Learn on your own time
Finish early by putting in more hours
Why Enroll in an Online Cybersecurity Bootcamp?
With an estimated 3.5 million unfilled industry jobs, according to Cybersecurity Ventures, cybersecurity is a safe and readily recommendable career to jump into. A career in cybersecurity is highly fulfilling, as the industry is designed to protect people and businesses at large from a wide range of security risks.
Cybersecurity professionals must possess a lot of technical know-how, risk assessment skills, data and security knowledge, and threat intelligence skills. At Gonzaga University, our online Cybersecurity Bootcamp is engineered to provide students with all they need to start their career in the industry. We do this by providing you with a thoroughly curated curriculum designed by industry experts, including hands-on projects that offer a real-world experience tailored specifically for your future career.
Cybersecurity Bootcamp Details
Throughout this course, you will learn cybersecurity fundamentals, ending in a capstone project that will serve as a centerpiece for your portfolio. Our courses will give you all you need to know about the most important aspects of several IT, IT security and IT auditing processes. In addition, you will learn how to identify errors and improve a range of products and services that are popular in the industry. Even better, you'll be able to do all this on your own time, potentially completing the course ahead of schedule if you're prepared to devote the extra time.
In addition, this comprehensive Cybersecurity Bootcamp includes a complete mock exam designed to help you prepare for the globally-recognized CompTIA Security+ exam. We'll provide you with a free voucher to sit for the exam. With this voucher, alongside the optional 1:1 career coaching we provide, you'll get everything you need to build a professional resume and begin your career in this ever-growing industry.
Careers in Cybersecurity
Once you complete our online Cybersecurity Bootcamp, you'll have all the skills employers demand to begin a successful career in the industry. The following are some of the most common examples of careers that you can pursue, according to CompTIA:
Cybersecurity analyst: $107,500
Software developer/engineer: $110,140
Cybersecurity consultant: $92,504
Vulnerability analyst/penetration tester: $101,091
Cybersecurity manager/administrator: $130,000
Network engineer/architect: $83,510
Systems engineer: $90,920
Senior Software Developer: $151,960
Systems Administrator: $80,600
Typical coursework includes complete learning resources, exercises, InfoSec learning labs and nine optional, career-related units. In addition, our bootcamp will help you learn all the fundamentals you need to succeed. Explore the curriculum:
This bootcamp covers each of the components:
Identity and Access Management
Security Assessment and Testing
By studying 15-20 hours per week, you should complete it in 6 months.
Course units include learning resources, practice exercises, virtual labs from InfoSec Learning, as well as nine optional career-related units.
The course itself is divided into 21 total learning units, consisting of:
1 Getting Started Unit
11 Technical Units
3 Basic Priming Units:
An Optional Cybersecurity Basics Unit
A Cybersecurity Fundamentals Unit
An IT Project Management Unit
6 Core Concept Units
1 Capstone Project Unit
1 CompTIA Security+ Preparation Unit
9 Career Preparation Units
Getting Started with Cybersecurity Career Track
Creating Your Job Search Strategy
IT Project Management
Your Elevator Pitch and LinkedIn Profile
Effective Networking: Building Your Network
Identity and Access Management
Networking: Informational Interviews
Security Assessment and Testing
Find the Right Job Titles and Companies
Preparing For and Getting Interviews
CompTIA Security+ Prep Unit
Effective Interviewing for Cybersecurity
Salary Negotiation and Career Next Steps
Congrats and Next Steps After Course Completion
Technical Unit Preview
Through our Cybersecurity Bootcamp, you'll gain experience via several specialized units. These units are each carefully designed to help you find success in your career. The following are examples of the kinds of technical units that we provide:
Learn all the fundamentals of the industry through our hands-on approach. You'll learn how to detect IT security problems, among other skills, including all of the following:
Threat actor types and attributes (hackers, DarkNet entities, social engineering, etc.)
