WHY CYBERSECURITY?

  • High Demand

    As cyberattacks are on the rise and the tech workforce gap continues to grow, the information security industry needs trained professionals.

  • Diverse Career Paths

    The cybersecurity field has a variety of opportunities and allows people of all interests and backgrounds to pursue a career path that fulfills them.

  • Competitive Salary

    Employers are motivated to attract and retain talent, meaning organizations pay more for skilled security professionals, even at the entry-level.

TRAIN WITH TOP
INDUSTRY TOOLS

Develop your information security skills across software and
programs cybersecurity professionals are using right now.

Splunk
X
Splunk

Splunk

You will use this Security Information and Event Management (SIEM) tool to perform security log investigations by linking with multiple systems in an environment, providing visibility into any malicious activity happening.

Windows
X
Windows

Windows

Windows is the most commonly used desktop operating system in the world. You will be exposed to the inner workings of domains, active directory, and policies utilized in corporate environments.

Kali Linux
X
Kali Linux

Kali Linux

Not to be confused with the Linux operating system, Kali Linux is an advanced Linux distribution used for penetration testing, ethical hacking, and network security assessments that you will use during the program.

Linux
X
Linux

Linux

Linux is an open-source and community-developed operating system used worldwide and will be utilized throughout the program and your professional career.

Python
X
Python

Python

You will utilize this high-level, general-purpose programming language to learn coding fundamentals that will be integral in your cybersecurity career.

Wireshark
X
Wireshark

Wireshark

This free and open-source packet analyzer is commonly used in the cyber industry. You will perform network analysis and learn how to take resulting files and analyze them with other security tools presented in the program.

Snort IDS
X
Snort IDS

Snort IDS

Snort IDS is used for monitoring networks or systems for malicious activity or policy violations. Using it, you will learn how Intrusion Detection Systems (IDS) function and how they are implemented in a secure environment.

OUR BOOTCAMP BENEFITS

In-Depth Instruction

Multiple instructors are present in every live cyber training session to give each learner the attention they need. Bringing years of experience directly into the classroom, our experts provide additional support outside of class in office hours and Q&A sessions.

No Prerequisites

Our program does not require a degree or tech experience. Our curriculum ensures comprehension and competency of even advanced cybersecurity topics. Attend live classes and access recorded sessions any time to revisit a topic you want to reinforce.

Less Than a Year

The UF OPWD Cybersecurity Bootcamp is an online, part-time professional program designed to be completed in 36 weeks, followed by an elective 8-week CompTIA® Security+ Exam Prep Course. We focus on in-depth training via live classes on a part-time evening schedule to prepare even the most beginner learners for a successful career.

PERSONALIZED SUPPORT AT EVERY STEP

Comprehensive Career Assistance

Networking Advantages

Build valuable connections with industry professionals throughout the program and during scheduled professional networking events.

Dedicated Support

Our expert career coaches can support learners in optimizing their resume and LinkedIn profile for up to 6 months after program completion.

Professional Coaching

Learners can receive one-on-one standard and technical interview support to prepare for their cybersecurity career after program completion.

Learn more about your career support options.

CYBERSECURITY
TRAINING OVERVIEW

4-Week Introductory Course |
32-Week Complete Program

  • Introductory Course

    Our 4-week-long introductory course offers a unique opportunity to explore our online Cybersecurity Bootcamp before you commit to the full program. Learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle.

    The course lets you experience how classes and interactions flow in our online learning environment, giving you all the information you need to make a confident and informed decision about enrolling in the program. At the end of the course, you take a summary exam to assess your skills and determine if the cybersecurity field is right for you.
  • Fundamentals Phase

    Throughout the Fundamentals Phase, you will dive deeper into the foundations of cybersecurity. This deep dive will include a number of concepts needed in order to secure and defend as a cybersecurity professional: an exploration of networks and their functions, common operating systems, how devices communicate over networks, as well as how data is stored and utilized in the cloud.

    Complete this phase with a foundational understanding of essential cybersecurity concepts.
  • Computer Networking Fundamentals

    This course offers a comprehensive introduction to computer networking, providing practical experience in configuring and managing network devices for optimal performance and security. Learners will gain an understanding of network architectures, protocols, and security while honing their device configuration and troubleshooting skills. Through hands-on activities, they will apply critical thinking and problem-solving skills to address common networking challenges.

