Schedule a Consultation

Cybersecurity Professional Bootcamp

University of Miami
Cybersecurity Professional Bootcamp

Accelerated Programs | Weekend & Evening Classes

By clicking “Request Info,” I consent to be contacted by or on behalf of the University of Miami, including by email, calls, and text messages to any telephone number that I provide, about my educational interest. I understand my consent is not required to purchase or enroll. I also agree to the Terms of Use and Privacy Policy.

Are You Thinking About a
Career in IT or Cybersecurity?

Designed to take you from zero to pro, this program is built for those who are looking to fast-track their career into IT or cybersecurity and have little or no professional background in the field.

The Cybersecurity Professional Bootcamp covers everything from the fundamentals of network management to routing and switching to cybersecurity. According to Forbes, the information technology field is one of the fastest-growing in the US, and cyber professionals are reportedly ranked at the top of the list of happiest workers.
Asset

Our hands-on approach to learning includes simulation labs to prepare you to take some of the most essential certification exams in the cybersecurity industry.

Go From No Experience To Ready-to-Hire

30-Hour Introductory Course | 370-Hour Extended Program

University of Miami’s Cybersecurity Bootcamp curriculum is tailored to market demand and focuses on teaching the skills you need to gain employment in the field.

Introductory Course

30 In-ClassHours

Get a taste of cybersecurity with an introduction to the Windows and Linux operating systems as well as the fundamentals of software and hardware. This course focuses on hands-on, practical exercises where students learn to run basic commands and computer communication protocols. The Introduction to Cybersecurity Course also provides a firm understanding of system structures and virtualization, and introduces you to the Cyber Attack Cycle.

Windows Security

45 In-ClassHours

Countless companies worldwide rely on Windows Server 2012 to manage their organization's computers and networks using Group Policy Objects. Students learn how to set up domain environments using Active Directory, which enables central control of all computers and users in a domain. This course also teaches students how to manage network services, such as DNS and DHCP servers, how to configure security servers to harden systems, and how to manage and operate a Microsoft domain environment that includes Windows Server 2012 operating systems, which is the most common Data Center in use today. Students also learn the differences between the newer OS versions of Windows Server, 2016 and 2019, and the security aspects and hardening of those environments and systems.

Computer Networking

50 In-ClassHours

Cybersecurity professionals must have a comprehensive knowledge of networking. You will learn all the necessary networking concepts, including protocols, topologies, and networking devices. This course prepares you with the knowledge you need to obtain your first cyber-related certificate, the CompTIA Network+ exam.*

Today, networking devices are installed in almost all business sectors, including government, finance, transportation, technology, healthcare, manufacturing, hospitality, and more. This course provides you with an in-depth understanding of various protocols, network layers, and devices.

Cloud Security

15 In-ClassHours

This course focuses on the growing use of cloud platforms, and teaches how environments are managed and secured in the cloud. These platforms provide services ranging from basic physical servers to completely managed solutions. You will also build the knowledge base and skill set required to take the AWS Certified Cloud Practitioner exam.*

Many today organizations are moving their infrastructure to cloud platforms that include centralized managed solutions for all their needs. Knowing how to leverage such platforms, work with them, and secure them, is a crucial aspect of today’s cyber industry. Many servers and databases are migrated to solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure.

Linux Security

30 In-ClassHours

This course teaches you how to manage and operate the Linux open-source operating system, and specifically the cybersecurity distribution known as Kali Linux. Students are taught the security aspects and hardening of such environments. This course also prepares you for the LPI Linux Essentials certification exam.*

Linux has grown very popular in recent years due to its use in IoT products and the benefits it lends to Information Security personnel. Students will learn to navigate the Linux file system, run basic commands, configure network services, handle access permissions, and exploit mitigations.

Network Security

60 In-ClassHours

The purpose of this course is to build the skill set you need to secure, manage, and operate network communication equipment and systems for a variety of organizational types. This course helps prepare you for the Cisco Certified CyberOps Associate exam.*

The curriculum enables you to achieve a high-level position in an organization specializing in technology and business operations by giving you the digital skill set you need to stand out to potential employers in the market.

Cyber Infrastructure & Technology

30 In-ClassHours

This course provides you with the knowledge and practical training you need to design and maintain secure infrastructures. You will also learn to implement various security countermeasures and build the knowledge base and skill set that will prepare you to take the CompTIA Security+ certification exam.*

This course provides an in-depth examination of the many different methods of defensive infrastructure. You will focus on how to design secure architecture and familiarize yourself with various security measures that can be used to harden networks, devices, and cloud infrastructures. You will learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a widespread open-source solution currently available on the market.

