Find Success
in Cybersecurity

Start Here. Go Anywhere.

No matter your level of technological proficiency, the Pepperdine Graziadio Cybersecurity Boot Camp can give you a thorough skill set and expand your knowledge of the fundamentals required to defend the virtual landscape, secure data from outside attackers, and build a career in cybersecurity.

With over 460,000 job
openings nationwide,
there’s never been a
better time to join the
cybersecurity industry

Source:
Cyberseek.org

img

Secure Your Future with
Our Accelerated Curriculum
Gain hands-on experience utilizing cutting-edge, cybersecurity technologies and methodologies.

Our Cybersecurity Boot Camp will provide you with all of the tech skills and training you’ll need to
become a cybersecurity professional.

Becoming a
Cybersecurity Professional

Start building the skills you need to excel in the field of cybersecurity under the guidance of industry experts
eager to train the next generation of cybersecurity professionals.

Industry-Leading
Instructors

Benefit from expert instructors’ current industry knowledge as well as from their unique insider’s understanding of the fast-paced field of cybersecurity. Experience personalized mentorship and guidance as you learn what it takes to become a cybersecurity professional.

Cyber Labs

Learn to identify vulnerabilities on web, server, mobile, and desktop platforms and create secure defenses that protect against a variety of threats through real-world simulations. Complete cyber labs designed by cybersecurity experts to gain the knowledge you need to succeed.

Virtual Classroom

Benefit from top-tier instructional methodologies enhanced with cloud-based chat software that allows live, virtual, hands-on interaction between you and your instructors. Virtually attend classes in the evenings and on the weekends from the comfort of your own home.

Hands-On Courses

Gain real-world experience in an accelerated, online environment designed to launch the careers of professionals of all backgrounds and experience levels. Confidently enter the workforce with the hands-on training required to excel in the field of cybersecurity.

Build the Skills That Employers Need

Benefit from a comprehensive career services package orchestrated by a dedicated team of professional development experts.

Networking Opportunities

Gain access to a network of local and global hiring partners looking to employ newly-qualified cybersecurity professionals. Attend virtual networking events designed to introduce you to the variety of opportunities available to you upon program completion.

Dedicated Support

Routinely meet with a student success manager dedicated to ensuring you have the tools and support you need to thrive in the program and beyond. Know you have a team of professionals backing you in your journey into the field of cybersecurity.

Career Coaching

Find professional development support within a team of career coaches eager to help you achieve your career goals in cybersecurity. Get help with your resume, prepare for interviews, gain assistance building your LinkedIn profile, and more.

Job Placement Assistance

Work with our Career Services team to determine what opportunities are available to you. Our placement assistance will help you locate career opportunities and thoroughly prepare you for the interview process ahead of time.

Download the
Course Catalog
Find out what you’ll learn.

img

Program Overview

30-Hour Introductory Course |
370-Hour Extended Program

  • Introductory Course

    Our Introductory Course will let you take the Cybersecurity Boot Camp for a test drive before you commit to the whole program. Learn to carry out basic commands and use computer communication protocols, develop a basic understanding of operating system structures, and familiarize yourself with the Cyber Attack cycle. You’ll also receive first-hand experience using the online learning environment, get a feel for the class and interaction flow, and acquire all of the information you need to make an informed and confident decision to sign up for the full Cybersecurity Boot Camp. When the Introductory Course is over, students will take a summary exam that will assess their ability to excel in a successful career in cybersecurity.
  • Fundamentals Phase

    In the Fundamentals Phase of the boot camp, students will learn the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.
  • Microsoft Security

    Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Students will learn best practices for administrating and securing the Microsoft ecosystem of products.
  • Computer Networking

    Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields -- including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices. Additionally, the Computer Networking course will give students a foundation for preparing to take the CompTIA Network+ exam*.
  • Linux Security

    The Linux Security course imparts knowledge and practical skills on the most used operating system in the world -- one that is absolutely essential to cybersecurity professionals. Students will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available. Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam.
  • Cloud Security

    Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming much more commonplace as more organizations adopt them. The Cloud Security course prepares students to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that students can understand how to implement security for cloud-based platforms. Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*
  • Fundamentals Phase Final Project - Building Your Own Environment

    In this project that simulates a real-world environment, participants will build their own insecure small business infrastructure. From there, they’ll learn how to secure the platform while practicing both cyberattacks and digital forensics. Upon completion of the final project, learners will be able to use it in their portfolio as a demonstration of their ability and skill.
  • Cybersecurity Infrastructure Phase

