Kansas State UniversityCybersecurity Bootcamp

Accelerated programs. In-depth training.
Live, virtual classes.

By clicking "Request Info", I consent to be contacted by or on behalf of Kansas State University, including by email, calls, and text messages (including by autodialer or prerecorded messages), about my educational interests. I understand consent to be contacted is not required to enroll. Msg. and data rates may apply.

Contact (913) 361-7300 for more information. I also agree to the Terms of Use and Privacy Policy.

Transition to

a career in cybersecurity

Less than a year is all it takes.

Explore the potential of a new career path with the K-State Cybersecurity Bootcamp, where you can train with leading instructors from inside the industry. Virtual classroom environments offer a rich, interactive experience that is flexible in delivering an immersive curriculum. Take advantage of real-world simulations, practical training, networking with like-minded professionals and industry figures, as well as ongoing guidance and development to kickstart your career.

Find a job you enjoy doing, and you will never have to work a day in your life.

- Mark Twain

Accelerate your

cybersecurity career

Benefit from a curriculum designed by industry experts.

Get the education and skills to become a cybersecurity professional. Our advanced bootcamp covers all you need to succeed, from the essential principles to practical hands-on technical skills and prep for the top industry certifications.

Do you fit the profile of the ideal Cybersecurity Bootcamp candidate?

Icon
Minimal or no professional experience in the world of cybersecurity
Icon
Drive and passion to upgrade your career
Icon
Desire to cultivate skills that prevent cyber threats and protect organizations

Learn to

prevent cyberattacks

With a global shortage of cybersecurity professionals in the workforce, could you fit the bill?

$8.64MILLION

The average cost of a data breach in the U.S.

$10.5TRILLION

The projected cost global cybercrime will reach by 2025

4,000

Daily average of post-pandemic cyberattacks

31%

The projected growth of cybersecurity careers by 2029

Icon

Learn how to defend against

cyberattacks in the real world

Gain experience in our hands-on, simulation-based labs.

Our top-tier instructors provide real-life training simulations of cyber attacks in virtual education environments. Benefit from a comprehensive curriculum and an interactive program format that prepares you for the challenges you will face in a professional cybersecurity position. With a practical approach to learning, you will gain the skills to outperform the competition and achieve your career potential.

Program

overview

30-Hour Introductory Course | 370-Hour Extended Program

INTRODUCTORY COURSE

Explore the areas of networking, Linux and Windows operating systems, and virtualization concepts in the Introductory Course that covers the fundamentals you need to know. The Introductory Course modules include the Cyber Attack Cycle, basic protocols and commands of computer communication, and the structure of operating systems. You will also encounter practical training sessions that introduce scenarios of real-life cyber attacks and how to apply countermeasures that defend and protect. The course concludes with an aptitude exam to assess the candidate's suitability for the full course and for a career in the field.

MICROSOFT SECURITY

How to manage the networks and computers of an organization are covered in this course, including the fundamentals of Group Policy Objects and Windows Server 2012. Learn the practical side of setting up domain environments with the help of Active Directory, as well as managing network services (i.e., DHCP and DNS servers). The course will demonstrate how Windows Server 2012 differs from later updates and configuration of security services to make systems more robust.

COMPUTER NETWORKING

Computer networking today is an integral part of any organizational structure in nearly every industry, such as finance, hospitality, healthcare, government, technology, manufacturing, transport, and others. In this course, you will gain deep knowledge of network devices, layers, and protocols that are typically in use. An in-depth comprehension of networks is essential to a cybersecurity career. The Computer Networking course covers all the networking concepts that you must be familiar with, such as topologies, protocols, and devices. Included in this course is preparation for the CompTIA Network+ exam*, the first cyber industry certification that you will obtain during the bootcamp.