    Learners will:
    • Learn how different entities connect and interact across digital landscapes.
    • Gain an understanding of the various types of networks and their impact on our interconnected world.
    • Harness the power of configuration settings documentation.
    • Be exposed to the role of audits in ensuring optimal network performance and security.
    • Find out why system and communications protection plays a pivotal role in safeguarding information.
    • Learn how to effectively update and adapt policies to keep pace with the ever-evolving landscape.


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠
  • Microsoft Security Systems Administration

    This course offers hands-on training focused on securing Microsoft Windows environments, providing learners with the practical knowledge and skills needed to implement security features and tools, including Microsoft Defender, BitLocker, and Windows Firewall. They will also be able to configure and manage networks to ensure security and stability using system admin tools. By the end of the course, participants will understand the basics of Microsoft’s infrastructure and be able to implement and maintain secure Windows environments in various professional roles.

    Learners Will:
    • Gain an understanding of Microsoft's infrastructure and its components.
    • Learn effective strategies to protect Microsoft's infrastructure from potential threats.
    • Develop skills to manage various types of accounts based on business function.
    • Explore ways to maintain a secure and safe network environment.
    • Discover how automations and scripting can enhance both security and efficiency in cybersecurity roles.
    • Understand how Active Directory helps manage permissions and control access to network resources.
    • Learn how to improve system security and operational efficiencies with Powershell.
  • Securing Your Network

    In this course, you continue to build on your knowledge of networks to deepen that understanding. As you explore networks, you will familiarize yourself with the different components of wired and wireless networks including their security constraints and vulnerabilities. You will then continue on to developing access controls to ensure that you have considered all pieces of what it means to secure a network from people and data to devices. In addition, you will look at how to safely build and secure networks including discussions around cryptography and privacy constraints.

    Learners Will:
    • Develop an understanding of network security measures, including strategies needed to keep networks safe.
    • Begin to master network monitoring techniques.
    • Gain an understanding of how to effectively manage accounts within a system.
    • See how security attributes can help strengthen network defenses.
    • Become familiar with a range of common tools and technologies that support network safety.
    • Acquire the skills to build a secure network architecture.
    • Learn the basics of MHN networks and how to set them up effectively.
    • Understand the relationship between Telnet and POP3 machines.


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, Cisco Certified CyberOps Associate
  • Integrating Your Infrastructure Security

    This course equips learners with the necessary skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. Additionally, they will learn how to monitor, scan, and analyze threats and vulnerabilities in these environments, while also becoming familiar with remediation techniques. Finally, learners will begin to understand how DevSecOps impacts the cybersecurity landscape.

    Learners will:
    • Gain an understanding of how to manage Linux operating systems, as well as how to monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments
    • Be introduced to Python programming.
    • Develop a basic understanding of cloud computing environments and create an instance using Amazon Web Services (AWS).
    • Understand how to remediate and share details to protect other systems Learn how to create automations to efficiently manage and protect systems.
    • Explore the design principles of scalable cloud solutions and the integration of different environments.
    • Become familiar with DevSecOps.


    Information covered in this course helps prepare learners to begin studying for the following certification*: AWS Cloud Practitioner
  • Infrastructure Phase

    The Infrastructure phase of the program is where you will focus solely on security concepts and practices. In the Infrastructure phase, you will study critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.
  • Designing Your Cybersecurity Infrastructure

    This course delves into the essential aspects of safeguarding endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations for industrial systems and IoT devices.

    Learners will:
    • Explore endpoint devices to gain an understanding of how to evaluate, identify threats to, and protect them.
    • Learn to document and track configurations and tool options.
    • Understand how to establish rules and restrictions that safeguard endpoint devices from potential harm.
    • Discover how to work with external information systems while maintaining the security of endpoint devices.
    • Develop the skills to implement of data loss prevention techniques.
    • Become familiar with the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP
  • Advanced Phase

    Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond the theories behind cybersecurity technologies to understanding the motivations and social engineering techniques that are deployed by malicious actors. You will learn various attack types, the attack kill chain, attack implementation, response to ongoing attacks, and mitigation strategies.

    Upon successful completion of this phase, you will receive your UF OPWD Cybersecurity Bootcamp certificate of completion.
  • Social Engineering and Ethical Hacking

    In the Social Engineering and Ethical Hacking course, participants explore the inner workings of hackers' minds and acquire an understanding of game theory principles as they relate to cybersecurity defense and solutions. By the end of the course, learners will have an understanding of social engineering techniques and ethical hacking principles, empowering them to enhance cybersecurity defenses and protect against potential threats.

