Format:
100% online
Learn on your own time
Duration:
6 months, 10-15 hrs/wk
Finish early by putting in more hours
Apply by:

Cohort starts

Why Enroll In a Cybersecurity Bootcamp?

Job security is one of the most important aspects to consider when determining your future career. As digital services increasingly become the norm, there is a constantly growing need to ensure the safety of those digital spaces. Cybersecurity Ventures estimates that there will be over 3.5 million unfilled cybersecurity by 2025, making it one of the fastest growing and secure careers worldwide. By participating in a cybersecurity bootcamp online, you will develop diverse skills, including full technological proficiency, risk management skills, data analysis and threat identification. 

The Northern Illinois University CPE Cybersecurity Bootcamp, created and delivered by Springboard, offers a comprehensive online experience where students learn hands-on skills needed to enter or progress in the cybersecurity field. Our industry experts carefully crafted our content, including detail-driven projects designed to prepare you for tasks common in the workplace. In addition, our selection of technical labs and personal projects ensures that you will get the real-world experience required for your future career. 

100% Online Cybersecurity Bootcamp

Through our online cybersecurity bootcamp, you will be taught cybersecurity fundamentals. Our comprehensive instruction builds towards a mentor-led capstone project, where you'll be walked through a multi-step, structured penetration test of a fictional company. While taking this course, you'll build up mastery of various technical skills, including IT security, auditing and security error ID. To top it off, you will be able to learn all these skills on your own time, without needing to stress about taking time off from your current work to take classes. 

Our non-credit cybersecurity bootcamp includes various mock exams and quizzes designed to prepare you for the CompTIA Security+ exam. The exam is globally recognized and passing it will help secure your future in the industry. When you are ready to take the exam, our bootcamp includes a free voucher for the test itself. 

After you earn your cybersecurity bootcamp certificate of participation, you'll be prepared to start a career in the industry. Our fully-equipped team is prepared to help you find the perfect job to meet your needs. This includes building your resume, assisting in your job search and providing you with a wide range of interview tips and tricks. In addition, our career coaches will happily work with you every step along the way. 

Cybersecurity Careers

In this in-demand industry, the average salary ranges between $50k and 120k. There are many potential jobs in the field, but according to CompTIA, the following positions are in high demand:

  • Cybersecurity Consultant: $92,504.

  • Cybersecurity Analyst: $107,500.

  • Vulnerability Analyst/Penetration Tester $101,091.

  • Cybersecurity Manager/Administrator: $130,000.

Student-Focused Curriculum

Our Cybersecurity Bootcamp is built to ensure you're job ready upon completion. The course includes learning resources and exercises, online laboratories from InfoSec learning and several optional, career-related units.

NEW! AI for Cybersecurity Curriculum

Learn to harness the power of AI with new learning units throughout your cybersecurity curriculum. You’ll explore AI’s practical applications and how to leverage them to solve cybersecurity challenges. Learn how to identify and respond to security threats in real time, to predict cyber threats and future attack trends.  With AI by your side, you can become a powerful guardian of cyberspace, and a valuable asset to your employer. Curriculum includes:

  • Introduction to AI and its Applications in Cyber Security

  • AI for Threat Detection and Incident Response

  • AI in Malware Analysis and NLP for Cyber Security

  • AI in Network Security and Threat Hunting

  • Explainable AI and AI for Predictive Security Analytics

Cybersecurity Fundamentals

In this unit, you'll get a peek behind the curtain of the cybersecurity stage. You'll study the behavior, motivations, and game plan of your adversary — the cybercriminal. You'll learn about threat actors, the most common types of attacks, plus the frameworks and models used to build a robust defensive playbook. 

You'll understand how professionals set the defense standards through the CIA Triad, and the cyber kill chain model. You'll also study real-life data breaches to get a glimpse of how rapidly the dominoes can fall. Finally, you'll be introduced to the CompTIA Security+ certification exam and become familiar with Linux and Unix.

Topics Covered Include:

  • The CIA Triad: Three-Legged Stool

  • Threat Actor Types and Attributes

  • Cyber Kill Chain

  • Ethical Hacking 

  • Using Linux and Unix

  • Intro to CompTIA Security+ Certification

Identity and Access Management

Identity and Access Management (IAM) is one of the most important disciplines within cybersecurity. It aims to manage user identities and their access to enterprise resources and data. IAM governance and programs—including policies, processes, and technologies—manage user identities and access, as well as what a user can do within a system through authentication, authorization, and accounting. At the end of the unit, you’ll have the option to prepare for and take the Microsoft Security, Compliance, and Identity Fundamentals exam (Exam SC-900), which is 50% off for students taking this course.

Topics Covered Include:

  • Controlling Access

  • Zero Trust

  • Microsoft Security, Compliance, and Identity Fundamentals

Security Assessment and Training

In the Security Assessment and Testing unit, you will learn how to conduct security assessments and recommend remediation activities. You will also learn how to create Information Security (IS) audit test plans, which will give you insight into how IS auditors approach their engagements. Exposure to advanced concepts around web security testing and the use of Kali Linux is also included. Mini-projects in this unit will allow you to explore another side of penetration testing,  real-world vulnerability management challenges, and software testing plans. Labs in this unit will give you another slice of the red-team world, taking you through attacking web servers, exploring a vulnerable web application, and cracking passwords.

