Part-Time Cybersecurity Bootcamp

Become a Cybersecurity professional using the most sought-after curriculum in the industry!

  • CompTIA Security+ Certification CompTIA Security+ Certification
  • 14 weeks | 100% online | Live instruction 14 weeks | 100% online | Live instruction
  • Job guaranteed Job guaranteed

Get the Part-Time Cybersecurity coursebook

']

Upcoming Cohort Start Dates

Open

Feb 19, 2024 - May 31, 2024

Open

Jun 3, 2024 - Sep 13, 2024

Open

Sep 16, 2024 - Jan 31, 2025

300+

PLACEMENT PARTNERS

86%

GRADUATION RATE

$81,310

AVERAGE SALARY

$23k

SALARY INCREASE

Skills & technologies covered

Curriculum

Skills & technologies covered

1
Intro to Cybersecurity
2
Systems and Network Security
3
Tools and Technologies
4
Cryptography
5
Incident Response and Risk Management
6
Application and Web Security
7
Cloud Security
8
Mobile & IoT Security
9
Security Policies and Standards
10
Final Project and Career Preparation

Module 1

Intro to Cybersecurity

In this module, students will gain a solid foundation in cybersecurity principles and practices. They will explore the fundamentals of cybersecurity, including the types of threats and attacks that organizations face. Participants will also learn about the role of a cybersecurity professional and the importance of protecting information and networks. Basic networking concepts will be covered, along with an overview of cybersecurity domains and legal and ethical aspects. The module concludes with a project that involves analyzing a real-world cyber-attack and its impact.

Technologies Used:

TCP/IP, VPN, Firewalls, OS Linux/Windows

MODULE 2

Systems and Network Security

This module focuses on securing operating systems and networks from cyber threats. Students will learn about different types of vulnerabilities and how to protect operating systems effectively. The module covers network security, including firewalls and intrusion detection and prevention systems. Participants will also explore security measures for wireless networks and setting up secure remote access through VPNs. The module culminates in a project where students will configure a secure network with firewall rules and VPN.

Technologies Used:

IDS, SIEM, Bash

MODULE 3

Tools and Technologies

In this module, students will be introduced to various cybersecurity tools and technologies that professionals use to defend against threats. They will gain hands-on experience with tools like Wireshark, Nmap, Nessus, and Metasploit. Participants will learn about intrusion detection and prevention systems, security information and event management (SIEM) tools, and vulnerability assessment and penetration testing tools. The module includes a project where students will conduct a vulnerability assessment using a chosen tool.

Technologies Used:

Wireshark, Nmap, Nessus, Snort, Metasploit

MODULE 4

Cryptography

Cryptography plays a crucial role in securing information, and this module explores its principles and applications. Students will learn about different types of cryptography, including symmetric, asymmetric, and hash functions. The module covers topics such as public key infrastructure (PKI), secure sockets layer/transport layer security (SSL/TLS), and cryptanalysis. Participants will engage in a project that involves analyzing a cryptographic system for potential vulnerabilities.

Technologies Used:

OWASP ZAP, Kali Linux, SQL (for SQL injection), Bash scripting

MODULE 5

Incident Response and Risk Management

Effective incident response and risk management are essential for organizations to mitigate and recover from cyber incidents. In this module, students will learn about the six phases of incident response and how to create an incident response plan. They will also gain an understanding of risk management principles and disaster recovery planning. The module explores incident response planning, forensics, and business continuity. Students will complete a project where they create an incident response plan and a risk management plan for a hypothetical scenario.

Technologies Used:

Google's GRR, TheHive, MISP, LogRhythm, AWS, Google Cloud, Azure

MODULE 6

Application and Web Security

This module focuses on securing applications and web environments, which are frequent targets for cyber-attacks. Students will learn about the importance of application and web security, common threats, and vulnerabilities. The module covers secure coding practices and introduces the OWASP Top 10 vulnerabilities. Participants will also learn about web security tools like Burp Suite. The module concludes with a project where students conduct a security review of a web application using the OWASP Top 10 as a guide.

