NYU School of Professional StudiesCybersecurity Bootcamp

400-Hour Bootcamp | Immersive Education
| Online, Live Classrooms

By clicking "Request Info,” I consent to be contacted by HackerUSA Inc. on behalf of NYU School of Professional Studies Cybersecurity Bootcamp, including by email, calls, and text messages (including by autodialer or prerecorded messages) about my educational interests. I understand consent to be contacted is not required. Msg. and data rates may apply.

Contact 212-361-9205 for more information. I also agree to the Terms of Use and Privacy Policy.

Enter the Cyber Workforce

In Less than a Year

With a Bootcamp Dedicated to Your Success

Benefit from instructors who are leaders in the industry, imparting their knowledge in online live classes and hands-on lab simulations of real-world cyber attacks in our rich, comprehensive bootcamp. Career services and professional development provide networking opportunities inside the industry.
This continuing education program is offered by the NYU School of Professional Studies.

find a job you enjoy doing, and you will never have to work a day in tour life

-Mark Twain

Get Ahead with a Fast-Track Comprehensive Bootcamp

Discover the Professional Path for You

Our bootcamp is designed to give you comprehensive skills and training to transform your career to professional cybersecurity specialist, covering all the basics through to the most high-demand and advanced skills and capabilities.

If one of these describes you, then you are an ideal candidate for the NYU School of Professional Studies (NYU SPS) Cybersecurity Bootcamp:

Icon
Minimal or no cybersecurity experience or background
Icon
Looking to move towards a new, rewarding, and innovative career
Icon
Seeking to learn the skills to defend businesses against cyber attacks

Become a Front-Line Defender

Against Cyber Threats

Skilled Cybersecurity Specialists Are In High Demand

31%

The projected growth of cybersecurity careers by 2029

4k

Daily average of post-pandemic cyber attacks

10.5t

The projected cost global cybercrime will reach by 2025

8.64m

The average cost of a data breach in the U.S.

Icon

Hands-On Cyber Defense

Experience

Get the Real-World Practice You Need with Cyber Attack Simulations

Get started in the right direction to a career in cybersecurity with the NYU SPS Cybersecurity Bootcamp. Hands-on training is the key to building marketable cybersecurity skills, so we’ve developed CyWar: a robust, cloud-based platform where you can apply what you learned in class, practice offensive and defensive tactics, and even compete with other aspiring cyber professionals from around the world.

Discover what it really means to work as a cybersecurity professional with simulations that mimic real-world challenges and conditions in the workplace. A range of challenging and exciting projects and learning modules provide the practical experience that enables participants to excel in their new profession and stand above the competition.

Program
Overview

30-Hour Introductory Course | 370-Hour Extended Program

Introductory Course

Our Introductory Course offers the unique opportunity to test-drive our Cybersecurity Bootcamp before you commit to the whole program. In just 8 hours a week—spread out under one month across evenings and weekends—you’ll learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle. You’ll also experience what an online learning environment feels like, how classes and interactions flow, and, most importantly, you’ll acquire all the information you need to make a confident and informed decision to enroll in the Extended Program. At the end of the Introductory Course, learners take a summary exam to assess their ability to forge a successful future in their chosen career path.

Cybersecurity Fundamentals Phase

The Fundamentals phase of the program helps learners understand the basics of cybersecurity. In Fundamentals, learners cover Microsoft Windows, Linux, and basic network and cloud security. This phase of the program acts as training to prepare learners for the more rigorous Infrastructure phase.

Microsoft Security

Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few. In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

Computer Networking

Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few. In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

Linux Security

In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam*.

Cloud Security

More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam*.

Fundamentals Phase Final Project

Building Your Own Environment: Learners will create an insecure small business infrastructure on which they will secure while practicing cyberattacks and forensics. Upon completion of the program, learners will be able to include this project in their portfolio to demonstrate their skill and ability.

Cybersecurity Infrastructure Phase

The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase.

Network Security

Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the skill set needed to appeal most to potential employers.

This course gives learners the necessary knowledge to begin studying for the EC-Council CND exam*.

Critical Infrastructure Security

Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure a good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.

After this course, learners will be prepared to begin studying for the CompTIA Security+ exam*.

Python for Security

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

Infrastructure Phase Final Project

Using the infrastructure created in the previous final project, learners will take a threat scenario and secure the infrastructure to demonstrate infrastructure hardening.

Career Services Workshop

This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while CyWar hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field.

Advanced Cybersecurity Phase

The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers.

Ethical Hacking

Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.

After this course, learners will be prepared to finish studying for the EC-Council CEH(Certified Ethical Hacker) certification exam*.

Digital Forensics & Incident Response

When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.

After this course, learners will be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.

Advanced Phase Final Project: Attack & Response

Learners will take the secure infrastructure they have created in previous projects, design an attack to compromise the infrastructure, gather forensic evidence, and write a complete investigative report.

