Outsmart the Competition

and Excel in Your Career

From the Fundamentals to Advanced Skills, We Have You Covered.

This non-credit, non-degree program is built for those looking to fast-track their career in cybersecurity, whatever their initial level of tech proficiency. Expert instructors guide your training in a safe cloud-based platform where you can practice defending and attacking various systems and applications. You will complete the program ready to defend organizations against real attacks, find weaknesses, and secure systems from threats–all the skills employers look for.

The Cybersecurity Bootcamp is offered through the Continuing Education services of Penn State Beaver, Penn State Behrend, Penn State Greater Allegheny, and Penn State New Kensington.

With over 700,000
job openings
nationwide, there’s
never been a better
time to join the
cybersecurity
industry.

- Source:
Cyberseek.org

img

Join the Rewarding
Field of Cybersecurity in Under a Year!
Train on the Industry’s Top Tools and Software

Develop the advanced skills and training you’ll need to become a well-rounded cybersecurity
professional, covering everything from the basics to highly sought-after, advanced industry skills.

Learn to Defend Against Cyberattacks

Thrive in the Expanding World of Cybersecurity

Hands-On Learning

Confidently enter the workforce with hands-on training in an accelerated, online environment. Gain real-world experience designed for professionals of all backgrounds and experience levels to excel in the field of cybersecurity.

Cyber Labs

Gain experience through real-world simulations identifying vulnerabilities on web, server, mobile, and desktop platforms and learn how to protect against a variety of threats. Cyber Labs are designed by cybersecurity experts to help you practice the skills you need to succeed.

Virtual Classroom

Top-tier instructional methodologies are used with cloud-based chat software that encourages real-time interaction between you and your instructors. Attend classes virtually from the comfort of your own home in the evenings and on the weekends.

Industry-Leading Instructors

Experience personalized mentorship and guidance from expert instructors with current industry knowledge and a unique insider’s understanding of the fast-paced field of cybersecurity. Access guidance from thought leaders as you learn how to succeed as a cybersecurity professional.

Get the Knowledge and Experience You Need
in Under a Year, Become a Cyber Defender

Networking
Advantages

Attend virtual networking events to access local and global hiring partners looking to hire newly-qualified cybersecurity professionals. Events are designed to allow you to explore diverse career opportunities available upon program completion.

Professional
Coaching

Access a team of career coaches eager to help you achieve your professional goals in your cybersecurity career. Professional development is available to assist in resume writing, LinkedIn profile building, interview prep, and more.

Dedicated
Support

Your journey into the field of cybersecurity is backed by a dedicated team. Your student success manager will help ensure you have the tools and support you need to succeed in the program and beyond.

Career Search
Assistance

Our Career Outcomes team will assist in your search to find exciting job opportunities. Prepare for the interview process with our professional assistance to start your new career with confidence.

Download the
Course Catalog

Find out what you will learn.

img

Program Overview

30-Hour Introductory Course |
370-Hour Extended Program

  • Introductory Course

    The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future.

    The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics.
  • Part 1: Fundamentals

    The Fundamentals phase of the program helps learners understand the basics of cybersecurity. In Fundamentals, learners cover Microsoft Windows, Linux, and basic network and cloud security. This phase of the program acts as training to prepare learners for the more rigorous Infrastructure phase.
  • Microsoft Security

    Globally, a multitude of companies trust Windows Server exclusively to manage their computers and networks. The Microsoft Security course gives learners a hands-on education with modern and widely used versions of the Microsoft Windows and Server operating systems. Learners will discover how to administrate, secure, and become good practitioners with the Microsoft ecosystem of products.
  • Computer Networking

    Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few.

    In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.
  • Cloud Security

    More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam.*
  • Linux Security

    In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam.*
  • Part 2: Cybersecurity Infrastructure

    The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase.
  • Network Security

    Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the digital skill set needed to appeal most to potential employers.
  • Cyber Infrastructure Security

    Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure a good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.

