Flex Cybersecurity bootcamp

Become a Cybersecurity professional on your own time using the most sought-after curriculum in the industry!

  • CompTIA Security+ Certification CompTIA Security+ Certification
  • 6 month access | 100% online | Live group sessions 6 month access | 100% online | Live group sessions
  • Job guaranteed Job guaranteed

Get the Flex Cybersecurity coursebook

']

300+

PLACEMENT PARTNERS

86%

GRADUATION RATE

$81,310

AVERAGE SALARY

$23k

SALARY INCREASE

Skills & technologies covered

Curriculum

Skills & technologies covered

1
Intro to Cybersecurity
2
Systems and Network Security
3
Tools and Technologies
4
Cryptography
5
Incident Response and Risk Management
6
Application and Web Security
7
Cloud Security
8
Mobile & IoT Security
9
Security Policies and Standards
10
Final Project and Career Preparation

Module 1

Intro to Cybersecurity

In this module, students will gain a solid foundation in cybersecurity principles and practices. They will explore the fundamentals of cybersecurity, including the types of threats and attacks that organizations face. Participants will also learn about the role of a cybersecurity professional and the importance of protecting information and networks. Basic networking concepts will be covered, along with an overview of cybersecurity domains and legal and ethical aspects. The module concludes with a project that involves analyzing a real-world cyber-attack and its impact.

Technologies Used:

TCP/IP, VPN, Firewalls, OS Linux/Windows

MODULE 2

Systems and Network Security

This module focuses on securing operating systems and networks from cyber threats. Students will learn about different types of vulnerabilities and how to protect operating systems effectively. The module covers network security, including firewalls and intrusion detection and prevention systems. Participants will also explore security measures for wireless networks and setting up secure remote access through VPNs. The module culminates in a project where students will configure a secure network with firewall rules and VPN.

Technologies Used:

IDS, SIEM, Bash

MODULE 3

Tools and Technologies

In this module, students will be introduced to various cybersecurity tools and technologies that professionals use to defend against threats. They will gain hands-on experience with tools like Wireshark, Nmap, Nessus, and Metasploit. Participants will learn about intrusion detection and prevention systems, security information and event management (SIEM) tools, and vulnerability assessment and penetration testing tools. The module includes a project where students will conduct a vulnerability assessment using a chosen tool.

Technologies Used:

Wireshark, Nmap, Nessus, Snort, Metasploit

MODULE 4

Cryptography

Cryptography plays a crucial role in securing information, and this module explores its principles and applications. Students will learn about different types of cryptography, including symmetric, asymmetric, and hash functions. The module covers topics such as public key infrastructure (PKI), secure sockets layer/transport layer security (SSL/TLS), and cryptanalysis. Participants will engage in a project that involves analyzing a cryptographic system for potential vulnerabilities.

Technologies Used:

OWASP ZAP, Kali Linux, SQL (for SQL injection), Bash scripting

MODULE 5

Incident Response and Risk Management

Effective incident response and risk management are essential for organizations to mitigate and recover from cyber incidents. In this module, students will learn about the six phases of incident response and how to create an incident response plan. They will also gain an understanding of risk management principles and disaster recovery planning. The module explores incident response planning, forensics, and business continuity. Students will complete a project where they create an incident response plan and a risk management plan for a hypothetical scenario.

Technologies Used:

Google's GRR, TheHive, MISP, LogRhythm, AWS, Google Cloud, Azure

MODULE 6

Application and Web Security

This module focuses on securing applications and web environments, which are frequent targets for cyber-attacks. Students will learn about the importance of application and web security, common threats, and vulnerabilities. The module covers secure coding practices and introduces the OWASP Top 10 vulnerabilities. Participants will also learn about web security tools like Burp Suite. The module concludes with a project where students conduct a security review of a web application using the OWASP Top 10 as a guide.

Technologies Used:

GDPR, CCPA, HIPAA, ISO 27001, NIST Cybersecurity Framework

MODULE 7

Cloud Security

As cloud computing continues to grow in popularity, it is crucial to understand the unique security challenges it presents. This module introduces students to cloud security concepts and best practices. Participants will learn about different cloud models, security considerations, and the shared responsibility model. The module covers topics such as access controls, data encryption, and regular audits in the cloud environment. Students will engage in a project where they develop a comprehensive cloud security plan for a provided case scenario.

Technologies Used:

PCI DSS

MODULE 8

Mobile & IoT Security

Mobile devices are prevalent in today’s digital landscape, and securing them is essential. This module explores the challenges and vulnerabilities associated with mobile security. Students will learn about the security features of Android and iOS platforms and their strengths and weaknesses. The module covers mobile device management (MDM) and best practices for securing mobile devices. Participants will complete a project where they assess the security of a mobile device and propose improvements.

