ONLINE / PART-TIME
Cybersecurity Bootcamp Online Part-Time



U.S International Certificate

Learn By Doing
50-75% Lab Work

Career Service From Day One

10 Years Of Learning Science
NEXT PROGRAM DATES
Open
Enroll By
to start class on
Talk to Admissions
+(216) 58 858 571
OVERVIEW
Cybersecurity Jobs are Rewarding, Lucrative, & In-Demand
The importance of cybersecurity today cannot be overstated, which makes it a good time to join a cybersecurity bootcamp. As our reliance on technology grows, there’s a corresponding need to secure and defend networks and data against leaks, theft, and attacks. That’s good news for those seeking cybersecurity certification-the U.S. Bureau of Labor Statistics projects cybersecurity jobs will grow 31% through 2029. In short, there’s job security in cybersecurity.
After completing Coding Dojo’s Cybersecurity bootcamp, students are mission-ready to identify, assess, report, and mitigate technology and information security risks.

- Gain hands-on experience with a host of popular tools such as Wireshark, Kali Linux, Metasploit, and more within a sandbox environment.
- Learn skills applicable to certifications such as the CompTIA Security+, CySA+ , Network+, Linux+, Server+, Cloud+, and certified Ethical Hacker (CEH).
- Benefit from a comprehensive set of career services to help equip you for success as you work to change career paths or advance in your current position.
- Cover the latest real-world deployment of cybersecurity management practices, including defensive and offensive tactics, NIST Cybersecurity Framework, and event & incident management.
EXPLORE CODING BOOTCAMP
Question? Get Quick Answers

