Cybersecurity for beginners

Are you ready to transform your career? Whether you're a professional from another industry looking to move into cybersecurity or are trying to grow your cybersecurity career, this is your pathway. The Cybersecurity Beginners Immersive Boot Camp provides 500 hours of comprehensive training to guide you from novice to your first cybersecurity job. In as little as 26 weeks, you'll not only learn a wide range of fundamental and in-demand cybersecurity topics from networks to hacking to cybersecurity engineering you'll also receive career coaching and build an attention-getting portfolio to help you break into the field 

4.6 (738 ratings)

Affirm Financing available

Quick facts about this program

  • Method

    Live online, self-paced

  • Duration

    500+ hours training

  • Experience

    None. This is a program for cybersecurity beginners.

Cybersecurity for beginners: An overview

Build the in-demand skills you need for a career in cybersecurity in as little as 26 weeks. In Cybersecurity Foundations 101, you’ll learn about the professional security tools used to identify and protect vulnerable systems. Then, in Cybersecurity Foundations 102, you’ll build your hands-on operating system and networking skills using the Infosec cyber range.  

In Cybersecurity Foundations 201 and 301, you’ll learn how to troubleshoot Windows machines and overcome cyber challenges before joining the fictional company GlobalX, where you’ll play your part in administrating, designing and defending networks as it grows into a multinational enterprise. In Cybersecurity Foundations 401, you’ll dig into popular cybersecurity concepts, including frameworks, data encryption, cloud security, network security, threat modeling, shell scripting, penetration testing and incident response.  

If you continue in the optional Cybersecurity Foundations 501, you’ll also discover how generative AI models support cybersecurity practices by providing new ways of defending digital assets. 

Why enroll in this training program

What to expect in this immersive boot camp

Immersive Boot Camps are specifically designed for individuals at the entry-level or those transitioning careers. Learn how to administer systems using Agile project management and build cybersecurity administration skills across areas like governance, risk and compliance (GRC), data security, cloud security and threat hunting.

Who is this program for?

This program is ideal for a variety of backgrounds: 

  • Professionals from various industries looking to switch to a cybersecurity career 
  • People with existing IT experience who want to pursue cybersecurity 

Required skills 

To take this program, you only need to have a basic familiarity with computers. You don't need any prior experience with cybersecurity, programming or systems administration. 

Have more questions? We're here to help

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

This is where the error message would go.

Step 1

Step 2


Step 1

Step 2


Thank you! One of our advisors will contact you shortly to continue the application process.

How to enroll

Submit your application

Fill out our short application form to start your enrollment. This allows our admissions team to learn about your goals, background and what program is the best fit.
Receive a call from an advisor

We'll schedule a call to discuss your goals and answer your questions. We want to ensure the program is a perfect fit for you.
Start your career transformation

Our live, interactive virtual classes will provide you with experience, hands-on skills and expert mentorship from industry experts, preparing you for a career in the rapidly evolving field of cybersecurity.

Award-winning training you can trust

Program syllabus

(Pre-work) Cybersecurity Foundations 101: Modern Computing Technologies and Operating Systems
1 Week

Understand the role of information security in the modern technology environment. You will learn to identify vulnerable systems and protect them from vulnerabilities. Through instructor guidance and example approaches, you will see the results of their research. You will also collaborate with other students through a facilitated activity to understand the dynamics of being a technology specialist in a professional work environment. 


  • None 


Upon satisfactory completion of this training, you should be able to:

  • Describe and define 
    • Cybersecurity best practices 
    • Discovery of how attackers find weaknesses and attack them 
    • Explore career pathways to in-demand jobs in pentesting and cybersecurity 
  • Execute
    • Learn to think like a cybercriminal, using tools like social engineering, cryptography and brute-force attacks
    • Research and report on real-world exploits 
(Pre-work) Cybersecurity Foundations 102: Introduction to Cybersecurity
1 Week

Get your hands dirty and start working in our award-winning cyber range. In this training, you will perform your first lab and work through basic operating systems and networking operations. 


  • None 


  • Have confidence in performing basic computer technical operations within an operating system 
  • Dive deeper into how computer workstations function 
  • Get introduced to IT operations concepts like provisioning, virtualization, working with hardware interfaces and more
  • Develop proficiency in installing new software and peripherals
  • Be fully prepared for the challenges ahead in Cyber Foundations 201
  • Have a wider network of new and experienced information systems professionals, and prepare your resume for all the awesome new skills you are about to learn 
Cybersecurity Foundations 201: Foundations of Computer Operations
6 Weeks

In this hands-on training, you will build foundational Windows troubleshooting skills by exploring and overcoming challenging scenario-based labs. Key skills such as communication, knowledge and process documentation, fundamental terminal operations, performance monitoring, system process management, issue handling, backup/imaging/recovery tools and software application operations are developed. 


