Format:
100% online
Learn on your own time
Duration:
6 months, 10-15 hrs/wk
Finish early by putting in more hours
Apply by:

Cohort starts

Why Enroll in an Online Cybersecurity Bootcamp?

With an estimated 3.5 million unfilled industry jobs, according to Cybersecurity Ventures, cybersecurity is a safe and readily recommendable career to jump into. A career in cybersecurity is highly fulfilling, as the industry is designed to protect people and businesses at large from a wide range of security risks. 

Cybersecurity professionals must possess a lot of technical know-how, risk assessment skills, data and security knowledge, and threat intelligence skills. At Gonzaga University, our online Cybersecurity Bootcamp, offered in partnership with Springboard, is engineered to provide students with all they need to start their career in the industry. We do this by providing you with a thoroughly curated curriculum designed by industry experts, including hands-on projects that offer a real-world experience tailored specifically for your future career.

Cybersecurity Bootcamp Details

Throughout this course, you will learn cybersecurity fundamentals, ending in a capstone project that will serve as a centerpiece for your portfolio. Our courses will give you all you need to know about the most important aspects of several IT, IT security and IT auditing processes. In addition, you will learn how to identify errors and improve a range of products and services that are popular in the industry. Even better, you'll be able to do all this on your own time, potentially completing the course ahead of schedule if you're prepared to devote the extra time.

In addition, this comprehensive Cybersecurity Bootcamp includes a complete mock exam designed to help you prepare for the globally-recognized CompTIA Security+ exam. We'll provide you with a free voucher to sit for the exam. With this voucher, alongside the optional 1:1 career coaching we provide, you'll get everything you need to build a professional resume and begin your career in this ever-growing industry. 

Careers in Cybersecurity

Once you complete our online Cybersecurity Bootcamp, you'll have all the skills employers demand to begin a successful career in the industry. The following are some of the most common examples of careers that you can pursue, according to CompTIA

  • Cybersecurity analyst: $107,500

  • Software developer/engineer: $110,140

  • Cybersecurity consultant: $92,504

  • Vulnerability analyst/penetration tester: $101,091

  • Cybersecurity manager/administrator: $130,000

  • Network engineer/architect: $83,510

  • Systems engineer: $90,920

  • Senior Software Developer: $151,960

  • Systems Administrator: $80,600

Curriculum

Typical coursework includes complete learning resources, exercises, InfoSec learning labs and nine optional, career-related units. In addition, our bootcamp will help you learn all the fundamentals you need to succeed. Explore the curriculum:

NEW! AI for Cybersecurity Curriculum

Learn to harness the power of AI with new learning units throughout your cybersecurity curriculum. You’ll explore AI’s practical applications and how to leverage them to solve cybersecurity challenges. Learn how to identify and respond to security threats in real time, to predict cyber threats and future attack trends.  With AI by your side, you can become a powerful guardian of cyberspace, and a valuable asset to your employer. Curriculum includes:

  • Introduction to AI and its Applications in Cyber Security

  • AI for Threat Detection and Incident Response

  • AI in Malware Analysis and NLP for Cyber Security

  • AI in Network Security and Threat Hunting

  • Explainable AI and AI for Predictive Security Analytics

7 Core Concepts of Cybersecurity

This bootcamp covers each of the components:

  1. Host-Based Security 

  2. Network Security 

  3. Identity and Access Management 

  4. Cryptography

  5. Security Assessment and Testing

  6. Security Operations

  7. Application SecurityBy studying 10-15 hours per week, you should complete it in 6 months.

Course units include learning resources, practice exercises, virtual labs from InfoSec Learning, as well as nine optional career-related units.

Curriculum Breakdown

The course itself is divided into multiple learning units, consisting of:

  • 1 Getting Started Unit

  • 12 Technical Units

  • 2 Basic Priming Units:

    • A Cybersecurity Basics Unit 

    • A Cybersecurity Fundamentals Unit

  • 7 Core Concepts

  • 1 Capstone Project Unit

  • 1 CompTIA Security+ Preparation Unit

  • 6 Career Preparation Units

Course Sequence
  • Program Overview

  • Introduction to AI and its Applications in Cyber Security

  • Cybersecurity Basics

  • Cybersecurity Fundamentals

  • AI for Threat Detection and Incident Response

  • Career Unit: Career Planning

  • Cybersecurity Attacks

  • Host-Based Security

  • Career Unit: Career Branding

  • Network Security Part I

  • Network Security Part II

  • AI in Network Security and Threat Hunting

  • Career Unit: Effective Networking

  • Identity and Access Management (IAM)

