Cybersecurity Bootcamp
Receive hands-on training in leading cybersecurity tools with the career support you need to make a living defending our digital world.

At a Glance
- Enrollment:
- Open enrollment
- Length:
- 36 weeks Part-time
- Format:
- Online
- Investment:
-
Get the technical skills, tactical knowledge, and career support you need to enter the cybersecurity field.
There is an unprecedented demand for qualified cybersecurity professionals to protect the amazing volume of sensitive information online. The growing field of cybersecurity offers practitioners a chance to help others, thwart hackers, and find work across a vast range of roles and industries.
In thirty-six weeks of guided learning, practical labs, and simulated cyberattacks with expert instructors, the University of Chicago Cybersecurity Bootcamp gives you a rock-solid foundation in cybersecurity concepts, best practices, and current technologies. Our program also helps you gain skills applicable to industry certifications. In addition to the core curriculum, we offer targeted classes in network and systems security, vulnerability assessment, risk mitigation, ethical hacking, and more.
Designed For
Designed for those looking to start a career in tech as well as for tech professionals who want to work in cybersecurity.
In four phases of project-based learning, you will:
- Gain an understanding of complex cybersecurity concepts like risk mitigation, data analysis, and forensics, as well as network security measures and the tools used to implement them.
- Apply the practical, technical, and theoretical skills used in the cyber sector.
- Study and gain skills applicable to the following certifications*:
- CompTIA CySA+
- CompTIA Network+
- CompTIA Security+
- (ISC)2 SSCP**
- AWS Certified Cloud Practitioner
- LPI Linux Essentials
* This program is not a certification test preparation program. Certification exams are not conducted as part of the curriculum and require an additional fee.
** Students must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.
4-week introductory Cybersecurity course
We offer a stand-alone Introductory Course to let you make an informed decision about enrolling in the University of Chicago Cybersecurity Bootcamp. Test-drive the structure and pacing of our program while learning cybersecurity fundamentals and receiving one-on-one attention from our expert instructors. At the end of the course, you take a summary exam to assess your skills and determine if the cybersecurity field is right for you.
Real Cybersecurity Career Support
Our bootcamp comes equipped with a dedicated career services team to provide interview coaching, job-placement assistance, resume and LinkedIn help, access to hiring partners, and more. Throughout the program, you can schedule one-on-one coaching sessions designed to evolve your personal brand as you increase your skills. Upon completion of the bootcamp, our career services team will help you pinpoint the best roles for your unique goals and help you in your job search.
Cybersecurity Bootcamp Program Structure
The Cybersecurity Bootcamp is divided into four phases. All students begin with the Introductory Course where they are introduced to networking and network security fundamentals, security on Linux and Microsoft platforms, offensive security, threats and threat actors, and more. If you wish to further develop your knowledge, you will move on to the bootcamp which covers three phases: Fundamentals, Cybersecurity Infrastructure, and Advanced Cybersecurity. Each phase of the bootcamp is broken down into comprehensive lessons.
- Learning Format: Live-Online Classes, Held on Evenings
- Program Duration: 36 Weeks | 4 Week Introductory Course | 32-Week bootcamp program
Career Benefits
A significant challenge faced by companies today is finding qualified professionals to fill open cybersecurity positions. Industries across the private sector, government agencies, and infrastructure are all in need of employees skilled in securing data and preventing breaches.
In fact, the overall U.S. tech sector workforce is expected to grow at twice the rate of the rest of the national labor market, with cybersecurity projected as the second-fastest growing employment sector.
Job openings for cybersecurity positions have grown 3x faster than the overall IT industry.
Employment in cybersecurity is projected to grow 33% from 2020 to 2030.
Projected number of cybersecurity job openings globally through 2025: 3.5 million.
Cybersecurity career paths
Our part-time, online program features a research-backed curriculum designed to open the door to multiple career options, including:
- Cyber Network Defender: Test, implement, and deploy infrastructure-related hardware and software while responding to crisis situations and reducing potential threats.
- Cybersecurity Analyst: Stay one step ahead of cyberattacks. Monitor systems to prevent data breaches and be quick on your feet to secure systems in the event of one.
