Join a mission. Secure the future with our proven curriculum.
Ready to change your career? Launch into one of the US' top 10 fastest-growing jobs with a career in cybersecurity engineering. Our 15-week immersive program has been developed in collaboration with top cybersecurity employers — you’ll learn the skills you need to jump right into cybersecurity’s frontlines and into the cybersecurity roles that employers are looking for.
Get job-ready with our employer-oriented curriculum, and hands-on experience in our unique Cyber Range lab environment—a sandbox where you can safely learn how to hack, explore, track, gather, break, and build things.
Find out if we’re right for you - schedule a chat with our New York City Admissions Team.
With a rigorous 15-week learning journey, you’ll elevate your skills and prepare yourself with the know-how to take on real-world cyber threats.
Learn the skills you need for a cybersecurity career with a carefully balanced combination of theory and hands-on practical skills.
Our Career Services team is with you even before you graduate to help you navigate the job market and find a cybersecurity engineering role that's right for you.
What you'll learn: comprehensive cybersecurity engineering skills
Over 15 intense weeks at Flatiron School New York City, our Cybersecurity Engineering curriculum will prepare you to jump into the cybersecurity industry. You’ll get fluent in cybersecurity tools like Python, Wireshark, Linux, Metasploit and more, and learn how to use them to defend against cybercriminals. The program includes 9 modules designed to fully prepare you for a career as a tier 1+ security engineer, technical analyst, penetration tester or consultant.
You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning, and domain spoofing, as well as countermeasures.
You’ll then explore sniffing and port scanning, firewalls, IDSes, and NIDSes and cover wireless protocols and their security.
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system, and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows, and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits, and Android and iOS security.
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
Join the global cybersecurity mission
Cybercrime is one of the biggest threats facing companies worldwide today, predicted to cost the world $6 trillion annually by 2021, according to the Cisco/Cybersecurity Ventures 2019 Cybersecurity Almanac.
But there’s a skills gap — employer demand is outstripping the supply of highly-trained cybersecurity specialists. That’s where our Cybersecurity Engineering program comes in — we’ll equip you to become an ethical hacker and break into cybersecurity, with one of the most in-demand skillsets in the job market.
The course will prepare you for a broad range of cybersecurity jobs, including Security Engineer, Pen Tester, Security Analyst and Security Consultant.
Student life at Flatiron School
By joining the Cybersecurity Engineering program, you’ll become a part of our thriving tech community at our Manhattan campus located in the Financial District.
Our full-time New York City Cybersecurity Engineering program is in session 5 days per week for 15 weeks and follows a block schedule. We use a unique instructional architecture to maximize instructor interaction and lab exercises. Our lab times let you engage in hands-on learning, with key cybersecurity topics during lecture portions of the class. Most classes will meet twice a week. Each class is a half-day in length with a lunch break between classes.
Throughout the program, you’ll progress through longer “foundational” courses alongside shorter, domain-specific topics.
Below is an example of a day at Flatiron School:
Theory and Demonstration
Hands-on labs in the Cyber Range
Theory and Demonstration
Hands-on labs in the Cyber Range
You’ll end the day reviewing concepts and strategising the next steps for your personal projects.
Is Cybersecurity Engineering the right choice for me?
To succeed in our cybersecurity engineering course, it will help if you have some knowledge of programming languages, as well as familiarity with Windows, Linux, and Unix operating systems.
This course is ideal for people who are organized leaders, proficient decoders, and detail-oriented individuals who are passionate about tech and computer systems.
We place a higher value on technical ability over formal education. Networking engineering certifications and degrees in technology, science and mathematics are helpful.
Your cybersecurity instructors
Great teachers inspire us to connect with topics on a profound level. Industry experience alone doesn’t necessarily make someone an effective teacher –– that’s why we’re passionate about finding people who possess extensive cybersecurity experience and are also deeply committed, experienced teachers.
Jim oversees cyber instruction for all campuses. Jim was formerly the head of Intl. Relations and Defense Policy at the U.S. Air Force Academy, where he led scholarship in Intelligence studies.
Launch your career in cybersecurity with support from our Career Services team
We’re here to help you land a job in cybersecurity. After years working with passionate students and helping them land fulfilling careers in tech, we’ve got a keen understanding of what goes into getting that first job.
During your job search, you’ll meet weekly with your dedicated Career Coach. Coaches help with everything from résumé review to interview prep, and help you tell your story to get the job you want.
We’ve built relationships with hiring managers at top companies, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly evangelizing our grads and helping you get in the door.
Through 1:1 guidance from our Career Coaching team and our tried-and-tested job-search framework, you’ll gain the skills and support you need to get a job and start your career in cybersecurity.
Cybersecurity careers in New York City
Our Flatiron School grads have created powerful change and made contributions at respected companies in New York City and across the globe.*
*Students placed with employers while studying with SecureSet Academy, our sister program in Colorado, which has a curriculum substantially similar to the Flatiron School Cybersecurity Engineering program.
The Access Scholarship
The Access Scholarship opens doors for aspiring innovators who may have previously experienced barriers to an education. With our £2,500 scholarship, start learning with £0 up front.
Scholarships are available to individuals who identify as a member of one of the following groups: Women, underrepresented minorities, people with disabilities, British Armed Forces service leavers, LGBTQ+, those earning below £20,000 in London.
What the application process looks like
Start your journey toward a career in cybersecurity engineering by joining our inclusive, dynamic student community. At Flatiron School, we admit students who bring creativity, ingenuity, and curiosity to the classroom.
Not sure if Cybersecurity Engineering is right for you? Schedule a chat with our New York City Admissions Team.
Submit your application. Share a bit about yourself and what’s driving you to start a career in cybersecurity engineering.
Speak with an Admissions representative in a non-technical interview. This is an opportunity for us to get to know each other a little better. Here’s what you can expect.
During the technical review, our instructors will learn more about your overall technical background and you will have the chance to get to know our instructors and their teaching style.
Receive your acceptance decision from Admissions. This usually happens within 4 business days.
If accepted, you'll begin course pre-work to prepare for the first day of class.