  • Cryptography

  • Security Architecture

  • Security Operations (SecOps)

  • Application Security

  • Explainable AI and AI for Predictive Security Analytics

  • Security Assessment and Testing

  • AI in Malware Analysis and NLP for Cyber Security

  • Capstone Project

  • Career Unit: Your Application Materials

  • CompTIA Security+ Exam Prep Unit

  • Career Unit: Effective Interviewing for Cybersecurity

  • Career Unit: Salary Negotiation

  • Congrats and Next Steps After Course Completion

Technical Unit Preview

Through our Cybersecurity Bootcamp, you'll gain experience via several specialized units. These units are each carefully designed to help you find success in your career. The following are examples of the kinds of technical units that we provide:

Cybersecurity Fundamentals

In this unit, you'll get a peek behind the curtain of the cybersecurity stage. You'll study the behavior, motivations, and game plan of your adversary — the cybercriminal. You'll learn about threat actors, the most common types of attacks, plus the frameworks and models used to build a robust defensive playbook. 

You'll understand how professionals set the defense standards through the CIA Triad, and the cyber kill chain model. You'll also study real-life data breaches to get a glimpse of how rapidly the dominoes can fall. Finally, you'll be introduced to the CompTIA Security+ certification exam and become familiar with Linux and Unix.

Topics Covered:

  • The CIA Triad: Three-Legged Stool

  • Threat Actor Types and Attributes

  • Cyber Kill Chain

  • Ethical Hacking 

  • Using Linux and Unix

  • Intro to CompTIA Security+ Certification

Identity and Access Management

Identity and Access Management (IAM) is one of the most important disciplines within cybersecurity. It aims to manage user identities and their access to enterprise resources and data. IAM governance and programs—including policies, processes, and technologies—manage user identities and access, as well as what a user can do within a system through authentication, authorization, and accounting. At the end of the unit, you’ll have the option to prepare for and take the Microsoft Security, Compliance, and Identity Fundamentals exam (Exam SC-900), which is 50% off for students taking this course.

Topics Covered:

  • Controlling Access

  • Zero Trust

  • Microsoft Security, Compliance, and Identity Fundamentals

Security Assessment and Training

In the Security Assessment and Testing unit, you will learn how to conduct security assessments and recommend remediation activities. You will also learn how to create Information Security (IS) audit test plans, which will give you insight into how IS auditors approach their engagements. Exposure to advanced concepts around web security testing and the use of Kali Linux is also included. Mini-projects in this unit will allow you to explore another side of penetration testing,  real-world vulnerability management challenges, and software testing plans. Labs in this unit will give you another slice of the red-team world, taking you through attacking web servers, exploring a vulnerable web application, and cracking passwords.

Topics Covered:

  • Logical and Physical Security Testing

  • Mobile Device Security

  • Governance Risk and Compliance

  • Security Policies

Student Support

Through Springboard student advisors, mentors and career coaches, you will have access to the following support elements:

  • Student Advising: Your student advisor will be with you from start to finish, answering questions as you progress. 

  • 1:1 Mentorship: Meet regularly with your cybersecurity mentor, with additional calls available as needed. 

  • Career Preparation: You can also take advantage of optional 1:1 career coaching to help you develop a strong resume, among other preparations.

  • Online Community: Get the feedback you need from both peers and mentors. 

Learn With an Industry Mentor

At Springboard, our team of mentors is composed of industry experts that are fully equipped to help students develop all the skills they need to succeed. 

  • Regular 1:1 Video Calls: Our mentors offer assistance in fine-tuning your projects, addressing any roadblocks and building professional goals.

  • Accountability: We help you achieve a sense of personal responsibility by making you accountable for reaching your goals. 

  • Dedicated Mentorship Calls: We provide additional 1:1 calls with our mentorship team as needed at no extra cost.

mentorAvatar
Alissa Torres
Senior Threat Hunter
mentorAvatar
Jay James
Cyber Security Operations Lead
mentorAvatar
Mark Adams
Sr Manager, IT Security & Compliance
mentorAvatar
Leonard Simon
MSSP Manager

Is This Cybersecurity Bootcamp Right for You?

If protecting people and their assets in the modern digital age sounds appealing, you have come to the right place. A career in cybersecurity requires that you enjoy collaborating and problem solving, in addition to the following prerequisites:

  • A willingness and desire to complete all required course units.

  • The ability to pass an evaluation for baseline soft skills, including self-motivation, team communication, overall professionalism, commitment to learning and analytical skills. 