- IT Security Manager: Be the gatekeeper of an organization’s IT infrastructure. Monitor, maintain, and implement security tools and protocols.
- Network Security Administrator: Eliminate threats and secure any weaknesses with protection strategies that ensure network-wide security.
- Network Operations Center (NOC) Technician: Proactively monitor critical network elements and maintain a company’s technical infrastructure.
- Security Operations Center (SOC) Analyst: Stop system-wide threats, assess safety measures, and determine ways to improve overall security.
- Vulnerability Assessment Analyst: Proactively identify vulnerabilities within applications and systems to stop future attacks.
4-Week Introductory Course | 32-Week Bootcamp Program
Introductory Course | 4 Weeks
The introductory course gives you an overview of the cybersecurity industry and the many career paths and opportunities that exist. In addition, the course outlines some of the core concepts in cybersecurity and previews how those concepts will be covered within the full bootcamp program. Upon completion, you will take an assessment exam and consult with an admissions advisor to determine if you are a good fit to continue to the full bootcamp and pursue a career in cybersecurity.
This course will immerse you in the context of business cybersecurity. It begins with the fundamentals of information security and risk management, moves on to network and software security, and introduces the concept and role of offensive security. You will finish the course with an understanding of how threats and threat actors operate within these frameworks.
Fundamentals Phase | 16 Weeks
In the Fundamentals Phase, your understanding of cybersecurity's bedrock principles will expand. This comprehensive exploration encapsulates numerous concepts that are critical to performing effectively as a cybersecurity professional: a thorough examination of networks and their operations, common operating systems, mechanisms of communication over networks, and the methods of data storage and usage in cloud environments.
Conclude this phase with a firm understanding of fundamental cybersecurity concepts.
Computer Networking Fundamentals | 4 Weeks | Online
This course serves as an in-depth primer on computer networking, equipping you with hands-on proficiency in configuring and safeguarding network devices for peak performance. Gain insights into network structures, protocols, and security measures while refining your skills in device configuration and troubleshooting. Through engaging, experiential activities, you will cultivate critical thinking and problem-solving capacities to address frequent networking quandaries.
You will also:
- Discover how various entities interface and interact in the digital realm.
- Grasp the diversity of networks and their profound influence on our interlinked world.
- Master the art of documentation related to configuration settings.
- Experience the significance of audits in maintaining the highest standards of network performance and safety.
- Recognize the critical role system and communication protection plays in information security.
- Learn to effectively modify and update policies in response to the ever-changing landscape.
The knowledge imparted in this course lays the groundwork for you to start your journey toward acquiring the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity.
Microsoft Security Systems Administration | 4 Weeks | Online
This course delivers practical training centered on safeguarding Microsoft Windows environments, equipping you with the tactical know-how to deploy security features and tools such as Microsoft Defender, BitLocker, and Windows Firewall. You will also learn to regulate and manage networks for optimal security and stability using system administration tools. Upon course completion, you will have a foundational understanding of Microsoft's infrastructure and the ability to establish and maintain secure Windows environments across various professional contexts.
You will also:
- Gain insights into the makeup of Microsoft's infrastructure and its constituent parts.
- Develop effective methods to shield Microsoft's infrastructure from potential hazards.
- Acquire the ability to administer diverse types of accounts corresponding to business roles.
- Explore strategies for preserving a secure and reliable network environment.
- Discover how automation and scripting can boost both security and efficiency in cybersecurity roles.
- Understand the role of Active Directory in managing permissions and regulating access to network resources.
- Learn to enhance system security and operational productivity using Powershell.
Securing Your Network | 4 Weeks | Online
In this course, you will continue to augment your knowledge of networks and explore various aspects of wired and wireless networks, including their inherent security challenges and vulnerabilities. The course will guide you through designing access controls, encompassing all facets of network security—from people and data to devices. You will also learn how to safely construct and fortify networks, discussing topics like cryptography and privacy restrictions.
You will also:
- Cultivate an understanding of network security measures and the requisite strategies for network protection.
- Start mastering techniques for effective network monitoring.
- Gain insights into how to proficiently manage system accounts.
- Understand how security attributes can fortify network defenses.