Schedule Admissions Call
1-on-1 call for quick answers about bootcamp

Join the Open House
Meet the team, see the bootcamp breakdown
WHY US?
The Dojo Difference
By completing Coding Dojo’s Cybersecurity program, you’ll stand out from other bootcamp graduates and be mission-ready for a challenging and rewarding career path from day one.
Gain a tactical advantage by preparing for the CySA+ certification exam.
Cybersecurity is a highly standardized field with a range of skills certifications. CompTIA Security+ is the bootcamp standard, but we take you further - adding material to help you prepare for the CySA+ certification.
*Coding Dojo cannot guarantee that graduates of this program will be eligible to take third party certification examinations. Certification requirements for taking and passing these exams are controlled by outside entities and are subject to change without notice to Coding Dojo.
No professional experience requirements
Unlike other bootcamps that require work experience in IT or related field or a 4-year degree, we recognize that many Cyber professionals are self-taught.
Extensive hands-on training
Our Cybersecurity bootcamp features extensive offensive and defensive experience within our sandbox. Near the end of course, up to 75% of your time is spent in labs, attacking and defending against each other in Capture the Flag and other exercises. Graduates are mission-ready with an informed perspective on cybersecurity and be ready to hit the ground running.
CURRICULUM
Curriculum Overview
WEEKS 2-0
PRECOURSE
The pre-course will cover the schedule, stack expectations, certification process, and graduation requirements of the program. You’ll also review some basic cybersecurity resources and complete reading and assignments to familiarize yourself with the framework and foundations of cybersecurity. Finally, you’ll get your virtual machine (VM) up and running.
WEEKS 1-8
Track 1: CORE
In the Core track, you will build foundational knowledge across key areas of cybersecurity. This track covers both hardware and software, configuring multiple operating systems, understanding network architecture, and the basic principles to identify vulnerabilities and risks.
What You’ll Learn:
- Cybersecurity basics including: Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure Software, Testing, Cryptography
- How to build out a Kali Linux machine while learning about networking and data security.
- Network configurations and data security, including Network Design, Firewall Configuration, Access Control
- Viruses and Ransomware, intrusion detection, useful tools, introduction to embedded (control) systems, secure shell, mobile & endpoint security.
- Virtual Machines, malicious code, Disaster Recovery, and Powershell
- Identifying and responding to incidents, technical and legal elements of forensics
- Learn how resiliency, automation, and backups provide essential and fundamental protection
- Start learning what a career in cybersecurity looks like
Hands-on Experience:
- VM Setup
- Windows & Mac Directions
- Network Settings
- Scanning Networks
- Packet Sniffing
- Nessus Installation
- Password Cracking
- Basic ACL
- Firewall Configuration Kali
- Secure Network Design
- Snort Installation
- SSH
- Endpoint Protection
- Malicious Code
- Powershell Security
- Configuring an Intrusion Detection System
- Incident Response
- Digital Forensics
WEEKS 9-6
Track 2: INTERMEDIATE
By completing this track, students will be able to demonstrate to prospective employers basic security skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies and regulations.
What You’ll Learn:
- Understand roles and responsibilities, security controls, indicators of compromise, understanding threats, attack tools, monitoring networks
- Protect networks, monitor and analyze various services for signs of compromise, run scripts, understand and use SIEM (Security Information and Event Management)
- Examine forensic tools and techniques, digging into indicators of compromise, understanding detection and containment, learning digital evidence collection, understanding frameworks, policies and procedures, exploring attacker lateral movement and pivoting.
- Learn intermediate incident response as well as effective recovery.
- How to conduct a risk analysis and vulnerability assessment
- Understand regulations in cybersecurity
- Learn technical and non-technical controls, the relationship of security and privacy, & how to configure and analyze share permissions
- Learn cloud technologies and how to protect your cloud-based solutions with OWASP
Hands-on Experience:
- IoC Investigation
- Network Group Assignment
- Wireshark Analysis
- Log Analysis
- Windows Security Logs
- Analyzing Email Headers
- SIEM Group Assignment
- Digital Evidence Collection
- Incident Response Write-Up
- Risk Management
- Nmap Formatting
- Credential Security
- Wireshark
- Research Assignment (Regulations)
- Linux Audit
- Configuring and Analyzing Share Permission
- OWASP Research
- Web Assessment
WEEKS 17-24
Track 3: PROFESSIONAL
By the end of the program, students will be able to configure and apply threat intelligence, conduct vulnerability assessments and mitigation, investigate data to provide continuous security monitoring, analyze potential indicators of compromise, apply incident response protocols in support of risk mitigation, and conduct basic threat hunting. You’ll end your bootcamp with your second belt exam and will receive the vouchers for your CompTIA Security+ and CySA+ exams.
What You’ll Learn:
- Discuss the ethics of hacking
- Penetration testing, Metasploitable2 and Eternal Blue
- Understanding the underlying capabilities of search engines, WHOIS, DNS, nmap, dirbuster and gobuster, nikto, social engineering, specialized scanners, SNB enumeration
- Proactive threat hunting.
- Local File Inclusion and Remote File Inclusion, SQL injection techniques and defenses, hacking and testing mobile devices.
- Counter and create a buffer overflow attack
- Add to your malware knowledge with advanced techniques and tools.
- Elevate privilege to fully exploit platforms, monitor the network, or access other systems during an attack.
- Learn various sources for exploits and how to use them, including password attacks.
Hands-on Experience:
- Metasploitable3 & Good Gone Bad
- Eternal Blue
- Footprinting Assignment
- Specialized Scanners
- SMB Enumeration
- Vulnerability Scanning 1 of 2
- Vulnerability Scanning 2
- BurpSuite Setup
- LFI/RFI
- SQL Injection
- Windows BOF
- Analyzing Output from Web Application Assessment Tools
