Learn Ethical Hacking, Network Defense, and Digital Forensics
- Complete in 9 months
- Curriculum developed by EC-Council, known as the world’s largest technical cyber security certification body
- Option to earn 3 EC-Council cyber security certifications (in addition to our certificate)
- Financing options available, including Federal Student Aid
- Tuition: $10,000 (voucher to take EC-Council certification exams included)
Online Cybersecurity Bootcamp Style Certificate Program Overview
With cybercrime on the rise, organizations of all types – from financial institutions to government agencies – are putting their cyber security efforts at the forefront of their technology initiatives. Information security professionals and ethical hackers are in high demand. In the Kenzie Academy Certificate in Cybersecurity program from Southern New Hampshire University you'll learn how to protect computer and networking systems, safeguard web applications, detect security threats and defend against cyber attacks, while preparing to enter the field.
The curriculum for this program was developed by the International Council of E-commerce Consultants (EC-Council), known as the world’s largest technical cyber security certification body. EC-Council also created the globally recognized Certified Ethical Hacker (CEH standards) and coined the phrase “ethical hacking” in 2001. This means you’ll gain world-class training built for ethical hackers.
Benefits of the Certificate in Cybersecurity Program
Kenzie Academy program courses are designed to:
- Help prepare you to take the following EC-Council certification exams: Network Defense Essentials, Ethical Hacking Essentials and Digital Forensics Essentials. Voucher to take these exams are included as part of tuition. Attaining these 3 EC-Council certifications can help position you for success in entry-level roles. You may also gain additional experience that could help prepare you for more rigorous cyber security certifications offered by EC-Council.
- Empower you with optional sessions led by Subject Matter Experts (SMEs) who can help reinforce hard topics and answer questions. These sessions also present opportunities to collaborate and study with peers.
- Earn a tech certificate faster, but learn more than you would in a typical 12- to 24-week bootcamp. This 9-month program offers the right balance between a traditional bootcamp and degree program - so you can get ready to advance your career.
Cybercrime is quickly evolving — and organizations need more digital security professionals and ethical hackers to keep up. As a result, there’s high job market demand for qualified, skilled workers in these areas including cyber, technical support, and penetration testing, as well as IT, network and information security.
According to the U.S. Bureau of Labor Statistics, there were over 163,000 information security jobs in 2021.1 These numbers are also projected to increase by 35% through 2031 – much faster than national average for all occupations.1
With the prevalence of data breaches and ransomware attacks, the need for digital security professionals expands across all industries, including healthcare, finance, hospitality, retail and more.
In addition to providing cyber literacy and training, this Kenzie Academy program includes three career prep and job-readiness courses to help you achieve professional success.
- Foundations in Cybersecurity: Create initial drafts of tech-focused career artifacts and enhance your ability to market yourself through guided exercises.
- Exploration in Cybersecurity: Gain skills to navigate job searching for technical careers. Build social capital and explore interview success strategies, self-promotion techniques, relevant resources for job searching and more.
- Portfolio: Finalize your resume, LinkedIn and portfolio. These artifacts can map to your specific job search and refine your self-marketing strategy as you start to look for opportunities.
By completing these courses, and getting support from Career Services, you’ll be equipped with the tools, techniques and resources you need to confidently start your job search.
Courses & Curriculum
You’ll complete three terms: Network Defense Essentials, Ethical Hacking Essentials and Digital Forensics Essentials, which amount to 12 courses. 9 of those courses include:
- Network Security Controls
- Cloud, Network and Device Security
- Data Security
- Ethical Hacking Fundamentals
- Cyber Attack and Countermeasures
- Cyber Threats, Countermeasures and Testing
- Computer Forensics Fundamentals
- Operating Systems Forensics
- Dark Web and Malware Forensics
The remaining 3 courses focus on career prep, job search strategies and optimizing a tech job search toolkit.
To learn more about the cyber security courses, curriculum and program outcomes, visit the Online Academic Catalog.
