Format:
100% online
Learn on your own time
Duration:
6 months, 10-15 hrs/wk
Finish early by putting in more hours
Apply by:

Cohort starts

Why Invest in an Online Cybersecurity Bootcamp?

On average, hackers execute a cyber attack every 39 seconds, putting every company, industry, local municipality or government agency at risk. Professionally-trained cybersecurity specialists are in high demand, and the Stony Brook University Cybersecurity Bootcamp can get you job-ready in six months. 

With a curriculum developed by industry experts, the 100% online Cybersecurity Bootcamp at Stony Brook University teaches you fundamental and advanced skills through hands-on project work, including 55 labs based on real-world examples. The benefits of choosing the Stony Brook University Cybersecurity Bootcamp include:

  • Mentor 1:1 with a cybersecurity industry professional.

  • Learn on your own time with help from 24/7 student support services.

  • Become an expert in IT security and IT audit work.

  • Prepare for the leading certification hiring managers look for – CompTIA Security+.

  • Create a portfolio-worthy capstone project, running a five-phase structured walkthrough penetration test for a fictitious company.

The number of open cybersecurity jobs is predicted to reach 3.5 million by 2025. You’ll have professional training upon bootcamp completion. Plus, your chances of landing a job further increases with optional 1:1 career coaching to develop your resume, work on interview and salary negotiation skills and more. 

Ranked as the #1 public university in New York by U.S. News & World Report, Stony Brook University offers you a unique opportunity to grow your cybersecurity skills with comprehensive student support. Read on to learn more about the online Cybersecurity Bootcamp at Stony Brook University.

Types of Cybersecurity Careers

Cybersecurity is a dynamic career with many opportunities for growth and upskilling. Most salaries start just below six figures for those with beginner cybersecurity skills. Below are some of the top in-demand cybersecurity jobs and their annual median advertised salaries in New York.

  • Cybersecurity Analyst: $98,560

  • Information Security Analyst: $99,584

  • Vulnerability analyst: $87,500

Annual Median Advertised Salary. Source: Lightcast; Oct 2022 - Sep 2023; 0-3 years minimum experience required. New York.

Cybersecurity Bootcamp Curriculum

The online Cybersecurity Bootcamp at Stony Brook University thoroughly trains students in the core concepts of cybersecurity, like network security, security operations and security assessment and testing. You’ll be job-ready in 6 months or less with a 10-15 hour weekly commitment.

NEW! AI for cybersecurity curriculum

Learn to harness the power of AI with new learning units throughout your cybersecurity curriculum. You’ll explore AI’s practical applications and how to leverage them to solve cybersecurity challenges. Learn how to identify and respond to security threats in real time, to predict cyber threats and future attack trends.  With AI by your side, you can become a powerful guardian of cyberspace, and a valuable asset to your employer. Curriculum includes:

  • Introduction to AI and its Applications in Cyber Security

  • AI for Threat Detection and Incident Response

  • AI in Malware Analysis and NLP for Cyber Security

  • AI in Network Security and Threat Hunting

  • Explainable AI and AI for Predictive Security Analytics

Seven core concepts of cybersecurity

This bootcamp covers each of the components:

  • Host-Based Security.

  • Network Security.

  • Identity and Access Management.

  • Cryptography.

  • Security Assessment and Testing.

  • Security Operations.

  • Application Security.

By studying 10-15 hours per week, you should complete it in 6 months.

Course units include learning resources, practice exercises, virtual labs from InfoSec Learning, as well as 30 hours of optional career-related curriculum.

Curriculum breakdown

The course is broken into 27 total learning units, consisting of:

  • 1 Getting Started Unit.

  • 12 Technical Units.

  • 2 Basic Priming Units:

    • A Cybersecurity Basics Unit.

    • A Cybersecurity Fundamentals Unit.

  • 7 Core Concepts.

  • 1 Capstone Project Unit.

  • 1 CompTIA Security+ Preparation Unit.

  • 6 Career Preparation Units.