Technologies Used:

GDPR, CCPA, HIPAA, ISO 27001, NIST Cybersecurity Framework

MODULE 7

Cloud Security

As cloud computing continues to grow in popularity, it is crucial to understand the unique security challenges it presents. This module introduces students to cloud security concepts and best practices. Participants will learn about different cloud models, security considerations, and the shared responsibility model. The module covers topics such as access controls, data encryption, and regular audits in the cloud environment. Students will engage in a project where they develop a comprehensive cloud security plan for a provided case scenario.

Technologies Used:

PCI DSS

MODULE 8

Mobile & IoT Security

Mobile devices are prevalent in today’s digital landscape, and securing them is essential. This module explores the challenges and vulnerabilities associated with mobile security. Students will learn about the security features of Android and iOS platforms and their strengths and weaknesses. The module covers mobile device management (MDM) and best practices for securing mobile devices. Participants will complete a project where they assess the security of a mobile device and propose improvements.

Technologies Used:

Blockchain, AI, IoT, Cloud Security, Zero Trust Security

Module 9

Security Policies and Standards

Security policies and standards provide guidelines for implementing effective cybersecurity measures. In this module, students will gain an understanding of the role of security policies and common security standards such as ISO 27001. They will learn how to develop and implement security policies and ensure compliance through auditing. The module also introduces cybersecurity frameworks like the NIST Cybersecurity Framework. Participants will engage in a project where they create a security policy and develop an auditing procedure for a given organization.

Technologies Used:

APTs, Cobalt Strike, Powershell Empire5G, Edge Computing, AI

Module 10

Final Project and Career Preparation

In the final module, students will apply their knowledge and skills to a comprehensive final project. The project involves risk assessment, security policies, secure network design, application and cloud security planning, and incident response planning. Participants will present their final projects and receive feedback. The module also includes career preparation, covering job market insights, career readiness track preparation, and guidance on further learning and relevant certifications.

1
Intro to Cybersecurity

Module 1

Intro to Cybersecurity

In this module, students will gain a solid foundation in cybersecurity principles and practices. They will explore the fundamentals of cybersecurity, including the types of threats and attacks that organizations face. Participants will also learn about the role of a cybersecurity professional and the importance of protecting information and networks. Basic networking concepts will be covered, along with an overview of cybersecurity domains and legal and ethical aspects. The module concludes with a project that involves analyzing a real-world cyber-attack and its impact.

Technologies Used:

TCP/IP, VPN, Firewalls, OS Linux/Windows

2
Systems and Network Security

MODULE 2

Systems and Network Security

This module focuses on securing operating systems and networks from cyber threats. Students will learn about different types of vulnerabilities and how to protect operating systems effectively. The module covers network security, including firewalls and intrusion detection and prevention systems. Participants will also explore security measures for wireless networks and setting up secure remote access through VPNs. The module culminates in a project where students will configure a secure network with firewall rules and VPN.

Technologies Used:

IDS, SIEM, Bash

3
Tools and Technologies

MODULE 3

Tools and Technologies

In this module, students will be introduced to various cybersecurity tools and technologies that professionals use to defend against threats. They will gain hands-on experience with tools like Wireshark, Nmap, Nessus, and Metasploit. Participants will learn about intrusion detection and prevention systems, security information and event management (SIEM) tools, and vulnerability assessment and penetration testing tools. The module includes a project where students will conduct a vulnerability assessment using a chosen tool.

Technologies Used:

Wireshark, Nmap, Nessus, Snort, Metasploit

4
Cryptography

MODULE 4

Cryptography

Cryptography plays a crucial role in securing information, and this module explores its principles and applications. Students will learn about different types of cryptography, including symmetric, asymmetric, and hash functions. The module covers topics such as public key infrastructure (PKI), secure sockets layer/transport layer security (SSL/TLS), and cryptanalysis. Participants will engage in a project that involves analyzing a cryptographic system for potential vulnerabilities.

Technologies Used:

OWASP ZAP, Kali Linux, SQL (for SQL injection), Bash scripting

5
Incident Response and Risk Management

MODULE 5

Incident Response and Risk Management

Effective incident response and risk management are essential for organizations to mitigate and recover from cyber incidents. In this module, students will learn about the six phases of incident response and how to create an incident response plan. They will also gain an understanding of risk management principles and disaster recovery planning. The module explores incident response planning, forensics, and business continuity. Students will complete a project where they create an incident response plan and a risk management plan for a hypothetical scenario.

