Start a Career in Cybersecurity

Become a cybersecurity engineer so you can help organizations of all sizes protect data from getting stolen, hacked, leaked, or damaged.  Our cybersecurity courses can help you get started in as little as 15 weeks. 

Course Start Dates

Course Dates
Start Date Pace Campus Status
August 29, 2022 Part-Time Online Few Spots Left!
September 19, 2022 Full-Time Online Open
September 19, 2022 Part-Time Online Open
October 10, 2022 Part-Time Online Open
October 31, 2022 Part-Time Online Open
October 31, 2022 Full-Time Online Open
November 21, 2022 Part-Time Online Open
December 12, 2022 Part-Time Online Open
December 12, 2022 Full-Time Online Open
December 12, 2022 Full-Time New York City Open

An Exceptional Learning Experience

Learn the skills to kickstart your cybersecurity career.

What you’ll learn

Network Security

You’ll focus on the core ideas in network security.

The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning, and domain spoofing, as well as countermeasures.

You’ll then explore sniffing and port scanning, firewalls, IDSes, and NIDSes and cover wireless protocols and their security.

What you’ll learn

System Security

You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system, and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.

Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows, and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits, and Android and iOS security.

What you’ll learn


You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.

What you’ll learn

Governance, Risk, & Compliance

You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.

The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.

Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.

What you’ll learn

Logs & Detection

You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.

Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.

What you’ll learn

Threat Intelligence

You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.

What you’ll learn

Application Security

You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pen testing tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.

What you’ll learn

Applied Cryptography

This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.

What you’ll do


You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.

This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.

Learn a life-changing skill – at your own pace.

Our students understand that there’s a lot of hard work ahead of them, but we also understand the need for flexibility and autonomy. We deliver a structured learning experience that adjusts to your specific lifestyle. Talk to your admissions representative about full-time and part-time pace options.


You’ll learn cybersecurity skills on a fixed full-time schedule: roughly 8 hours a day, Monday through Friday, for 15 weeks. You will interact with students and instructors, learning both collaboratively and solo.

  • 15 weeks long.
  • Daily touchpoints with your cohort, group work with instructor help, paired with programming sessions, lab time with instructional staff, and community support.
  • Best for students who want to learn in live lectures, keep a structured schedule, or who enjoy learning in a community with other students.
  • Available in-person and online.
  • Also known as our Live program.


You’ll learn cybersecurity skills on your own schedule over 40 weeks. You will have access to study groups and one-on-one instructor sessions.

  • 40 weeks long. Set your own hours.
  • Mostly recorded lectures, with optional live weekly lectures and office hours, weekly check-ins with instructors, chat with classmates and instructors via Slack.
  • Best for working professionals that need to fit classes into their already-busy schedule.
  • Available online only.
  • Also known as our Flex program.

Now offering prep courses.

Find the location for you.

Learn online from anywhere or at one of our campuses across the country.

Get the syllabus.

Real-world preparation

Our courses don’t just prepare you for a future tech career — Flatiron School prepares you to change the world. Our curriculum is regularly reviewed by industry partners to ensure that you learn the most relevant and in-demand skills.

Career coaching for 180 days

We’re committed to your success. That’s why we include up to 180 days of 1-on-1 career coaching. Meet with your Flatiron School career coach regularly to optimize your job search. Your coach can help with interview prep, resume reviews, and building your personal brand.

Access to a vast employer network.

We’ve built relationships with hiring managers at top companies across the world, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly advocating for our grads to get you in the door. 

Our grads have been hired at some amazing companies

Learn with a community.

Flatiron School offers award-winning courses and proven outcomes. But the beauty of Flatiron School is that you learn in-demand skills with the support of the community — that we call the  Flatiron Family. From our employer partners down to your cohort mates, our community is actively rooting for your success.

Experienced Instructors

How to Apply


No matter what discipline or pacing option you choose, all of our programs are available at one price, with 3 ways you can pay.