  • Cybersecurity Foundations 101 
  • Cybersecurity Foundations 102 

Students with previous relevant or equivalent experience can test out of this requirement in their application. 


Learn to support technology operations by resolving issues with hardware, software and virtual or cloud systems. Upon satisfactory completion of this training, you should be able to: 

Describe and define 

Technical service and support 

  • Customer service 
  • Endpoint technical support 
  • Issue tracking system 
  • ITIL service management framework 
  • Knowledge management, documentation and standard operating procedures (SOP) 
  • Remote desktop support and diagnostics
  • Service level agreement (SLA)
  • Technical project support
  • Technical reporting and communication
  • Troubleshooting methodology 

Hardware and software 

  • Endpoint imaging, backup, and recovery 
  • Windows 10 troubleshooting and configuration 
  • Performance monitoring and tuning 
  • Software application deployment, updating, and removal 

Infrastructure connectivity 

  • Active directory user support 
  • Cloud instance deployment 
  • Network protocols and concepts (TCP/IP, DHCP, DNS, LAN, SMTP, WAN, VPN) 
  • Network ports, ethernet 
  • Network troubleshooting 
  • Network routers 


  • Deliver remote IT service and support 
  • Set up and configure computer virtualization using VirtualBox 
  • Deploy an EC2 instance using Lightsail on AWS cloud
  • Apply a standardized troubleshooting and workstation deployment methodology
  • Utilize backup and recovery tools for disk imaging
  • Perform data restoration, startup repair and secure disposal
  • Deploy, configure, and troubleshoot Windows 10 OS
  • Install, update, troubleshoot and uninstall software applications
  • Evaluate endpoint performance metrics to identify anomalous readings and troubleshoot a malfunctioning system
  • Incorporate infrastructure connectivity concepts, including RDP and SSH
  • Evaluate and configure network adapter settings
  • Deploy pfSense firewall and establish network connectivity through it
  • Automate tasks in Linux using Bash scripting in an IDE
  • Practice using Linux and Windows terminal commands
  • Perform basic GitHub operations
  • Be prepared for the Cyber Foundations 301 
Cybersecurity Foundations 301: Networking and Systems Administration
6 Weeks

Gain hands-on server and networking skills in this exciting training that follows the journey of the fictional GlobeX Corporation as it grows from a startup to a multinational enterprise with a fully functional network and information systems. As their new administrator, you’ll get ready to deploy systems and design new networks in a fast-paced learning environment that mirrors critical on-the-job scenarios. 


  • Cybersecurity Foundations 101 
  • Cybersecurity Foundations 102 
  • Cybersecurity Foundations 201 

Students with previous relevant or equivalent experience can test out of this requirement in their application. 


At the end of this training, you will be prepared for a career as a network operations specialist or systems administrator. Upon satisfactory completion of this training, you should be able to: 

Describe and define 

Systems administration 

  • Agile project management 
  • Linux and Windows network services, like AD, DHCP, DNS, email, LDAP, web servers 
  • LAN connectivity to cloud resources on AWS 
  • Identity management 
  • IT infrastructure and systems design 
  • Microsoft Windows Server 2019 
  • Patch management 
  • Software administration 
  • Virtual machine administration 


  • Router and firewall administration with pfSense 
  • Network traffic analysis tools 
  • Network access controls 
  • Network design 
  • Network infrastructure troubleshooting
  • Network service administration (TCP/IP, DHCP, DNS)
  • Virtual private network (VPN) client and tunnel 

Scripting & automation 

  • Bash 
  • OS task automation 
  • Powershell 
  • Python 


  • Apply lightweight Agile project management methodologies 
  • Administer critical IT and network systems 
  • Practice identity management in Active Directory (AD)/LDAP protocol 
  • Design and deploy a client-server network, including a domain controller (DC) 
  • Create and push group policy to endpoints 
  • Analyze how cloud systems can integrate into on-premise systems 
  • Automate OS tasks using scripting languages Bash, Powershell, and Python 
  • Design and deploy network infrastructure using the open-source pfSense virtual appliance 
  • Extend the capabilities of pfSense using packages 
  • Troubleshoot challenging network connectivity problems 
  • Oversee patch management of Windows endpoints 


Cybersecurity Foundations 401: Cybersecurity Engineering
12 Weeks

Designed to prepare you for today's most in-demand security skills, this hands-on training emphasizes practical SecOps foundations. You will gain cutting-edge skills by analyzing systems vulnerabilities, implementing defenses against common threats and using industry-relevant tooling.  