Introduction to Python for Security

25 In-ClassHours

This course introduces you to Python, the Cyber and Information Security industry's leading programming language. Learn to set up Python environments in Windows and Linux, get acquainted with using external libraries, and participate in immersive cyber labs to gain hands-on experience building advanced attack tools.

Offensive Security: Ethical Hacking

50 In-ClassHours

This course delves deeper into the mindset of criminal hackers in order to beat them at their own game and stay ahead of impending threats. To provide you with an in-depth understanding of how black-hat hackers work, you will analyze how they think, where they come from, and what they intend to do. Students will learn how to execute and defend against a variety of cyber attacks, including social engineering attacks, network attacks, application attacks, and cryptographic attacks. You will also have access to hands-on labs that help you learn the tools, knowledge, and specialized skill set needed to discover and exploit system vulnerabilities.

Incident Response & Threat Hunting

45 In-ClassHours

This course covers digital forensics and incident response (DFIR). Curriculum focuses on preparing you for the CompTIA Security+ and CompTIA CySA+ certification exams* and teaches how to conduct successful threat hunting procedures and identify elusive threats that evade existing security countermeasures. You will learn how to handle cyber attacks as they occur and about working on a Security Operations Center (SOC) team.

Throughout this course, you will study advanced threat hunting techniques, such as machine learning, situational awareness, user behavior analytics, and intelligence. The curriculum seeks to deeply familiarize you with the role of SOC teams across a variety of organizations and how to prepare for and manage attacks in real time. Students will also conduct an in-depth study of digital forensics and learn to investigate network attacks, host attacks, and how to reverse engineer malware to understand its purpose and execution on vulnerable systems.

Game Theory Strategy in Cyberecurity

10 In-ClassHours

Study the minds of criminal hackers and learn the fundamentals of Game Theory as applied to cybersecurity defense and solutions. Develop strategic skills needed to apply game-theoretic methods to real-world attack scenarios and learn to identify solutions and defend a variety of organization types.

Career Services

10 In-ClassHours

This 10-hour course is dedicated to providing you with internship placement assistance, personalized interview training, and professional networking opportunities, as well as resume and LinkedIn profile building tips to help you secure a job as a cybersecurity professional after graduation.

Career Services are consultation-based only and do not guarantee job placement.
Certification exams are not conducted as part of the program and require additional costs not included in tuition.
Prepare for Internationally
Recognized Certification Exams
Cisco Certified CyberOps Associate

Cisco Certified CyberOps Associate exam tests a professional’s ability to determine network vulnerabilities and security threats and mitigate them. Technology professionals should acquire this certificate to certify their competency in developing and maintaining secure infrastructures. CCNA Security candidates should also have knowledge of security network troubleshooting in addition to familiarity with Cisco security technologies.

LPI Linux Essentials

The LPI Linux Essentials exam is a great indicator of a candidate's skill set in regards to the Linux command line, administration, security, permissions, networking configuration, and group/user management. This exam also confirms a professional's knowledge of open-source Linux operating systems in addition to fundamental knowledge of a multitude of open-source environments.

CompTIA Cloud+

This certification assesses candidates' practical knowledge of cloud performance management as well as configuration and deployment data migration to the cloud. The CompTIA Cloud+ is considered a key certification for all IT professionals who want to showcase their competency in cloud infrastructures. The certification verifies that candidates have the skill set required to work in data centers.

CompTIA Security+

This is an entry-level cybersecurity certification that validates candidates' skills in penetration testing, systems, network, and security administration. Eligibility to take the CompTIA Security+ exam rests on a candidate being a verified holder of the CompTIA Network+ certification.

CompTIA CySA+

This is an intermediate-level cybersecurity certification in security analytics and intrusion detection and response. The CompTIA CySA+ meets standards set by the United States Department of Defense and assesses the ability to perform data analysis specifically to identify different system vulnerabilities, threats, and risks. The exam also assesses the ability to employ and configure tools to detect threats and to secure organizational systems and applications.

Program Tuition

The tuition for the Cybersecurity Professional Bootcamp is $15,500, not including $500 for the Introductory Course.

Tuition, fees, and deposits subject to change.

Get More Information About Our Programs

By clicking “Request Info,” I consent to be contacted by or on behalf of the University of Miami, including by email, calls, and text messages to any telephone number that I provide, about my educational interest. I understand my consent is not required to purchase or enroll. I also agree to the Terms of Use and Privacy Policy.

If you would like to learn more about University of Miami DCIE Cybersecurity Bootcamps, give our Cyber Admissions Advisors a call at (305) 425-1151 or fill out the form above.
Skip to content