- Familiarize themselves with an array of common tools and technologies that bolster network safety.
- Develop the competence to construct a secure network architecture.
- Learn the rudiments of MHN networks and how to effectively implement them.
- Comprehend the interaction between Telnet and POP3 machines.
The knowledge gained in this course lays the groundwork for you to commence preparation for the following certification*: CompTIA®
Integrating Your Infrastructure Security | 4 Weeks | Online
In this course, you will cultivate the skills needed to proficiently manage Linux operating systems, apply rudimentary Python programming, delve into cloud computing, and strengthen system defenses against threats and vulnerabilities. You will also learn to monitor, detect, and analyze threats and vulnerabilities within these settings while also developing an understanding of remediation strategies. Additionally, you will begin building knowledge of the transformative role DevSecOps plays in the cybersecurity domain.
You will also:
- Cultivate a comprehensive understanding of Linux operating system management and the monitoring, detection, and analysis of threats and vulnerabilities in Linux and cloud-based settings.
- Receive an introduction to Python programming.
- Develop a foundational understanding of cloud computing settings and generate an instance using Amazon Web Services (AWS).
- Comprehend remediation strategies and methods to communicate protection measures to safeguard other systems.
- Learn to design automations for efficient system management and protection.
- Investigate the design tenets of scalable cloud solutions and the integration of various settings.
- Become conversant with DevSecOps.
Infrastructure Phase | 4 Weeks
Designing Your Cybersecurity Infrastructure | 4 Weeks | Online
This course delves deeply into the critical components of defending endpoint devices, enforcing data loss prevention methodologies, and employing advanced instruments and strategies to protect an organization's digital resources. By the course's conclusion, you will have a holistic understanding of endpoint device defense, data loss prevention, and the security implications for industrial systems and IoT devices.
You will also:
- Investigate endpoint devices to comprehend how to assess, recognize threats to, and secure them.
- Learn to record and monitor configurations and tool choices.
- Understand how to devise rules and constraints that shield endpoint devices from potential damage.
- Discover how to collaborate with external information systems while preserving the security of endpoint devices.
- Develop the competency to enforce data loss prevention techniques.
- Become conversant with the threats and security measures associated with Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).
The knowledge imparted in this course lays the groundwork for you to begin preparation for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP.
Social Engineering and Ethical Hacking | 4 Weeks | Online
In the Social Engineering and Ethical Hacking course, you will delve into the psychology of hackers and grasp the principles of game theory as applicable to cybersecurity defense and strategies. By the course's conclusion, students will understand social engineering tactics and the fundamentals of ethical hacking, enabling them to bolster cybersecurity defenses and guard against potential threats.
You will also:
- Gain an understanding of the motivations and actions of prospective attackers.
- Develop insights into how adopting a malicious hacker’s perspective can fortify system security.
- Discover how ethical hacking can proactively fortify applications, systems, and organizational infrastructure.
- Investigate how reconnaissance, penetration testing, and evasion of defense systems can contribute to system safety.
- Learn to identify vulnerabilities in web applications and cloud-based systems.
- Cultivate the ability to effectively communicate risks and suggest defense strategies.
- Understand how social engineering techniques can manipulate individuals.
The knowledge gained in this course helps prepare you for the following certifications*: CompTIA® CySA+, PenTest+.
Digital Forensics and Incident Response | 4 Weeks | Online
The Digital Forensics and Incident Response course gives you the vital tools needed to efficiently counter attacks, perform investigations, collect evidence, and generate detailed reports. Upon course completion, you will know how to address incidents, conduct investigations, and report findings. These abilities will aid you in identifying, scrutinizing, and brainstorming about security incidents to avert future violations.
You will also:
- Engage in the rudiments of offensive security.
- Acquire an understanding of digital forensics fundamentals.
- Investigate file recovery strategies and the retrieval of stolen data.
- Learn to proficiently manage various types of attacks directed at organizations.
- Gain insights into the strategies attackers employ to gain access to critical systems and data.
- Explore the basics of malware analysis to improve your capacity to identify and neutralize potential threats.
The knowledge imparted in this course prepares you to start your journey toward the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP.
