We’re honored and grateful that we’re a top ranked Cybersecurity Bootcamp by Career Karma for Q1 2020, a leading authority in the bootcamp community of students. These awards were granted based on reviews from our alumni who’ve transformed their careers through our cybersecurity program.
Safeguard our systems from threats with a career in cybersecurity
Looking for a career with purpose? Cybersecurity professionals work to protect the digital networks, data and devices we rely on from unauthorized access and malicious cyber criminals.
Designed for students with technical backgrounds, this rigorous 15-week program will teach you real skills using real tools, including our custom-built ‘Cyber Range’ lab environment. Thanks to our proven, employer-oriented curriculum, you’ll graduate prepared for a range of vital tier 1+ cybersecurity roles — like security engineer or penetration tester — in months, instead of years.
Find out if we’re right for you — schedule a chat with our D.C. Admissions Team.
With a rigorous, intensive 15-week learning journey, you’ll elevate your skills, build your confidence, and prepare yourself with the know-how to take on real-world cyber threats. This immersion lets you start your cybersecurity career in months instead of years.
We teach and prepare our students for the skills you need for a cybersecurity career – the skills employers are looking for – with a carefully balanced combination of theory and hands-on practical skills. 50% of your learning will take place in our unique, real-world Cyber Range lab – a sandbox where you can safely explore, hack, track, gather, break, and build things.
We believe in you – so we do everything we can to support your switch into your new cybersecurity career. Get dedicated career support, access to our extensive US employer network, and a Money-Back Guarantee (see terms).
What you'll learn: comprehensive cybersecurity engineering skills
During 15 intense weeks on Flatiron School’s D.C. campus, our Cybersecurity Engineering curriculum will prepare you for a jump into the cybersecurity industry. You’ll get fluent in cybersecurity tools like Python, Wireshark, Linux, and Metasploit, then learn how to use them to defend against cybercriminals. The program includes 9 modules designed to fully prepare you for a career as a tier 1+ security engineer, technical analyst, penetration tester or consultant.
You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning and domain spoofing, as well as countermeasures. '
You’ll then explore sniffing and port scanning, firewalls, IDSes and NIDSes and cover wireless protocols and their security.
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits and Android and iOS security.
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
Join the global cybersecurity mission
Cybercrime is one of the biggest threats facing companies worldwide today. According to Cisco/Cybersecurity Ventures’ 2019 Cybersecurity Almanac, it’s predicted to cost the world $6 trillion annually by 2021.
But there’s a skills gap – employer demand is rapidly outpacing the supply of highly trained cybersecurity specialists, especially in Washington, D.C., where there are nearly 8 times as many cybersecurity jobs available as the national average, according to Cyberseek.org.
That’s where our Cybersecurity Engineering program comes in — we’ll equip you with one of the most in-demand skill sets in the D.C. job market and beyond. This course will prepare you for a broad range of cybersecurity jobs, including security engineer, pen tester, security analyst and security consultant.
Student life at Flatiron School
By joining the Cybersecurity Engineering program, you’ll become part of our thriving tech community in downtown D.C., just steps from the National Mall.
Our full-time D.C. Cybersecurity Engineering program is in session 5 days per week for 15 weeks and follows a block schedule. We use a unique instructional architecture to maximize instructor interaction and lab exercises. Designated lab times let you engage in hands-on learning, while key cybersecurity topics are covered during classes. Most classes will occur twice a week. Each class is a half-day in length with a lunch break between subjects.
Throughout the program, you’ll progress through longer “foundational” courses while tackling shorter, domain-specific topics.
Below is an example of a day at Flatiron School:
Theory and Demonstration
Hands-on labs in the Cyber Range
Theory and Demonstration
Hands-on labs in the Cyber Range
You’ll end the day reviewing concepts and strategising the next steps for your personal projects.
Is Cybersecurity Engineering the right choice for me?
Still not sure if Cybersecurity Engineering is right for you? Schedule a chat with our Admissions team to get your questions answered.