Technologies Used:

Blockchain, AI, IoT, Cloud Security, Zero Trust Security

Module 9

Security Policies and Standards

Security policies and standards provide guidelines for implementing effective cybersecurity measures. In this module, students will gain an understanding of the role of security policies and common security standards such as ISO 27001. They will learn how to develop and implement security policies and ensure compliance through auditing. The module also introduces cybersecurity frameworks like the NIST Cybersecurity Framework. Participants will engage in a project where they create a security policy and develop an auditing procedure for a given organization.

Technologies Used:

APTs, Cobalt Strike, Powershell Empire5G, Edge Computing, AI

Module 10

Final Project and Career Preparation

In the final module, students will apply their knowledge and skills to a comprehensive final project. The project involves risk assessment, security policies, secure network design, application and cloud security planning, and incident response planning. Participants will present their final projects and receive feedback. The module also includes career preparation, covering job market insights, career readiness track preparation, and guidance on further learning and relevant certifications.

1
Intro to Cybersecurity

Module 1

Intro to Cybersecurity

In this module, students will gain a solid foundation in cybersecurity principles and practices. They will explore the fundamentals of cybersecurity, including the types of threats and attacks that organizations face. Participants will also learn about the role of a cybersecurity professional and the importance of protecting information and networks. Basic networking concepts will be covered, along with an overview of cybersecurity domains and legal and ethical aspects. The module concludes with a project that involves analyzing a real-world cyber-attack and its impact.

Technologies Used:

TCP/IP, VPN, Firewalls, OS Linux/Windows

2
Systems and Network Security

MODULE 2

Systems and Network Security

This module focuses on securing operating systems and networks from cyber threats. Students will learn about different types of vulnerabilities and how to protect operating systems effectively. The module covers network security, including firewalls and intrusion detection and prevention systems. Participants will also explore security measures for wireless networks and setting up secure remote access through VPNs. The module culminates in a project where students will configure a secure network with firewall rules and VPN.

Technologies Used:

IDS, SIEM, Bash

3
Tools and Technologies

MODULE 3

Tools and Technologies

In this module, students will be introduced to various cybersecurity tools and technologies that professionals use to defend against threats. They will gain hands-on experience with tools like Wireshark, Nmap, Nessus, and Metasploit. Participants will learn about intrusion detection and prevention systems, security information and event management (SIEM) tools, and vulnerability assessment and penetration testing tools. The module includes a project where students will conduct a vulnerability assessment using a chosen tool.

Technologies Used:

Wireshark, Nmap, Nessus, Snort, Metasploit

4
Cryptography

MODULE 4

Cryptography

Cryptography plays a crucial role in securing information, and this module explores its principles and applications. Students will learn about different types of cryptography, including symmetric, asymmetric, and hash functions. The module covers topics such as public key infrastructure (PKI), secure sockets layer/transport layer security (SSL/TLS), and cryptanalysis. Participants will engage in a project that involves analyzing a cryptographic system for potential vulnerabilities.

Technologies Used:

OWASP ZAP, Kali Linux, SQL (for SQL injection), Bash scripting

5
Incident Response and Risk Management

MODULE 5

Incident Response and Risk Management

Effective incident response and risk management are essential for organizations to mitigate and recover from cyber incidents. In this module, students will learn about the six phases of incident response and how to create an incident response plan. They will also gain an understanding of risk management principles and disaster recovery planning. The module explores incident response planning, forensics, and business continuity. Students will complete a project where they create an incident response plan and a risk management plan for a hypothetical scenario.

Technologies Used:

Google's GRR, TheHive, MISP, LogRhythm, AWS, Google Cloud, Azure

6
Application and Web Security

MODULE 6

Application and Web Security

This module focuses on securing applications and web environments, which are frequent targets for cyber-attacks. Students will learn about the importance of application and web security, common threats, and vulnerabilities. The module covers secure coding practices and introduces the OWASP Top 10 vulnerabilities. Participants will also learn about web security tools like Burp Suite. The module concludes with a project where students conduct a security review of a web application using the OWASP Top 10 as a guide.

Technologies Used:

GDPR, CCPA, HIPAA, ISO 27001, NIST Cybersecurity Framework

7
Cloud Security

MODULE 7

Cloud Security

As cloud computing continues to grow in popularity, it is crucial to understand the unique security challenges it presents. This module introduces students to cloud security concepts and best practices. Participants will learn about different cloud models, security considerations, and the shared responsibility model. The module covers topics such as access controls, data encryption, and regular audits in the cloud environment. Students will engage in a project where they develop a comprehensive cloud security plan for a provided case scenario.

Technologies Used:

PCI DSS

8
Mobile & IoT Security

MODULE 8

Mobile & IoT Security

Mobile devices are prevalent in today’s digital landscape, and securing them is essential. This module explores the challenges and vulnerabilities associated with mobile security. Students will learn about the security features of Android and iOS platforms and their strengths and weaknesses. The module covers mobile device management (MDM) and best practices for securing mobile devices. Participants will complete a project where they assess the security of a mobile device and propose improvements.