Threat Hunting and Intelligence | 4 Weeks | Online
The Threat Hunting and Intelligence course arms you with the necessary knowledge to detect and neutralize vulnerabilities in an organization's infrastructure. By the end of the course, you will be able to recognize vulnerabilities, react to threats, and formulate solid plans to protect an organization's infrastructure.
You will also:
- Cultivate an extensive understanding of the threats and vulnerabilities that can surface within an organization's network infrastructure, including hardware devices, software applications, and network services.
- Improve their capacity to proactively pinpoint and respond to threats, thereby promoting a proactive security stance.
- Gain the knowledge and skills to design effective plans and procedures to handle security situations efficiently, ensuring a rapid and coordinated response.
- Develop the ability to evaluate information sources and tools, allowing them to bolster their defense tactics.
The knowledge acquired in this course prepares you to start your preparation for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP.
Complimentary Career Preparation Courses
Elective CompTIA® Security+ Certification Exam Prep Course | 8 Weeks | Online
The University of Chicago Professional Education Cybersecurity Bootcamp includes an optional CompTIA® Security+ Exam Preparation Course** designed to prepare you for this highly-valued industry certification. A voucher for the CompTIA® Security+ certification exam is included.
Highlights of this course include:
- Begin building a foundation of crucial knowledge required in any cybersecurity role and is the only basic cybersecurity certification that underscores hands-on practical abilities.
- A globally acknowledged certification that instills the essential knowledge required in the sector and serves as a launchpad for mid-level cybersecurity positions.
Optional Career Outcomes | 15 Hours
Our final course focuses on helping you put your best foot forward as you prepare to enter the cybersecurity field. This course delivers one-on-one interview coaching and individual advising sessions on your LinkedIn profile and resume.
Modules:
- Resume and LinkedIn Profile-Building
- Interview Skill-Building
- Job-Search Strategies and the Power of Networking
*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.
**The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.
Prepare for Internationally Recognized Certification Exams
This bootcamp is not a certification-prep program. However, our program can help you gain skills and knowledge applicable to industry certifications. To assist you with expanding your credentials beyond our program, you will have access to a curated library of resources that can further help you prepare for cybersecurity certification exams. To become a standout candidate, we recommend that you obtain one certification in every phase of the program.
LPI Linux Essentials
The Linux LPI Essentials exam verifies your understanding of the open-source Linux operating system and practical knowledge of various open-source applications. The exam measures your ability to manage users and groups, as well as your competency with Linux command line, permissions, security, basic networking configuration, and administration.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam should be considered by individuals with knowledge of AWS Cloud and its infrastructure. Experience with security and compliance aspects of the platform will be a crucial requirement both for passing the exam and proving your competence to potential employers.
CompTIA® Network+
The CompTIA® Network+ certification exam requires you to know how to configure, manage, and troubleshoot a variety of network devices. The exam also expects you to be familiar with emerging cloud, communication, mobile, and virtualization technologies.
CompTIA® CySA+
This certification is crafted to offer a more intensive focus on applying behavioral analytics to networks at an intermediate level than the CompTIA® Security+ exam. It encapsulates essential cybersecurity skills while highlighting the importance of software and application security. Furthermore, it covers automation, threat hunting, and industry IT compliance.
(ISC)² SSCP
For those who achieved one year of experience—Post-Program Completion.
The (ISC)² SSCP certification is ideal for those with proven technical and practical, hands-on security knowledge. Individuals with this certificate have proof they can implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures.
GIAC Security Essentials
The GIAC Security Essentials (GSEC) certification confirms a practitioner's understanding of information security beyond mere terms and concepts. Those holding a GSEC certification are illustrating that they are competent in hands-on roles related to security operations within IT systems.
GIAC Incident Handler
The GIAC Incident Handler certification corroborates a practitioner's capacity to identify, react to, and resolve computer security incidents employing an array of critical security skills. Holders of the GCIH certification possess the requisite knowledge to handle security incidents, underpinning this with an understanding of typical attack methodologies, vectors, and tools, and are
Certified Information Security Manager® (CISM®)
In the face of data breaches, ransomware attacks, and other incessantly changing security threats that are a constant concern for today's IT professionals, a Certified Information Security Manager® (CISM®) certification empowers you with the ability to evaluate risks, enforce efficient governance, and actively manage incidents.