CLOUD SECURITY

This course takes a close look at cloud storage, which is the infrastructure of choice for many businesses and organizations. Data stored in the cloud is in critical need of protection, as it often comprises sensitive information that is at extremely high risk. Cloud platforms, such as Google Cloud, Microsoft Azure, and AWS by Amazon, are highly popular, and therefore any cybersecurity professional must know how to implement and manage them. Cloud security is an ongoing challenge and not just a one-time activity, so the course also covers how to ensure data integrity in the longer term. In addition, this course will prepare you with the skills and knowledge to successfully sit the AWS Certified Cloud Practitioner exam.*

LINUX SECURITY

Take this course to discover the ins and outs of the open-source Linux operating system, and particularly Kali Linux, the cybersecurity distribution. In addition to learning about Linux security and how to reinforce the OS environment, you will also get prepared to pass the LPI Linux Essentials certification exam*, a leading industry certification. The rise of IoT has contributed to the popularity of Linux in the past few years, thanks to its significant benefits for information security personnel. This course will cover the Linux file system and how to navigate it, including running of basic commands, the configuration of network services, and how to exploit mitigations and manage access permissions.

NETWORK SECURITY

The ability to manage, secure, and operate network communication equipment is the focus of this course, including all types of systems and organizations. In addition, the course covers preparation to sit the Cisco Certified CyberOps Associate exam.*

CYBER INFRASTRUCTURE & TECHNOLOGY

In addition, you'll learn the various infrastructure defenses put to use today, as well as secure architecture design, and how to make networks, cloud infrastructures, and devices as secure as possible. Practical training includes working with Security Information & Event Management (SIEM) solutions, particularly focusing on Splunk, an open-source solution that is highly popular today.

INTRODUCTION TO PYTHON FOR SECURITY

Delve into the world of basic programming and its surrounding concepts, and learn how to use one of the most widely-used programming languages in the cyber industry, Python. The hands-on focus provides instruction on setting up a Python environment in Linux and Windows, advanced levels of programming with Python, and the use of external libraries. Earn practical experience building and using tools for the automation of tasks involved in cybersecurity. As part of the wider scope of cyberinfrastructure courses, this course will lay the foundation for a career as a Cybersecurity Practitioner, how to collaborate with Network Operations Center (NOC) teams, and how to function as the cybersecurity specialist for IT and NOC teams in a range of organization types.

OFFENSIVE SECURITY: ETHICAL HACKING

Enter the minds of black hat hackers and discover how cyber criminals think, who they are, and how to beat them at their own game. The course covers the gamut of cyber attacks and how to defend against them, such as network attacks, cryptographic attacks, social engineering attacks, and application attacks. The practical exercises and simulations demonstrate how to uncover system vulnerabilities and exploit them via specialist knowledge and skills. You will also benefit from more preparation for a range of high-level certification exams, including CompTIA Security+, CompTIA CySA+, and (ISC)² SSCP** certification exams.*

DFIR & THREAT HUNTING

In this course, you will learn digital forensics and incident response (DFIR), including procedures for successful threat hunting, management of cyber attacks in real-time, pinpointing the threats that have managed to break through current security protocols, and how to collaborate as part of a Security Operations Center (SOC) team. During the course, you will undergo preparation for several certification exams*, including CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP**. The thorough course curriculum covers threat hunting methods that are more advanced, including analytics of user behavior, artificial intelligence, and situational awareness. It all includes a deep examination of digital forensics and how to use them to investigate host and network attacks. The topic of reverse engineering of malware is also examined in-depth, so you can learn how it is executed on systems that are vulnerable. Another aspect of the course covers the SOC team's role in organizations and how it is activated to handle cyber attacks as they occur.

GAME THEORY STRATEGY IN CYBERSECURITY

The only way to get ahead of hackers is to understand how their minds work and what they plan to do next. In this course, learners get to know the concept of divergent thinking and how to implement it to win at the hacker's game. The course covers an introduction to Game Theory, which is a fundamental tool to understand the interaction of all players, the rational and irrational approaches to thought, and how to use "out of the box" thinking to predict impending attacks. The material offered in the course sharpens the learner's strategic capabilities, imparts the skills to apply Game Theory to real-life cyber attacks, and instructs in methods of solving an organization's defense issues.

