Man studying cybersecurity at home

Launch your career in cybersecurity

Learn the skills needed to start a life-changing career in cybersecurity. Reinvent your future at your own pace, online or on-campus.

Prepare yourself to work for some of the most influential companies in the world.

Google Logo

Proven, industry-aligned curriculum

If accountability, a set schedule, and dedicated classmates match your learning style, we suggest learning full-time. But if you have a packed schedule and flexibility is what matters most to you, we recommend choosing our part-time program.

No matter which pace you pick, you’ll learn our tried-and-true coding curriculum proven to help students land cybersecurity jobs and start promising careers in the cybersecurity industry.

What you’ll learn

Network Security

You’ll focus on the core ideas in network security.

The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning, and domain spoofing, as well as countermeasures.

You’ll then explore sniffing and port scanning, firewalls, IDSes, and NIDSes and cover wireless protocols and their security.

Concentric circles
What you’ll learn

System Security

You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system, and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.

Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows, and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits, and Android and iOS security.

Concentric circles
What you’ll learn

Python

You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.

Concentric circles
What you’ll learn

Governance, Risk, and Compliance (GRC)

You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.

The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.

Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.

Concentric circles
What you’ll do

Logs and Detection

You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.

Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.

Concentric circles
What You’ll Learn

Threat Intelligence

You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.

Concentric circles
What You’ll Learn

Application Security

You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.

Concentric circles
What You’ll Learn

Applied Cryptography

This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.

Concentric circles

Capstone

You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.

This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.

Concentric circles

An Exceptional Learning Experience

Flatiron School remains committed to helping our students succeed, land incredible jobs, and make the biggest impact possible. We’re also proud and honored to be recognized with several industry awards.

One cybersecurity engineering program, multiple ways to learn

What learning pace works best for you: full-time or at your own pace? We all have different learning styles and schedules — our structured full-time pace is the learning fast-track while our Flex program is designed for students planning to learn at a more flexible pace.

Full-Time

You’ll learn cybersecurity skills on a fixed full-time schedule: roughly 8 hours a day, Monday through Friday, for 15 weeks. You will interact with students and instructors, learning both collaboratively and solo.

  • 15 weeks long.
  • Daily touchpoints with your cohort, group work with instructor help, paired with programming sessions, lab time with instructional staff, and community support.
  • Best for students who want to learn in live lectures, keep a structured schedule, or who enjoy learning in a community with other students.
  • Available in-person and online.
  • Also known as our Live program.

Part-Time

You’ll learn cybersecurity skills on your own schedule over 40 weeks. You will have access to study groups and one-on-one instructor sessions.

  • 40 weeks long. Set your own hours.
  • Mostly recorded lectures, with optional live weekly lectures and office hours, weekly check-ins with instructors, chat with classmates and instructors via Slack.
  • Best for working professionals that need to fit classes into their already-busy schedule.
  • Available online only.
  • Also known as our Flex program.

Pick a start date that fits your schedule

Course Dates
Start Date Pace Location Discipline Status
December 2, 2024
Dec 2, 2024
Part-Time Online Cybersecurity Few Spots Left!
January 6, 2025
Jan 6, 2025
Part-Time Online Cybersecurity Open

Start a new career in as little as 15 weeks.

Meet our alumni who’ve changed their careers with Flatiron School

Samantha R., Entrepreneur, Alumna, and Author, Discusses “Bitcoin Pizza”

Meet Flatiron School alum and “Bitcoin Pizza” author, Samantha R.

 

Samantha R. - Former Flatiron Student

From TSA Security to Professional Software Engineer

Meet Flatiron School alum and Popmenu engineer, Deka Ambia.

Deka A. - Former Flatiron School student

How One Student’s Focus on the Goal Helped Him Find Community

Meet Flatiron School alum and FanConnect engineer, Anthony H.

Flatiron School Alumni and FanConnect engineer - Anthony H.

Join the 5000+ grads who have landed jobs in tech

As the job market changes, we’ve continued to provide students with career coaching support relevant for today’s job search challenges.

circles

Individual career coaching

During your job search, you’ll meet weekly with your dedicated Career Coach. Coaches help with everything from résumé review to interview prep, and help you tell your story to land your first job.

circles

Vast employer network

We’ve built relationships with hiring managers at top companies across the world, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly advocating for our grads and helping you get in the door.

circles

Proven job-search framework

Through 1-on-1 guidance from our Career Coaching team and our tried-and-true job-search framework, you’ll gain the skills and support you need to launch your career.