    In the Infrastructure phase of the program, learners will begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners will get practical security skills and experience that will prepare them for the Advanced phase of the program.
  • Network Security

    Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. Students will leave this course with the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions. The Network Security course gives you the skills and knowledge to prepare for the EC-Council CND exam*.
  • Critical Infrastructure Security

    Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to ensure these important facets of everyday life are protected. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things, and environment security. This skill set is in high demand in both the business world, as well as in industry. This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam*.
  • Python for Security

    Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python. Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives students the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.
  • Infrastructure Phase Final Project

    In the Infrastructure phase final project, learners will use the setup they created in the previous project to analyze a threat scenario and provide the necessary steps to secure it. This will demonstrate infrastructure hardening.
  • Career Services Workshop

    Get the competitive edge you need to succeed in technical interviews with this specialized workshop. CyWar also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.
  • Advanced Cybersecurity Phase

    In the Advanced phase of the boot camp, learners will solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.
  • Ethical Hacking

    This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role. Upon completion of this course, learners will be ready to study for the EC-Council CEH (Certified Ethical Hacker) certification exam*.
  • Digital Forensics & Incident Response

    When there’s a cyberattack, first responders are the first in line to analyze and contain the incident. The Digital Forensics & Incident will give learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering, and report the results. After completing this course, learners will be prepared to study for the EC-Council CSA (Certified SOC Analyst) certification exam*.
  • Advanced Phase Final Project: Attack & Response

    In the Advanced phase final project, learners will build upon the secure infrastructure created in past projects. They’ll design an attack to compromise the infrastructure, use their skills to gather forensic evidence, and complete an investigative report with details about the simulated incident. When they complete the program, learners can add the code, reports, and designs from their projects to form a solid portfolio to showcase to hiring managers and prospective employers.
  • Game Theory

    In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the thread actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
Icon

Introductory Course

8 Lessons - 30 Hours

Our Introductory Course will let you take the Cybersecurity Boot Camp for a test drive before you commit to the whole program. Learn to carry out basic commands and use computer communication protocols, develop a basic understanding of operating system structures, and familiarize yourself with the Cyber Attack cycle. You’ll also receive first-hand experience using the online learning environment, get a feel for the class and interaction flow, and acquire all of the information you need to make an informed and confident decision to sign up for the full Cybersecurity Boot Camp. When the Introductory Course is over, students will take a summary exam that will assess their ability to excel in a successful career in cybersecurity.

Icon

Fundamentals Phase

In the Fundamentals Phase of the boot camp, students will learn the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.

Icon

Microsoft Security

10 Lessons - 40 Hours

Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Students will learn best practices for administrating and securing the Microsoft ecosystem of products.

Icon

Computer Networking

35 Hours

Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields -- including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices. Additionally, the Computer Networking course will give students a foundation for preparing to take the CompTIA Network+ exam*.

Icon

Linux Security

8 Lessons - 30 Hours

The Linux Security course imparts knowledge and practical skills on the most used operating system in the world -- one that is absolutely essential to cybersecurity professionals. Students will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available. Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam.

Icon

Cloud Security

7 Lessons - 25 Hours

Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming much more commonplace as more organizations adopt them. The Cloud Security course prepares students to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that students can understand how to implement security for cloud-based platforms. Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam*

Icon

Fundamentals Phase Final Project - Building Your Own Environment

2 Lessons - 10 Hours

In this project that simulates a real-world environment, participants will build their own insecure small business infrastructure. From there, they’ll learn how to secure the platform while practicing both cyberattacks and digital forensics. Upon completion of the final project, learners will be able to use it in their portfolio as a demonstration of their ability and skill.

Icon

Cybersecurity Infrastructure Phase

In the Infrastructure phase of the program, learners will begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners will get practical security skills and experience that will prepare them for the Advanced phase of the program.

Icon

Network Security

8 Lessons - 30 Hours

Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. Students will leave this course with the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions. The Network Security course gives you the skills and knowledge to prepare for the EC-Council CND exam*.

Icon

Critical Infrastructure Security

9 Lessons - 35 Hours

Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to ensure these important facets of everyday life are protected. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things, and environment security. This skill set is in high demand in both the business world, as well as in industry. This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam*.

Icon

Python for Security

7 Lessons - 25 Hours

Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python. Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives students the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.

Icon

Infrastructure Phase Final Project

2 Lessons - 10 Hours

In the Infrastructure phase final project, learners will use the setup they created in the previous project to analyze a threat scenario and provide the necessary steps to secure it. This will demonstrate infrastructure hardening.

Icon

Career Services Workshop

1 Session - 5 Hours

Get the competitive edge you need to succeed in technical interviews with this specialized workshop. CyWar also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.