CAREER SERVICES

This course is dedicated to honing your job search and supporting your abilities to find a suitable job in the professional cybersecurity industry. A host of specialist career topics are covered, such as training for interviews, how to network, assistance in internship placement, and 1:1 meetings for resume writing, LinkedIn profile optimization, and more.

INTRODUCTORY COURSE
MICROSOFT SECURITY
COMPUTER NETWORKING
CLOUD SECURITY
LINUX SECURITY
NETWORK SECURITY
CYBER INFRASTRUCTURE & TECHNOLOGY
INTRODUCTION TO PYTHON FOR SECURITY
OFFENSIVE SECURITY: ETHICAL HACKING
DFIR & THREAT HUNTING
GAME THEORY STRATEGY IN CYBERSECURITY
CAREER SERVICES
Icon
Introductory Course
(30 Hours)

Explore the areas of networking, Linux and Windows operating systems, and virtualization concepts in the Introductory Course that covers the fundamentals you need to know. The Introductory Course modules include the Cyber Attack Cycle, basic protocols and commands of computer communication, and the structure of operating systems. You will also encounter practical training sessions that introduce scenarios of real-life cyber attacks and how to apply countermeasures that defend and protect. The course concludes with an aptitude exam to assess the candidate's suitability for the full course and for a career in the field.

Microsoft Security
(40 Hours)

How to manage the networks and computers of an organization are covered in this course, including the fundamentals of Group Policy Objects and Windows Server 2012. Learn the practical side of setting up domain environments with the help of Active Directory, as well as managing network services (i.e., DHCP and DNS servers). The course will demonstrate how Windows Server 2012 differs from later updates and configuration of security services to make systems more robust.

Icon
Computer Networking
(50 Hours)

Computer networking today is an integral part of any organizational structure in nearly every industry, such as finance, hospitality, healthcare, government, technology, manufacturing, transport, and others. In this course, you will gain deep knowledge of network devices, layers, and protocols that are typically in use. An in-depth comprehension of networks is essential to a cybersecurity career. The Computer Networking course covers all the networking concepts that you must be familiar with, such as topologies, protocols, and devices. Included in this course is preparation for the CompTIA Network+ exam*, the first cyber industry certification that you will obtain during the bootcamp.

Icon
Cloud Security
(15 Hours)

This course takes a close look at cloud storage, which is the infrastructure of choice for many businesses and organizations. Data stored in the cloud is in critical need of protection, as it often comprises sensitive information that is at extremely high risk. Cloud platforms, such as Google Cloud, Microsoft Azure, and AWS by Amazon, are highly popular, and therefore any cybersecurity professional must know how to implement and manage them. Cloud security is an ongoing challenge and not just a one-time activity, so the course also covers how to ensure data integrity in the longer term. In addition, this course will prepare you with the skills and knowledge to successfully sit the AWS Certified Cloud Practitioner exam.*

Icon
Linux Security
(30 Hours)

Take this course to discover the ins and outs of the open-source Linux operating system, and particularly Kali Linux, the cybersecurity distribution. In addition to learning about Linux security and how to reinforce the OS environment, you will also get prepared to pass the LPI Linux Essentials certification exam*, a leading industry certification. The rise of IoT has contributed to the popularity of Linux in the past few years, thanks to its significant benefits for information security personnel. This course will cover the Linux file system and how to navigate it, including running of basic commands, the configuration of network services, and how to exploit mitigations and manage access permissions.

