More Questions About the Program?
Speak to our enrollment team by completing an application, email Carolina, our enrollment assistant, or explore more frequently asked questions.
Job security is one of the most important aspects to consider when determining your future career. As digital services increasingly become the norm, there is a constantly growing need to ensure the safety of those digital spaces. Cybersecurity Ventures estimates that there will be over 3.5 million unfilled cybersecurity by 2025, making it one of the fastest growing and secure careers worldwide. By participating in a cybersecurity bootcamp online, you will develop diverse skills, including full technological proficiency, risk management skills, data analysis and threat identification.
The Northern Illinois University CPE Cybersecurity Bootcamp, created and delivered by Springboard, offers a comprehensive online experience where students learn hands-on skills needed to enter or progress in the cybersecurity field. Our industry experts carefully crafted our content, including detail-driven projects designed to prepare you for tasks common in the workplace. In addition, our selection of technical labs and personal projects ensures that you will get the real-world experience required for your future career.
Through our online cybersecurity bootcamp, you will be taught cybersecurity fundamentals. Our comprehensive instruction builds towards a mentor-led capstone project, where you'll be walked through a multi-step, structured penetration test of a fictional company. While taking this course, you'll build up mastery of various technical skills, including IT security, auditing and security error ID. To top it off, you will be able to learn all these skills on your own time, without needing to stress about taking time off from your current work to take classes.
Our non-credit cybersecurity bootcamp includes various mock exams and quizzes designed to prepare you for the CompTIA Security+ exam. The exam is globally recognized and passing it will help secure your future in the industry. When you are ready to take the exam, our bootcamp includes a free voucher for the test itself.
After you earn your cybersecurity bootcamp certificate of participation, you'll be prepared to start a career in the industry. Our fully-equipped team is prepared to help you find the perfect job to meet your needs. This includes building your resume, assisting in your job search and providing you with a wide range of interview tips and tricks. In addition, our career coaches will happily work with you every step along the way.
In this in-demand industry, the average salary ranges between $50k and 120k. There are many potential jobs in the field, but according to CompTIA, the following positions are in high demand:
Cybersecurity Consultant: $92,504.
Cybersecurity Analyst: $107,500.
Vulnerability Analyst/Penetration Tester $101,091.
Cybersecurity Manager/Administrator: $130,000.
Our Cybersecurity Bootcamp is built to ensure you're job ready upon completion. The course includes learning resources and exercises, online laboratories from InfoSec learning and several optional, career-related units.
Learn to harness the power of AI with new learning units throughout your cybersecurity curriculum. You’ll explore AI’s practical applications and how to leverage them to solve cybersecurity challenges. Learn how to identify and respond to security threats in real time, to predict cyber threats and future attack trends. With AI by your side, you can become a powerful guardian of cyberspace, and a valuable asset to your employer. Curriculum includes:
Introduction to AI and its Applications in Cyber Security
AI for Threat Detection and Incident Response
AI in Malware Analysis and NLP for Cyber Security
AI in Network Security and Threat Hunting
Explainable AI and AI for Predictive Security Analytics
This unit teaches students cybersecurity fundamentals by employing a hands-on approach to detecting basic IT security problems. This includes teaching various methods to defend against them.
Topics Covered Include:
Threat actor types and attributes (hackers, DarkNet, social engineering, etc.)
Intro to Security+ certification
Three-legged stool (CIA)
Threat-modeling
Red- vs. blue-team
As a multidisciplinary field, cybersecurity is essential for Identity and Access Management, or IAM. Proper use of these aspects helps maintain control of user identities and access to business assets, including protecting data.
Topics Covered Include:
Authentication models and components
Rights, policies and permissions
Defining access control models
Through our bootcamp, you will master security assessment skills while learning how to recommend mediation steps. You will also learn how to build Information Security (IS) and audit test plans, which are ultimately designed to provide you with an understanding of how information security auditors approach their jobs.
Topics Covered Include:
Conducting risk assessments and audits
Assessing system vulnerabilities
System vulnerability remediation
With your support team, you study on your terms. Enjoy a comprehensive support network, including advisors, mentorship and career coaching.
