Slim Prep

Cybersecurity career shift: Intensive Cybersecurity Bootcamp with Internship

$2,000.00

Cyber Ready Bootcamp: Launch Your Career in Cybersecurity is an immersive, 100% virtual, instructor-led program designed to fast-track your journey into cybersecurity. Over 8 weeks, you’ll build foundational knowledge across core security principles, networking, cryptography, and cybersecurity defenses, with real-world applications. Classes are held on Mondays and Saturdays, and internship opportunities are available to bridge your learning into practical experience.

- +

FLEXIBLE PAYMENT OPTION AVAILABLE

 

This 8-week immersive bootcamp is tailored to equip aspiring cybersecurity professionals with both foundational and advanced skills necessary for a successful career. Each week covers crucial aspects of cybersecurity, including core principles, computer networking, cryptographic practices, and advanced defense and attack strategies. The program is fully virtual, featuring live, instructor-led sessions, hands-on labs, and real-world scenarios. With a well-rounded curriculum that balances theoretical insights and practical skills, this bootcamp prepares you to tackle real cybersecurity challenges with confidence.

 

Module 1: Familiarity with core security terms and principles. By the time you leave the classroom after the first section, you will fully understand:

  • Principles of least Privilege.
  • Confidentiality, Integrity, and Availability (CIA), and you’ll see why those principles drive all security discussions.
  • Risk management, security policy, and authentication/ authorization/accountability fundamentals.

Module 2: Computer Functions and Networking

  • The networking discussion begins with a non-technical explanation of how data move across a network. From there we move to fundamental terminology dealing with network types and standards. You’ll learn about common network hardware such as switches and routers, and terms like “protocol” and “encapsulation.”
  • We’ll give a very basic introduction to network addressing and port numbers and then work our way up the Open Systems Interconnection (OSI) protocol stack, introducing more detail only as we proceed to the next layer. In other words, we explain networking starting in non-technical terms and gradually progress to more technical detail as students are ready to take the next step.
  • By the end of our discussions, you’ll have a fundamental grasp of any number of critical technical networking acronyms that you’ve often heard but never quite understood, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.

 

Module 3: Crypto, Cybersecurity attacks, Vulnerability Management:

  • Symmetric and asymmetric key cryptography and “cryptographic hash,” and why do you need to know? How are those concepts used together in the real world to create cryptographic systems
  • Basic cybersecurity tech: We begin with LAN, WAN, wireless network security (WiFi), virtualization and introduction to cloud technologies and mobile device security (i.e., cell phones).
  • We follow that with a brief look at some common attacks:
  • malware and anti-malware technologies.
  • Phishing
  • DNS poisoning
  • DoS/DDoS
  • Vulnerability management

Module 4: Cybersecurity, Defensive/Detective Technologies –  Part 1 Our fourth section in the classroom begins our exploration of cybersecurity technologies. We end the section with an examination of:

– email security

– Secure remote access & Virtual Private Network (VPN) technologies.

– secure web access (HTTPS)

– secure file transfer

– firewalls, Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS), sniffers, content filters, etc. We end the section with a look at system security to include hardening operating systems, patching, virtual machines, cloud computing, and backup.

Module 5: Cybersecurity Proactive Technologies –

  • We will explore the OWASP Top 10 vulnerabilities
  • WEB App Sec
  • Shift Left
  • Browser, web security, cloud and the difficulties of securing the web environment.
  • We also explore cloud best practices such as shared responsibility model,
  • Secrets management, dependency vulnerabilities, containerization, orchestration and cloud security posture management.

Module 6:  Agile Project Management

  • What is Agile
  • Scrum, Kanban
  • Scrum in practice
  • JIRA

What Our Past Students Say About Us​

Helping people level up in their career is what we do best.
Scroll to Top
Need help?