This 8-week immersive bootcamp is tailored to equip aspiring cybersecurity professionals with both foundational and advanced skills necessary for a successful career. Each week covers crucial aspects of cybersecurity, including core principles, computer networking, cryptographic practices, and advanced defense and attack strategies. The program is fully virtual, featuring live, instructor-led sessions, hands-on labs, and real-world scenarios. With a well-rounded curriculum that balances theoretical insights and practical skills, this bootcamp prepares you to tackle real cybersecurity challenges with confidence.
Module 1: Familiarity with core security terms and principles. By the time you leave the classroom after the first section, you will fully understand:
- Principles of least Privilege.
- Confidentiality, Integrity, and Availability (CIA), and you’ll see why those principles drive all security discussions.
- Risk management, security policy, and authentication/ authorization/accountability fundamentals.
Module 2: Computer Functions and Networking
- The networking discussion begins with a non-technical explanation of how data move across a network. From there we move to fundamental terminology dealing with network types and standards. You’ll learn about common network hardware such as switches and routers, and terms like “protocol” and “encapsulation.”
- We’ll give a very basic introduction to network addressing and port numbers and then work our way up the Open Systems Interconnection (OSI) protocol stack, introducing more detail only as we proceed to the next layer. In other words, we explain networking starting in non-technical terms and gradually progress to more technical detail as students are ready to take the next step.
- By the end of our discussions, you’ll have a fundamental grasp of any number of critical technical networking acronyms that you’ve often heard but never quite understood, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.
Module 3: Crypto, Cybersecurity attacks, Vulnerability Management:
- Symmetric and asymmetric key cryptography and “cryptographic hash,” and why do you need to know? How are those concepts used together in the real world to create cryptographic systems
- Basic cybersecurity tech: We begin with LAN, WAN, wireless network security (WiFi), virtualization and introduction to cloud technologies and mobile device security (i.e., cell phones).
- We follow that with a brief look at some common attacks:
- malware and anti-malware technologies.
- Phishing
- DNS poisoning
- DoS/DDoS
- Vulnerability management
Module 4: Cybersecurity, Defensive/Detective Technologies – Part 1 Our fourth section in the classroom begins our exploration of cybersecurity technologies. We end the section with an examination of:
– email security
– Secure remote access & Virtual Private Network (VPN) technologies.
– secure web access (HTTPS)
– secure file transfer
– firewalls, Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS), sniffers, content filters, etc. We end the section with a look at system security to include hardening operating systems, patching, virtual machines, cloud computing, and backup.
Module 5: Cybersecurity Proactive Technologies –
- We will explore the OWASP Top 10 vulnerabilities
- WEB App Sec
- Shift Left
- Browser, web security, cloud and the difficulties of securing the web environment.
- We also explore cloud best practices such as shared responsibility model,
- Secrets management, dependency vulnerabilities, containerization, orchestration and cloud security posture management.
Module 6:Â Agile Project Management
- What is Agile
- Scrum, Kanban
- Scrum in practice
- JIRA
What Is Included
Enrolling provides access to:
- âś… Expert-Led Training: Direct instruction from seasoned cybersecurity professionals with real-world experience.
- âś… Practical, Hands-On Labs: Work through hands-on exercises that simulate real-world security challenges.
- âś… Comprehensive Curriculum: Structured learning that covers foundational cybersecurity topics as well as advanced defensive and proactive practices.
- âś… Career Guidance: Support with resume preparation and career advice to help you enter the cybersecurity field with confidence.
- âś… Access to Exclusive Learning Resources: Recorded sessions, supplementary materials, and additional tools to reinforce learning.
Who Should Attend
The Bootcamp is ideal for:
- Aspiring Cybersecurity Professionals: Individuals seeking a structured, comprehensive introduction to cybersecurity with hands-on practice.
- IT Professionals Transitioning to Cybersecurity: Those already working in tech who want to gain specific skills in cybersecurity, including threat management and network defense.
- Career Switchers: Professionals from other fields looking for an intensive program to break into cybersecurity.