- Malware Analysis
- Linux Privesc
- Windows Privesc
- How Many Shells?
- Password Attacks
WEEK 24
GRADUATION!
The pre-course will cover the schedule, stack expectations, certification process, and graduation requirements of the program. You’ll also review some basic cybersecurity resources and complete reading and assignments to familiarize yourself with the framework and foundations of cybersecurity. Finally, you’ll get your virtual machine (VM) up and running.
- PRE-COURSE Weeks -2-0
- TRACK 1: CORE Weeks 1-8
- TRACK 2: INTERMEDIATE Weeks 9-16
- TRACK 3: PROFESSIONAL Weeks 17-24
- GRADUATION Week 24
- Cybersecurity Bootcamp Online Part-Time PRE-COURSE Weeks -2-0
PRECOURSE:
Weeks -2-0The pre-course will cover the schedule, stack expectations, certification process, and graduation requirements of the program. You’ll also review some basic cybersecurity resources and complete reading and assignments to familiarize yourself with the framework and foundations of cybersecurity. Finally, you’ll get your virtual machine (VM) up and running.- Cybersecurity Bootcamp Online Part-Time TRACK 1: CORE Weeks 1-8
Track 1: Core
Weeks 1-8
In the Core track, you will build foundational knowledge across key areas of cybersecurity. This track covers both hardware and software, configuring multiple operating systems, understanding network architecture, and the basic principles to identify vulnerabilities and risks.What You’ll Learn:
- Cybersecurity basics including: Controls, Frameworks, Benchmarks, Virtual Machines, Threats, Vulnerabilities, Defenses, Secure Software, Testing, Cryptography
- How to build out a Kali Linux machine while learning about networking and data security.
- Network configurations and data security, including Network Design, Firewall Configuration, Access Control
- Viruses and Ransomware, intrusion detection, useful tools, introduction to embedded (control) systems, secure shell, mobile & endpoint security.
- Virtual Machines, malicious code, Disaster Recovery, and Powershell
- Identifying and responding to incidents, technical and legal elements of forensics
- Learn how resiliency, automation, and backups provide essential and fundamental protection
- Start learning what a career in cybersecurity looks like
Hands-on Experience:
- VM Setup
- Windows & Mac Directions
- Network Settings
- Scanning Networks
- Packet Sniffing
- Nessus Installation
- Password Cracking
- Basic ACL
- Firewall Configuration Kali
- Secure Network Design
- Snort Installation
- SSH
- Endpoint Protection
- Malicious Code
- Powershell Security
- Configuring an Intrusion Detection System
- Incident Response
- Digital Forensics
- Cybersecurity Bootcamp Online Part-Time TRACK 2: INTERMEDIATE Weeks 9-16
Track 2: INTERMEDIATE
Weeks 9-16
By completing this track, students will be able to demonstrate to prospective employers basic security skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies and regulations.
What You’ll Learn:
- Understand roles and responsibilities, security controls, indicators of compromise, understanding threats, attack tools, monitoring networks
- Protect networks, monitor and analyze various services for signs of compromise, run scripts, understand and use SIEM (Security Information and Event Management)
- Examine forensic tools and techniques, digging into indicators of compromise, understanding detection and containment, learning digital evidence collection, understanding frameworks, policies and procedures, exploring attacker lateral movement and pivoting.
- Learn intermediate incident response as well as effective recovery.
- How to conduct a risk analysis and vulnerability assessment
- Understand regulations in cybersecurity
- Learn technical and non-technical controls, the relationship of security and privacy, & how to configure and analyze share permissions
- Learn cloud technologies and how to protect your cloud-based solutions with OWASP
Hands-on Experience:
- IoC Investigation
- Network Group Assignment
- Wireshark Analysis
- Log Analysis
- Windows Security Logs
- Analyzing Email Headers
- SIEM Group Assignment
- Digital Evidence Collection
- Incident Response Write-Up
- Risk Management
- Nmap Formatting
- Credential Security
- Wireshark
- Research Assignment (Regulations)
- Linux Audit
- Configuring and Analyzing Share Permission
- OWASP Research
- Web Assessment
- Cybersecurity Bootcamp Online Part-Time TRACK 3: PROFESSIONAL Weeks 17-24
Track 3: PROFESSIONAL
Weeks 17-24
By the end of the program, students will be able to configure and apply threat intelligence, conduct vulnerability assessments and mitigation, investigate data to provide continuous security monitoring, analyze potential indicators of compromise, apply incident response protocols in support of risk mitigation, and conduct basic threat hunting. You’ll end your bootcamp with your second belt exam and will receive the vouchers for your CompTIA Security+ and CySA+ exams.What You’ll Learn:
- Discuss the ethics of hacking
- Penetration testing, Metasploitable2 and Eternal Blue
- Understanding the underlying capabilities of search engines, WHOIS, DNS, nmap, dirbuster and gobuster, nikto, social engineering, specialized scanners, SNB enumeration
- Proactive threat hunting.
- Local File Inclusion and Remote File Inclusion, SQL injection techniques and defenses, hacking and testing mobile devices.
- Counter and create a buffer overflow attack
- Add to your malware knowledge with advanced techniques and tools.
- Elevate privilege to fully exploit platforms, monitor the network, or access other systems during an attack.
- Learn various sources for exploits and how to use them, including password attacks.
Hands-on Experience:
- Metasploitable3 & Good Gone Bad
- Eternal Blue
- Footprinting Assignment
- Specialized Scanners
- SMB Enumeration
- Vulnerability Scanning 1 of 2
- Vulnerability Scanning 2
- BurpSuite Setup
- LFI/RFI
- SQL Injection
- Windows BOF
- Analyzing Output from Web Application Assessment Tools
- Malware Analysis
- Linux Privesc
- Windows Privesc
- How Many Shells?
- Password Attacks
- Cybersecurity Bootcamp Online Part-Time GRADUATION Week 24
Graduation!
Week 24
Way to go! By now you have the hands-on experience, knowledge and career service support to start sending in those job applications. Continue to leverage your career services manager and your fellow graduates as you schedule and take your CompTIA Security+ and CySA+ exams. Armed with these certifications, you’ll be well on your way to a successful career in cybersecurity.
TYPICAL WEEK
Our Part-Time Format