Student advisor: With you every step of the bootcamp, your student advisor can help answer any questions you may have.
Unlimited 1:1 mentor support: Meet regularly with your mentor, with as many additional calls as required.
Prepare for your career: Take advantage of optional 1:1 coaching to help prepare for your career, including job search, resume building and more.
A helpful online community: Receive feedback and participate in conversations with bootcamp students and mentors.
Advance your technical skills and develop additional cybersecurity soft skills with the support of your mentor. Each mentor is an expert in the cybersecurity industry, allowing you to gain an even deeper understanding of your future career's needs.
Regular 1:1 video calls: Improve your projects, address concerns and discuss your roadmap.
Improved accountability: Your mentor will help you stay on course to achieve your goals.
Unlimited mentor calls: Get additional assistance from other mentors in our community at no extra cost.
Meet some of our mentors:
If you are interested in learning new skills, enjoy solving problems and are a capable communicator, this Cybersecurity Bootcamp is perfect for you.
Course Prerequisites:
Bootcamp students will need the determination to complete all required bootcamp units.
You'll need to pass an evaluation of baseline soft skills, including communication, motivation, professionalism, a commitment to learning and an analytical mindset.
In general, cybersecurity consists of the process and techniques used to protect sensitive data, computer systems, networks and software applications from cyber attacks.
Some of the most popular topics covered in cybersecurity include:
Unauthorized access to systems and data.
Disrupting the normal functions of a business and its processes.
Using ransomware attacks to encrypt data and extort money from victims.
Entry-level roles generally do not require any coding experience, but programming is a powerful skill to have in your toolkit as you progress in your career. This course will teach you basic Python, Perl and Powershell. No coding experience is required for acceptance into this Cybersecurity Bootcamp.
Professionals working in the cybersecurity field must have a strong analytical mindset, robust communications skills and a highly collaborative work ethic. In this course, you’ll also build the following technical skillset:
Incident response.
Threat intelligence.
Operating system security.
Application security.
Network scanning tools.
Network mapping.
Firewall.
IDS/IPs.
Vulnerability assessments.
IT controls.
Basic Python Scripting.
Security information and event management (SIEM) analysis.
Packet capture and log analysis.
While building the technical skillset, Cybersecurity Bootcamp students will have access to the following tools:
Nmap for network scanning.
Wireshark: A free and open-source network protocol analyzer.
Metasploit for vulnerability scanning, enumeration, executing attacks and more.
Kali Linux for digital forensics, penetration testing, ethical hacking and more.
Kleopatra for security key encryption.
Autopsy for digital forensics.
Splunk for DevSecOps.
OpenVAS for vulnerability scanning.
Zenmap, the graphical interface of Nmap, used for scanning, network mapping and more.
GoPhish to run phishing simulations.
Low Orbit Ion Cannon for stress testing and denial-of-service attack application.
You’ll be able to gain an entry-level position as a cybersecurity analyst, specialist and incident analyst/responder.
Graduates also pursue other roles, such as SOC analyst, cybersecurity engineer, cybersecurity consultant, cybersecurity manager / administrator, systems engineer, network engineer / architect, software developer / engineer, vulnerability analyst, cyber crime analyst/ responder and IT auditor.
This course is designed to be completed in 6 months or less depending on how much time you dedicate each week. It is completely self-paced with you in the driver’s seat.
Depending on your work experience, geographic location, role and work sector, you can expect to make between $89,000 and $105,000.
Yes, according to the U.S. Bureau of Labor Statistics, cybersecurity jobs are expected to grow 35% through 2031, much faster than average for other occupations.
According to Cybersecurity Ventures, there are an estimated 3.5 million unfulfilled cybersecurity jobs as the demand to fill these jobs far outweighs the number of individuals qualified to undertake a complex field.
Yes! You’ll have the skills you need to succeed in 6 months’ time with a support system ready to help you in your job search.
Speak to our enrollment team by completing an application, email Carolina, our enrollment assistant, or explore more frequently asked questions.
Request the Syllabus
Apply Now