Flex Cybersecurity bootcamp
Become a Cybersecurity professional on your own time using the most sought-after curriculum in the industry!
- CompTIA Security+ Certification
- 6 month access | 100% online | Live group sessions
- Job guaranteed
Get the Flex Cybersecurity coursebook']
Skills & technologies covered
Intro to Cybersecurity
In this module, students will gain a solid foundation in cybersecurity principles and practices. They will explore the fundamentals of cybersecurity, including the types of threats and attacks that organizations face. Participants will also learn about the role of a cybersecurity professional and the importance of protecting information and networks. Basic networking concepts will be covered, along with an overview of cybersecurity domains and legal and ethical aspects. The module concludes with a project that involves analyzing a real-world cyber-attack and its impact.
TCP/IP, VPN, Firewalls, OS Linux/Windows
Systems and Network Security
This module focuses on securing operating systems and networks from cyber threats. Students will learn about different types of vulnerabilities and how to protect operating systems effectively. The module covers network security, including firewalls and intrusion detection and prevention systems. Participants will also explore security measures for wireless networks and setting up secure remote access through VPNs. The module culminates in a project where students will configure a secure network with firewall rules and VPN.
IDS, SIEM, Bash
Tools and Technologies
In this module, students will be introduced to various cybersecurity tools and technologies that professionals use to defend against threats. They will gain hands-on experience with tools like Wireshark, Nmap, Nessus, and Metasploit. Participants will learn about intrusion detection and prevention systems, security information and event management (SIEM) tools, and vulnerability assessment and penetration testing tools. The module includes a project where students will conduct a vulnerability assessment using a chosen tool.
Wireshark, Nmap, Nessus, Snort, Metasploit
Cryptography plays a crucial role in securing information, and this module explores its principles and applications. Students will learn about different types of cryptography, including symmetric, asymmetric, and hash functions. The module covers topics such as public key infrastructure (PKI), secure sockets layer/transport layer security (SSL/TLS), and cryptanalysis. Participants will engage in a project that involves analyzing a cryptographic system for potential vulnerabilities.
Burp Suite, OWASP ZAP, Kali Linux, SQL (for SQL injection), Bash scripting
Incident Response and Risk Management
Effective incident response and risk management are essential for organizations to mitigate and recover from cyber incidents. In this module, students will learn about the six phases of incident response and how to create an incident response plan. They will also gain an understanding of risk management principles and disaster recovery planning. The module explores incident response planning, forensics, and business continuity. Students will complete a project where they create an incident response plan and a risk management plan for a hypothetical scenario.
Google's GRR, TheHive, MISP, LogRhythm, AWS, Google Cloud, Azure
Application and Web Security
This module focuses on securing applications and web environments, which are frequent targets for cyber-attacks. Students will learn about the importance of application and web security, common threats, and vulnerabilities. The module covers secure coding practices and introduces the OWASP Top 10 vulnerabilities. Participants will also gain practical experience with web security tools like Burp Suite. The module concludes with a project where students conduct a security review of a web application using the OWASP Top 10 as a guide.
GDPR, CCPA, HIPAA, ISO 27001, NIST Cybersecurity Framework
As cloud computing continues to grow in popularity, it is crucial to understand the unique security challenges it presents. This module introduces students to cloud security concepts and best practices. Participants will learn about different cloud models, security considerations, and the shared responsibility model. The module covers topics such as access controls, data encryption, and regular audits in the cloud environment. Students will engage in a project where they develop a comprehensive cloud security plan for a provided case scenario.
Mobile & IoT Security
Mobile devices are prevalent in today’s digital landscape, and securing them is essential. This module explores the challenges and vulnerabilities associated with mobile security. Students will learn about the security features of Android and iOS platforms and their strengths and weaknesses. The module covers mobile device management (MDM) and best practices for securing mobile devices. Participants will complete a project where they assess the security of a mobile device and propose improvements.
Blockchain, AI, IoT, Cloud Security, Zero Trust Security
Security Policies and Standards
Security policies and standards provide guidelines for implementing effective cybersecurity measures. In this module, students will gain an understanding of the role of security policies and common security standards such as ISO 27001. They will learn how to develop and implement security policies and ensure compliance through auditing. The module also introduces cybersecurity frameworks like the NIST Cybersecurity Framework. Participants will engage in a project where they create a security policy and develop an auditing procedure for a given organization.
APTs, Cobalt Strike, Powershell Empire5G, Edge Computing, AI
Final Project and Career Preparation
In the final module, students will apply their knowledge and skills to a comprehensive final project. The project involves risk assessment, security policies, secure network design, application and cloud security planning, and incident response planning. Participants will present their final projects and receive feedback. The module also includes career preparation, covering job market insights, career readiness track preparation, and guidance on further learning and relevant certifications.
Dive deeper into our Flex curriculum
Flex Front-End Development bootcamp
Flex learning allows you to get the coding bootcamp experience on your own time. You are able to move at your own speed, free from deadlines and class schedules. You’ll learn to program through a mix of recorded lectures, coding exercises, and projects.
We set students up for success
1:1 Live support sessions with an instructor
Weekly peer programming and code wars sessions
Real projects and graded assignments
Dedicated Student Success Manager
We offer lifetime career services
Our post-graduation services provide each student with the necessary resources, tools, and guidance to build a meaningful career. We provide 1-1 support for the entirety of your professional journey.Learn more
Our Admissions Representatives are ready to help
We’ll work 1-1 to get your questions answered.
We’re here to help you understand our curriculum and financing, as well as give you information about post-graduation services.
Attend one of our Weekly Webinars
See what our program is like and learn how to get started.
Ask questions during our live Q&A.
Big names in tech hire Coding Temple grads
Don’t just take our word for it.
Hear from our graduates
"Overall I will say it was the right choice for me to go with Coding Temple for several personal reasons. Scheduling, timeline, availability of instructors/tutors, budget, and reputation were all very important in my decision to choose this bootcamp over the numerous other ones I looked into."
"I had a great experience at Coding Temple. Before enrolling in CT, my coding / web design experience dates to at least 15 years ago. I was overdue for a re-introduction to the wonderful world of web development. I like how CT emphasizes both the material subject matter (the curriculum) AND the job search process itself, and how -- once one passes/graduates the program -- one becomes availed of ongoing education AND career advice. I found a focus here, while also gaining an introduction to a wide array of topics."
"This coding Bootcamp is awesome. I learned so much throughout, it's an intensive but rewarding Bootcamp. It was great learning how to apply the skills I've learned. I really loved the projects we had to complete, as I could use my creativity to add my own flair to them. The 1-1 help was also really great and the instructors were amazing! I would highly recommend Coding Temple!"
"From first phone interview to post graduation. The application, learning, and career support are amazing. I went from zero coding experience to actually understanding and building applications. It was a great price for the time learning."
How to get started
Explore our career paths and courses
Ready to start your new career in tech? Explore our different career tracks and see which path interests you the most!Explore Courses
Schedule an admissions call
Talk with our admissions team so we can get to understand your career goals and answer any questions you have about our program.Schedule a Call
Application and basic skills assessment
Submit your application – it takes less than 5 minutes. After you apply you will be sent a basic skills assessment. Our 50-question assessment is meant to test your cognitive skills. Don’t stress! We want to know if you can think like a programmer, if you can we will take it from there!Apply Now
Secure your seat and enroll
Finalize your payment plan to secure your seat! Once you’re enrolled, you will gain instant access to our preparatory work, slack channels, and 1:1 support prior to class.See Payment Plans