along with personalized interview coaching, professional networking and one-on-one consultations devoted to perfecting LinkedIn profiles and resume. Put your best foot forward as you prepare to seek entry into the field of cybersecurity.

*Although the course curriculum provides the knowledge necessary to do well on industry exams, this isn’t a test preparation program, where the main focus is how a learner performs on an exam. Certification exams are not taken as part of the program and will require additional costs not included in the program tuition.

Knowledge You Can Apply
to Certification Exams

This bootcamp is not a certification-prep program, but we know that learners who are new to the cybersecurity field can get more competitive offers when they have obtained industry certifications. In an effort to boost your credentials and make you stand out from the crowd, we’ve created in-depth resources to help you learn skills applicable to the certification exams below.

  • LPI Linux Essentials

    The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills and overall Linux administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
  • CompTIA CySA+

    The CompTIA CySA+ certification exam measures a learner’s ability to proactively capture, monitor and respond to network traffic findings. Skills in software and application security, automation, threat hunting and IT regulatory compliance are also assessed.
  • CompTIA Network+

    The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication and virtualization technologies.
  • CompTIA Security+

    The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration and penetration testing.
  • Cisco Certified CyberOps Associate

    The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn. The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For learners who have achieved one year of experience after completion of their program. Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam. The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring and administration of information technology infrastructure according to information security best practices, policies and procedures.

LPI Linux Essentials

The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills and overall Linux administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.

CompTIA CySA+

The CompTIA CySA+ certification exam measures a learner’s ability to proactively capture, monitor and respond to network traffic findings. Skills in software and application security, automation, threat hunting and IT regulatory compliance are also assessed.

CompTIA Network+

The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication and virtualization technologies.

CompTIA Security+

The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration and penetration testing.

Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate certification is considered the first security certification a candidate should earn. The exam measures a candidate’s baseline skills necessary to perform core security functions of any cybersecurity role and pursue an IT security career.

(ISC)² SSCP – Systems Security Certified Practitioner**

For learners who have achieved one year of experience after completion of their program. Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam. The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring and administration of information technology infrastructure according to information security best practices, policies and procedures.

** In order to be certified, learners must have a minimum of at least one year of cumulative work experience in one or more of the seven disciplines of the SSCP Common Body of Knowledge (CBK)

Program Tuition

Invest in yourself and your future career. Our comprehensive bootcamp can help you develop the job-ready skills you need to be successful in cybersecurity.

30-Hour Introductory Course

$180

370-Hour Extended Program

$17,800

Requirements

Internet access

Drive, ambition, and passion

Introductory course and admission exam

Tuition, fees and deposits subject to change.

This non-credit professional program is offered through NC State Continuing and Lifelong Education.

img
Skip to content