You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning, and domain spoofing, as well as countermeasures.
You’ll then explore sniffing and port scanning, firewalls, IDSes, and NIDSes and cover wireless protocols and their security.
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system, and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows, and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits, and Android and iOS security.
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
Governance, Risk, & Compliance
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
Logs & Detection
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pen testing tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
You’ll learn cybersecurity skills on a fixed full-time schedule: roughly 8 hours a day, Monday through Friday, for 15 weeks. You will interact with students and instructors, learning both collaboratively and solo.
- 15 weeks long.
- Daily touchpoints with your cohort, group work with instructor help, paired with programming sessions, lab time with instructional staff, and community support.
- Best for students who want to learn in live lectures, keep a structured schedule, or who enjoy learning in a community with other students.
- Available in-person and online.
- Also known as our Live program.
You’ll learn cybersecurity skills on your own schedule over 40 weeks. You will have access to study groups and one-on-one instructor sessions.
- 40 weeks long. Set your own hours.
- Mostly recorded lectures, with optional live weekly lectures and office hours, weekly check-ins with instructors, chat with classmates and instructors via Slack.
- Best for working professionals that need to fit classes into their already-busy schedule.
- Available online only.
- Also known as our Flex program.
Choose a start date
A demanding schedule doesn’t have to stop you from career transformation. Both our full-time and part-time pace options empower you to switch careers.
|June 27, 2022||Full-Time||15 weeks||Online||Cybersecurity||Closing Soon||Apply|
|June 27, 2022||Part-Time||40 weeks||Online||Cybersecurity||Closing Soon||Apply|
|July 18, 2022||Full-Time||15 weeks||Denver||Cybersecurity||Open||Apply|
|July 18, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|August 8, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|August 8, 2022||Full-Time||15 weeks||Online||Cybersecurity||Open||Apply|
|August 8, 2022||Full-Time||15 weeks||New York City||Cybersecurity||Open||Apply|
|August 29, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|September 19, 2022||Full-Time||15 weeks||Online||Cybersecurity||Open||Apply|
|September 19, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|September 19, 2022||Full-Time||15 weeks||New York City||Cybersecurity||Open||Apply|
|October 10, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|October 31, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|November 21, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|December 12, 2022||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
Find the location for you.
Learn online from anywhere or at one of our campuses across the country.
Get the syllabus.
Our courses don’t just prepare you for a future tech career — Flatiron School prepares you to change the world. Our curriculum is regularly reviewed by industry partners to ensure that you learn the most relevant and in-demand skills.
Career coaching for 180 days
We’re committed to your success. That’s why we include up to 180 days of 1-on-1 career coaching. Meet with your Flatiron School career coach regularly to optimize your job search. Your coach can help with interview prep, resume reviews, and building your personal brand.
Access to a vast employer network.
We’ve built relationships with hiring managers at top companies across the world, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly advocating for our grads to get you in the door.
Learn with a community.
Flatiron School offers award-winning courses and proven outcomes. But the beauty of Flatiron School is that you learn in-demand skills with the support of the community — that we call the Flatiron Family. From our employer partners down to your cohort mates, our community is actively rooting for your success.
How to Apply
No matter what discipline or pacing option you choose, all of our programs are available at one price, with 3 ways you can pay.
- $500 deposit
We have 3 easy ways you can pay for tuition.
- Pay upfront
- Pay with a loan
- Pay in 12 monthly installments
Scholarships & Diversity Initiatives
We believe that everyone who is willing to work hard deserves an opportunity to break into tech. That’s what we offer scholarships to support diversity in tech — from our access scholarship to programs to support underrepresented groups in tech. See Scholarships
What Is A Pen Test?
A ‘pen test’ (short for ‘penetration test’) is an attack on a computer system that is authorized by the system’s owner. The purpose? You find weak points before hackers do.
What is a SOC Analyst?
A SOC Analyst — Security Operations Center (SOC) analyst — is often called the “first line of defense” against cyberthreats. Learn what a SOC analyst does and how to become one here.
On-campus programs are held full-time and you are expected to be on campus for each day of class. The online program uses the same curriculum, but gives you the added flexibility of studying from home.
No matter which program you sign up for, you can still visit campus to connect with fellow students and alumni, find quiet places to study and work, and attend networking and workshop events.
Cybersecurity engineering — sometimes called information security engineering or data security engineering, among other things — is the discipline of protecting devices, services, and networks from malicious digital attacks.
A cybersecurity engineer also designs and implements secure networks and ensures that the network and its attendant resources are protected from cyber-attacks.
Security engineers also regularly test and monitor security systems to ensure they are up to date and functioning properly. Organizations and/or individuals hire these engineers to help protect organizational data, sensitive and confidential information, financial/transactional information, and the reputation of the organization as a whole.
The responsibilities of a cybersecurity engineer have a lot of overlap with cybersecurity analysts, who are also tasked with protecting sensitive information.
Their main responsibilities vary, but often fall along these lines:
- Implementing security measures and infrastructure to protect organizational data and resources
- Ensuring adequate security measures and protocols are in place
- Troubleshooting network and security issues
- Testing and identifying network vulnerabilities
- Responding to security breaches with their SOC team comprised of cybersecurity analysts, pen testers, security consultants, cyber threat analysts, and sometimes compliance analysts.
Learn more about becoming a cybersecurity engineer.
This all depends on your career ambitions. At Flatiron School, we recommend all graduates start with the CompTIA Sec+ certification and then pursuing others based on their desired career path.
Learn more about specific cybersecurity certifications and who should get them.
We get asked this a lot — and it’s a great question — and encourage you to think about what you mean by “worth it.” If “worth it,” to you, means attending a cybersecurity engineering bootcamp, learning the skills you need to become a cybersecurity engineer, and landing a job as one, then yes, good cyber engineering bootcamps are certainly worth it.
In fact, that’s what most bootcamps set out to help you do — and the best ones will indeed help you get there.
But if you’re simply looking to brush up on your cybersecurity knowledge without a goal to work in cyber, then a full-time or part-time bootcamp would not end up being worth it for you.
If you’re looking to join the cybersecurity field professionally, though, it’s a growing and lucrative field — and the best bootcamps can help you break into it.
Read more about whether or not cybersecurity bootcamps are worth it for you and your goals.
Our Cybersecurity Engineering program teaches people with some technical experience the skills they need to succeed in entry-level cybersecurity roles like security engineer, security analyst, and security consultant.
Strong candidates for our Cybersecurity Engineering program are detail-oriented with creative problem-solving skills. Candidates should have some working knowledge of programming languages and familiarity with Windows, Linux, and Unix operating systems. Technical ability is valued over formal education, though network engineering certifications or degrees in technology, math, or science are helpful. Candidates must have a high school diploma or equivalent.
The Flatiron School Career Services team exists to help get you hired. We do this in two ways:
- Empowering stand-out job-seekers to learn to be no-brainer hires → this is what your Career Coach does!
- Building a nationwide network of hiring partners → this is what the Employer Partnerships team does!
You will have an initial meeting with your career coach during the program to get acquainted with the process. Once you’ve graduated from the program you’ll work with your Career Coach on how to maximize your opportunities and efforts for landing a job. It is important to note that, like with our course, you must come prepared and committed. Your Coaches will help you to get organized and prepare you for interviews, but it is up to you to do the heavy lifting as well.