FAQ

What is cybersecurity?

In general, cybersecurity consists of the process and techniques used to protect sensitive data, computer systems, networks and software applications from cyber attacks.

Some of the most popular topics covered in cybersecurity include:

  • Unauthorized access to systems and data

  • Disrupting the normal functions of a business and its processes

  • Using ransomware attacks to encrypt data and extort money from victims

Does cybersecurity require coding?

Entry-level roles generally do not require any coding experience, but programming is a powerful skill to have in your toolkit as you progress in your career. This course will teach you basic Python, Perl and Powershell. No coding experience is required for acceptance into this Cybersecurity Bootcamp.

What skills are needed to work in cybersecurity?

Professionals working in the cybersecurity field must have a strong analytical mindset, robust communications skills and a highly collaborative work ethic. In this course, you’ll also build the following technical skillset:

  • Incident response

  • Threat intelligence

  • Operating system security

  • Application security

  • Network scanning tools

  • Network mapping

  • Firewall

  • IDS/IPs

  • Vulnerability assessments

  • IT controls

  • Packet capture

While building the technical skill set, Cybersecurity Bootcamp students will have access to the following tools:

  • Nmap for network scanning

  • Wireshark: A free and open-source network protocol analyzer

  • Metasploit for vulnerability scanning, enumeration, executing attacks and more

  • Kali Linux for digital forensics, penetration testing, ethical hacking and more

  • Kleopatra for security key encryption

  • Autopsy for digital forensics

  • OpenVAS for vulnerability scanning

  • Zenmap, the graphical interface of Nmap, used for scanning, network mapping and more

  • GoPhish to run phishing simulations

  • Low Orbit Ion Cannon for stress testing and denial-of-service attack application

What type of jobs can you do after a cybersecurity bootcamp?

You’ll be able to gain an entry-level position as a cybersecurity analyst, specialist or incident analyst/responder.

Graduates also pursue other roles, such as SOC analyst, cybersecurity engineer, cybersecurity consultant, cybersecurity manager / administrator, systems engineer, network engineer / architect, software developer / engineer, vulnerability analyst, cyber crime analyst/ responder and IT auditor.

How long does it take to complete a cybersecurity bootcamp?

This course is designed to be completed in 6 months or less depending on how much time you dedicate each week. It is completely flexible with you in the driver’s seat.

What is the salary of someone working in cybersecurity?

Depending on your work experience, geographic location, role and work sector, you can expect to make between $80,000 and $130,000 in some of the best cybersecurity jobs, according to CompTIA.

Is cybersecurity in high demand?

Yes, according to the U.S. Bureau of Labor Statistics, cybersecurity jobs are expected to grow 33% through 2030, much faster than average for other occupations.

According to Cybersecurity Ventures, there are an estimated 3.5 million unfulfilled cybersecurity jobs as the demand to fill these jobs far outweighs the number of individuals qualified to undertake a complex field.

Is a cybersecurity bootcamp worth it?

Yes! You’ll have the skills you need to succeed in 6 months’ time with a support system ready to help you in your job search.

How much does a cybersecurity bootcamp cost?
  • The full tuition of the program is $13,050. If you pay upfront, you get an 11% discount.

  • Pay monthly only for the time you need, up to 6 months.

  • Financing options available.

For more details on how tuition payments work, see the frequently asked questions page.

Is this program offered by Gonzaga University?

Gonzaga partners with Springboard, an industry-driven education company that prepares learners for high-growth careers, to offer the Cybersecurity Bootcamp. This course is designed, administered and led by Springboard, and the curriculum has been vetted and approved by Gonzaga University School of Engineering and Applied Science.

After successfully completing a bootcamp, you’ll receive an official Certificate in Cybersecurity from Gonzaga University and verification of continuing education credits.

More Questions About the Program?

Speak to our enrollment team by completing an application, email Carolina, our enrollment advisor, or explore more frequently asked questions

Orlando Headshot

Syllabus Request

Get Started

Upcoming Programs

Gonzaga University Center for Lifelong Learning 502 E. Boone Ave. Spokane, WA 99258

Copyright © 2024

Powered by Springboard

Gonzaga University Center for Lifelong Learning 502 E. Boone Ave. Spokane, WA 99258

Copyright © 2024

Powered by Springboard

Gonzaga University offers bootcamps in partnership with the third-party learning provider Springboard. Springboard designs, teaches and administers the course. The Gonzaga Center for Lifelong Learning evaluates and monitors the curriculum and issues successful students with continuing education credits on an official transcript.