Icon

Advanced Cybersecurity Phase

In the Advanced phase of the boot camp, learners will solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.

Icon

Ethical Hacking

12 Lessons - 50 Hours

This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role. Upon completion of this course, learners will be ready to study for the EC-Council CEH (Certified Ethical Hacker) certification exam*.

Icon

Digital Forensics & Incident Response

12 Lessons - 50 Hours

When there’s a cyberattack, first responders are the first in line to analyze and contain the incident. The Digital Forensics & Incident will give learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering, and report the results. After completing this course, learners will be prepared to study for the EC-Council CSA (Certified SOC Analyst) certification exam*.

Icon

Advanced Phase Final Project: Attack & Response

2 Lessons - 10 Hours

In the Advanced phase final project, learners will build upon the secure infrastructure created in past projects. They’ll design an attack to compromise the infrastructure, use their skills to gather forensic evidence, and complete an investigative report with details about the simulated incident. When they complete the program, learners can add the code, reports, and designs from their projects to form a solid portfolio to showcase to hiring managers and prospective employers.

Icon

Game Theory

4 Lessons - 15 Hours

In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the thread actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.

*Although the course curriculum provides the knowledge necessary to do well on industry exams, this isn’t a test preparation program, where the main focus is how a student performs on an exam. Certification exams are not taken as part of the program and will require additional costs not included in the program tuition.

Prepare Yourself for
Industry-Standard Exams

Start Studying to Earn
Cybersecurity Certifications

Those who are new to the cybersecurity industry are much more likely to be hired if they obtain industry-standard and internationally recognized certifications. To help boost your credentials, we’ve created an in-depth resource to help you prepare and study for certification exams.

  • LPI Linux Essentials

    The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Learners with security and compliance experience in AWS Cloud will have a key requirement for passing the exam -- as well as providing their knowledge to prospective employers.
  • CompTIA Network+

    The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
  • EC-Council CND - Certified Network Defender

    The EC-Council CND - Certified Network Defender certification should be considered by aspiring cyber professionals who want to pursue a career as network administrators. It tests a learner’s knowledge and training in defending, detecting, and responding to threats on a network.
  • CompTIA Security+

    The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing.
  • EC-Council CSA - Certified SOC Analyst

    The Certified SOC Analyst certification should be considered by aspiring cybersecurity professionals who want to join and work in a security operations center (SOC) environment. It’s meant for current and aspiring Tier I and Tier II SOC analysts and measures a candidate’s proficiency in both entry-level and intermediate SOC operations.
  • EC-Council CEH - Certified Ethical Hacker

    The Certified Ethical Hacker certification is engineered for cybersecurity professionals who want to work in a discipline that incorporates Ethical Hacking, red teaming, or penetration testing from a vendor-agnostic perspective.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For students who have achieved one year of experience after completion of their program.

    Students with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

    The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.

LPI Linux Essentials

The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Learners with security and compliance experience in AWS Cloud will have a key requirement for passing the exam -- as well as providing their knowledge to prospective employers.

CompTIA Network+

The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.

EC-Council CND - Certified Network Defender

The EC-Council CND - Certified Network Defender certification should be considered by aspiring cyber professionals who want to pursue a career as network administrators. It tests a learner’s knowledge and training in defending, detecting, and responding to threats on a network.

CompTIA Security+

The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing.

EC-Council CSA - Certified SOC Analyst

The Certified SOC Analyst certification should be considered by aspiring cybersecurity professionals who want to join and work in a security operations center (SOC) environment. It’s meant for current and aspiring Tier I and Tier II SOC analysts and measures a candidate’s proficiency in both entry-level and intermediate SOC operations.

EC-Council CEH - Certified Ethical Hacker

The Certified Ethical Hacker certification is engineered for cybersecurity professionals who want to work in a discipline that incorporates Ethical Hacking, red teaming, or penetration testing from a vendor-agnostic perspective.

(ISC)² SSCP – Systems Security Certified Practitioner**

For students who have achieved one year of experience after completion of their program.

Students with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.

The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.

** In other to be certified, learners must have a minimum of at least one year of cumulative work experience in one or more of the seven disciplines of the SSCP Common Body of Knowledge (CBK)

Program Tuition

Invest in your professional development with the job-ready skill set you need to enter the field of cybersecurity.

30-Hour Introductory Course

$180

370-Hour Extended Program

$15,820

Requirements

Internet access

Drive, ambition, and passion

Introductory course and admission exam

Tuition, fees, and deposits subject to change.

img
Skip to content