Get The Cybersecurity
Course Catalog
Learn the Skills You
Need to Succeed in
Cybersecurity
Become Job-Ready in
Just 10 Months
The Old Dominion University Cybersecurity Bootcamp is a non-credit offering designed for those looking to get started in—or advance into—a meaningful career in cybersecurity. Whatever your initial level of tech knowledge, our learners develop the specialized competencies needed to protect data and systems from cyberattacks, and learn to apply their knowledge to real-world challenges in less than a year.
With over 500,000
job
openings
nationwide,
there’s never
been a better
time to join the
cybersecurity
industry.
Source:
Cyberseek.org
Accelerated
Cybersecurity Training
Develop the Most Sought-After Skills
Learn cybersecurity in an immersive environment that prioritizes practice and
real-world training on some of the industry’s top tools and software.
Seize the Opportunity to Become a Cyber Hero
Get Ahead of the Competition with Simulations and Hands-On Practice
Cyber Labs and Cywar
Through Cyber Labs, participants apply what they learn in class to everyday scenarios they are likely to encounter on the job. Learners also have access to our proprietary platform, CyWar, where they can test their defensive and offensive skills through immersive, gamified simulations.
Virtual Classroom
All our classes are delivered live and online on a part-time schedule. The virtual learning experience is enhanced through online communication and collaboration tools, access to class recordings, study guides, and a bank of practical exercises to fine-tune your cybersecurity skills.
Expert Instructors
Our expert instructors are cybersecurity professionals who are active in the field. They guide your training and enrich your learning by bringing their everyday experiences and unique industry insights directly into the classroom.
Hands-On Classes
Thanks to our practical approach to cybersecurity education, our classes are designed to prepare learners for the real world. Engaging projects, constant practice, and challenging Cyber Labs help learners develop the hands-on skills they’ll need on the job.
360° Support Tailored to Your Needs
Accelerate Your Success With a Built-in Professional Network
Professional Community
We create networking opportunities throughout the length of the program so that learners can easily became part of a widespread community of cybersecurity professionals and hiring partners, making connections that will benefit them well beyond the bootcamp.
Career Coaching
Our career coaches help learners set the course for the professional trajectory of their dreams. Throughout the bootcamp, they will guide you in polishing your resume, making your LinkedIn profile standout, preparing you for interviews, and so much more.
Learner Support
The student success team follows learners along their cybersecurity training journey, always making sure they have access to the resources they need. From test retakes to tutoring sessions, student success managers support and enhance the entire bootcamp experience.
Job Placement Assistance
Getting started in a new field can be challenging. That’s why we pair learners with career services team members who can help them find the best opportunities for their chosen career path and get their foot in the door for their first position in cybersecurity.
Explore the
Course Catalog
Browse Through Our Class Offerings
Program Overview
30-Hour Introductory Course |
370-Hour Extended Program
-
Introductory Course
Take the Cybersecurity Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors, and more.
You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended Cybersecurity Bootcamp.
When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career. -
Fundamentals Phase
In the Fundamentals Phase, learners acquire the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program. -
Microsoft Security
Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Learners will gain best practices for administrating and securing the Microsoft ecosystem of products. -
Computer Networking
Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices.
Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*. -
Linux Security
The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available.
Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam*. -
Cloud Security
Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms.
Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*. -
Fundamentals Phase Final Project: Building Your Own Environment
In this project that simulates a real-world environment, participants build their own insecure small business infrastructure. From there, they’ll learn how to secure the platform while practicing carrying out cyberattacks and digital forensics. Upon completion of the final project, learners will be able to use it in their portfolio as a demonstration of their skill level. -
Cybersecurity Infrastructure Phase
In the Infrastructure Phase, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program. -
Network Security
Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. They will have the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.
The Network Security course gives you the skills and knowledge to prepare for the EC-Council CND exam*. -
Critical Infrastructure Security
Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to protect these important facets of everyday life. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things, and environment security. This skill set is in high demand across the business world, as well as in the cybersecurity industry.