Icon
Network Security
(35 Hours)

The ability to manage, secure, and operate network communication equipment is the focus of this course, including all types of systems and organizations. In addition, the course covers preparation to sit the Cisco Certified CyberOps Associate exam.*

Icon
Cyber Infrastructure & Technology
(40 Hours)

In addition, you'll learn the various infrastructure defenses put to use today, as well as secure architecture design, and how to make networks, cloud infrastructures, and devices as secure as possible. Practical training includes working with Security Information & Event Management (SIEM) solutions, particularly focusing on Splunk, an open-source solution that is highly popular today.

Introduction to Python for Security
(25 Hours)

Delve into the world of basic programming and its surrounding concepts, and learn how to use one of the most widely-used programming languages in the cyber industry, Python. The hands-on focus provides instruction on setting up a Python environment in Linux and Windows, advanced levels of programming with Python, and the use of external libraries. Earn practical experience building and using tools for the automation of tasks involved in cybersecurity. As part of the wider scope of cyberinfrastructure courses, this course will lay the foundation for a career as a Cybersecurity Practitioner, how to collaborate with Network Operations Center (NOC) teams, and how to function as the cybersecurity specialist for IT and NOC teams in a range of organization types.

Icon
Offensive Security: Ethical Hacking
(50 Hours)

Enter the minds of black hat hackers and discover how cyber criminals think, who they are, and how to beat them at their own game. The course covers the gamut of cyber attacks and how to defend against them, such as network attacks, cryptographic attacks, social engineering attacks, and application attacks. The practical exercises and simulations demonstrate how to uncover system vulnerabilities and exploit them via specialist knowledge and skills. You will also benefit from more preparation for a range of high-level certification exams, including CompTIA Security+, CompTIA CySA+, and (ISC)² SSCP** certification exams.*

Icon
DFIR & Threat Hunting
(60 Hours)

In this course, you will learn digital forensics and incident response (DFIR), including procedures for successful threat hunting, management of cyber attacks in real-time, pinpointing the threats that have managed to break through current security protocols, and how to collaborate as part of a Security Operations Center (SOC) team. During the course, you will undergo preparation for several certification exams*, including CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP**. The thorough course curriculum covers threat hunting methods that are more advanced, including analytics of user behavior, artificial intelligence, and situational awareness. It all includes a deep examination of digital forensics and how to use them to investigate host and network attacks. The topic of reverse engineering of malware is also examined in-depth, so you can learn how it is executed on systems that are vulnerable. Another aspect of the course covers the SOC team's role in organizations and how it is activated to handle cyber attacks as they occur.

Icon
Game Theory Strategy in Cybersecurity
(10 Hours)

The only way to get ahead of hackers is to understand how their minds work and what they plan to do next. In this course, learners get to know the concept of divergent thinking and how to implement it to win at the hacker's game. The course covers an introduction to Game Theory, which is a fundamental tool to understand the interaction of all players, the rational and irrational approaches to thought, and how to use "out of the box" thinking to predict impending attacks. The material offered in the course sharpens the learner's strategic capabilities, imparts the skills to apply Game Theory to real-life cyber attacks, and instructs in methods of solving an organization's defense issues.

Icon
Career Services
(15 Hours)

This course is dedicated to honing your job search and supporting your abilities to find a suitable job in the professional cybersecurity industry. A host of specialist career topics are covered, such as training for interviews, how to network, assistance in internship placement, and 1:1 meetings for resume writing, LinkedIn profile optimization, and more.

*While the courses offer the material necessary to pass the industry exams, the program is not designed exclusively for exam preparation. Moving forward to take the certification exams is not part of the program structure and costs are not included in the tuition fee. The cost of the certification exams is the responsibility of the learner.
** In order to certify, learners must have at least one year of work experience (cumulative) in at least one of the seven domains of the SSCP Common Body of Knowledge (CBK).

Stand Out in the Cyber Job Market

Cybersecurity Industry Certifications

CompTIA Network+

The CompTIA Network+ certification exam covers configuration, management, and troubleshooting of different network devices. It also tests familiarity and skills with new technologies, including cloud, mobile, virtualization, and communication tech.

