Cybint Bootcamp

Career-accelerated cybersecurity bootcamp for higher education

demo-icon-1-1
480 hrs of Market-Driven Content
graph-icon-1-1
Affordable and Accelerated
bullseye-icon-1-1
Aligned to NICE-NIST Framework

Where Cybersecurity Meets Education

The Cybint Bootcamp is a remote cybersecurity training program designed to successfully prepare people with little or no background in IT for entry-level jobs in cybersecurity. Cybint partners with Higher Education (Continuing Education and Workforce) to deliver this in-demand solution to your community.

  • Turnkey and fully online
  • New revenue channel for your school
  • Market-influenced content
cybersecurity bootcamp higher education-min
bootcamp-5-1

How it Works

The Cybint Bootcamp is hosted completely online with both live video classroom sessions and online self-paced activities. We know that everyone learns differently which is why your school receives the option of two accelerated tracks:

Full Time, 3 Months

Fully online activities and live virtual classes every day with the Bootcamp Facilitator, with built-in one-on-one time.

Part Time, 6 Months

Cover the same content over a longer period of time with live virtual classes occurring only twice a week, two hours each day.

Bootcamp Curriculum

  • Introduction to the Bootcamp
  • Overview of the Cybersecurity Landscape and Industry
  • Basics of Computer and Device Hardware, Software, Operating Systems and Processes
  • Basics of Networking Traffic, Hardware Components and Topology
  • Network Communication Principles and Methods
  • Network and Routing Protocols / Services
  • Packet Level Traffic Analysis
  • Hands-on Operation of a Computer Network and Equipment, Monitoring and Analyzing Network Traffic Flow, Patterns and Performance
  • Hands-on Creation and Analysis of Critical Network Servers.
  • Hands-on Creation and Analysis of Telnet, Web, Data and Active Directory Servers
  • Hands-on Analysis of Network Topologies, Network Mapping and OS Fingerprinting
  • Telecommunication Concepts and Range
  • System and Network Admin Concepts, Management Principles and Controls
  • Hands-on Creation and Use of Virtual Machines and Bootable USB OS
  • Overview of Threats, Classes, Attackers, Tactics, and Application Security Risks (OWASP)
  • Hands-on Communications Security through Encrypting and Decrypting Data and Medias
  • Hands-on Backup and Recovery of Data, Devices and Servers
  • Network Security Principles, Methods, Protocols, Components and Architectures
  • Hands-on Assessment of Access Controls and Hardening Techniques to Ensure a Network’s Security 
  • Hands-on Configuration and Utilization of a Firewall (on Windows, Linux and Hardware Firewall)
  • Hands-on Configuration and Utilization of a Network/Host Intrusion Detection/Prevention System to Alert and Prevent Malicious Activity on a Network
  • Hands-on Configuration and Utilization of a Security Information and Event Management System to Correlate, Research, Analyze Logs and Provide Timely Detection of Misuse, Threats and Malicious Activity on the Network
  • Hands-on Malware Detection, Analysis, Isolation and Removal
  • Cyber-Forensic Investigation Methodologies, Mindset, Tools
  • Hands-on Forensics Investigation: Logs, System Files, Media, Memory Dump and Traffic Monitoring and Analysis
  • Overview of Network Vulnerabilities, Associated Attacks; Ethical Hacking Methodologies, Stages, Principles, Tools and Techniques
  • Hands-on Conducting of Vulnerability and Compliance Scanning; and Correction Recommendation
  • Hands-on Performing Incident Response, Damage Assessment, Incident Triage, Tracking and Reporting
  • Full Day Scenarios: Hands-on Protecting a Network from a Range of Cyber-Attacks (DDoS, SQL Injection, XSS, Ransomware, MiTM, ARP Poisoning, etc.)
  • Analysis of System Security and Organizational Posture Trends
  • Analysis of Cyber-Defense Trends and Staying at the Cutting Edge of the Industry
  • Performing of Security Design and Architecture Evaluation and Ensuing Recommendation
  • Hands-on Process of the Whole Chain of Custody for Handling Digital Evidence
  • Hands-on Performing of Static and Dynamic Analysis of Drive Images and other Data Sources, Recovery and Mitigation/Remediation of an Enterprise System
  • Risk and Security Management Processes and Security Models
  • Cybersecurity and Privacy Principles
  • Advising on Disaster Recovery, Contingency and Continuity
  • Summary and Presentation by Bootcampers
  • Technical and Soft-Skill Preparation of a Job Interview
  • Final Hands-on Scenario

The Day in the Life of a Cybint Bootcamper

Let's Talk

If your school is looking for cybersecurity skills education you've come to the right place. View the Cybint Cybersecurity Bootcamp Brochure for higher education and get in touch with us by filling in your information below.