This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam*. -
Python for Security
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond. -
Infrastructure Phase Final Project
In the Infrastructure Phase final project, learners will use the setup they created in the previous project to analyze a threat scenario and provide the necessary steps to secure it. This will demonstrate infrastructure hardening. -
Career Services Workshop
Get the competitive edge you need to succeed in technical interviews with this specialized workshop. CyWar also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes. -
Advanced Cybersecurity Phase
In the Advanced Phase, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry. -
Ethical Hacking
This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.
Upon completion of this course, learners will be ready to study for the EC-Council CEH (Certified Ethical Hacker) certification exam*. -
Digital Forensics & Incident Response
When there’s a cyberattack, first responders are there to analyze and contain the incident. The Digital Forensics & Incident Response course gives learners the necessary tools to respond to attacks appropriately, conduct various types of investigations and evidence gathering, and report the results.
After completing this course, learners will be prepared to study for the EC-Council CSA (Certified SOC Analyst) certification exam*. -
Advanced Phase Final Project: Attack & Response
In the Advanced Phase final project, learners will build upon the secure infrastructure created in past projects. They’ll design an attack to compromise the infrastructure, use their skills to gather forensic evidence, and complete an investigative report with details about the simulated incident.
When they complete the program, learners can add the code, reports, and designs from their projects to form a solid portfolio to showcase to hiring managers and prospective employers. -
Game Theory
In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
Introductory Course 8 Lessons - 30 Hours
Take the Cybersecurity Bootcamp for a test drive with the Introductory Course. During this course, you’ll learn about the industry and will be introduced to networking and network security fundamentals, security on the Linux and Microsoft platforms, offensive security, threats/threat actors, and more.
You’ll also get a feel for the remote learning environment and acquire all of the information you need to make an informed and confident decision on signing up for the extended Cybersecurity Bootcamp.
When the Introductory Course is over, the results from your assessment exam will help you determine your ability to excel in a cybersecurity career.
Fundamentals Phase
In the Fundamentals Phase, learners acquire the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.
Microsoft Security 10 Lessons - 40 Hours
Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Learners will gain best practices for administrating and securing the Microsoft ecosystem of products.
Computer Networking 9 Lessons - 35 Hours
Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices.
Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam*.
Linux Security 8 Lessons - 30 Hours
The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available.
Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam*.
Cloud Security 7 Lessons - 25 Hours
Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms.
Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*.
Fundamentals Phase Final Project: Building Your Own Environment 2 Lessons - 10 Hours
In this project that simulates a real-world environment, participants build their own insecure small business infrastructure. From there, they’ll learn how to secure the platform while practicing carrying out cyberattacks and digital forensics. Upon completion of the final project, learners will be able to use it in their portfolio as a demonstration of their skill level.
Cybersecurity Infrastructure Phase
In the Infrastructure Phase, learners begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners gain practical security skills and experience that will prepare them for the Advanced phase of the program.
Network Security 8 Lessons - 30 Hours
Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. They will have the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.
The Network Security course gives you the skills and knowledge to prepare for the EC-Council CND exam*.
Critical Infrastructure Security 9 Lessons - 35 Hours
Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to protect these important facets of everyday life. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things, and environment security. This skill set is in high demand across the business world, as well as in the cybersecurity industry.
This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam*.
Python for Security 7 Lessons - 25 Hours
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.
Infrastructure Phase Final Project 2 Lessons - 10 Hours
In the Infrastructure Phase final project, learners will use the setup they created in the previous project to analyze a threat scenario and provide the necessary steps to secure it. This will demonstrate infrastructure hardening.
Career Services Workshop 1 Session - 5 Hours
Get the competitive edge you need to succeed in technical interviews with this specialized workshop. CyWar also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.
Advanced Cybersecurity Phase
In the Advanced Phase, learners solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.
Ethical Hacking 12 Lessons - 50 Hours
This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.