Upon completion of the program, learners will have the reports, code, and designs from their projects to form a portfolio that they can show prospective employers.

Game Theory

How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.

Introductory Course
Cybersecurity Fundamentals Phase
Microsoft Security
Computer Networking
Linux Security
Cloud Security
Fundamentals Phase Final Project
Cybersecurity Infrastructure Phase
Network Security
Critical Infrastructure Security
Python for Security
Infrastructure Phase Final Project
Career Services Workshop
Advanced Cybersecurity Phase
Ethical Hacking
Digital Forensics & Incident Response
Advanced Phase Final Project: Attack & Response
Game Theory
Icon
Introductory Course
8 Lessons | 30 Hours

Our Introductory Course offers the unique opportunity to test-drive our Cybersecurity Bootcamp before you commit to the whole program. In just 8 hours a week—spread out under one month across evenings and weekends—you’ll learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle. You’ll also experience what an online learning environment feels like, how classes and interactions flow, and, most importantly, you’ll acquire all the information you need to make a confident and informed decision to enroll in the Extended Program. At the end of the Introductory Course, learners take a summary exam to assess their ability to forge a successful future in their chosen career path.

Icon
Cybersecurity Fundamentals Phase

The Fundamentals phase of the program helps learners understand the basics of cybersecurity. In Fundamentals, learners cover Microsoft Windows, Linux, and basic network and cloud security. This phase of the program acts as training to prepare learners for the more rigorous Infrastructure phase.

Icon
Microsoft Security
10 Lessons | 40 Hours

Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few. In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

Icon
Computer Networking
9 Lessons | 35 Hours

Computer networks are used across industries, from healthcare, finance, and technology to manufacturing, travel, and hospitality, to name a few. In the Computer Networking course, learners will cover the basics of computer networks, including topologies, protocols, network designs, and devices. This will form a foundation for learners to later study and sit for the CompTIA Network+ exam* after completing the Network Security course.

Icon
Linux Security
8 Lessons | 30 Hours

In the Linux Security course, learners will gain knowledge and practical skills with the most used operating system in the world. Cybersecurity professionals must have an in-depth understanding of Linux to succeed. Participants in this course will cover all the basics of using and manipulating the Linux operating system and learn about the different Linux distributions. Upon completion of this course, learners will be able to begin preparing for the LPI Linux Essentials certification exam*.

Icon
Cloud Security
7 Lessons | 25 Hours

More and more organizations are moving their infrastructure to cloud solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and utilize common cloud service providers and security offerings to implement security for cloud-based solutions. Additionally, learners will have a baseline level of cloud security knowledge that will give them the ability to prepare for the AWS Cloud Practitioner certification exam*.

Icon
Fundamentals Phase Final Project
2 Lessons | 10 Hours

Building Your Own Environment: Learners will create an insecure small business infrastructure on which they will secure while practicing cyberattacks and forensics. Upon completion of the program, learners will be able to include this project in their portfolio to demonstrate their skill and ability.

Icon
Cybersecurity Infrastructure Phase

The Infrastructure phase of the program is where learners will focus solely on security concepts and practices. In the Infrastructure phase, learners will study Critical Infrastructure Security (CIS), Python, and network security. This phase provides practical security skills and experience to prepare learners for the Advanced phase.

Network Security
8 Lessons | 30 Hours

Almost everything happens on a network, either locally or on the internet. Learners will leave the Network Security course with the skills to design, suggest, and implement controls to build secure networks from design to post-implementation. The curriculum focuses on enabling you to achieve technical positions by giving you the skill set needed to appeal most to potential employers.

This course gives learners the necessary knowledge to begin studying for the EC-Council CND exam*.

Icon
Critical Infrastructure Security
9 Lessons | 35 Hours

Power plants, medical facilities, and fire and rescue are all considered critical infrastructure. In the Critical Infrastructure Security course, learners will develop the necessary skills to ensure a good supply chain, Industrial Internet of Things (IIoT), and environment security. These skills are applicable in the business world as well as in the industry for securing systems and environments.

After this course, learners will be prepared to begin studying for the CompTIA Security+ exam*.

Icon
Python for Security
7 Lessons | 25 Hours

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.

Icon
Infrastructure Phase Final Project
2 Lessons | 10 Hours

Using the infrastructure created in the previous final project, learners will take a threat scenario and secure the infrastructure to demonstrate infrastructure hardening.

Icon
Career Services Workshop
1 Session | 5 Hours

This specialized workshop is dedicated to preparing learners for every aspect of technical interviews, while CyWar hosts a dedicated hub of resources, including in-depth career guides and asynchronous classes, to help them land a position in the cybersecurity field.

Advanced Cybersecurity Phase

The Advanced phase of the program builds skills and experience in advanced security concepts, such as ethical hacking, digital forensics, incident response, and game theory. This phase provides learners with a complete view of cybersecurity and prepares them for cybersecurity careers.