- Tech Enthusiasts and Recent Graduates: Individuals interested in exploring cybersecurity and establishing a solid foundation for future career opportunities.
This bootcamp provides the practical and theoretical knowledge needed to start or pivot into a cybersecurity career confidently.
Class Schedule
With live, instructor-led sessions for 8 weeks, you’ll dive deep into essential cybersecurity concepts, including:
- Live Virtual Sessions: Join engaging, instructor-led sessions that allow for direct guidance and real-time interaction with your tutor.
- Mondays 8pm-10pm EST
- Saturdays 1pm-3pm EST
Module 1: Familiarity with core security terms and principles. By the time you leave the classroom after the first section, you will fully understand:
- Principles of least Privilege.
- Confidentiality, Integrity, and Availability (CIA), and you’ll see why those principles drive all security discussions.
- Risk management, security policy, and authentication/ authorization/accountability fundamentals.
Module 2: Computer Functions and Networking
- The networking discussion begins with a non-technical explanation of how data move across a network. From there we move to fundamental terminology dealing with network types and standards. You’ll learn about common network hardware such as switches and routers, and terms like “protocol” and “encapsulation.”
- We’ll give a very basic introduction to network addressing and port numbers and then work our way up the Open Systems Interconnection (OSI) protocol stack, introducing more detail only as we proceed to the next layer. In other words, we explain networking starting in non-technical terms and gradually progress to more technical detail as students are ready to take the next step.
- By the end of our discussions, you’ll have a fundamental grasp of any number of critical technical networking acronyms that you’ve often heard but never quite understood, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.
Module 3: Crypto, Cybersecurity attacks, Vulnerability Management:
- Symmetric and asymmetric key cryptography and “cryptographic hash,” and why do you need to know? How are those concepts used together in the real world to create cryptographic systems
- Basic cybersecurity tech: We begin with LAN, WAN, wireless network security (WiFi), virtualization and introduction to cloud technologies and mobile device security (i.e., cell phones).
- We follow that with a brief look at some common attacks:
- malware and anti-malware technologies.
- Phishing
- DNS poisoning
- DoS/DDoS
- Vulnerability management
Module 4: Cybersecurity, Defensive/Detective Technologies – Part 1 Our fourth section in the classroom begins our exploration of cybersecurity technologies. We end the section with an examination of:
– email security
– Secure remote access & Virtual Private Network (VPN) technologies.
– secure web access (HTTPS)
– secure file transfer
– firewalls, Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS), sniffers, content filters, etc. We end the section with a look at system security to include hardening operating systems, patching, virtual machines, cloud computing, and backup.
Module 5: Cybersecurity Proactive Technologies –
- We will explore the OWASP Top 10 vulnerabilities
- WEB App Sec
- Shift Left
- Browser, web security, cloud and the difficulties of securing the web environment.
- We also explore cloud best practices such as shared responsibility model,
- Secrets management, dependency vulnerabilities, containerization, orchestration and cloud security posture management.
Module 6:Â Agile Project Management
- What is Agile
- Scrum, Kanban
- Scrum in practice
- JIRA
Meet your Tutor
Debo and Bolaji
Experienced Technology professionals with over 10 years of experience in client-facing roles driving secure product development life cycles across public and private sector clients in North America and West Africa. Adept at building and nurturing relationships, collaborating cross-functionally, and delivering comprehensive security roadmaps tailored to organizational goals and risk profiles.
Hands-on Experiences: Application Security, Cloud Security, Vulnerability Management, Data Protection & Privacy, Identity & Access Management, Digital Forensics, Managed Detection & Incidence Response, Resilience & Recovery, Third Party Risk Management, Governance & Compliance (PCI DSS, GDPR, ISO, NIST CSF, COBIT, SOC 2, CIS etc.)
Professional Certifications: CISSP, CIPM, GCP Cloud Security Engineer, AWS Security Specialist & Solutions Architect, Azure Fundamentals, CEH, Security+, CISA, GCFA, GMOB, CCNA, COBIT 5, PMP, ITIL v4, Six Sigma Green Belt.