As part of the program, you will also engage in hands-on experiential learning and complete a research project that mimics a real-world scenario:
- iLabs from EC-Council: Gain practical, hands-on training by learning within an environment where you can work with advanced technologies and practice managing cyber situations. iLabs include pre-configured vulnerable websites, hidden victim machines, vulnerable and unpatched operating systems, fully networked environments, forensic cases and files with hard disks and more.
- Summative Research Project: Strengthen your problem-solving, critical thinking and research skills by completing three summative assessment research projects. For each project, you will assume an executive leadership role and conduct a needs assessment of an industry-leading organization. Then, based on the given scenario, you will leverage resources from courses and craft a security proposal.
By engaging in real-world projects within an immersive learning environment, you'll gain skills and knowledge to pursue a career in the field.
|View Full Curriculum in the Catalog|
|Certificate in Cybersecurity Online|
|Courses May Include|
|Certificate in Cybersecurity|
|CYB 101||Network Security Controls Network Security: Administrative,||Students will be introduced to Network Security Fundamentals, Identification, Authentication, and Authorization, and Administrative, Physical, and Technical Network Security Controls. Students will learn through hands-on practical application by implementing Role-Based Access Control in Windows Admin Center (WAC), Password Policies Using Windows Group Policy, host-based firewall functionality using Windows Firewall, network-based IDS functionality using Snort IDS, Proxy Server Using Squid Proxy, and establishing a VPN Connection using OpenVPN. Enrollment in the Cybersecurity certificate program required.|
|CYB 102||Cloud, Network, and Device Security||Students will be introduced to Virtualization and Cloud Computing, Wireless Network Security, Mobile Device Security, IoT Device Security, and Cryptography and PKI. Students will learn through hands-on practical application by auditing Docker Host Security Using Docker-Bench-Security Tool, implementing AWS Identity and Access Management, Key Management Services, and Enterprise Mobile Security Using Miradore MDM Solution. They'll configure Security on Wireless Router, secure IoT Device Communication Using TLS\SSL, and calculate One-way Hashes using HashCalc, MD5 Hashes using MD5 Calculator, and MD5 Hashes using HashMyFiles. Lastly, they'll Create and Use Self-signed Certificates. Enrollment in the Cybersecurity certificate program required.|
|CYB 103||Data Security||Students will be introduced to Data Security and Network Traffic Monitoring. Students will learn through hands-on practical application by performing Disk Encryption using VeraCrypt and File Encryption using Advanced Encryption Package, capturing Network Traffic using Wireshark, analyzing and examining Various Network Packet Headers using Wireshark and Linux using tcpdump, and applying Various Filters in Wireshark. They'll complete file recovery using EaseUS Data Recovery Wizard and will detect Clear-Text Traffic using Wireshark. Enrollment in the Cybersecurity certificate program required.|
|CYB 121||Ethical Hacking Fundamentals||Students will be introduced to the fundamentals, threats, and vulnerability of Information Security and useful countermeasure techniques. Students will learn through hands-on practical application by footprinting to gather information about a target and extracting usernames, machine names, network resources, sharks, and more from a system or network. They'll create malware to gain access to and infect a targeted system and will perform various functions to crack and sniff user credentials to system passwords. Enrollment in the Cybersecurity certificate program required.|
|CYB 130||Cybersecurity Portfolio Optimization||Students will prepare for their approaching job search by revisiting and optimizing their career artifacts and previously established job search strategies. Through segmented guidance and practical, scaled application of tools and tips, students will begin to map their artifacts to their specific job search and add new, individualized skills to their job search approach. Students will leverage the synchronous and asynchronous guidance, exercises, and tools to complete this module with a refined self-marketing strategy, a plan for continued optimization of their career artifacts, and an understanding of their next steps to enter their job search with Career Services supports. Enrollment in the Cybersecurity certificate program required.|
|CYB 203||Dark Web and Malware Forensics||Students will be introduced to dark web and malware forensics and email crime. Students will learn through practical application by analyzing RMA dump and examining TOR browser artifacts and performing status analysis and examination of suspicious files and documents, and emails. Enrollment in the Cybersecurity certificate program required.|
|Total Credits: 18|
Frequently Asked Questions
Are online coding bootcamps or bootcamp style certificates programs worth it?