Icon
Ethical Hacking
12 Lessons | 50 Hours

Diving deeper into the mindset of criminal hackers, the ethical hacking course is key to the current cybersecurity industry. From penetration testers to GRC auditors, ethical hackers find themselves in many different situations. The Ethical Hacking course gives learners the broad foundations they need to pursue a career trajectory with ethical hacking as a primary role.

After this course, learners will be prepared to finish studying for the EC-Council CEH(Certified Ethical Hacker) certification exam*.

Icon
Digital Forensics & Incident Response
12 Lessons | 50 Hours

When a cyberattack happens, first responders are key. The Digital Forensics & Incident Response (DFIR) course ensures learners have all the tools they need to appropriately respond to incidents, gather evidence for different types of investigations, and report the results.

After this course, learners will be prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.

Icon
Advanced Phase Final Project: Attack & Response
2 Lessons | 10 Hours

Learners will take the secure infrastructure they have created in previous projects, design an attack to compromise the infrastructure, gather forensic evidence, and write a complete investigative report.

Upon completion of the program, learners will have the reports, code, and designs from their projects to form a portfolio that they can show prospective employers.

Icon
Game Theory
4 Lessons | 15 Hours

How do you describe the interactions between a threat and an organization without knowing who the threat is? Begin by viewing the world as a series of games and players. The Game Theory course covers the foundations in philosophy and mathematics as well as how to use game theory to describe threats and cyber incidents. The course also addresses the need for having soft skills in cybersecurity and focuses on developing those creative, out-of-the-box thinking skills to ensure learners are solution-driven and skilled cybersecurity professionals.

*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation program, where the primary focus is the students’ performance on the exam. Certification exams are not conducted as part of the program and require additional costs not included in tuition.

Get Prepped for
Cybersecurity Certifications

Recognized by the Global Industry

Cybersecurity professionals who are just starting in this industry are more likely to be hired if they also attain internationally recognized certifications. In an effort to boost your credentials even further, we have developed a robust hub of resources to help you prepare for certification exams.

During the two 2-week breaks that are built into the NYU SPS Cybersecurity Bootcamp, learners will have a chance to take non-mandatory asynchronous lessons for certification-prep. The CyWar platform also hosts study guides, question banks, “Cyberpedia,” and challenges that will help learners practice and ace their exams.

We recommend that learners seek one certification during each phase, according to their individual career goals.

LPI Linux Essentials

The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers.

CompTIA Network+

The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies.

EC-Council CND - Certified Network Defender

The Certified Network Defender certification should be considered by learners who want to become Network Administrators who are trained in protecting, detecting, and responding to the threats on the network.

CompTIA Security+

The CompTIA Security+ is the next step up from the CompTIA Network+ and is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests the candidate’s skill set over a range of disciplines, such as systems, networks, security administration, and penetration testing.

EC-Council CSA - Certified SOC Analyst

The Certified SOC Analyst certification is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

EC-Council CEH - Certified Ethical Hacker

The Certified Ethical Hacker certification is intended for learners who want to work in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

(ISC)² SSCP – Systems Security Certified Practitioner**

For students who achieved 1 year of experience—Post-Program Completion.

The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

LPI Linux Essentials
AWS Certified Cloud Practitioner
CompTIA Network+
EC-Council CND - Certified Network Defender
CompTIA Security+
EC-Council CSA - Certified SOC Analyst
EC-Council CEH - Certified Ethical Hacker
(ISC)² SSCP – Systems Security Certified Practitioner**
LPI Linux Essentials

The Linux LPI Essentials exam verifies knowledge of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures the ability to manage users and groups, as well as a candidate’s competency with Linux command line, permissions, security, basic networking configuration, and administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement for passing the examination and proving your competency to potential employers.

CompTIA Network+

The CompTIA Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects cyber professionals to be familiar with emerging technologies such as mobile, cloud, communication, and virtualization technologies.

EC-Council CND - Certified Network Defender

The Certified Network Defender certification should be considered by learners who want to become Network Administrators who are trained in protecting, detecting, and responding to the threats on the network.

CompTIA Security+

The CompTIA Security+ is the next step up from the CompTIA Network+ and is considered an entry-level cybersecurity certification. The CompTIA Security+ exam tests the candidate’s skill set over a range of disciplines, such as systems, networks, security administration, and penetration testing.

EC-Council CSA - Certified SOC Analyst

The Certified SOC Analyst certification is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

EC-Council CEH - Certified Ethical Hacker

The Certified Ethical Hacker certification is intended for learners who want to work in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

(ISC)2 SSCP – Systems Security Certified Practitioner**

For students who achieved 1 year of experience—Post-Program Completion.

The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.

Program

Tuition

Tuition for the Introductory Course is $500 and tuition for the Extended portion of the bootcamp is $17,500 for a total of $18,000.

Tuition, fees, and deposits subject to change.
This continuing education program is offered by the NYU School of Professional Studies.

Trulli
Skip to content