There’s never been a better time to join the mission to prevent global cybercrime. Developed in collaboration with top employers and industry pros, this 15-week will fast-track the tech skills you need for a new career as a tier 1+ cyber professional in Washington, D.C.
Safeguard our systems from threats with a career in cybersecurity
Looking for a career with purpose? Cybersecurity professionals work to protect the digital networks, data and devices we rely on from unauthorized access and malicious cyber criminals.
Designed for students with technical backgrounds, this rigorous 15-week program will teach you real skills using real tools, including our custom-built ‘Cyber Range’ lab environment. Thanks to our proven, employer-oriented curriculum, you’ll graduate prepared for a range of vital tier 1+ cybersecurity roles — like security engineer or penetration tester — in months, instead of years.
What you'll learn: comprehensive cybersecurity engineering skills
During 15 intense weeks on Flatiron School’s D.C. campus, our Cybersecurity Engineering curriculum will prepare you for a jump into the cybersecurity industry. You’ll get fluent in cybersecurity tools like Python, Wireshark, Linux, and Metasploit, then learn how to use them to defend against cybercriminals. The program includes 9 modules designed to fully prepare you for a career as a tier 1+ security engineer, technical analyst, penetration tester or consultant.
Network Security
You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning and domain spoofing, as well as countermeasures. '
You’ll then explore sniffing and port scanning, firewalls, IDSes and NIDSes and cover wireless protocols and their security.
System Security
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits and Android and iOS security.
Python
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
Governance, Risk, and Compliance (GRC)
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
Logs and Detection
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
Threat Intelligence
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
Application Security
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
Applied Cryptography
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
Capstone
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.