The short answer is: yes. Many see a typical cyber security bootcamp as a way to prepare for entry-level roles in far less time than a 2- or 4-year degree program. This can be attractive for those looking to prove their skills to employers in a shorter time frame.
That said, the 9-month Kenzie Academy program uniquely combines the benefits of a traditional tech bootcamp and a degree program. The curriculum is designed to ensure you learn the specific areas of ethical hacking, network defense or digital forensics in depth and engage in real-world scenarios within a timeframe that sets you up for success. You'll also get more support, and the ability to fast track your pathway, so you can enter the workforce with confidence.
Which cyber security bootcamp is the best?
While this is generally dependent on each learner’s specific needs, most bootcamps have a wide variety of advantages. This bootcamp style program takes longer than a traditional bootcamp, helping better prepare learners for the tech industry. In addition, the Learner Success and Career Services teams offer support before and after graduation.
With over 500 reviews, Kenzie Academy programs have a 4.9 out of 5 rating in Career Karma, placing these programs at the top of the list of best bootcamps.2
Can you get a job with a cyber security bootcamp?
Nontraditional educational pathways have steadily become more accepted and respected by hiring managers and recruiters across tech. Ultimately, the training, skills and knowledge you receive through a bootcamp style Kenzie Academy program are essential preparation for an entry-level position in cyber security.
How long does a cyber security bootcamp take?
You can learn cyber security fundamentals at a tech bootcamp in under a year and sometimes in as little as 10 weeks. The Kenzie Academy certificate program provides a strong foundation and career readiness in the field within 9 months.
To further develop your skills and knowledge, you may also choose to continue your education. You could even apply transfer credits, after completing the certificate program, toward a degree program. SNHU, for example, offers both Associate of Science in Cyber Security and Bachelor of Science in Cyber Security degrees.
What do you need to know about a cyber security bootcamp?
Cyber security bootcamps provide education that covers areas such as network security and defense, data security and digital forensics. They’re immersive programs designed to help learners as they make their way to entry-level positions in cyber security and help prepare them for any future cyber security certifications.
How can you tell if your cyber security bootcamp is reputable?
There are several signs that indicate if a cyber security bootcamp is reputable. First, an immersive cyber security bootcamp should not be completed in a matter of one or two weeks. In fact, most reputable bootcamps take at least 8 weeks to complete. They should also be led by qualified instructors and prepare learners for certification evaluations. Additionally, cyber security bootcamps should offer some career seeking assistance. Our programs were designed to meet and surpass all these requirements. Not to mention, our bootcamp style education is from Southern New Hampshire University, accredited by the New England Commission of Higher Education, Inc. (NECHE).
What is an ethical hacker?
An ethical hacker, or white hat, assumes the role of a malicious cybercriminal, or black hat, and attempts to access personal data, computer systems, networks, web applications and infrastructure. Owners authorize these security experts to execute hacking strategies from the perspective of the intruder to expose any security vulnerabilities and evaluate the potential for malicious activities. Their mission is to uncover any vulnerabilities, so the organization can take offensive measures to proactively resolve these weaknesses and prevent future cyber attacks.
Keep in mind, the cyber security industry has traditionally used the terms “white hat” and “black hat” to refer to the opposing sides of hacking. However, the community has begun replacing what can be considered offensive terminology with terms such as “ethical hacker” and “malicious hacker.”
Can I get an ethical hacking certificate online?
Yes! This Kenzie Academy program is 100% online. This program also includes EC-Council’s Ethical Hacking Essentials virtual course and lab that will help prepare you for the CEH certification exam.
How do you become a certified ethical hacker?
You must earn the Certified Ethical Hacker (CEH) credential. One way is to complete the Ethical Hacking Essentials training course and passing the CEH exam administered by EC-Council.
Sources & Citations (1, 2)
1Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, on the internet, at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (viewed Jan. 3, 2023).
Cited projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.
2Career Karma, Best Cyber Security Bootcamps to Learn Cyber Security, on the internet, at https://careerkarma.com/rankings/best-cyber-security-bootcamps/ (viewed Jan. 3, 2023).