    After this course, learners will be prepared to begin studying for the CompTIA Security+ exam.*
  • Intro to Python for Security

    Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
  • Part 3: Advanced Cybersecurity

    The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers.
  • Offensive Security: Ethical Hacking

    Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.
  • DFIR and Threat Hunting

    When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.
  • Game Theory Strategy in Cybersecurity

    How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.
  • Career Outcomes Workshop

    This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while TDX Arena hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field.
Icon

Introductory Course (30 Hours)

The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future.

The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics.

Icon

Part 1: Fundamentals

The Fundamentals phase of the program helps learners understand the basics of cybersecurity. In Fundamentals, learners cover Microsoft Windows, Linux, and basic network and cloud security. This phase of the program acts as training to prepare learners for the more rigorous Infrastructure phase.

Icon

Microsoft Security (40 Hours)

Globally, a multitude of companies trust Windows Server exclusively to manage their computers and networks. The Microsoft Security course gives learners a hands-on education with modern and widely used versions of the Microsoft Windows and Server operating systems. Learners will discover how to administrate, secure, and become good practitioners with the Microsoft ecosystem of products.

Icon

Computer Networking (50 Hours)

Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few.

In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

Icon

Cloud Security (15 Hours)

More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam.*

Icon

Linux Security (30 Hours)

In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam.*

Icon

Part 2: Cybersecurity Infrastructure

The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase.

Icon

Network Security (35 Hours)

Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the digital skill set needed to appeal most to potential employers.

Icon

Cyber Infrastructure Security (40 Hours)

Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure a good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.

After this course, learners will be prepared to begin studying for the CompTIA Security+ exam.*

Icon

Intro to Python for Security (25 Hours)

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

Icon

Part 3: Advanced Cybersecurity

The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers.

Icon

Offensive Security: Ethical Hacking (50 Hours)

Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.

Icon

DFIR and Threat Hunting (60 Hours)

When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.

Icon

Game Theory Strategy in Cybersecurity (10 Hours)

How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.

Icon

Career Outcomes Workshop (15 Hours)

This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while TDX Arena hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field.

*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation program, where the primary focus is the students’ performance on the exam. Certification exams are not conducted as part of the program and require additional costs not included in tuition.

Gear Up for Internationally
Recognized Certification Exams

This bootcamp is not a certification-prep program. However, we recognize that cybersecurity professionals breaking into the industry are more likely to be hired if they hold internationally recognized certifications. In an effort to boost your credentials even further, we have developed a vast library of resources to help you develop skills applicable to certification exams.

To stand out from other cybersecurity professionals, we recommend that learners seek one certification during each phase to support their individual career goals.

  • LPI Linux Essentials Certification

    The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration.
  • AWS Certified Cloud Practitioner Certification

    The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers.
  • CompTIA Network+ Certification

    The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies.
  • CompTIA Security+ Certification

    The CompTIA Security+ is the next step up from the CompTIA Network+ and is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests the candidate’s skill set over a range of disciplines, such as systems, networks, security administration, and penetration testing.
  • (ISC)² SSCP – Systems Security Certified Practitioner** Certification

    For students who achieved 1 year of experience—Post-Program Completion.

    The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

LPI Linux Essentials Certification

The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration.

AWS Certified Cloud Practitioner Certification

The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers.

CompTIA Network+ Certification

The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies.

CompTIA Security+ Certification

The CompTIA Security+ is the next step up from the CompTIA Network+ and is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests the candidate’s skill set over a range of disciplines, such as systems, networks, security administration, and penetration testing.

(ISC)² SSCP – Systems Security Certified Practitioner** Certification

For students who achieved 1 year of experience—Post-Program Completion.

The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

** Students must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Program Tuition

Now is the time to seize this opportunity to enter a new career in the tech field. Invest in your professional development with the knowledge and skills you need to enter the field of cybersecurity.

30-Hour Introductory Course

$180

370-Hour Extended Program

$17,800

Requirements

Internet access

Drive, ambition, and passion

Introductory course and admission exam

Tuition, fees and deposits are subject to change.

img
Skip to content