Technologies Used:

Google's GRR, TheHive, MISP, LogRhythm, AWS, Google Cloud, Azure

6
Application and Web Security

MODULE 6

Application and Web Security

This module focuses on securing applications and web environments, which are frequent targets for cyber-attacks. Students will learn about the importance of application and web security, common threats, and vulnerabilities. The module covers secure coding practices and introduces the OWASP Top 10 vulnerabilities. Participants will also learn about web security tools like Burp Suite. The module concludes with a project where students conduct a security review of a web application using the OWASP Top 10 as a guide.

Technologies Used:

GDPR, CCPA, HIPAA, ISO 27001, NIST Cybersecurity Framework

7
Cloud Security

MODULE 7

Cloud Security

As cloud computing continues to grow in popularity, it is crucial to understand the unique security challenges it presents. This module introduces students to cloud security concepts and best practices. Participants will learn about different cloud models, security considerations, and the shared responsibility model. The module covers topics such as access controls, data encryption, and regular audits in the cloud environment. Students will engage in a project where they develop a comprehensive cloud security plan for a provided case scenario.

Technologies Used:

PCI DSS

8
Mobile & IoT Security

MODULE 8

Mobile & IoT Security

Mobile devices are prevalent in today’s digital landscape, and securing them is essential. This module explores the challenges and vulnerabilities associated with mobile security. Students will learn about the security features of Android and iOS platforms and their strengths and weaknesses. The module covers mobile device management (MDM) and best practices for securing mobile devices. Participants will complete a project where they assess the security of a mobile device and propose improvements.

Technologies Used:

Blockchain, AI, IoT, Cloud Security, Zero Trust Security

9
Security Policies and Standards

Module 9

Security Policies and Standards

Security policies and standards provide guidelines for implementing effective cybersecurity measures. In this module, students will gain an understanding of the role of security policies and common security standards such as ISO 27001. They will learn how to develop and implement security policies and ensure compliance through auditing. The module also introduces cybersecurity frameworks like the NIST Cybersecurity Framework. Participants will engage in a project where they create a security policy and develop an auditing procedure for a given organization.

Technologies Used:

APTs, Cobalt Strike, Powershell Empire5G, Edge Computing, AI

10
Final Project and Career Preparation

Module 10

Final Project and Career Preparation

In the final module, students will apply their knowledge and skills to a comprehensive final project. The project involves risk assessment, security policies, secure network design, application and cloud security planning, and incident response planning. Participants will present their final projects and receive feedback. The module also includes career preparation, covering job market insights, career readiness track preparation, and guidance on further learning and relevant certifications.

Dive deeper into our Flex curriculum

Schedule

Daily schedule

You’ll get a full, immersive experience with your classmates and instructors in an online classroom. You’ll learn to program through a mix of live instruction, coding exercises, and team projects. We’re flexible in how we run our bootcamp, but here’s an example of what a typical day might look like in our Part-Time Cohorts.

5:00 PM
5:30 PM
6:00 PM
8:30 PM

Pre lecture review

The class begins with a chance to talk with your classmates and teachers; this is also a great time to ask questions and get last-minute advice on projects.

Whiteboard algorithms

Starting in week 2, the class will work through a coding algorithm question to prepare for technical interviews. One student will be chosen to share their screen as they code a solution, talk through their thought process, and get feedback from their instructors on how they solved the problem.

Lecture

In a live instruction class, your Senior Instructor will explain concepts and then lead you through how to apply them in real-life scenarios. Often these classes will be broken up into smaller groups so that you can work on projects together or help each other out with solutions.

Homework assignment

The morning opens with a chance to interact with other students and teachers, as well as a great opportunity to ask questions and get last minute advice on projects.

5:00 PM

Pre lecture review

The class begins with a chance to talk with your classmates and teachers; this is also a great time to ask questions and get last-minute advice on projects.

5:30 PM

Whiteboard algorithms

Starting in week 2, the class will work through a coding algorithm question to prepare for technical interviews. One student will be chosen to share their screen as they code a solution, talk through their thought process, and get feedback from their instructors on how they solved the problem.