Meet your new community

Effective learning comes from connecting with people who are learning and teaching it. Since 2012, we’ve brought together passionate, experienced instructors and driven students to achieve incredible outcomes and careers.

What the application process looks like

Our application process is five steps from when you apply to when you begin preparing for class. After you apply, a member of our Admissions team will reach out to chat about your goals, and then you’ll be given some questions to assess how you approach problems and solutions. After that, you’ll receive your admissions decision.

How to Apply

Smiling female colleagues sit at desk in office talk brainstorm work together on laptop

Find the right tuition plan for you

We have 3 easy ways you can pay for tuition.

  • Pay upfront
  • Pay with a loan
  • NEW! Pay in installments – Pay in 12 monthly installments, with no interest
flatiron school student grad applying for jobs

Ready to start a career in tech?

Frequently asked questions about cybersecurity

On-campus programs are held full-time and you are expected to be on campus for each day of class. The online program uses the same curriculum, but gives you the added flexibility of studying from home.

No matter which program you sign up for, you can still visit campus to connect with fellow students and alumni, find quiet places to study and work, and attend networking and workshop events.

Cybersecurity engineering — sometimes called information security engineering or data security engineering, among other things — is the discipline of protecting devices, services, and networks from malicious digital attacks.

A cybersecurity engineer also designs and implements secure networks and ensures that the network and its attendant resources are protected from cyber-attacks.

Security engineers also regularly test and monitor security systems to ensure they are up to date and functioning properly. Organizations and/or individuals hire these engineers to help protect organizational data, sensitive and confidential information, financial/transactional information, and the reputation of the organization as a whole.

The responsibilities of a cybersecurity engineer have a lot of overlap with cybersecurity analysts, who are also tasked with protecting sensitive information.

Their main responsibilities vary, but often fall along these lines:

Learn more about the responsibilities of a cybersecurity engineer and the cybersecurity programming languages they use, and other cyber skills they need.

Learn more about becoming a cybersecurity engineer.

This all depends on your career ambitions. At Flatiron School, we recommend all graduates start with the CompTIA Sec+ certification and then pursuing others based on their desired career path.

Learn more about specific cybersecurity certifications and who should get them.

We get asked this a lot — and it’s a great question — and  we encourage you to think about what you mean by “worth it.” If “worth it,” to you, means attending a cybersecurity engineering bootcamp, learning the skills you need to become a cybersecurity engineer, and landing a job as one, then yes, good cyber engineering bootcamps are certainly worth it.

In fact, that’s what most bootcamps set out to help you do — and the best ones will indeed help you get there.

But if you’re simply looking to brush up on your cybersecurity knowledge without a goal to work in cyber, then a full-time or part-time bootcamp would not end up being worth it for you.

If you’re looking to join the cybersecurity field professionally, though, it’s a growing and lucrative field — and the best bootcamps can help you break into it.

Read more about whether or not cybersecurity bootcamps are worth it for you and your goals.

Our Cybersecurity Engineering program teaches people with some technical experience the skills they need to succeed in entry-level cybersecurity roles like security engineer, security analyst, and security consultant.

Strong candidates for our Cybersecurity Engineering program are detail-oriented with creative problem-solving skills. Candidates should have some working knowledge of programming languages and familiarity with Windows, Linux, and Unix operating systems. Technical ability is valued over formal education, though network engineering certifications or degrees in technology, math, or science are helpful. Candidates must have a high school diploma or equivalent.

The Flatiron School Career Services team exists to help get you hired. We do this in two ways:

  • Empowering stand-out job-seekers to learn to be no-brainer hires → this is what your Career Coach does!
  • Building a nationwide network of hiring partners → this is what the Employer Partnerships team does!

You will have an initial meeting with your career coach during the program to get acquainted with the process. Once you’ve graduated from the program you’ll work with your Career Coach on how to maximize your opportunities and efforts for landing a job. It is important to note that, like with our course, you must come prepared and committed. Your Coaches will help you to get organized and prepare you for interviews, but it is up to you to do the heavy lifting as well.

If you would like to connect with a member of our team, please simply schedule a chat with one of our admissions representatives.