Course sequence
  1. Program Overview

  2. Introduction to AI and its Applications in Cyber Security

  3. Cybersecurity Basics

  4. Cybersecurity Fundamentals

  5. AI for Threat Detection and Incident Response

  6. Career Unit: Career Planning

  7. Cybersecurity Attacks

  8. Host-Based Security

  9. Career Unit: Career Branding

  10. Network Security Part I

  11. Network Security Part II

  12. AI in Network Security and Threat Hunting

  13. Career Unit: Effective Networking

  14. Identity and Access Management (IAM)

  15. Cryptography

  16. Security Architecture

  17. Security Operations (SecOps)

  18. Application Security

  19. Explainable AI and AI for Predictive Security Analytics

  20. Security Assessment and Testing

  21. AI in Malware Analysis and NLP for Cyber Security

  22. Capstone Project

  23. Career Unit: Your Application Materials

  24. CompTIA Security+ Exam Prep Unit

  25. Career Unit: Effective Interviewing for Cybersecurity

  26. Career Unit: Salary Negotiation

  27. Congrats and Next Steps After Course Completion

Get an Early Look at Three Cybersecurity Technical Units

The online Cybersecurity Bootcamp at Stony Brook University consists of 21 learning units, including a capstone project showcasing your cybersecurity skills for hiring managers. Here’s a preview of three technical units for the online Cybersecurity Bootcamp:

Cybersecurity Fundamentals

In this unit, you'll get a peek behind the curtain of the cybersecurity stage. You'll study the behavior, motivations, and game plan of your adversary — the cybercriminal. You'll learn about threat actors, the most common types of attacks, plus the frameworks and models used to build a robust defensive playbook. 

You'll understand how professionals set the defense standards through the CIA Triad, and the cyber kill chain model. You'll also study real-life data breaches to get a glimpse of how rapidly the dominoes can fall. Finally, you'll be introduced to the CompTIA Security+ certification exam and become familiar with Linux and Unix.

Topics Covered:

  • The CIA Triad: Three-Legged Stool

  • Threat Actor Types and Attributes

  • Cyber Kill Chain

  • Ethical Hacking 

  • Using Linux and Unix

  • Intro to CompTIA Security+ Certification

Identity and Access Management

Identity and Access Management (IAM) is one of the most important disciplines within cybersecurity. It aims to manage user identities and their access to enterprise resources and data. IAM governance and programs—including policies, processes, and technologies—manage user identities and access, as well as what a user can do within a system through authentication, authorization, and accounting. At the end of the unit, you’ll have the option to prepare for and take the Microsoft Security, Compliance, and Identity Fundamentals exam (Exam SC-900), which is 50% off for students taking this course.

Topics Covered:

  • Controlling Access

  • Zero Trust

  • Microsoft Security, Compliance, and Identity Fundamentals

Security Assessment and Training

In the Security Assessment and Testing unit, you will learn how to conduct security assessments and recommend remediation activities. You will also learn how to create Information Security (IS) audit test plans, which will give you insight into how IS auditors approach their engagements. Exposure to advanced concepts around web security testing and the use of Kali Linux is also included. Mini-projects in this unit will allow you to explore another side of penetration testing,  real-world vulnerability management challenges, and software testing plans. Labs in this unit will give you another slice of the red-team world, taking you through attacking web servers, exploring a vulnerable web application, and cracking passwords.

Topics Covered:

  • Logical and Physical Security Testing

  • Mobile Device Security

  • Governance Risk and Compliance

  • Security Policies 

4 Ways You Are Supported

As a 100% online program, we know student support is critical for your success. The Stony Brook University Cybersecurity Bootcamp provides 24/7 access to support services in four ways:

  1. Student Advisor - You’ll be paired with an advisor with comprehensive program knowledge to help you with questions, projects and brainstorming and provide much-needed motivation if you get stuck.

  2. Expert Mentor - You will be matched with a mentor who works in the industry and with whom you will meet regularly 1:1 to discuss your progress and upcoming projects. 

  3. Career Coaching - Get a head start on job applications, learn how to interview and negotiate your salary and more with optional career units and 1:1 coaching.  

  4. Online Community - Join our online student community and connect with others to share feedback, collaborate, brainstorm and get help or advice. 

Take Advantage of 1:1 Mentorship

Industry experts share their knowledge and experience with Stony Brook University students. You’ll be supported throughout the online Cybersecurity Bootcamp with:

  • Regularly 1:1 video calls: Meet with your mentor regularly face to face to discuss your progress and talk about upcoming projects. 

  • Accountability: Because you go at your pace, being accountable to a mentor can keep you on track and help with roadblocks.

  • Dedicated mentor calls: Gain a different industry perspective when you connect with other mentors. Additional 1:1 mentorship is available at no additional cost.