Lectures
5 PM CET
Always live, but always recorded!

Optional Office Hours
Need more help understanding a concept? Hang out after a lecture to discuss your questions with the instructor

Play in the Sandbox
Detonate malicious programs, defend against attacks, and practice your CTFs inside the sandbox. 50-75% of your learning will be spent in these hands-on exercises.

Self Study
Most students dedicate about 25 hours a week to self study, though you may need more or less depending on your experience and learning style.
EXPLORE CODING BOOTCAMP
Support When You Need It
Student support begins the day you inquire about pursuing your studies with Coding Dojo. You’ll find support throughout your Admissions journey, along the way through your program, and beyond graduation with Career Services that never expire.

Live Instruction
Learn live over Zoom with your cohort every week interacting directly with your instructors and classmates.

Office Hours
Join office hours every week prior to your live lecture to connect directly with your instructor about course topics, assignments, and feedback.

24/7 Cohort Access
Your access to our LEARN Platform is available 24/7. Access your materials at whatever time you need them.

Student Support Team
Find yourself needing extra support? You’ll have a dedicated Student Experience Manager to help guide you through pain points you may encounter.

TA Support
Students in the full-time program have access to TA Support Monday - Friday when classes are in session.

Code Reviews
Get real-time commentary and feedback to assist in developing your skills.
EXPLORE CODING BOOTCAMP
Support When You Need It
Student support begins the day you inquire about pursuing your studies with Coding Dojo. You’ll find support throughout your Admissions journey, along the way through your program, and beyond graduation with Career Services that never expire.

Live Instruction
Learn live over Zoom with your cohort every week interacting directly with your instructors and classmates.

Office Hours
Join office hours every week prior to your live lecture to connect directly with your instructor about course topics, assignments, and feedback.

24/7 Cohort Access
Your access to our LEARN Platform is available 24/7. Access your materials at whatever time you need them.

Student Support Team
Find yourself needing extra support? You’ll have a dedicated Student Experience Manager to help guide you through pain points you may encounter.

TA Support
Students in the full-time program have access to TA Support Monday - Friday when classes are in session.

Code Reviews
Get real-time commentary and feedback to assist in developing your skills.
CAREER SERVICES
Dedicated Cybersecurity Career Services
We have had the privilege of helping over 13K+ students upgrade their careers & their lives. In 14 weeks, all while learning the most-indemand STEM skills, you will be working on your job search for when graduation comes and goes.
Other bootcamps only give you career services for the first 6 months after graduation. Our services team is there for you throughout your career, whether it’s 6 months or 6 years down the line, because we are truly invested in your success.

No Expiration Date
lifetime community + support

Unlimited Support
starting day one

One on One
Career Service Manager Coaching

Interview Prep & Negotiation
- Mock Interviews & Soft Skill Prep
- Target Compensation Management
- Contract Negotiation

Professional Profile & Portfolio Building
- LinkedIn Profile Creation
- Intro to Hack.Me & HackerRank
- Resume Development & Curation

Job Prospecting & Application Guidance
- Real Job Search
- Sample Applications
- Hiring Manager Communicationn
- Job Title Refinement
PRICING
Tuition & Financing

Tuition
6950 TND
9650 TND

Deposit
1000 TND

Payment Plan
Starts at 545 TND
APPLICATION PROCESS
How to Enroll
Are you ready for a challenging and rewarding career in Cybersecurity? Applying to the Coding Dojo Online Part-Time Cybersecurity Program is simple:

Apply
Ready to join? Submit your application and pick your start date to join.

Interview
Meet an Admission Advisor to make sure you’re ready for the challenges of the program. An acceptance decision will be made within 2-3 business days.

Deposit to Enroll
If accepted, submit your deposit to officially save your seat and gain access to bootcamp-prep materials for your start date.
Upcoming Program Dates
At Coding Dojo, we truly believe that anyone can learn to code, regardless of their professional background. After teaching 9000+ students, we have found that determination is the #1 factor to student success – NOT coding experience. That’s why our admissions process does not include a coding challenge or technical assessment.
Still Have Questions?
What are you waiting for?
Let’s get started.
Part-Time Remote Cybersecurity Bootcamp (24 Weeks)
FAQS
You've Got Questions We've Got Answers
What is Cybersecurity?
Why is Cybersecurity Important?
How Hard is Cybersecurity to Learn?
Does Cybersecurity Require Coding?
Do I Need Cybersecurity Experience Before Enrolling?
What Cybersecurity Certifications Can I Get After This Bootcamp?
Is a Cybersecurity Bootcamp Worth It?
According to the U.S. Bureau of Labor Statistics, cybersecurity is predicted to be the fastest growing tech job over the next decade.
How Long Does it Take to Learn Cybersecurity?
Our online cybersecurity bootcamp lasts 24 weeks with the expectation that you spend 25 hours per week learning. There is also two weeks of precourse work that will set you up for success on day one.
How Much Does the Cybersecurity Bootcamp Cost?
Depending on the payment structure you choose, our cybersecurity bootcamp costs anywhere from $15,495 to $16,995. Many students are eligible for scholarships that reduce the costs of the bootcamp.