AWS Certified Cloud Practitioner

Test your skills with AWS Cloud infrastructure, security, and compliance issues with the AWS Certified Cloud Practitioner certification exam. This is an in-demand certification that will put you ahead of the competition in your job search.

Linux LPI Essentials

Your knowledge of the Linux operating system and different open-source applications are tested in the Linux LPI Essentials exam. The exam also covers your management capabilities of users and groups, skills in Linux command line, networking configuration, administration, and permissions.

Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate certification is highly sought after by potential employers. It covers the concepts and principles of security operations and the skills and knowledge necessary to work successfully in a Security Operations Center (SOC).

CompTIA Security+

To obtain the intermediate-level CompTIA CySA+ certification, candidates will need to demonstrate capabilities in intrusion detection, security analytics and cyber attack response, and data analysis for different threats, vulnerabilities, and risks. This certification is accepted by the US Department of Defense.

CompTIA CySA+

To obtain the intermediate-level CompTIA CySA+ certification, candidates will need to demonstrate capabilities in intrusion detection, security analytics and cyber attack response, and data analysis for different threats, vulnerabilities, and risks. This certification is accepted by the US Department of Defense.

(ISC)² SSCP

The high-level (ISC)² SSCP certification is aimed at candidates with hands-on knowledge and technical skills that are proven in the world of cybersecurity. To obtain this certificate, the individual must demonstrate clear capabilities in the implementation, administration, and monitoring of IT infrastructures based on advanced procedures and best practices.

CompTIA Network+
AWS Certified Cloud Practitioner
Linux LPI Essentials
Cisco Certified CyberOps Associate
CompTIA Security+
CompTIA CySA+
(ISC)² SSCP
CompTIA Network+
Certification

The CompTIA Network+ certification exam covers configuration, management, and troubleshooting of different network devices. It also tests familiarity and skills with new technologies, including cloud, mobile, virtualization, and communication tech.

AWS Certified Cloud Practitioner
Certification

Test your skills with AWS Cloud infrastructure, security, and compliance issues with the AWS Certified Cloud Practitioner certification exam. This is an in-demand certification that will put you ahead of the competition in your job search.

Linux LPI Essentials
Certification

Your knowledge of the Linux operating system and different open-source applications are tested in the Linux LPI Essentials exam. The exam also covers your management capabilities of users and groups, skills in Linux command line, networking configuration, administration, and permissions.

Cisco Certified CyberOps Associate
Certification

The Cisco Certified CyberOps Associate certification is highly sought after by potential employers. It covers the concepts and principles of security operations and the skills and knowledge necessary to work successfully in a Security Operations Center (SOC).

CompTIA Security+
Certification

To obtain the intermediate-level CompTIA CySA+ certification, candidates will need to demonstrate capabilities in intrusion detection, security analytics and cyber attack response, and data analysis for different threats, vulnerabilities, and risks. This certification is accepted by the US Department of Defense.

CompTIA CySA+
Certification

To obtain the intermediate-level CompTIA CySA+ certification, candidates will need to demonstrate capabilities in intrusion detection, security analytics and cyber attack response, and data analysis for different threats, vulnerabilities, and risks. This certification is accepted by the US Department of Defense.

(ISC)² SSCP
Certification

The high-level (ISC)² SSCP certification is aimed at candidates with hands-on knowledge and technical skills that are proven in the world of cybersecurity. To obtain this certificate, the individual must demonstrate clear capabilities in the implementation, administration, and monitoring of IT infrastructures based on advanced procedures and best practices.

The program

at your fingertips

Trulli

Bootcamp

tuition

The Cybersecurity Bootcamp at Kansas State University has a tuition fee of $15,500.
This does not include the $500 tuition for the introductory course.

Fees, deposits, and tuition are subject to change.

Skip to content