Classes begin quarterly
Become a Cybersecurity Professional in 24 Weeks
New York-Based Online Cybersecurity Boot Camp
Big data needs big protection. And as computer networks grow, so too does the quantity of vulnerable information. It’s no surprise that cybersecurity is among the fastest-growing careers, with a 28% growth in jobs projected through 2026 in New York state, according to data from the U.S. Department of Labor.*
Columbia Engineering Cybersecurity Boot Camp offers a multidisciplinary approach to attaining proficiency in IT, networking, and modern information security over the course of 24 intensive weeks.
- Gain experience with a host of popular tools such as Wireshark, Kali Linux, Metasploit, Nessus, and more.
- Learn skills applicable to certifications such as the CompTIA Security+, Network+, Linux+, Server+, Cloud+, and certified Ethical Hacker (CEH).
- Advance your skill set even if you’re currently employed or in school through convenient evening and weekend classes.
- Benefit from a comprehensive set of career services to help equip you for success as you work to change career paths or advance in your current position.
Get Boot Camp Info
Is this cyber boot camp right for you?
If you are eager to become a digital defender and learn how to keep data safe from prying eyes, or if any of the below describe you, enrolling in this boot camp could help put you on the path to achieving your goals:
- You are currently working in a technical field and want to expand your cyber knowledge, better understand how to keep data secure, and learn hands-on skills to apply on the job.
- You are a part of a company that has urgent cybersecurity needs to protect the confidentiality, availability, and integrity of data and software.
- You understand the growing need for cybersecurity professionals and want to get hands-on training in defensive and offensive cybersecurity to become a part of making the internet a safer space.
- You are a tech enthusiast looking to start your career in tech and learn how to conduct vulnerability assessments and identify suspicious patterns of user behavior to get your foot in the door in the world of networking and security.
Building On The Basics
Achieving your goals in cybersecurity requires not only deep security knowledge but also experience with the application of that knowledge. Our curriculum is designed to give you both the knowledge you need to move toward the cybersecurity industry and ample experience applying that knowledge to real-world problems.
Throughout the course, you will learn tools and technologies vetted by current practitioners, and learn skills applicable to certifications expected of all serious security professionals.
At Columbia Engineering Cybersecurity Boot Camp, you will get hands-on training in networking, systems, web technologies, databases, and defensive and offensive cybersecurity. You will also learn methods, techniques, and best practices for accurately conveying the severity of the risks facing an organization’s security posture.
You’ll learn from skilled instructors and gain real-world experience by collaborating with your peers. Through hands-on application, you’ll gain the confidence you need to tap into the industry. The curriculum* will dive into the foundational skills for cybersecurity, including:
- Packet Analysis
- Windows and Linux Administration Techniques
- Windows and Linux Hardening
- Secure Network Design and Architecture
- Risk Management
- Vulnerability Assessment
- Identity and Access Management
- Cloud Security
Ethical Hacking and Penetration:
- Kali Linux
- Burp Suite
- Web Vulnerabilities and Security
- Digital Forensics Methods
- Penetration Testing
- Vulnerability Assessment
- Security Operations and Analytics
Programming and Scripting:
- Bash Scripting
- PowerShell Scripting
*The material covered is subject to change. Our academic team adjusts to the market demand.
By the time you complete Columbia Engineering Cybersecurity Boot Camp, you will know how to:
- Conduct vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities
- Configure machines on a virtual network, deploy them to the cloud, and investigate cloud security risks
- Identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
- Write Bash scripts to automate security and operating systems tasks
How to Apply
- Contact form. First, you will need to submit the form telling us which boot camp you’re interested in pursuing.
- Interview and Application. An admissions officer will then connect with you to discuss course details, answer any questions you may have, and ask you a few questions to ensure that Columbia Engineering Boot Camps are a good fit for you. Then, you will fill out a short application. All individuals are invited to apply, regardless of educational background or professional experience.
- Assessment. You’ll have 40 minutes to complete a basic multiple-choice, critical thinking and problem-solving assessment. If you do not pass on your first attempt, you will have the opportunity to retake the assessment.
- Enrollment. After you pass the assessment, you’ll be accepted into the boot camp. At this stage, you will work with your admissions officer to determine which financial option is right for you. Secure your seat by signing your enrollment agreement and paying your deposit.
Cybersecurity Job Outcomes in NYC
Those who complete the Cybersecurity Boot Camp will have acquired the skills and critical thinking relevant to the following jobs:
This role is more commonly found in the military than in the private sector. Individuals in this position perform specialized computer network defense duties, including infrastructure support, incident response, auditing, and managing. They also use a variety of tools to detect, analyze, and protect against cyber attacks.