Learn more about tuition plans

  • $16,900
  • $500 deposit

We have 3 easy ways you can pay for tuition.

  • Pay upfront
  • Pay with a loan
  • Pay in 12 monthly installments

Scholarships & Diversity Initiatives

We believe that everyone who is willing to work hard deserves an opportunity to break into tech. That’s what we offer scholarships to support diversity in tech — from our access scholarship to programs to support underrepresented groups in tech. See Scholarships

Ready to change things?

Take the next step and speak to our admissions team. Book a 10-minute chat to ask questions and learn more about our program.

Frequently asked questions about cybersecurity

On-campus programs are held full-time and you are expected to be on campus for each day of class. The online program uses the same curriculum, but gives you the added flexibility of studying from home.

No matter which program you sign up for, you can still visit campus to connect with fellow students and alumni, find quiet places to study and work, and attend networking and workshop events.

Cybersecurity engineering — sometimes called information security engineering or data security engineering, among other things — is the discipline of protecting devices, services, and networks from malicious digital attacks.

A cybersecurity engineer also designs and implements secure networks and ensures that the network and its attendant resources are protected from cyber-attacks.

Security engineers also regularly test and monitor security systems to ensure they are up to date and functioning properly. Organizations and/or individuals hire these engineers to help protect organizational data, sensitive and confidential information, financial/transactional information, and the reputation of the organization as a whole.

The responsibilities of a cybersecurity engineer have a lot of overlap with cybersecurity analysts, who are also tasked with protecting sensitive information.

Their main responsibilities vary, but often fall along these lines:

Learn more about the responsibilities of a cybersecurity engineer and the cybersecurity programming languages they use, and other cyber skills they need.

Learn more about becoming a cybersecurity engineer.

This all depends on your career ambitions. At Flatiron School, we recommend all graduates start with the CompTIA Sec+ certification and then pursuing others based on their desired career path.

Learn more about specific cybersecurity certifications and who should get them.

We get asked this a lot — and it’s a great question — and encourage you to think about what you mean by “worth it.” If “worth it,” to you, means attending a cybersecurity engineering bootcamp, learning the skills you need to become a cybersecurity engineer, and landing a job as one, then yes, good cyber engineering bootcamps are certainly worth it.

In fact, that’s what most bootcamps set out to help you do — and the best ones will indeed help you get there.

But if you’re simply looking to brush up on your cybersecurity knowledge without a goal to work in cyber, then a full-time or part-time bootcamp would not end up being worth it for you.

If you’re looking to join the cybersecurity field professionally, though, it’s a growing and lucrative field — and the best bootcamps can help you break into it.

Read more about whether or not cybersecurity bootcamps are worth it for you and your goals.

Our Cybersecurity Engineering program teaches people with some technical experience the skills they need to succeed in entry-level cybersecurity roles like security engineer, security analyst, and security consultant.

Strong candidates for our Cybersecurity Engineering program are detail-oriented with creative problem-solving skills. Candidates should have some working knowledge of programming languages and familiarity with Windows, Linux, and Unix operating systems. Technical ability is valued over formal education, though network engineering certifications or degrees in technology, math, or science are helpful. Candidates must have a high school diploma or equivalent.

The Flatiron School Career Services team exists to help get you hired. We do this in two ways:

  • Empowering stand-out job-seekers to learn to be no-brainer hires → this is what your Career Coach does!
  • Building a nationwide network of hiring partners → this is what the Employer Partnerships team does!

You will have an initial meeting with your career coach during the program to get acquainted with the process. Once you’ve graduated from the program you’ll work with your Career Coach on how to maximize your opportunities and efforts for landing a job. It is important to note that, like with our course, you must come prepared and committed. Your Coaches will help you to get organized and prepare you for interviews, but it is up to you to do the heavy lifting as well.

If you would like to connect with a member of our team, please simply schedule a chat with one of our admissions representatives.