2020欧洲杯正规平台We’re honored and grateful that we’re a top ranked Cybersecurity Bootcamp by for Q1 2020, a leading authority in the bootcamp community of students. These awards were granted based on reviews from our alumni who’ve transformed their careers through our cybersecurity program.
Join a mission. Secure the future with our proven curriculum.
2020欧洲杯正规平台Ready to change your career? Launch into one of the with a career in cybersecurity engineering. Our 15-week immersive program has been developed in collaboration with top cybersecurity employers — you’ll learn the skills you need to jump right into cybersecurity’s frontlines and into the cybersecurity roles that employers are looking for.
Get job-ready with our employer-oriented curriculum, and hands-on experience in our unique Cyber Range lab environment—a sandbox where you can safely learn how to hack, explore, track, gather, break, and build things.
2020欧洲杯正规平台Find out if we’re right for you - with our New York City Admissions Team.
2020欧洲杯正规平台With a rigorous, intensive 15-week learning journey, you’ll elevate your skills, build your confidence, and prepare yourself with the know-how to take on real-world cyber threats. This immersion lets you start your cybersecurity career in months instead of years.
2020欧洲杯正规平台We teach and prepare our students for the skills you need for a cybersecurity career – the skills employers are looking for – with a carefully balanced combination of theory and hands-on practical skills. 50% of your learning will take place in our unique, real-world Cyber Range lab – a sandbox where you can safely explore, hack, track, gather, break, and build things.
We believe in you – so we do everything we can to support your switch into your new cybersecurity career. Get dedicated career support, access to our extensive US employer network, and a Money-Back Guarantee (see terms).
What you'll learn: comprehensive cybersecurity engineering skills
2020欧洲杯正规平台Over 15 intense weeks on campus at Flatiron School New York City, our Cybersecurity Engineering curriculum will prepare you to jump into the cybersecurity industry. You’ll get fluent in cybersecurity tools like Python, Wireshark, Linux, Metasploit and more, and learn how to use them to defend against cybercriminals. The program includes 9 modules designed to fully prepare you for a career as a tier 1+ security engineer, technical analyst, penetration tester or consultant.
2020欧洲杯正规平台You’ll focus on the core ideas in network security.
2020欧洲杯正规平台The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning and domain spoofing, as well as countermeasures. '
You’ll then explore sniffing and port scanning, firewalls, IDSes and NIDSes and cover wireless protocols and their security.
2020欧洲杯正规平台You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits and Android and iOS security.
2020欧洲杯正规平台You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
2020欧洲杯正规平台You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
2020欧洲杯正规平台You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
2020欧洲杯正规平台This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
Join the global cybersecurity mission
2020欧洲杯正规平台Cybercrime is one of the biggest threats facing companies worldwide today, predicted to cost the world $6 trillion annually by 2021, according to the Cisco/Cybersecurity Ventures .
But there’s a skills gap — employer demand is outstripping the supply of highly-trained cybersecurity specialists. That’s where our Cybersecurity Engineering program comes in — we’ll equip you to become an ethical hacker and break into cybersecurity, with one of the most in-demand skillsets in the job market.
The course will prepare you for a broad range of cybersecurity jobs, including Security Engineer, Pen Tester, Security Analyst and Security Consultant.
Unfilled cybersecurity jobs predicted globally by 2021, according to the Cisco/Cybersecurity Ventures .
Fastest growing job in the US, according to .
Student life at Flatiron School
By joining the Cybersecurity Engineering program, you’ll become a part of our thriving tech community at our Manhattan campus located in the Financial District.
Our full-time New York City Cybersecurity Engineering program is in session 5 days per week for 15 weeks and follows a block schedule. We use a unique instructional architecture to maximize instructor interaction and lab exercises. Our lab times let you engage in hands-on learning, with key cybersecurity topics during lecture portions of the class. Most classes will meet twice a week. Each class is a half-day in length with a lunch break between classes.
2020欧洲杯正规平台Throughout the program, you’ll progress through longer “foundational” courses alongside shorter, domain-specific topics.
2020欧洲杯正规平台Below is an example of a day at Flatiron School:
Theory and Demonstration
Hands-on labs in the Cyber Range
Theory and Demonstration
Hands-on labs in the Cyber Range
You’ll end the day reviewing concepts and strategising the next steps for your personal projects.
Is Cybersecurity Engineering the right choice for me?
Still not sure if Cybersecurity Engineering is right for you? with our Admissions team to get your questions answered.