Upon completion of this course, learners will be ready to study for the EC-Council CEH (Certified Ethical Hacker) certification exam*.
Digital Forensics & Incident Response 12 Lessons - 50 Hours
When there’s a cyberattack, first responders are there to analyze and contain the incident. The Digital Forensics & Incident Response course gives learners the necessary tools to respond to attacks appropriately, conduct various types of investigations and evidence gathering, and report the results.
After completing this course, learners will be prepared to study for the EC-Council CSA (Certified SOC Analyst) certification exam*.
Advanced Phase Final Project: Attack & Response 2 Lessons - 10 Hours
In the Advanced Phase final project, learners will build upon the secure infrastructure created in past projects. They’ll design an attack to compromise the infrastructure, use their skills to gather forensic evidence, and complete an investigative report with details about the simulated incident.
When they complete the program, learners can add the code, reports, and designs from their projects to form a solid portfolio to showcase to hiring managers and prospective employers.
Game Theory 4 Lessons - 15 Hours
In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the threat actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
Develop Skills That
Can
Help You Ace
Certification Exams
While this bootcamp is not a certification-prep program, we know that learners who are starting in a brand new field can benefit from obtaining industry-recognized certifications. Not only do they help boost your credentials, but they might also make you stand out to employers as you start looking for your first job in cybersecurity. That’s why we’ve created in-depth resources to help you learn skills applicable to certification exams such as the below.
-
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration. -
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam. -
CompTIA Network+
The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies. -
EC-Council CND - Certified Network Defender
The EC-Council CND - Certified Network Defender certification should be considered by aspiring cyber professionals who want to pursue a career as network administrators. It tests a learner’s knowledge and training in defending, detecting, and responding to threats on a network. -
CompTIA Security+
The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing. -
EC-Council CSA - Certified SOC Analyst
The Certified SOC Analyst certification should be considered by aspiring cybersecurity professionals who want to join and work in a security operations center (SOC) environment. It’s meant for current and aspiring Tier I and Tier II SOC analysts and measures a candidate’s proficiency in both entry-level and intermediate SOC operations. -
EC-Council CEH - Certified Ethical Hacker
The Certified Ethical Hacker certification is engineered for cybersecurity professionals who want to work in a discipline that incorporates Ethical Hacking, red teaming, or penetration testing from a vendor-agnostic perspective. -
(ISC)² SSCP – Systems Security Certified Practitioner**
For learners who have achieved one year of experience after completing their program.
Learners with at least one year of experience after completing their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.
The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Security and compliance experience in AWS Cloud is a key requirement for passing the exam.
CompTIA Network+
The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
EC-Council CND - Certified Network Defender
The EC-Council CND - Certified Network Defender certification should be considered by aspiring cyber professionals who want to pursue a career as network administrators. It tests a learner’s knowledge and training in defending, detecting, and responding to threats on a network.
CompTIA Security+
The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing.
EC-Council CSA - Certified SOC Analyst
The Certified SOC Analyst certification should be considered by aspiring cybersecurity professionals who want to join and work in a security operations center (SOC) environment. It’s meant for current and aspiring Tier I and Tier II SOC analysts and measures a candidate’s proficiency in both entry-level and intermediate SOC operations.
EC-Council CEH - Certified Ethical Hacker
The Certified Ethical Hacker certification is engineered for cybersecurity professionals who want to work in a discipline that incorporates Ethical Hacking, red teaming, or penetration testing from a vendor-agnostic perspective.
(ISC)² SSCP – Systems Security Certified Practitioner**
For learners who have achieved one year of experience after completing their program.
Learners with at least one year of experience after completing their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.
The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
Program Tuition
There’s no time like the present to start investing in yourself and build
the skills and credentials you need to launch a career in the skyrocketing
field of cybersecurity.
30-Hour Introductory Course
$500
370-Hour Extended Program
$15,500
Requirements
Internet access
Drive, ambition, and passion
Introductory course and
an admission exam