  • Cybersecurity Foundations 101 
  • Cybersecurity Foundations 102 
  • Cybersecurity Foundations 201 
  • Cybersecurity Foundations 301 

Students with previous relevant or equivalent experience can test out of this requirement in their application. 


At the end of this training, you will be prepared for a career in cybersecurity. Upon satisfactory completion of this training, you should be able to: 

Describe and define 

Governance, risk and compliance (GRC) 

  • Cybersecurity frameworks (e.g., SOC2) 
  • CIA triad 
  • Systems hardening 
  • Risk analysis, assessment and reporting 
  • Security compliance and auditing 

Data security 

  • Data classification 
  • Data loss prevention (DLP) 
  • Data privacy concepts and regulation (GDPR, CCPA) 
  • Encryption standards 
  • Password security 
  • Protecting data at rest and in transit 
  • Public Key Infrastructure (PKI) 
  • SSL/TLS 

SecOps foundations 

  • Threat detection with IDS, SIEM 
  • Incident response lifecycle 
  • Indicators of compromise (IOC) 
  • SIEM deployment and operation 
  • SIEM log and event analysis 
  • SIEM troubleshooting, data ingestion, query writing 
  • Threat hunting techniques 

Cloud security 

  • Cloud identity and access management 
  • Cloud security in AWS 
  • Data loss prevention (DLP) 
  • Intrusion detection & prevention systems (IDS/IPS, Snort)
  • Network traffic analysis
  • Virtual private cloud (VPC)
  • AWS native tooling (e.g., AWS CloudTrail) 

Threat modeling and analysis 

  • Tactics, techniques and procedures (TTPs) 
  • Cyber Kill-Chain 
  • OWASP 
  • Threat Modeling 
  • Data flow diagrams 

SecFoundations: Threat hunting 

  • Malware detection with YARA rules, VirusTotal API 
  • Malware traffic analysis 
  • Forensic investigation 
  • Threat hunting with Zeek, RITA 

AppSec and vulnerability analysis 

  • Web app scanning and exploitation with Burp Suite, w3af, OWASP ZAP 
  • CVE, CVSS 
  • Vulnerability scanning tools, e.g., Nessus
  • Network and application vulnerability scans and assessments
  • Scanner output handling, false positives, prioritization
  • Vulnerability risk rating
  • Vulnerability types and concepts 

Penetration testing 

  • Enumeration 
  • Exploitation 
  • Impact analysis 
  • Investigation and intelligence collection 
  • Legal considerations in pentest scoping 
  • Nmap, metasploit, datasploit 
  • OSINT 
  • Penetration test lifecycle 
  • Planning 
  • Scoping 
  • Target profiling and evaluation 


  • Assess risk using quantitative or qualitative methods 
  • Document risk mitigations and perform security compliance audits 
  • Take a security project all the way from conceptual requirements to technical implementation
  • Apply modern cryptographic principles to protect data at rest and in transit
  • Use data loss prevention (DLP) tools
  • Perform threat analysis and threat modeling using various tools such as STRIDE, cyber kill-chain, and MITRE ATT&CK
  • Explore web application security
  • Administer anti-malware systems and various security tools
  • Analyze IT systems security with vulnerability scanning
  • Perform penetration testing
  • Configure an intrusion detection/prevention system (IDS/IPS)
  • Performing incident response operations and SIEM event monitoring
  • Deploy, configure and query a SIEM
  • Oversee cloud security efforts using AWS native tooling 
(Optional) Cybersecurity Foundations 501: AI in Cybersecurity
6 Weeks

Staying ahead of threats in the ever-evolving cybersecurity landscape requires vigilance and innovation. This cutting-edge AI-driven cyber defense training is designed to arm you with the knowledge and skills to leverage generative AI technologies in the fight against cyber threats. You will delve into integrating artificial intelligence, specifically generative AI models, into cybersecurity practices, offering a new frontier in digital defense mechanisms. 

Course prerequisites 

  • Cybersecurity Foundations 101 
  • Cybersecurity Foundations 102 
  • Cybersecurity Foundations 201 
  • Cybersecurity Foundations 301
  • Cybersecurity Foundations 401 


Culminate your learning experience with a capstone project that challenges you to design and implement a generative AI solution to a pressing cybersecurity problem, demonstrating your ability to innovate and protect in the digital age. 


Cybersecurity for beginners

Full course tuition


What's included:

  • 26-week immersive program (up to 640 hours of total immersion!)
  • 240 hours of live instruction
  • Interactive hands-on labs
  • Career Coaching
  • Security+ exam voucher
  • 6 weeks post program Skills validation Badge activities
  • Knowledge Retention Assurance

Transform your life with an affordable Affirm payment plan