Meet Some of Our Mentors

mentorAvatar
Alissa Torres
Senior Threat Hunter
mentorAvatar
Jay James
Cyber Security Operations Lead
mentorAvatar
Mark Adams
Sr Manager, IT Security & Compliance
mentorAvatar
Leonard Simon
MSSP Manager

Is an Online Cybersecurity Bootcamp Right For You?

The Cybersecurity Bootcamp at Stony Brook University can help jumpstart your cybersecurity career. You’ll learn how to protect companies from digital threats through fundamentals and study for certifications that can help you get hired. Plus, we don’t require coding or computer science skills, just a penchant for problem-solving, solid communication and collaboration.

Prerequisites:

  • All school or professional backgrounds are welcome, but you must demonstrate strong analytical skills and commit to completing the courses.

  • You’ll have to pass a soft skills assessment, demonstrating your communication, motivation, professionalism and analytical ability. 

FAQ

What is cybersecurity?

In general, cybersecurity consists of the process and techniques used to protect sensitive data, computer systems, networks and software applications from cyber attacks.

Some of the most popular topics covered in cybersecurity include:

  • Unauthorized access to systems and data.

  • Disrupting the normal functions of a business and its processes.

  • Using ransomware attacks to encrypt data and extort money from victims.

Does cybersecurity require coding?

Entry-level roles generally do not require any coding experience, but programming is a powerful skill to have in your toolkit as you progress in your career. This course will teach you basic Python, Perl and Powershell. No coding experience is required for acceptance into this Cyber Security Bootcamp.

What skills are needed to work in cybersecurity?

Professionals working in the cybersecurity field must have a strong analytical mindset, robust communications skills and a highly collaborative work ethic. In this course, you’ll also build the following technical skillset:

  • Incident response.

  • Threat intelligence.

  • Operating system security.

  • Application security.

  • Network scanning tools.

  • Network mapping.

  • Firewall.

  • IDS/IPs.

  • Vulnerability assessments.

  • IT controls.

  • Packet capture.


While building the technical skillset, Cyber Security Bootcamp students will have access to the following tools:

  • Nmap for network scanning.

  • Wireshark: A free and open-source network protocol analyzer.

  • Metasploit for vulnerability scanning, enumeration, executing attacks and more.

  • Kali Linux for digital forensics, penetration testing, ethical hacking and more.

  • Kleopatra for security key encryption.

  • Autopsy for digital forensics.

  • OpenVAS for vulnerability scanning.

  • Zenmap, the graphical interface of Nmap, used for scanning, network mapping and more.

  • GoPhish to run phishing simulations.

  • Low Orbit Ion Cannon for stress testing and denial-of-service attack application.

What type of jobs can you do after a cyber security bootcamp?

You’ll be able to gain an entry-level position as a cybersecurity analyst, specialist and incident analyst/responder.

Graduates also pursue other roles, such as SOC analyst, cybersecurity engineer, cybersecurity consultant, cybersecurity manager / administrator, systems engineer, network engineer / architect, software developer / engineer, vulnerability analyst, cyber crime analyst/ responder and IT auditor.

How long does it take to complete a cyber security bootcamp?

This course is designed to be completed in 6 months or less depending on how much time you dedicate each week. It is completely flexible with you in the driver’s seat.

What is the salary of someone working in cybersecurity?

Potential salary ranges depending on your work experience, geographic location, role and work sector.

Cybersecurity analysts roles for those at the beginning of their career (0-3 years experience) have an annual median advertised salary of $98,560. (Source: Lightcast, Oct 2022 - Sep 2023; 0-3 years minimum experience required. New York.)

Is cybersecurity in high demand?

Yes, according to the U.S. Bureau of Labor Statistics, cybersecurity jobs are expected to grow 35% through 2031, much faster than average for other occupations.

According to Cybersecurity Ventures, there are an estimated 3.5 million unfulfilled cybersecurity jobs as the demand to fill these jobs far outweighs the number of individuals qualified to undertake a complex field.

Is a cybersecurity bootcamp worth it?

Yes! You’ll have the skills you need to succeed in 6 months’ time with a support system ready to help you in your job search.

More Questions About the Program?

Speak to our enrollment team by completing an application, email Carolina our enrollment advisor or explore more frequently asked questions

Carolina Headshot

Request the Syllabus

Get Started

Upcoming Programs