2020欧洲杯正规平台To succeed in our cybersecurity engineering course, it will help if you have some knowledge of programming languages, as well as familiarity with Windows, Linux, and Unix operating systems.
This course is ideal for people who are organized leaders, proficient decoders, and detail-oriented individuals who are passionate about tech and computer systems.
2020欧洲杯正规平台We place a higher value on technical ability over formal education. Networking engineering certifications and degrees in technology, science and mathematics are helpful.
Your cybersecurity instructors
Great teachers inspire us to connect with topics on a profound level. Industry experience alone doesn’t necessarily make someone an effective teacher –– that’s why we’re passionate about finding people who possess extensive cybersecurity experience and are also deeply committed, experienced teachers.
2020欧洲杯正规平台Dustin has experience in analytics, cybersecurity, and engineering. He previously worked as a security analyst, qualifying ,and quantifying cybersecurity risk for informed decision making. He has a particular interest in cybersecurity education for organizational governance, growth, and innovation.
Kodjo is an avid Naruto Runner and passionate Information Security professional. He enjoys working with the next generation of Cybersecurity professionals by helping them see the bigger picture.
Launch your career in cybersecurity with support from our Career Services team
We’re here to help you land a job in cybersecurity. After years working with passionate students and helping them land fulfilling careers in tech, we’ve got a keen understanding of what goes into getting that first job.
During your job search, you’ll meet weekly with your dedicated Career Coach. Coaches help with everything from résumé review to interview prep, and help you tell your story to get the job you want.
2020欧洲杯正规平台We’ve built relationships with hiring managers at top companies, creating a robust employer pipeline for Flatiron School grads. Our Employer Partnerships team is constantly evangelizing our grads and helping you get in the door.
Through 1:1 guidance from our Career Coaching team and our tried-and-tested job-search framework, you’ll gain the skills and support you need to get a job and start your career in cybersecurity.
Change careers with confidence thanks to our Money-Back Guarantee. If you graduate, follow our job-search process, and don’t secure a job offer within 6 months of your job search start date, we’ll refund your tuition in full (see terms).
Cybersecurity careers in New York City
Our Flatiron School grads have created powerful change and made contributions at respected companies in New York City and across the globe.*
2020欧洲杯正规平台*Students placed with employers while studying with SecureSet Academy, our sister program in Colorado, which has a curriculum substantially similar to the Flatiron School Cybersecurity Engineering program.
Find the right tuition plan for you
You'll be able to choose from 3 different payment options
Make an initial deposit of $1,000 to secure your seat, then pay the remainder of your tuition in one lump sum before class begins.
Maximum tuition under this plan: $20,000
Pay with a loan
Dedicated to making our programs more accessible, we offer financing options through and , two accelerated learning financing companies. Available only to those who qualify.
Maximum tuition under this plan: $20,000 plus interest
Pay only after you're getting paid
Defer your tuition with the Flatiron School Income Share Agreement (ISA). After you make a deposit, the remainder of your tuition is paid once you've left the program and are getting paid at least a minimum income.
Join us on campus
|Cohort Start Date||Campus||Status|
|Sep 14, 2020 – Dec 25, 2020||Manhattan||Open –|
|Jan 4, 2021 – Apr 16, 2021||Manhattan||Open –|
|Apr 19, 2021 – Jul 30, 2021||Manhattan||Open –|
What the application process looks like
Start your journey toward a career in cybersecurity engineering by joining our inclusive, dynamic student community. At Flatiron School, we admit students who bring creativity, ingenuity, and curiosity to the classroom.
Not sure if Cybersecurity Engineering is right for you? with our New York City Admissions Team.
Submit your application. Share a bit about yourself and what’s driving you to start a career in cybersecurity engineering.
Speak with an Admissions representative in a non-technical interview. This is an opportunity for us to get to know each other a little better. Nothing technical — just a friendly conversation.
During the technical review, our instructors will learn more about your overall technical background and you will have the chance to get to know our instructors and their teaching style.
2020欧洲杯正规平台Receive your acceptance decision from Admissions. This usually happens within 4 business days.
If accepted, you'll begin course pre-work to prepare for the first day of class.
Frequently asked questions
You can also view our main FAQ page.
2020欧洲杯正规平台Start your application for one of our immersive bootcamps and change your life today.
2020欧洲杯正规平台Attend an Event
2020欧洲杯正规平台Join us for a seminar or info session to see what student life is like at Flatiron School.
Chat with Admissions
2020欧洲杯正规平台Have a question about our program that we haven’t answered above? Our admissions team is here to help.