Technologies Used:

Blockchain, AI, IoT, Cloud Security, Zero Trust Security

9
Security Policies and Standards

Module 9

Security Policies and Standards

Security policies and standards provide guidelines for implementing effective cybersecurity measures. In this module, students will gain an understanding of the role of security policies and common security standards such as ISO 27001. They will learn how to develop and implement security policies and ensure compliance through auditing. The module also introduces cybersecurity frameworks like the NIST Cybersecurity Framework. Participants will engage in a project where they create a security policy and develop an auditing procedure for a given organization.

Technologies Used:

APTs, Cobalt Strike, Powershell Empire5G, Edge Computing, AI

10
Final Project and Career Preparation

Module 10

Final Project and Career Preparation

In the final module, students will apply their knowledge and skills to a comprehensive final project. The project involves risk assessment, security policies, secure network design, application and cloud security planning, and incident response planning. Participants will present their final projects and receive feedback. The module also includes career preparation, covering job market insights, career readiness track preparation, and guidance on further learning and relevant certifications.

Dive deeper into our Flex curriculum

Schedule

Daily schedule

Flex learning allows you to get the coding bootcamp experience on your own time. You are able to move at your own speed, free from deadlines and class schedules. You’ll learn to program through a mix of recorded lectures, coding exercises, and projects.

Support

We set students up for success

1:1 Live support sessions with an instructor

1:1 Live support sessions with an instructor

Weekly peer programming and code wars sessions

Weekly peer programming and code wars sessions

Real projects and graded assignments

Real projects and graded assignments

Dedicated Student Success Manager

Dedicated Student Success Manager

Slack community

Slack community

Fine-tune your communication

Fine-tune your communication

Build your personal brand

Build your personal brand

Sharpen your technical skills

Sharpen your technical skills

Leverage our employer network

Leverage our employer network

Build a meaningful community

Build a meaningful community

Utilize resources and templates

Utilize resources and templates

Careers

We offer lifetime career services

Our post-graduation services provide each student with the necessary resources, tools, and guidance to build a meaningful career. We provide 1-1 support for the entirety of your professional journey.

Learn more

Want quick answers to your questions?

Quick Questions

Our Admissions Representatives are ready to help

We’ll work 1-1 to get your questions answered.

We’re here to help you understand our curriculum and financing, as well as give you information about post-graduation services.

Quick Questions

Attend one of our Weekly Webinars

See what our program is like and learn how to get started.

Ask questions during our live Q&A.

Curriculum Reviews

Don’t just take our word for it.

Hear from our graduates

Five Stars

"Overall I will say it was the right choice for me to go with Coding Temple for several personal reasons. Scheduling, timeline, availability of instructors/tutors, budget, and reputation were all very important in my decision to choose this bootcamp over the numerous other ones I looked into."

Robert C.

Five Stars

"I had a great experience at Coding Temple. Before enrolling in CT, my coding / web design experience dates to at least 15 years ago. I was overdue for a re-introduction to the wonderful world of web development. I like how CT emphasizes both the material subject matter (the curriculum) AND the job search process itself, and how -- once one passes/graduates the program -- one becomes availed of ongoing education AND career advice. I found a focus here, while also gaining an introduction to a wide array of topics."

Matt R.

Five Stars

"This coding Bootcamp is awesome. I learned so much throughout, it's an intensive but rewarding Bootcamp. It was great learning how to apply the skills I've learned. I really loved the projects we had to complete, as I could use my creativity to add my own flair to them. The 1-1 help was also really great and the instructors were amazing! I would highly recommend Coding Temple!"

Elise S.

Five Stars

"From first phone interview to post graduation. The application, learning, and career support are amazing. I went from zero coding experience to actually understanding and building applications. It was a great price for the time learning."

Dennis

Tuition + payment plans breakdown

Program cost

Save $1000

Pay Up Front

Save $500 on program cost by paying upfront. No additional payments required.

$ 8,995

Pay With a Loan

Pay With a Loan

Pay with Climb. Secure payment platform. Seamless payment experience.

$ 9,995

Secure Payment

Lock

Admissions process

How to get started

1

Explore our career paths and courses

Ready to start your new career in tech? Explore our different career tracks and see which path interests you the most!

Explore Courses
2

Application and basic skills assessment

Submit your application – it takes less than 5 minutes. After you apply you will be sent a basic skills assessment. Our assessment is meant to test your cognitive skills. Don’t stress! We want to know if you can think like a programmer, if you can we will take it from there!

Apply Now
3

Schedule an admissions call

Talk with our admissions team so we can get to understand your career goals and answer any questions you have about our program.

Schedule a Call
4

Secure your seat and enroll

Finalize your payment plan to secure your seat! Once you’re enrolled, you will gain instant access to our preparatory work, slack channels, and 1:1 support prior to class.

See Payment Plans

Not sure if Cybersecurity is for you?

Frequently asked questions