A cybersecurity analyst investigates security breaches, monitors systems for issues, and installs security software and firewalls. Rather than being tasked with providing the one-on-one client support that an entry-level technician does, an analyst would be more likely to assume a broader perspective over systems at large.
Responsibilities for this role include developing risk mitigation strategies, tracking vulnerabilities, creating and maintaining vulnerability management policies, setting requirements for information security solutions, and identifying possible network security attacks.
This is another title more commonly found in the military than in civilian roles. The main responsibility of this position is providing cyber intelligence through monitoring an emerging threat, helping protect a network, or implementing new security measures.
Individuals in this role develop policies and systems to protect their companies’ and customers’ sensitive data. Their goal is to build and maintain a safe digital environment for the company’s other employees by mitigating the threat of cyber attacks.
Analysts work directly with collected data to spot suspicious activity in databases, servers, networks, or other proprietary software. Once a breach occurs, analysts lead efforts to mitigate the damage and prevent future attacks.
These professionals play a primary role in defining standard organizational guidelines through designing and implementing systems and processes intended to keep electronic information private and secure. Their work includes analyzing existing processes and safeguards, recommending changes, monitoring systems for any signs of vulnerability, and creating policies and procedures for reporting issues.
Digital forensics refers to the application of investigative techniques to uncover sources of digital crime and hacking attempts. Specialists working in forensics must collect digital evidence, carefully retrieve and examine it through approved extraction methods, attempt to find out who created the data, and then report the results to approved authorities.
These analysts monitor and identify security threats to an organization’s cyber system. They identify security vulnerabilities and perform security audits, risk analyses, network forensics, malware analysis, and penetration tests. They’ll also work with other members of the cybersecurity team to develop incident response plans and policies.
“SOC” stands for Security Operations Center. This role often provides the first response to a cyber attack. SOC Analysts report cyberthreats and then implement changes to protect an organization. They are generally part of a large security operations team where they investigate, document, and report on information security issues and emerging trends.
What does a career in cybersecurity look like?
The field of cybersecurity is ever-growing and changing. In the past, cybersecurity primarily focused on preventing access from the outside by forming a perimeter of defense measures such as firewalls or antivirus software to prevent cyber crimes. These crimes date back to the 1970s when early computerized phone systems were targeted in order to steal long-distance telephone time.
Today’s data travels in all directions at lightning speed, meaning that cybersecurity measures must be much more varied and sophisticated. Over the past several years, the occurrence of cyber crime has increased to include cyber espionage, ransomware, and phishing schemes. The cybersecurity industry has expanded as a result, with spending expected to exceed $1 trillion by 2021, as reported by Cybersecurity Ventures.
Cybersecurity specialists are in higher demand than ever because employers are finding it challenging to secure qualified candidates. Employers in the U.S. currently employ less than half of the cybersecurity candidates they need to keep up with demand. Right now, there are just 48 qualified candidates for every 100 cybersecurity job postings. It would take a 145 percent increase in the current cybersecurity workforce just to meet the global demand.
There are a wide variety of cybersecurity roles, both for people who have technical and non-technical backgrounds. Regardless of the career path you choose, you will be involved in the process of protecting data, electronic systems, and networks against cyber attacks.
Some of the skills you’ll need for the field include, but are not limited to:
- Risk assessment and management
- Cryptography and encryption
- Incident response
- Security operations
- Penetration testing
The market demand for cybersecurity professionals in NYC
The demand for cybersecurity professionals has never been greater. After the May 2021 Colonial Pipeline attack, and the MTA hack in April of the same year, companies and individuals are realizing the necessity of a strong cybersecurity posture and the need for professionals who enable a high level of security.
In fact, national cybersecurity job growth is anticipated to be a staggering 23.4 percent in the next 10 years, according to Burning Glass Technologies 2020 Labor Insight™. This growth is more than double the 8 percent projected growth rate for all occupations through 2030 by the U.S. Bureau of Labor Statistics (BLS). In addition, Burning Glass also ranks New York in the top 5 states with the highest number of cybersecurity job postings in the nation during the last 12 months.
In New York City, the median cybersecurity salary was $103,000, which is 5 percent greater than the national median of $96,081 according to Burning Glass. Given the number of cybersecurity job postings in NYC offering a salary higher than the national average, cybersecurity is an excellent field to consider if you reside in the New York metropolitan area.
Another exciting aspect of working in cybersecurity is the diversity of organizations looking for qualified professionals. For example, the NYC Cyber Command (formed in 2017) is continuously looking for cyber professionals to help combat cyber threats to municipal infrastructure, resources, and data. According to Indeed.com, locally based companies such as Citi, The New York Times, J.Crew, and Penguin Random House are seeking assistance with their cybersecurity posture. Educational and healthcare institutions such as The New School, New York University, Mount Sinai, and NYU Langone Health are seeking cybersecurity professionals as well.
