Cybersecurity Bootcamp (Part-Time Evening Program)

cybersecurity bootcamp

Ninety percent of the world’s data has been created in just the last two years. As computer networks grow, so does the information that needs protection. The Cybersecurity Boot Camp equips students with the fundamentals of IT networking and modern information security.

Throughout this program, you will gain experience with a host of tools such as Wireshark, Kali Linux, Metasploit, Burp Suite, and more. You will also receive training towards certifications such as the Security+, Network+, and CISSP, which greatly enhances desirability and employability in today’s job market.

This non-credit program is offered in partnership with Trilogy Education Services (TES). The online application process is handled by TES – applicants should expect a call or other communication from one of their advisors, upon completion of the online application.

Learn More

Class Details


Upcoming Course Date(s):
  • August 6, 2019 – February 8, 2020

Cost: $11,495 USD (Financing available)

Professional Education is offering University of Utah Employees a $1,000 discount on tuition. Please communicate your University of Utah employment status to the enrollment team.

(Please note: Employee discount is only eligible to employees. Children and spouses/partners are not eligible for discount.)

Schedule: 24 Weeks, 10 hours per week, 240 in-class hours

Classes meet weeknights, Monday/Wednesday 6:30 pm—9:30 pm. and Saturdays from 9:00 am—1:00 pm

Students should expect to spend another 20 hours outside of class doing project work.
Students must provide their own laptop.


What You Will Learn

By the time you graduate, you can expect to be able to:

  • Analyze packet traffic flowing over a network in order to better troubleshoot issues such as poor network performance
  • Understand and implement network theory
  • Analyze malware to identify its origin and purpose, and determine methods for uninstalling it
  • Perform administrative and security tasks to Windows and Linux Operating Systems
  • Understand cybersecurity threats, actors, and methods
  • Conduct vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities
  • Perform network, system, and web penetration testing activities
  • Identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
  • Perform Python programming along with Bash and scripting
  • Gain insight into the important best practices around password selection and storage to crack into (mock!) user accounts
  • Advise on cybersecurity best practices and risk management strategies
  • Implement access control policies as an additional layer of security over an organization’s private data
  • Develop best practices in implementing security strategy policies across an organization


Benefits

Achieving your goals in Cybersecurity requires not only deep security knowledge, but also experience with the application of that knowledge.

The curriculum is designed to give you both the knowledge you need to move forward with the cybersecurity industry and ample experience applying that knowledge to real-world problems. Throughout the program, you will learn tools and techniques vetted by current practitioners, and learn skills applicable to certifications expected of all security professionals.

In addition to learning cybersecurity, you will have access to career services that will help you prepare for technical roles after graduation.

What You Will Learn

By the time you graduate, you can expect to be able to:

  • Analyze packet traffic flowing over a network in order to better troubleshoot issues such as poor network performance
  • Understand and implement network theory
  • Analyze malware to identify its origin and purpose, and determine methods for uninstalling it
  • Perform administrative and security tasks to Windows and Linux Operating Systems
  • Understand cybersecurity threats, actors, and methods
  • Conduct vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities
  • Perform network, system, and web penetration testing activities
  • Identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
  • Perform Python programming along with Bash and scripting
  • Gain insight into the important best practices around password selection and storage to crack into (mock!) user accounts
  • Advise on cybersecurity best practices and risk management strategies
  • Implement access control policies as an additional layer of security over an organization’s private data
  • Develop best practices in implementing security strategy policies across an organization

Benefits

Achieving your goals in Cybersecurity requires not only deep security knowledge, but also experience with the application of that knowledge.

The curriculum is designed to give you both the knowledge you need to move forward with the cybersecurity industry and ample experience applying that knowledge to real-world problems. Throughout the program, you will learn tools and techniques vetted by current practitioners, and learn skills applicable to certifications expected of all security professionals.

In addition to learning cybersecurity, you will have access to career services that will help you prepare for technical roles after graduation.

Student admissions, program content questions, career services questions, and financial plan information are supported by (TES).

Phone: 801-895-2166
E-mail: bootcamp@utah.edu

Who Should Attend

This program is for anyone who needs to know how to keep data safe from prying eyes. Enrolling can help you achieve your goals if you say “yes” to any of the following:

  • You are currently a technical professional, such as a web developer, network administrator, or help desk technician, who is looking to move into cybersecurity.
  • You are a manager in a company whose revenue depends on the confidentiality, availability, and integrity of client data.
  • You are a manager dedicated to managing growing cyber risks to your organization.
  • You are a tech enthusiast looking to get your foot in the door in the world of networking and security.

Prerequisites

There is an application process, but no specific prerequisites.

 



For more information about our Veterans/Military Programs, please contact us at proed@continue.utah.edu or 801-585-1780.