    Learners will:
    • Gain insights into the motivations of potential attackers and their actions.
    • Develop an understanding of how to use a malicious hacker’s "state of mind" to enhance system protection.
    • Discover how ethical hacking can proactively support applications, systems, and organizational infrastructure.
    • Explore how reconnaissance, penetration testing, and defense system bypassing can help keep systems safe.
    • Learn how to identify vulnerabilities in web applications and cloud-based systems.
    • Build skills to effectively report risks and provide defense recommendations.
    • Understand how social engineering techniques can be used to deceive individuals.


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® CySA+, PenTest+
  • Digital Forensics and Incident Response

    The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.

    Learners will:
    • Be immersed in the fundamentals of offensive security
    • Gain an understanding of the basics of digital forensics.
    • Review file and stolen data recovery strategies.
    • Learn how to effectively handle various types of attacks targeting organizations.
    • Get insight into the strategies attackers use to attain access to critical systems and data.
    • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats.


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP
  • Threat Hunting and Intelligence

    The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure.

    Learners will:
    • Gain an understanding of the threats and vulnerabilities that can emerge within an organization's network infrastructure, including hardware devices, software applications, and network services
    • Grow their ability to proactively identify and respond to threats.
    • Learn to develop plans and procedures to effectively handle situations, ensuring a swift and coordinated response.
    • Develop the skills to evaluate sources of information and tools needed to bolster their defenses.


    Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP
  • Elective CompTIA® Security+ Certification Exam Prep Course

    The Cybersecurity Bootcamp includes an elective CompTIA® Security+ Exam Prep Course** designed to prepare students to obtain this valuable industry certification and a voucher for the CompTIA® Security+ certification exam.

    Certificate Highlights:
    • Establish the core knowledge required for any cybersecurity role.
    • The only foundational cybersecurity certification that emphasizes hands-on practical skills.
    • A globally recognized certification that establishes the core knowledge required in the field and provides a springboard to intermediate-level cybersecurity jobs.
Icon

Introductory Course (4 Weeks)

Our 4-week-long introductory course offers a unique opportunity to explore our online Cybersecurity Bootcamp before you commit to the full program. Learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle.

The course lets you experience how classes and interactions flow in our online learning environment, giving you all the information you need to make a confident and informed decision about enrolling in the program. At the end of the course, you take a summary exam to assess your skills and determine if the cybersecurity field is right for you.

Icon

Fundamentals Phase (16 Weeks)

Throughout the Fundamentals Phase, you will dive deeper into the foundations of cybersecurity. This deep dive will include a number of concepts needed in order to secure and defend as a cybersecurity professional: an exploration of networks and their functions, common operating systems, how devices communicate over networks, as well as how data is stored and utilized in the cloud.

Complete this phase with a foundational understanding of essential cybersecurity concepts.

Computer Networking Fundamentals

This course offers a comprehensive introduction to computer networking, providing practical experience in configuring and managing network devices for optimal performance and security. Learners will gain an understanding of network architectures, protocols, and security while honing their device configuration and troubleshooting skills. Through hands-on activities, they will apply critical thinking and problem-solving skills to address common networking challenges.

Learners will:

  • Learn how different entities connect and interact across digital landscapes.
  • Gain an understanding of the various types of networks and their impact on our interconnected world.
  • Harness the power of configuration settings documentation.
  • Be exposed to the role of audits in ensuring optimal network performance and security.
  • Find out why system and communications protection plays a pivotal role in safeguarding information.
  • Learn how to effectively update and adapt policies to keep pace with the ever-evolving landscape.


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, (ISC)2 Certified in Cybersecurity℠

Microsoft Security Systems Administration

This course offers hands-on training focused on securing Microsoft Windows environments, providing learners with the practical knowledge and skills needed to implement security features and tools, including Microsoft Defender, BitLocker, and Windows Firewall. They will also be able to configure and manage networks to ensure security and stability using system admin tools. By the end of the course, participants will understand the basics of Microsoft’s infrastructure and be able to implement and maintain secure Windows environments in various professional roles.

