We’re honored and grateful that we’re a top ranked Cybersecurity Bootcamp by Career Karma for Q1 2020, a leading authority in the bootcamp community of students. These awards were granted based on reviews from our alumni who’ve transformed their careers through our cybersecurity program.
Course Report takes many factors into consideration – alumni and student reviews, transparency around job placements, financing options, and commitment to diversity, just to name a few. We are proud to be recognized on this prestigious list.
Change your life with our cybersecurity engineering program
Our 15-week immersive program has been developed in collaboration with top cybersecurity employers. Using our Cyber Range lab environment — a sandbox where you can safely learn how to hack, explore, track, gather, break, and build things — you’ll learn the skills you need to jump right into cybersecurity’s frontlines and into the roles that employers need.
With a rigorous 15-week learning journey, you’ll elevate your skills and prepare yourself with the know-how to take on real-world cyber threats.
Learn the skills you need for a cybersecurity career with a carefully balanced combination of theory and hands-on practical skills.
Our Career Services team is with you even before you graduate to help you navigate the job market and find a cybersecurity engineering role that's right for you.
Learn the skills to launch a career as a cybersecurity engineer
Learn the technical, strategic, and analytical skills essential to launch a successful career in cyber. Our cybersecurity engineering bootcamp combines our robust cybersec curriculum with the option to learn either on-campus or online.
No matter what learning experience you choose, you'll learn the cybersecurity engineering process using the same tried-and-true methods.
You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning, and domain spoofing, as well as countermeasures.
You’ll then explore sniffing and port scanning, firewalls, IDSes, and NIDSes and cover wireless protocols and their security.
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system, and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows, and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits, and Android and iOS security.
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
Enjoy a learning community on our campuses and online
*Due to the pandemic, all courses are currently offered online. With campuses around the country, we’ll soon reopen our spaces where you can connect with fellow students and alumni, find quiet studying space, and attend networking and workshop events. Programs can be completed from home, with the option to be on-campus as our locations reopen. Learn more about the campus experience.
Pick a start date that fits your schedule
In our full-time course, you'll have access to a virtual classroom where you’ll interact with your instructors and fellow students on a fixed, full-time schedule: 9 hours a day, Monday through Friday.
Once you apply, you'll work with your admissions representative to select the start date that best fits your timeline so you can start learning to become a cybersecurity engineer in a way that makes sense for you.
|Cohort Start Date||Pace||Length||Status|
|Aug 9, 2021 – Nov 19, 2021||Full-Time||15 Weeks||Open –|
|Sep 20, 2021 – Jan 7, 2022||Full-Time||15 Weeks||Open –|
|Nov 22, 2021 – Mar 11, 2022||Full-Time||15 Weeks||Open –|
Learn cybersecurity engineering with the support of passionate instructors and seasoned Career Coaches
Learning something new is best done with others. And even while we're all learning online because of the pandemic, our cybersecurity engineering course is designed to combine flexibility with community so you're never alone and support is always available.
Experienced educators and a supportive learning community
Since day one over seven years ago, we’ve taken teaching seriously. Great teachers inspire us to connect to topics on a profound level, but industry experience alone doesn’t necessarily make someone an effective teacher. That’s why we’re passionate about finding not only great cybersecurity experts, but deeply committed teachers.
Anna is a U.S. Army veteran who has a diverse background in military, government, and private industry cybersecurity and risk management, having supported the FBI, Department of State, and KPMG, to name a few.
Bret is the Founder and CEO of SecureSet and the Head of Cybersecurity at Flatiron School. As a former professor at UC-Boulder, Bret has exercised his passion for providing students with a quality education.
Navigate cybersecurity's top opportunities with the help of our Career Coaching team
After many years working with passionate students and helping them land fulfilling careers in tech, we’ve got a keen understanding of what goes into getting that first cyber job. Graduate both with the skills to succeed as a cybersecurity engineer and the know-how to land your first job.
During your job search, you’ll meet weekly with your dedicated Career Coach. Coaches help with everything from résumé review to interview prep, and help you tell your story to land your first job.
We’ve built relationships with hiring managers at top companies across the world, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly advocating for our grads and helping you get in the door.
Through 1-on-1 guidance from our Career Coaching team and our tried-and-true job-search framework, you’ll gain the skills and support you need to launch your career.
Where Flatiron School grads get hired
Not all cybersecurity engineering bootcamps are created equal. Flatiron School grads have gone on to work at some of cybersecurity's most influential and innovative tech companies.
Meet our alumni who changed their lives through Flatiron School
Succeeding in a cybersecurity engineering bootcamp takes passion and hard work. Meet our alumni and learn how Flatiron School helped change their lives.
Meet Flatiron School alum and Popmenu engineer, Deka Ambia.
Meet Flatiron School alum and "Bitcoin Pizza" author, Samantha R.
Meet Flatiron School alum and FanConnect engineer, Anthony H.
What the application process looks like
Our application process is five steps from when you apply to when you begin preparing for class. After you apply, a member of our Admissions team will reach out to chat about your goals, and then you'll be given some questions to assess how you approach problems and solutions. After that, you'll receive your admissions decision.
Submit your application. Share a bit about yourself and what’s driving you to start a career in cybersecurity engineering.
Speak with an Admissions representative in a non-technical interview. This is an opportunity for us to get to know each other a little better. Nothing technical — just a friendly conversation.
Complete a 15-minute critical thinking and problem-solving assessment.
Receive your acceptance decision from Admissions. This usually happens within 4 business days.
If accepted, you'll begin course pre-work to prepare for the first day of class.
Find the right tuition plan for you
You'll be able to choose from 2 different payment options
Make an initial deposit of $500 to secure your seat, then pay the remainder of your tuition in one lump sum before class begins.
Maximum tuition under this plan: $18,900
Current scholarships and diversity initiatives
You could be eligible for one of the programs listed below. Whether it’s with a partner or through our own initiatives, we’re committed to making a life-changing education accessible.
Flatiron School’s partial scholarship enables students to enroll for $0 upfront. Available for all courses globally.Learn More
We’re closing the tech gender gap with the National Center for Women & Information Technology (NCWIT). Their full-tuition scholarships to women in Michigan and Alabama for our Full-Time and Part-Time Online Software Engineering, Data Science, and Cybersecurity courses.Learn More
Learn more about cybersecurity engineering and Flatiron School
Cybersecurity is more important than ever for companies across every industry. Dive deeper into the different aspects of cybersecurity engineering, pen testing, cybersecurity engineering bootcamps and languages, the future outlook for cyber, and more.