Whether you’re interested in the corporate, healthcare, government, or education sector, you’ll find cybersecurity professionals are needed and valued in most industries. Become indispensable — learn how to combat cyber attacks and take the next step in your future today! Enroll in Columbia Engineering Cybersecurity Boot Camp and get started.
Get Boot Camp Info
Frequently Asked Questions
Our cybersecurity boot camp in New York is being held via our tried and tested virtual classroom experience. Call us at (646) 870-1598 for more information on how to apply, or visit our Online Experience page to learn more.
No, applicants do not need to be Columbia students. The Cybersecurity Boot Camp is offered through Columbia Engineering.
No experience is needed as long as you are dedicated and eager to learn. Our pre-course tutorials will help you prepare for our boot camp.
Columbia Engineering Cybersecurity Boot Camp offers financial options for paying your tuition. You can take advantage of our interest-free, six-month payment plan, allowing you to pay your tuition in equal monthly installments over the length of the course. If you need more payment flexibility, you can apply for approval to use the 24-month, interest-free payment plan option with EdAid and split your payments over an extended, 24-month period
The demand for cybersecurity professionals is growing. A 2019 report by (ISC)2 noted that the cybersecurity workforce gap is nearly 500,000 in the United States alone. That talent pool would need to grow by 62 percent to meet the current demand posed by American businesses. This workforce shortage poses a great opportunity for people looking for employment security and career growth. In addition to the demand, cybersecurity is also a fascinating career.
Successful cybersecurity teams continually strive to secure networks, proprietary applications, and systems against online threats, creating multiple layers of protection across networks, computers, and sensitive data. As attackers become ever more innovative, it falls to these information security professionals to prevent malicious players from accessing, changing, or destroying sensitive data.
Not all cybersecurity roles require coding experience. While coding is not a hard requirement, having a strong understanding of web applications, databases, and the vulnerabilities associated with them, as well as the skills to write scripts for automating security and operating systems tasks, can help set you apart as a competitive cybersecurity professional.
Cybersecurity Boot Camp Schedule
- 24-week boot camp
- Classes held two weekdays from 7 to 10 p.m.
and Saturdays from 10 a.m. to 2 p.m.
In 24 weeks, Columbia Engineering Cybersecurity Boot Camp can help give you the technical skills you need to protect today’s cyber space.
Through immersive hands-on experience, you will not only learn the fundamental skills for cybersecurity, but also put them into action on practical exercises.
Learning Module: Security Fundamentals
Description:In this module, you will learn to think like a cybersecurity professional by assessing threats and mitigating risks. You will also look at security from an organizational perspective as you dive into Governance, Risk, and Compliance. You will learn how security controls impact an organization and its employees. This will enable you to communicate with non-security professionals, work with stakeholders outside of the security space, and understand how teams interact in an organization.
What You Will Learn:
- CIA Triad
- Risk Analysis and Risk Mitigation
- Business Continuity Planning
- Disaster Recovery
Learning Module: Systems Administration
Description:You will cover both Linux and Windows systems administration. You will gain hands-on experience working with the command line and bash commands that are prominent in IT roles. You will configure and audit servers, as well as harden and secure them from malicious attacks.
What You Will Learn:
- Linux Server Configuration
- Tar, Cron, and Cronjobs
- Bash Scripting and Programming
- Windows Server Configuration
- Active Directory
Learning Module: Networks and Network Security
Description:You will dive into network configuration, design, protocols and data communication. You will study cryptography, network security, cloud security, and virtualization.
What You Will Learn:
- Network Architecture, Operations, and Security
- Wireshark and Traffic Analysis
- Email Security
- Wireless Security
- Cryptography and Encryption
- Port Scanning
- Cloud Security and Virtualization
Learning Module: Defensive Security
Description:You will dive into SIEMs and network security monitoring. You will cover the Incident Response framework and practice responding to different breaches and attacks. You will also cover Digital Forensics and how to recover deleted data as part of preparing evidence for a legal case.
What You Will Learn:
- Monitoring and Logging
- Incident Response
- Data Extraction and Recovery
Learning Module: Offensive Security
Description:You will gain a thorough understanding of web applications, databases, and the vulnerabilities and hardening associated with them. You will dive into penetration testing using tools like Metasploit to attack and compromise networks and servers.
What You Will Learn:
- Burp Suite
- XSS Vulnerabilities and Payloads
- SQL Injection
- File Inclusion and Command Injection Vulnerabilities
- Penetration Testing Execution Standard
- Searchsploit and Metasploit
- Pivoting Networks
Learning Module: Test Prep and Final Projects
Description:You will focus on certification prep for Security+ and CEH exams and conclude the course with a final group project.
What You Will Learn: