Classes begin quarterly
Gain Hands-On Cybersecurity Training in an Intensive 24-Week Program
Online Philadelphia Cybersecurity Boot Camp
Big data needs big protection. According to a study by IBM, in just the last two years, 90 percent of the world’s data has been created. As computer networks grow, so too does the quantity of vulnerable information.
This online Cybersecurity Boot Camp is a challenging, part-time program that takes a multidisciplinary approach to attain proficiency in IT, networking, and modern information security, throughout the course of 24 intensive weeks.
- Gain experience with a host of popular tools such as Wireshark, Kali Linux, Metasploit, Nessus, and more.
- Learn skills applicable to certifications such as the CompTIA Security+, Network+, Linux+, Server+, Cloud+, and certified Ethical Hacker (CEH).
- Advance your skill set even if you’re currently employed or in school through a convenient evening and weekend schedule.
- Get job-ready through a comprehensive set of career services to help equip you for success as you work to change career paths or advance in your current position.
Benefit from our CompTIA partnership and receive a complimentary test-prep course and voucher to take the CompTIA Security+ certification exam.
Why Apply to a Cybersecurity Program?
If you are eager to become a digital defender and learn how to keep data safe from prying eyes, or if any of the below describe you, enrolling in this boot camp could help put you on the path to achieving your goals:
- You already work in a technical field and want to add to your cyber skill set, enhance your understanding of data protection, and gain real-world experience to apply to your current role or advance your career.
- Your current organization is in need of stronger cybersecurity and professionals who have the skills to ensure the privacy, availability, and fidelity of information and technology.
- You’re aware of the growing global need for skilled cybersecurity professionals and have a desire to help protect internet users and their sensitive information.
- You have a deep interest in technology and are eager to gain the requisite knowledge to start a career in the world of networking and cybersecurity.
- You’re interested in acquiring in-demand cybersecurity skills but need an educational format that allows you to keep your current commitments and study through a virtual, part-time schedule.
- You’re looking to get exposure to the tools and techniques used by modern cybersecurity professionals to learn how to effectively protect your organization from external threats.
- You need dedicated career services to help you become employer-competitive and put your best foot forward when it comes time to start the job search.
Get Program Info
Building on the Basics
Achieving your goals in cybersecurity requires not only deep security knowledge but also experience with the application of that knowledge. Our curriculum is designed to give you both the knowledge you need to move toward the cybersecurity industry and ample experience applying that knowledge to real-world problems.
Throughout the program, you will learn tools and technologies vetted by current practitioners, and learn skills applicable to certifications expected of all serious security professionals.
Get Hands-On Training and Real-World Experience
At Penn Cybersecurity Boot Camp, participants get hands-on training in networking, systems, web technologies, databases, and defensive and offensive cybersecurity. You will also learn methods, techniques, and best practices for accurately conveying the severity of the risks facing an organization’s security posture.
You’ll learn from skilled instructors and gain real-world experience by collaborating with your peers. Through hands-on application, you’ll gain the confidence you need to tap into the industry. The curriculum* will dive into the foundational skills for cybersecurity, including:
- Packet Analysis
- Windows and Linux Administration Techniques
- Windows and Linux Hardening
- Secure Network Design and Architecture
- Risk Management
- Vulnerability Assessment
- Identity and Access Management
- Cloud Security
Ethical Hacking and Penetration:
- Kali Linux
- Burp Suite
- Web Vulnerabilities and Security
- Digital Forensics Methods
- Penetration Testing
- Vulnerability Assessment
- Security Operations and Analytics
Programming and Scripting:
- Bash Scripting
- PowerShell Scripting
*The material covered is subject to change. Our academic team adjusts to the market demand.
By the Time You Complete the Program, You Will Know How To:
- Conduct vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities
- Configure machines on a virtual network, deploy them to the cloud, and investigate cloud security risks
- Identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
- Write Bash scripts to automate security and operating systems tasks
Frequently Asked Questions
Learners can complete the part-time cybersecurity program in 6 months (24 weeks).
No previous experience is required as long as you are dedicated and eager to learn. Our pre-program tutorials will help you prepare for the Cybersecurity Boot Camp.
No, applicants do not need to be University of Pennsylvania students to apply to Penn Cybersecurity Boot Camp.
Part-Time Boot Camp Schedule
- 24-week program
- Sessions held two weekdays from 6:30 to 9:30 p.m.
and Saturdays from 10 a.m. to 2 p.m.
What is Cybersecurity?
Cybersecurity involves the practices and techniques used to keep devices and systems — and the networks and programs they run — safe from external attacks. While cybersecurity professionals are responsible for maintaining the processes used by their organizations to protect systems and information, individual users must also be aware of and adhere to internal protocols and best practices. In addition to staying up-to-date on software and other cybersecurity tools, many businesses require employees to sign into accounts with a password manager and two-factor authentication to prevent outside access. However, to be truly effective, a business’s cybersecurity should cover a range of aspects, from network and application security to identity management, cloud security, and disaster recovery.
Why is Cybersecurity so Important?
Cyber attacks can impact individuals and businesses alike, and the repercussions are often extreme. During these attacks, hackers and other malicious users attempt to obtain, alter, or destroy sensitive data; force users to pay a ransom to regain access to personal accounts; or disrupt business operations. As risks continue to rise and evolve, cybersecurity professionals are becoming increasingly in-demand in order to keep up with advancing threats. Businesses should be especially vigilant and aware of the potential damage they could incur as a result of poor cybersecurity practices, but individual users also face a variety of risks without proper network protection. Password management, network security, and data sensitivity impact everyone, making cybersecurity awareness essential both in the workplace and at home. In fact, employees and casual technology users can be at the highest risk of exposure through malicious attempts at ransomware, phishing, social engineering, and other common ways cyber criminals gain access to sensitive information.
What Does a Day at Work Look Like for a Cybersecurity Professional?
Cybersecurity professionals can find work both in freelance and internal positions within an organization. That said, most roles won’t follow a typical 9-to-5 structure — some days might be devoted to addressing a data breach, while others may involve housekeeping and maintenance of current defenses. In an organization like the NSA, your work depends on your position within the cybersecurity team. For instance, while a Threat Center Director leads the team, stays on top of industry trends, and meets with stakeholders to discuss potential threats, an Exploitation Analyst spends their days thinking like a hacker to determine when and how those potential threats might occur. If you do encounter an issue that requires attention, you’ll likely spend the day taking the necessary steps to find a solution. First, consider existing vulnerabilities and how they could be exploited, then communicate with anyone relevant to the problem. Your cybersecurity skills will come in handy as you keep digging to find a solution and make the necessary updates to internal protocols