Learners Will:

  • Gain an understanding of Microsoft's infrastructure and its components.
  • Learn effective strategies to protect Microsoft's infrastructure from potential threats.
  • Develop skills to manage various types of accounts based on business function.
  • Explore ways to maintain a secure and safe network environment.
  • Discover how automations and scripting can enhance both security and efficiency in cybersecurity roles.
  • Understand how Active Directory helps manage permissions and control access to network resources.
  • Learn how to improve system security and operational efficiencies with Powershell.

Securing Your Network

In this course, you continue to build on your knowledge of networks to deepen that understanding. As you explore networks, you will familiarize yourself with the different components of wired and wireless networks including their security constraints and vulnerabilities. You will then continue on to developing access controls to ensure that you have considered all pieces of what it means to secure a network from people and data to devices. In addition, you will look at how to safely build and secure networks including discussions around cryptography and privacy constraints.

Learners Will:

  • Develop an understanding of network security measures, including strategies needed to keep networks safe.
  • Begin to master network monitoring techniques.
  • Gain an understanding of how to effectively manage accounts within a system.
  • See how security attributes can help strengthen network defenses.
  • Become familiar with a range of common tools and technologies that support network safety.
  • Acquire the skills to build a secure network architecture.
  • Learn the basics of MHN networks and how to set them up effectively.
  • Understand the relationship between Telnet and POP3 machines.


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Network+, Cisco Certified CyberOps Associate

Integrating Your Infrastructure Security

This course equips learners with the necessary skills to effectively manage Linux operating systems, utilize basic Python programming, explore cloud computing, and enhance system security against threats and vulnerabilities. Additionally, they will learn how to monitor, scan, and analyze threats and vulnerabilities in these environments, while also becoming familiar with remediation techniques. Finally, learners will begin to understand how DevSecOps impacts the cybersecurity landscape.

Learners will:

  • Gain an understanding of how to manage Linux operating systems, as well as how to monitor, scan, and analyze threats and vulnerabilities in Linux and cloud-based environments
  • Be introduced to Python programming.
  • Develop a basic understanding of cloud computing environments and create an instance using Amazon Web Services (AWS).
  • Understand how to remediate and share details to protect other systems Learn how to create automations to efficiently manage and protect systems.
  • Explore the design principles of scalable cloud solutions and the integration of different environments.
  • Become familiar with DevSecOps.


Information covered in this course helps prepare learners to begin studying for the following certification*: AWS Cloud Practitioner

Icon

Infrastructure Phase 4 Weeks

The Infrastructure phase of the program is where you will focus solely on security concepts and practices. In the Infrastructure phase, you will study critical security measures, endpoint security, and other important concepts that are key to safeguarding organizations.

Icon

Designing Your Cybersecurity Infrastructure

This course delves into the essential aspects of safeguarding endpoint devices, implementing data loss prevention techniques, and utilizing advanced tools and strategies to protect an organization's digital assets. By the end of the course, participants will have a comprehensive understanding of endpoint device protection, data loss prevention, and the security considerations for industrial systems and IoT devices.

Learners will:

  • Explore endpoint devices to gain an understanding of how to evaluate, identify threats to, and protect them.
  • Learn to document and track configurations and tool options.
  • Understand how to establish rules and restrictions that safeguard endpoint devices from potential harm.
  • Discover how to work with external information systems while maintaining the security of endpoint devices.
  • Develop the skills to implement of data loss prevention techniques.
  • Become familiar with the threats and security measures related to Industrial Control Systems (ICS) and Industrial Internet of Things (IIOT).


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 CISSP

Icon

Advanced Phase (12 Weeks)

Courses of the Advanced Phase further prepare you to respond to attacks, proactively identify vulnerabilities utilizing ethical hacking, and improve system protection. You will move beyond the theories behind cybersecurity technologies to understanding the motivations and social engineering techniques that are deployed by malicious actors. You will learn various attack types, the attack kill chain, attack implementation, response to ongoing attacks, and mitigation strategies.

Upon successful completion of this phase, you will receive your UF OPWD Cybersecurity Bootcamp certificate of completion.

Icon

Social Engineering and Ethical Hacking

In the Social Engineering and Ethical Hacking course, participants explore the inner workings of hackers' minds and acquire an understanding of game theory principles as they relate to cybersecurity defense and solutions. By the end of the course, learners will have an understanding of social engineering techniques and ethical hacking principles, empowering them to enhance cybersecurity defenses and protect against potential threats.

