Proven, industry-aligned curriculum
If accountability, a set schedule, and dedicated classmates match your learning style, we suggest learning full-time. But if you have a packed schedule and flexibility is what matters most to you, we recommend choosing our part-time program.
No matter which pace you pick, you’ll learn our tried-and-true coding curriculum proven to help students land cybersecurity jobs and start promising careers in the cybersecurity industry.
You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning, and domain spoofing, as well as countermeasures.
You’ll then explore sniffing and port scanning, firewalls, IDSes, and NIDSes and cover wireless protocols and their security.
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system, and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows, and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits, and Android and iOS security.
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
Governance, Risk, and Compliance (GRC)
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
Logs and Detection
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
You’ll learn cybersecurity skills on a fixed full-time schedule: roughly 8 hours a day, Monday through Friday, for 15 weeks. You will interact with students and instructors, learning both collaboratively and solo.
- 15 weeks long.
- Daily touchpoints with your cohort, group work with instructor help, paired with programming sessions, lab time with instructional staff, and community support.
- Best for students who want to learn in live lectures, keep a structured schedule, or who enjoy learning in a community with other students.
- Available in-person and online.
- Also known as our Live program.
You’ll learn cybersecurity skills on your own schedule over 40 weeks. You will have access to study groups and one-on-one instructor sessions.
- 40 weeks long. Set your own hours.
- Mostly recorded lectures, with optional live weekly lectures and office hours, weekly check-ins with instructors, chat with classmates and instructors via Slack.
- Best for working professionals that need to fit classes into their already-busy schedule.
- Available online only.
- Also known as our Flex program.
Pick a start date that fits your schedule
|April 3, 2023||Full-Time||15 weeks||Online||Cybersecurity||Open||Apply|
|April 3, 2023||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|May 15, 2023||Full-Time||15 weeks||Online||Cybersecurity||Open||Apply|
|May 15, 2023||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
|June 26, 2023||Full-Time||15 weeks||Online||Cybersecurity||Open||Apply|
|June 26, 2023||Part-Time||40 weeks||Online||Cybersecurity||Open||Apply|
Meet our alumni who’ve changed their careers with Flatiron School
Join the 5000+ grads who have landed jobs in tech
As the job market changes, we’ve continued to provide students with career coaching support relevant for today’s job search challenges.
Individual career coaching
During your job search, you’ll meet weekly with your dedicated Career Coach. Coaches help with everything from résumé review to interview prep, and help you tell your story to land your first job.
Vast employer network
We’ve built relationships with hiring managers at top companies across the world, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly advocating for our grads and helping you get in the door.
Proven job-search framework
Through 1-on-1 guidance from our Career Coaching team and our tried-and-true job-search framework, you’ll gain the skills and support you need to launch your career.
Meet your new community
Effective learning comes from connecting with people who are learning and teaching it. Since 2012, we’ve brought together passionate, experienced instructors and driven students to achieve incredible outcomes and careers.
What the application process looks like
Our application process is five steps from when you apply to when you begin preparing for class. After you apply, a member of our Admissions team will reach out to chat about your goals, and then you’ll be given some questions to assess how you approach problems and solutions. After that, you’ll receive your admissions decision.
How to Apply
Find the right tuition plan for you
We have 3 easy ways you can pay for tuition.
- Pay upfront
- Pay with a loan
- NEW! Pay in installments – Pay in 12 monthly installments, with no interest
On-campus programs are held full-time and you are expected to be on campus for each day of class. The online program uses the same curriculum, but gives you the added flexibility of studying from home.
No matter which program you sign up for, you can still visit campus to connect with fellow students and alumni, find quiet places to study and work, and attend networking and workshop events.
Cybersecurity engineering — sometimes called information security engineering or data security engineering, among other things — is the discipline of protecting devices, services, and networks from malicious digital attacks.
A cybersecurity engineer also designs and implements secure networks and ensures that the network and its attendant resources are protected from cyber-attacks.
Security engineers also regularly test and monitor security systems to ensure they are up to date and functioning properly. Organizations and/or individuals hire these engineers to help protect organizational data, sensitive and confidential information, financial/transactional information, and the reputation of the organization as a whole.
The responsibilities of a cybersecurity engineer have a lot of overlap with cybersecurity analysts, who are also tasked with protecting sensitive information.
Their main responsibilities vary, but often fall along these lines:
- Implementing security measures and infrastructure to protect organizational data and resources
- Ensuring adequate security measures and protocols are in place
- Troubleshooting network and security issues
- Testing and identifying network vulnerabilities
- Responding to security breaches with their SOC team comprised of cybersecurity analysts, pen testers, security consultants, cyber threat analysts, and sometimes compliance analysts.
Learn more about becoming a cybersecurity engineer.
This all depends on your career ambitions. At Flatiron School, we recommend all graduates start with the CompTIA Sec+ certification and then pursuing others based on their desired career path.
Learn more about specific cybersecurity certifications and who should get them.
We get asked this a lot — and it’s a great question — and we encourage you to think about what you mean by “worth it.” If “worth it,” to you, means attending a cybersecurity engineering bootcamp, learning the skills you need to become a cybersecurity engineer, and landing a job as one, then yes, good cyber engineering bootcamps are certainly worth it.
In fact, that’s what most bootcamps set out to help you do — and the best ones will indeed help you get there.
But if you’re simply looking to brush up on your cybersecurity knowledge without a goal to work in cyber, then a full-time or part-time bootcamp would not end up being worth it for you.
If you’re looking to join the cybersecurity field professionally, though, it’s a growing and lucrative field — and the best bootcamps can help you break into it.
Read more about whether or not cybersecurity bootcamps are worth it for you and your goals.
Our Cybersecurity Engineering program teaches people with some technical experience the skills they need to succeed in entry-level cybersecurity roles like security engineer, security analyst, and security consultant.
Strong candidates for our Cybersecurity Engineering program are detail-oriented with creative problem-solving skills. Candidates should have some working knowledge of programming languages and familiarity with Windows, Linux, and Unix operating systems. Technical ability is valued over formal education, though network engineering certifications or degrees in technology, math, or science are helpful. Candidates must have a high school diploma or equivalent.
The Flatiron School Career Services team exists to help get you hired. We do this in two ways:
- Empowering stand-out job-seekers to learn to be no-brainer hires → this is what your Career Coach does!
- Building a nationwide network of hiring partners → this is what the Employer Partnerships team does!
You will have an initial meeting with your career coach during the program to get acquainted with the process. Once you’ve graduated from the program you’ll work with your Career Coach on how to maximize your opportunities and efforts for landing a job. It is important to note that, like with our course, you must come prepared and committed. Your Coaches will help you to get organized and prepare you for interviews, but it is up to you to do the heavy lifting as well.