To succeed in our cybersecurity engineering course, it will help if you have some knowledge of programming languages, as well as familiarity with Windows, Linux, and Unix operating systems.
This course is ideal for people who are organized leaders, proficient decoders, and detail-oriented individuals who are passionate about tech and computer systems.
We place a higher value on technical ability over formal education. Networking engineering certifications and degrees in technology, science and mathematics are helpful.
Your cybersecurity instructors
Great teachers inspire us to connect with topics on a profound level. Industry experience alone doesn’t necessarily make someone an effective teacher –– that’s why we’re passionate about finding people who possess extensive cybersecurity experience and are also deeply committed, experienced teachers.
Jim oversees cyber instruction for all campuses. Jim was formerly the head of Intl. Relations and Defense Policy at the U.S. Air Force Academy, where he led scholarship in Intelligence studies.
Anna oversees cyber instruction at Flatiron School's Washington, D.C. campus. She has a diverse background in military, government and private industry cybersecurity, having supported the FBI, Department of State and KPMG, to name a few.
Launch your career in cybersecurity with support from our Career Services team
We’re here to help you land a job in cybersecurity. After years working with passionate students and helping them land fulfilling careers in tech, we’ve got a keen understanding of what goes into getting that first job.
During your job search, you’ll meet weekly with your dedicated Career Coach. Coaches help with everything from résumé review to interview prep, and help you tell your story to get the job you want.
We’ve built relationships with hiring managers at top companies, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly evangelizing our grads and helping you get in the door.
Through 1:1 guidance from our Career Coaching team and our tried-and-tested job-search framework, you’ll gain the skills and support you need to get a job and start your career in cybersecurity.
Change careers with confidence thanks to our Money-Back Guarantee. If you graduate, follow our job-search process, and don’t secure a job offer within 6 months of your job search start date, we’ll refund your tuition in full (see terms).
Cybersecurity careers in D.C.
Our Flatiron School grads have created powerful change and made contributions at respected companies in D.C. and across the globe.*
*Students placed with employers while studying with SecureSet Academy, our sister program in Colorado, which has a curriculum substantially similar to the Flatiron School Cybersecurity Engineering program.
Find the right tuition plan for you
You'll be able to choose from 3 different payment options
Make an initial deposit of $500 to secure your seat, then pay the remainder of your tuition in one lump sum before class begins.
Maximum tuition under this plan: $18,000
Pay with a loan
Maximum tuition under this plan: $18,000 plus interest
Pay only after you're getting paid
Defer your tuition with the Flatiron School Income Share Agreement (ISA). After you make a deposit, the raminder of your tuition is paid once you've left the program and are getting paid at least a minimum income.
Join us on campus
|Cohort Start Date||Status|
|Sep 14, 2020 – Dec 25, 2020||Open –|
|Jan 4, 2021 – Apr 16, 2021||Open –|
|Apr 19, 2021 – Jul 30, 2021||Open –|
|Aug 2, 2021 – Nov 12, 2021||Open –|
What the application process looks like
Start your journey toward a career in cybersecurity engineering by joining our inclusive and dynamic student community. At Flatiron School, we admit students who bring creativity, ingenuity, and curiosity to the classroom.
Not sure if Cybersecurity Engineering is right for you? Schedule a chat with our D.C. Admissions team.
Submit your application. Share a bit about yourself and what’s driving you to start a career in cybersecurity engineering.
Speak with an Admissions representative in a non-technical interview. This is an opportunity for us to get to know each other a little better. Nothing technical — just a friendly conversation.
During the technical review, our instructors will learn more about your overall technical background and you will have the chance to get to know our instructors and their teaching style.
Receive your acceptance decision from Admissions. This usually happens within 4 business days.
If accepted, you'll begin course pre-work to prepare for the first day of class.
Frequently asked questions
You can also view our main FAQ page.
Start your application for one of our immersive bootcamps and change your life today.
Attend an Event
Join us for a seminar or info session to see what student life is like at Flatiron School.
Chat with Admissions
Have a question about our program that we haven’t answered above? Our admissions team is here to help.