Learners will:

  • Gain insights into the motivations of potential attackers and their actions.
  • Develop an understanding of how to use a malicious hacker’s "state of mind" to enhance system protection.
  • Discover how ethical hacking can proactively support applications, systems, and organizational infrastructure.
  • Explore how reconnaissance, penetration testing, and defense system bypassing can help keep systems safe.
  • Learn how to identify vulnerabilities in web applications and cloud-based systems.
  • Build skills to effectively report risks and provide defense recommendations.
  • Understand how social engineering techniques can be used to deceive individuals.


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® CySA+, PenTest+

Icon

Digital Forensics and Incident Response

The Digital Forensics & Incident Response course equips learners with essential tools to effectively respond to attacks, conduct investigations, gather evidence, and produce comprehensive reports. By the end of the course, participants will be equipped with the necessary knowledge to respond to incidents, run investigations, and report their findings. These skills will help students to recognize, analyze, and ideate about security incidents to prevent future breaches.

Learners will:

  • Be immersed in the fundamentals of offensive security
  • Gain an understanding of the basics of digital forensics.
  • Review file and stolen data recovery strategies.
  • Learn how to effectively handle various types of attacks targeting organizations.
  • Get insight into the strategies attackers use to attain access to critical systems and data.
  • Explore the basics of malware analysis in order to enhance your ability to detect and neutralize potential threats.


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, and (ISC)2 SSCP

Icon

Threat Hunting and Intelligence

The Threat Hunting and Intelligence course provides learners with the necessary knowledge to identify and mitigate vulnerabilities in an organization's infrastructure. By the end of the course, learners will be equipped with the expertise to identify vulnerabilities, respond to threats, and develop robust plans to safeguard an organization's infrastructure.

Learners will:

  • Gain an understanding of the threats and vulnerabilities that can emerge within an organization's network infrastructure, including hardware devices, software applications, and network services
  • Grow their ability to proactively identify and respond to threats.
  • Learn to develop plans and procedures to effectively handle situations, ensuring a swift and coordinated response.
  • Develop the skills to evaluate sources of information and tools needed to bolster their defenses.


Information covered in this course helps prepare learners to begin studying for the following certifications*: CompTIA® Security+, CompTIA® CySA+, (ISC)2 SSCP, (ISC)2 CISSP

Icon

Elective CompTIA® Security+ Certification Exam Prep Course

The Cybersecurity Bootcamp includes an elective CompTIA® Security+ Exam Prep Course** designed to prepare students to obtain this valuable industry certification and a voucher for the CompTIA® Security+ certification exam.

Certificate Highlights:

  • Establish the core knowledge required for any cybersecurity role.
  • The only foundational cybersecurity certification that emphasizes hands-on practical skills.
  • A globally recognized certification that establishes the core knowledge required in the field and provides a springboard to intermediate-level cybersecurity jobs.

*While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition.

**The CompTIA® Security+ certification exam is not administered within our program. Upon successful completion of the elective certification prep course, you will receive a voucher that covers the full cost of the CompTIA® Security+ exam.

EXPLORE THE
COURSE CATALOG

img

LEARN SKILLS APPLICABLE TO INDUSTRY CERTIFICATIONS

Advancing in the cyber industry can be expedited by earning certifications. Our program helps lay the foundation for learners who would like to take certification exams in the future.

Our research-backed curriculum touches on topics and concepts integral to cybersecurity certification exams. To further assist you with expanding your credentials beyond our program, you will also have access to a curated library of resources that can help you gain skills applicable to exams such as:

  • AWS Certified Cloud Practitioner
  • Cisco Certified CyberOps Associate
  • LPI Linux Essentials
  • (ISC)² SSCP
  • CompTIA® Network+
  • CertNexus® Cyber Secure Coder™ (CSC)
  • CertNexus® CyberSec First Responder® (CFR)
  • GIAC Security Essentials
  • Certified Incident Handler
  • Certified Information Security Manager
  • *While the curriculum includes subjects covered by many industry exams, this bootcamp program solely includes an optional CompTIA® Security+ certification prep course and exam voucher. No other preparatory courses or vouchers are provided as part of the curriculum or cost of the bootcamp program and require additional costs not included in tuition. ** Requires a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

UF OPWD
CYBERSECURITY
BOOTCAMP COST

Redefine your future by investing in your education.
Learn to defend against cyberattacks and advance your career today.

4-Week Introductory Course

$180

32-Week Program

$17,800

*Tuition, fees, and deposits are subject to change.

img
Skip to content