Intro to Security+ certification
Three-legged stool (CIA)
Red-team vs. blue-team
Identity and Access Management (IAM) is an essential discipline in cybersecurity. This process allows a company to manage its user identities, going so far as to maintain how they access data. This unit covers the following:
Authentication components and models
Defining access control models
Permissions, Policies and Rights
Through our Security Assessment and Testing unit, you'll learn how to conduct a wide range of security assessments and the best types of remediation for common issues. In addition, you will learn how to create Information Security (IS) auditing plans. These test plans provide insight into how IS auditors approach the industry. This includes lessons on all of the following:
Risk assessments and audits of controls
Through our student advisors, mentors and career coaches, you will have access to the following support elements:
Student Advising: Your student advisor will be with you from start to finish, answering questions as you progress.
1:1 Mentorship: Meet weekly with your cybersecurity mentor, with additional calls available as needed.
Career Preparation: You can also take advantage of optional 1:1 career coaching to help you develop a strong resume, among other preparations.
Online Community: Get the feedback you need from both peers and mentors.
Learn With an Industry Mentor
At Gonzaga University, our team of mentors is composed of industry experts that are fully equipped to help students develop all the skills they need to succeed.
Weekly 1:1 Video Calls: Our mentors offer assistance in fine-tuning your projects, addressing any roadblocks and building professional goals.
Accountability: We help you achieve a sense of personal responsibility by making you accountable for reaching your goals.
Unlimited Mentorship Calls: We provide additional 1:1 calls with our mentorship team as needed at no extra cost.
Is This Cybersecurity Bootcamp Right for You?
If protecting people and their assets in the modern digital age sounds appealing, you have come to the right place. A career in cybersecurity requires that you enjoy collaborating and problem solving, in addition to the following prerequisites:
A willingness and desire to complete all required course units.
The ability to pass an evaluation for baseline soft skills, including self-motivation, team communication, overall professionalism, commitment to learning and analytical skills.
In general, cybersecurity consists of the process and techniques used to protect sensitive data, computer systems, networks and software applications from cyber attacks.
Some of the most popular topics covered in cybersecurity include:
Unauthorized access to systems and data
Disrupting the normal functions of a business and its processes
Using ransomware attacks to encrypt data and extort money from victims
Entry-level roles generally do not require any coding experience, but programming is a powerful skill to have in your toolkit as you progress in your career. This course will teach you basic Python, Perl and Powershell. No coding experience is required for acceptance into this Cybersecurity Bootcamp.
Professionals working in the cybersecurity field must have a strong analytical mindset, robust communications skills and a highly collaborative work ethic. In this course, you’ll also build the following technical skillset:
Operating system security
Network scanning tools
Basic Python Scripting
Security information and event management (SIEM) analysis
Packet capture and log analysis
While building the technical skill set, Cybersecurity Bootcamp students will have access to the following tools:
Nmap for network scanning
Wireshark: A free and open-source network protocol analyzer
Metasploit for vulnerability scanning, enumeration, executing attacks and more
Kali Linux for digital forensics, penetration testing, ethical hacking and more
Kleopatra for security key encryption
Autopsy for digital forensics
Splunk for DevSecOps
OpenVAS for vulnerability scanning
Zenmap, the graphical interface of Nmap, used for scanning, network mapping and more
GoPhish to run phishing simulations
Low Orbit Ion Cannon for stress testing and denial-of-service attack application
You’ll be able to gain an entry-level position as a cybersecurity analyst, specialist or incident analyst/responder.
Graduates also pursue other roles, such as SOC analyst, cybersecurity engineer, cybersecurity consultant, cybersecurity manager / administrator, systems engineer, network engineer / architect, software developer / engineer, vulnerability analyst, cyber crime analyst/ responder and IT auditor.
This course is designed to be completed in 6 months or less depending on how much time you dedicate each week. It is completely self-paced with you in the driver’s seat.
Yes, according to the U.S. Bureau of Labor Statistics, cybersecurity jobs are expected to grow 33% through 2030, much faster than average for other occupations.
According to Cybersecurity Ventures, there are an estimated 3.5 million unfulfilled cybersecurity jobs as the demand to fill these jobs far outweighs the number of individuals qualified to undertake a complex field.
Yes! You’ll have the skills you need to succeed in 6 months’ time with a support system ready to help you in your job search.
The full tuition of the program is $13,050. If you pay upfront, you get an 11% discount.
Pay monthly only for the time you need, up to 6 months.
Financing options available.
For more details on how tuition payments work, see the frequently asked questions page.