6:00 PM

Lecture

In a live instruction class, your Senior Instructor will explain concepts and then lead you through how to apply them in real-life scenarios. Often these classes will be broken up into smaller groups so that you can work on projects together or help each other out with solutions.

8:30 PM

Homework assignment

The morning opens with a chance to interact with other students and teachers, as well as a great opportunity to ask questions and get last minute advice on projects.

Support

We set students up for success

1:1 Live support sessions with an instructor

1:1 Live support sessions with an instructor

Weekly peer programming and code wars sessions

Weekly peer programming and code wars sessions

Real projects and graded assignments

Real projects and graded assignments

Dedicated Student Success Manager

Dedicated Student Success Manager

Slack community

Slack community

Fine-tune your communication

Fine-tune your communication

Build your personal brand

Build your personal brand

Sharpen your technical skills

Sharpen your technical skills

Leverage our employer network

Leverage our employer network

Build a meaningful community

Build a meaningful community

Utilize resources and templates

Utilize resources and templates

Careers

We offer lifetime career services

Our post-graduation services provide each student with the necessary resources, tools, and guidance to build a meaningful career. We provide 1-1 support for the entirety of your professional journey.

Learn more

Want quick answers to your questions?

Quick Questions

Our Admissions Representatives are ready to help

We’ll work 1-1 to get your questions answered.

We’re here to help you understand our curriculum and financing, as well as give you information about post-graduation services.

Quick Questions

Submit your application for one of our programs

Applications take less than 5 minutes to complete!

Take the first step towards your future success by applying to one of our programs today.

Curriculum Reviews

Don’t just take our word for it.

Hear from our graduates

Five Stars

"Overall I will say it was the right choice for me to go with Coding Temple for several personal reasons. Scheduling, timeline, availability of instructors/tutors, budget, and reputation were all very important in my decision to choose this bootcamp over the numerous other ones I looked into."

Robert C.

Five Stars

"I had a great experience at Coding Temple. Before enrolling in CT, my coding / web design experience dates to at least 15 years ago. I was overdue for a re-introduction to the wonderful world of web development. I like how CT emphasizes both the material subject matter (the curriculum) AND the job search process itself, and how -- once one passes/graduates the program -- one becomes availed of ongoing education AND career advice. I found a focus here, while also gaining an introduction to a wide array of topics."

Matt R.

Five Stars

"This coding Bootcamp is awesome. I learned so much throughout, it's an intensive but rewarding Bootcamp. It was great learning how to apply the skills I've learned. I really loved the projects we had to complete, as I could use my creativity to add my own flair to them. The 1-1 help was also really great and the instructors were amazing! I would highly recommend Coding Temple!"

Elise S.

Five Stars

"From first phone interview to post graduation. The application, learning, and career support are amazing. I went from zero coding experience to actually understanding and building applications. It was a great price for the time learning."

Dennis

Program cost

Tuition + payment plans breakdown

Pay in full

$1,000 deposit / due prior to 1st day of class

$14,995

Pay as you learn

$1,000 deposit / 3 installments made throughout the class

$17,495

All plans carry 0% interest and do not require a credit check.

Deferred tuition

$0 deposit / monthly payments as low as $299

$17,495

Apply for a tuition loan in just five minutes with our
credit partner, Climb.

Admissions process

How to get started

1

Explore our career paths and courses

Ready to start your new career in tech? Explore our different career tracks and see which path interests you the most!

Explore Courses
2

Application and basic skills assessment

Submit your application – it takes less than 5 minutes. After you apply you will be sent a basic skills assessment. Our assessment is meant to test your cognitive skills. Don’t stress! We want to know if you can think like a programmer, if you can we will take it from there!

Apply Now
3

Schedule an admissions call

Talk with our admissions team so we can get to understand your career goals and answer any questions you have about our program.

Schedule a Call
4

Secure your seat and enroll

Finalize your payment plan to secure your seat! Once you’re enrolled, you will gain instant access to our preparatory work, slack channels, and 1:1 support prior to class.

See Payment Plans

Not sure if Cybersecurity is for you?

Frequently asked questions