
UNC Charlotte x Flatiron School
From beginner to professional
Prepare for a career in cybersecurity with a bootcamp program that will take you from a complete beginner to a cyber pro.
Kickstart Your Career in Cybersecurity
Embark on a comprehensive boot camp that takes you from a cybersecurity novice to a professional practitioner in just ten months.
You’ll learn cybersecurity professionals’ tools and techniques, gaining hands-on experience with real-world applications.

Program Features
- Personalized job-focused training & career services
- Small class sizes (max 5 students)
- Weekly calls with your mentor + recorded video critiques
- Supportive and active community of peers, alumni, and mentors
- Flexible schedules and 100% online, study from anywhere!

Cybersecurity Study Pathway
This comprehensive learning pathway will equip you for a future in cybersecurity.

Curriculum
Industry-approved curriculum to support your journey into Cybersecurity.
Introduction to Cybersecurity
– 3 weeks
In this introduction to cybersecurity course, you’ll learn about computer hardware, basic networking, and virtualization software. You’ll explore computer components like the CPU, RAM, and storage, and gain hands-on experience with the Linux command line. The final assessment involves finding flags on Windows and Linux virtual machines, providing a foundational understanding necessary for securing IT systems against cyber attacks.
What you’ll learn:
- Identify components of computer hardware
- Identify command Linux commands
- Identify built-in security features of Windows and Linux
- Configure virtual machines
Introduction to Python – 3 weeks
This introductory Python course equips you with essential programming skills for cybersecurity. You’ll learn scripting basics, compiled vs. interpreted languages, algorithms, and data structures. The course also covers Python libraries and functions. It concludes with a project where you’ll develop a Python script to analyze data, preparing you to use Python effectively in real-world cybersecurity challenges.
What you’ll learn:
- Apply the basics of programming language methodologies to real world scenarios
- Demonstrate foundational skills for scripting with a programming language, Python
Operating Systems and Networking – 3 weeks
This course teaches you to secure computer networks and systems, covering Linux and Windows operating systems, computer networking, and troubleshooting techniques. The final assessment involves analyzing a network diagram and virtual machines to troubleshoot connectivity issues.
What you’ll learn:
- Demonstrate fundamental knowledge of computer networking diagrams
- Determine potential computer networking and operating system issues in cybersecurity scenarios
System Hardening – 3 weeks
This course enhances your Linux skills with advanced commands and techniques, covers Active Directory security, common threats, and mitigation strategies. It includes cloud computing fundamentals, data protection methods, encryption, and privacy regulations. You’ll also learn system hardening, scripting for automation, and monitoring system health for optimal security.
What you’ll learn:
- Identify mitigation strategies to protect against future attacks
- Implement knowledge of system hardening to a scenario
Threat Intelligence
– 3 weeks
This comprehensive cyber threat intelligence course covers the fundamentals of CTI and its role in cybersecurity. You’ll explore real-world applications, threat intelligence models like MITRE ATT&CK, and analyze security incidents. The course also emphasizes the importance of Governance, Risk, and Compliance (GRC) in cybersecurity strategy.
What you’ll learn:
- Outline a response to an attack using security information and event management (SIEM) data
- Integrate GRC strategies in cybersecurity processes
SIEM and Threat Hunting
– 3 weeks
This course focuses on security incident detection and response, covering Security Information and Event Management (SIEM) solutions, log analysis, and threat intelligence. You’ll explore advanced SIEM features, threat hunting techniques, and vulnerability management. The course ends with a project where you’ll use SIEM and threat hunting to address a cybersecurity incident.
What you’ll learn:
- Utilize SIEM solutions and threat hunting to solve a cybersecurity incident
- Integrate Security Information and Event Management (SIEM) solutions to solve cybersecurity incidents
Security Architecture and Frameworks
– 3 weeks
This course covers secure architecture fundamentals, frameworks, and the consequences of insecure design. You’ll learn to assess system vulnerabilities, understand secure network architecture, and explore zero-trust concepts, network segmentation, and cloud security. The course concludes with a project where you’ll identify vulnerabilities using your knowledge of IT architecture and security.
What you’ll learn:
- Integrate knowledge of security architecture to identify vulnerabilities that are discovered
- Identify mitigation strategies to protect against future attacks
Incidence Response
– 3 weeks
This course covers digital forensics, including malware recognition and evaluation, Python skills for API security, and memory forensics for Windows and Linux. It concludes with a project where you’ll use these skills to respond to a cybersecurity incident.
What you’ll learn:
- Identify mitigation strategies to protect against future attacks
- Conduct an investigation to an incident using best practices of digital forensics and incident response
- Implement best practices for API security for organization security
Penetration Testing
– 3 weeks
This comprehensive course teaches you to ethically exploit vulnerabilities and identify security weaknesses. You’ll learn social engineering, reconnaissance, scanning, enumeration, and post-exploitation strategies. Gain hands-on experience with tools like Burp Suite and Metasploit, and apply your skills in a real-world penetration testing project.
What you’ll learn:
- Develop and log corrective action methodology to a system vulnerability using industry standard techniques
- Implement knowledge of nmap for penetration testing
Penetration Testing Applications
– 3 weeks
This course covers web application security, including common threats, secure coding, and penetration testing with industry tools. You’ll master Active Directory attack methods, mitigation strategies, and credential dumping, and learn OT security best practices and emerging trends like AI and quantum cryptography. It also addresses mobile device security, including vulnerability identification, configuration, and scripting for automated scans. The course concludes with a web application security penetration testing project.
What you’ll learn:
- Develop and log corrective action methodology to a system vulnerability using industry standard techniques.
- Implement a methodology for building secure mobile architecture
Cybersecurity Capstone
– 15 weeks
In this intensive capstone you will be tasked with developing 3 different portfolio projects. In these projects, you will be expected to frame your projects around solving a business problem. You will be expected to bring all your skills from Essentials and Foundations together to analyze a network diagram, create an incident response plan, and develop a security assessment including technical process and report.
What you’ll learn:
- Analyze a network diagram
- Create an incident response plan
- Develop a security assessment including technical process and report.

Tuition
Upfront: $15,000
Pay as You Go: $16,000
12 monthly payments of $1,334
Financed Tuition: $16,500
Monthly payments as low as $298
Have questions? Schedule an info session to talk with a Flatiron School representative.
Apply Now
Get started on your pathway to a exciting career in game design.
FAQs
“Our programs are not currently set up to accept military benefits, such as the GI Bill, as a form of payment directly from the student at this time. However, if your military benefits can be arranged to pay the school directly, this may be an option in rare cases.”
“No, you do not need a college degree to enroll in our programs. A high school diploma or GED is the only educational requirement. Our programs are designed to be accessible to a wide range of students with diverse backgrounds.”
“No, we do not accept FAFSA or traditional financial aid for our programs. However, we do offer loans for full-time students, as well as interest-free installment plans and upfront payment options for everyone else. Please contact us for more details about these flexible payment options.”
“It is VERY occasionally possible to skip the essentials program and go directly to Foundations I. However, we highly recommend that most students do not skip Essentials as it covers a tremendous amount of information and skills that will be used throughout the entire career pathway program and will require some catching up if skipped. The essentials program is still difficult and covers a great deal of material that is necessary for proceeding in the following programs and won’t be reviewed in Foundations. All of the future program material will build upon the essentials. If you would like to be considered to enter directly into the Foundations-level programs, you’ll be required to submit materials demonstrating your proficiency in the materials covered in the Essentials program.”
“Nope! This program is designed for complete beginners—no experience required.”