Topics Covered Include:

  • Logical and Physical Security Testing

  • Mobile Device Security

  • Governance Risk and Compliance

  • Security Policies


Success-Oriented Student Support

With your support team, you study on your terms. Enjoy a comprehensive support network, including advisors, mentorship and career coaching. 

  • Student advisor: With you every step of the bootcamp, your student advisor can help answer any questions you may have. 

  • Dedicated 1:1 mentor support: Meet regularly with your mentor, with as many additional calls as required. 

  • Prepare for your career: Take advantage of optional 1:1 coaching to help prepare for your career, including job search, resume building and more. 

  • A helpful online community: Receive feedback and participate in conversations with bootcamp students and mentors.

Expert Mentorship 

Advance your technical skills and develop additional cybersecurity soft skills with the support of your mentor. Each mentor is an expert in the cybersecurity industry, allowing you to gain an even deeper understanding of your future career's needs. 

  • Regular 1:1 video calls: Improve your projects, address concerns and discuss your roadmap. 

  • Improved accountability: Your mentor will help you stay on course to achieve your goals. 

  • Unlimited mentor calls: Get additional assistance from other mentors in our community at no extra cost.

Meet some of our mentors:

mentorAvatar
Alissa Torres
Senior Threat Hunter
mentorAvatar
Jay James
Cyber Security Operations Lead
mentorAvatar
Mark Adams
Sr Manager, IT Security & Compliance
mentorAvatar
Leonard Simon
MSSP Manager

Is This Bootcamp Right for You?

If you are interested in learning new skills, enjoy solving problems and are a capable communicator, this Cybersecurity Bootcamp is perfect for you. 

Course Prerequisites:

  • Bootcamp students will need the determination to complete all required bootcamp units.

  • You'll need to pass an evaluation of baseline soft skills, including communication, motivation, professionalism, a commitment to learning and an analytical mindset.

FAQ

What is cybersecurity?

In general, cybersecurity consists of the process and techniques used to protect sensitive data, computer systems, networks and software applications from cyber attacks.

Some of the most popular topics covered in cybersecurity include:

  • Unauthorized access to systems and data.

  • Disrupting the normal functions of a business and its processes.

  • Using ransomware attacks to encrypt data and extort money from victims.

Does cybersecurity require coding?

Entry-level roles generally do not require any coding experience, but programming is a powerful skill to have in your toolkit as you progress in your career. This course will teach you basic Python, Perl and Powershell. No coding experience is required for acceptance into this Cybersecurity Bootcamp.

What skills are needed to work in cybersecurity?

Professionals working in the cybersecurity field must have a strong analytical mindset, robust communications skills and a highly collaborative work ethic. In this course, you’ll also build the following technical skillset:

  • Incident response.

  • Threat intelligence.

  • Operating system security.

  • Application security.

  • Network scanning tools.

  • Network mapping.

  • Firewall.

  • IDS/IPs.

  • Vulnerability assessments.

  • IT controls.

  • Packet capture.


While building the technical skillset, Cybersecurity Bootcamp students will have access to the following tools:

  • Nmap for network scanning.

  • Wireshark: A free and open-source network protocol analyzer.

  • Metasploit for vulnerability scanning, enumeration, executing attacks and more.

  • Kali Linux for digital forensics, penetration testing, ethical hacking and more.

  • Kleopatra for security key encryption.

  • Autopsy for digital forensics.

  • OpenVAS for vulnerability scanning.

  • Zenmap, the graphical interface of Nmap, used for scanning, network mapping and more.

  • GoPhish to run phishing simulations.

  • Low Orbit Ion Cannon for stress testing and denial-of-service attack application.

What type of jobs can you do after a cybersecurity bootcamp?

You’ll be able to gain an entry-level position as a cybersecurity analyst, specialist and incident analyst/responder.

Graduates also pursue other roles, such as SOC analyst, cybersecurity engineer, cybersecurity consultant, cybersecurity manager / administrator, systems engineer, network engineer / architect, software developer / engineer, vulnerability analyst, cyber crime analyst/ responder and IT auditor.

How long does it take to complete a cybersecurity bootcamp?

This course is designed to be completed in 6 months or less depending on how much time you dedicate each week. It is completely flexible with you in the driver’s seat.

What is the salary of someone working in cybersecurity?

Depending on your work experience, geographic location, role and work sector, you can expect to make between $89,000 and $105,000.

Is cybersecurity in high demand?

Yes, according to the U.S. Bureau of Labor Statistics, cybersecurity jobs are expected to grow 35% through 2031, much faster than average for other occupations.

According to Cybersecurity Ventures, there are an estimated 3.5 million unfulfilled cybersecurity jobs as the demand to fill these jobs far outweighs the number of individuals qualified to undertake a complex field.

Is a cybersecurity bootcamp worth it?

Yes! You’ll have the skills you need to succeed in 6 months’ time with a support system ready to help you in your job search.

More Questions About the Program?

Speak to our enrollment team by completing an application, email Carolina, our enrollment assistant, or explore more frequently asked questions

Carolina Headshot

Request the Syllabus

Get Started

Upcoming Programs