*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.
**The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.
Invest in Your Future with the GI Bill® Benefit
Whether you are thinking about changing careers, looking to increase your salary, or seeking to better your work-life balance with a remote job, as a veteran, you can now use your GI Bill® Benefit to pay for your education in University of Chicago Professional Education’s Online Cybersecurity Bootcamp.
A Future in Cybersecurity Is Waiting
Consider an in-demand career path in cybersecurity after your service and build the job-ready skills you need to secure our digital world. Take the first step on your journey to success with a VA-approved, non-credit Cybersecurity Bootcamp. From easy enrollment to beneficial career support, this online bootcamp offers you everything you need for a smooth career transition—in less than a year.
How to Enroll
We hope you can utilize your veterans benefits to attend the University of Chicago Professional Education Cybersecurity Bootcamp.
Follow these steps and get started today:
- Determine which VA benefits are the best fit for you by emailing your Office for Military Affiliated Communities (OMAC) representative at the University of Chicago at veterans@uchicago.edu.
- Complete the Veteran Benefit Information and Application form and return it to veterans@uchicago.edu. Please include a copy of your Certificate of Eligibility or print screen from ebenefits showing your eligibility for VA benefits when you do reach out.
- Apply to the bootcamp program through our website.
- Speak with an admissions advisor by scheduling an appointment using our online scheduler.
FAQs About GI Bill® Benefits
Transform your military skills into cybersecurity expertise in less than a year.
Explore Our Frequently Asked Questions
Can I use my GI Bill® benefit for non-credit programs and prep courses like the Cybersecurity Bootcamp?
Yes, we now accept GI Bill® benefits for the non-credit Cybersecurity Bootcamp. Please visit UChicago's veteran benefits page to learn more.
You can also view the VA's Preparatory Course Fact Sheet for any questions regarding what is covered under the reimbursement.
How much tuition is covered by the GI Bill®?
Your benefits will depend on a few different factors. We encourage you to contact your OMAC representative at the University of Chicago at veterans@uchicago.edu for more information and to learn about your eligibility for education benefits and options.
- View rates and eligibility for the Post-9/11.
- View rates and eligibility for Chapter 35.
- If eligible for either of the Post-9/11 or the Chapter 35, learners must complete VA form 22-1027.
What if I am not a veteran, but a veteran’s spouse or dependent?
You may still qualify. Determine which VA benefits are the best fit for you by contacting your Office for Military-Affiliated Communities (OMAC) representative at the University of Chicago representative at veterans@uchicago.edu.
I’m already enrolled in The University of Chicago Professional Education Cybersecurity Bootcamp. Can I use my VA benefits if I am eligible?
You may still be eligible for reimbursement even if you are already enrolled or have finished the program. The program’s approval for VA benefits applies to the 2023-2024 academic year, beginning September 1, 2023. You may be eligible to receive reimbursement for tuition on the coursework that you have done after that date. Please reach out to the University of Chicago’s OMAC representative at veterans@uchicago.edu to learn more.
Is it correct that once I start the Cybersecurity Bootcamp Intro Course, I would need to complete the entire Cybersecurity Bootcamp to be reimbursed by the VA?
Yes, this is correct.
Am I still eligible for benefits if I transfer cohorts?
All transfers must be approved by the program team, which will determine whether you are eligible for a transfer. Then, you must contact the University’s OMAC representative, who will determine benefits eligibility and any next steps, such as reapplying for your certificate of eligibility.
Who do I talk to if I have more questions about my GI Bill® benefit?
Please contact your OMAC representative at the University of Chicago at veterans@uchicago.edu with any additional questions not addressed.
Your Next Mission Awaits
Seize this opportunity to advance your career and safeguard the digital world. Maximize Your military benefits and enroll in UChicago's Cybersecurity Bootcamp today.
Learn More about Our Digital Skills Bootcamps Today
Do you have questions about the University of Chicago Professional Education Cybersecurity Bootcamp? Our team is ready to discuss the program and answer your questions regarding our registration process. Connect with our program advisors by emailing us at professionaladmissions@uchicago.edu.