Cybersecurity Bootcamp

Become a cybersecurity analyst. Land a job or your money back.

  • 100% online, beginner-friendly, six-months, part-time

  • 1-on-1 mentorship + career coaching

  • Graduate with a CompTIA Security+ Certification

  • NEW! AI for Cybersecurity Professionals learning units

banner image

Vianey Luna

Cybersecurity Graduate

From Spanish Teacher

To IT Security Specialist @ Cooper Machinery Services

Our Cybersecurity graduates have been hired by:

Scale your income with cybersecurity


Average salary increase of Springboard Cybersecurity students who provided pre- and post-course salaries

December 2023

In this bootcamp you will:

  • Learn core cybersecurity analyst skills and practices

  • Analyze a cyber incident and identify the technical requirements to solve it

  • Assess operational systems in the presence of risks and threats

  • Conduct vulnerability assessments into on-premise and cloud security risks

  • Start your career in defensive and offensive cybersecurity

Plus, you’ll learn the tools cybersecurity analysts use, like:

Cybersecurity careers are lucrative and rewarding. Make an impact and help keep individuals, businesses, and governments safe. Transform your career in just six months.

Learn job-ready, in-demand skills

Build skills and put them to the test with a curriculum designed by cybersecurity experts.

Get an edge with human support

Work with a mentor, career coach, and more. They have your back and will hold you accountable.

Land a job or your money back

We back our program with a job guarantee. Get a job or you'll receive a full refund. See terms.

Career Opportunities in Cybersecurity

Join the ranks of sought-after security professionals worldwide. After completing this bootcamp, you’ll gain the confidence and ability to demonstrate your deep security knowledge and ability to oversee network security to employers. Examples of roles that students can pursue after this program include:

Job Titles

Annual Salary

Cybersecurity analyst


Cybersecurity specialist


Cybersecurity consultant


Cybersecurity manager


Software developer


Systems Engineer


Network Engineer


Solution Architect


*Source: Lightcast: Median Advertised Salary (0-3 years experience)

What you’ll learn

In this Cybersecurity bootcamp, you’ll attain entry-level proficiency in core cybersecurity and AI-assisted protocols. You’ll also have access to supporting resources to help you pass the CompTIA Security+ exam.

Through 50 labs, a capstone project, and AI learning units throughout, you’ll gain real-world context on cybersecurity attacks, and improve your job prospects.

Topic 1: Introduction to AI and its Applications in Cybersecurity

Grasping the basics of AI, machine learning, and deep learning is essential for cybersecurity professionals looking to use these advanced technologies effectively. In this unit, you’ll learn the fundamentals of AI and its applications in cybersecurity. 

  • Explore AI concepts, machine learning, and deep learning, and how they're applied to cybersecurity.

  • Differentiate between supervised, unsupervised, and reinforcement learning

  • Understand commonly-used algorithms in cybersecurity

Topic 2: Cybersecurity Basics

You’ll start to get acquainted with the cybersecurity field as you learn key vocabulary terms, explore different types of roles, and work on your first warmup labs. 

  • Recognize the basic principles of cybersecurity and learn about different career roles

  • Build baseline operating system skills

  • Log into and complete your first Infosec labs

Topic 3: Cybersecurity Fundamentals

To become a successful cybersecurity professional, you must begin to understand the motivations of various types of cybercriminals. This unit walks you through the threat actors you’ll encounter and introduces key information security principles like the CIA triad and red vs. blue teams in cybersecurity employment.

  • Explain different types of attackers — from script kiddies to hacktivists to nation-states, and more — and their motivations 

  • Differentiate between various computer security threats, including malware in all its forms

  • Recognize basic IT security threats and ways to mitigate those threats

Topic 4: AI for Threat Detection and Incident Response

With cyber threats getting more complex and common, using AI has become key for cybersecurity experts. This unit will give you the tools and know-how to use AI for better threat detection and response.

  • Understand  the role of AI in threat detection and incident response

  • Learn AI techniques for anomaly detection, intrusion detection, and real-time threat intelligence

Topic 5: Cybersecurity Attacks

Attacks, threats, and vulnerabilities are key concepts in the field of cybersecurity and information security. Vulnerabilities are weaknesses in a system or network, threats are potential risks or dangers that can exploit these vulnerabilities, and attacks are the actual actions taken by threat actors to exploit vulnerabilities and compromise security.

  • Social engineering

  • Attack types

Topic 6: Host-Based Security

A host refers to any device connected to a network, including desktops, laptops, and mobile devices. Hosts are often vulnerable to attacks because they are a gateway for threat actors to enter the larger network. In this unit, you’ll learn host-based hardening and vital security solutions for a variety of hosts. 

  • Protect a computer’s hardware, BIOS, wireless devices, and peripherals such as USB devices

  • Explain how to protect mobile devices and the data they contain 

  • Explain the basic concepts of patch management on both Windows and Linux

Topic 7: Network Security

Network security encompasses many technologies, devices, and processes and is responsible for protecting the integrity, confidentiality, and accessibility of computer networks and data. Through a series of videos and labs, you’ll learn the inner workings of protecting a network.

  • Select, install, and configure security applications 

  • Explain how to secure wireless networks, including wireless access points and wireless network adapters

  • Describe how to secure AWS and Azure cloud assets

Topic 8: AI in Network Security and Threat Hunting

AI is a game-changer in strengthening our digital walls and boosting the skills of cybersecurity experts. In this unit, we're diving deep, giving you a thorough look into how AI tools are becoming key players.

  • Understand the advantages of AI-driven network traffic analysis and its role in anomaly detection, penetration testing, and enhancement of traditional security systems

  • Identify the primary AI techniques suitable for analyzing time-series data and recognizing subtle temporal patterns

  • Identify the purpose of AI-powered attack simulations

Topic 9: Identity and Access Management

Identity and Access Management (IAM) aims to manage user identities and their access to enterprise resources and data. In this unit, you’ll focus on IAM through web applications and cloud-based infrastructures Microsoft Azure and AWS. You’ll also have the option to prepare for Microsoft's Security, Compliance, and Identity Fundamentals exam (50% off in this program).

  • Distinguish between Identity Management and Access Management

  • Determine users, groups, permissions, rights, and policies that can be created on a network

  • Configure users, templates, and groups in a manageable fashion; set up policies and security templates

Topic 10: Cryptography

Cryptography plays a crucial role in ensuring the confidentiality, integrity, authenticity, and non-repudiation of data in various applications. Take a deep dive into cryptographic technologies and concepts, all of which are covered in the Security+ exam.

  • Cryptography technologies and methods

Topic 11: Security Architecture

Security architecture is a structured framework for designing and implementing security measures within an organization. You’ll learn the policies, processes, technologies, and practices that are employed to ensure that an organization's information and resources are secure from a wide range of threats and risks.

  • Enterprise security

  • Authentication and authorization

Topic 12: Security Operations (SecOps)

The SecOps unit puts you in the center of the blue team Security Operations Center (SOC). You’ll understand how cybersecurity analysts put together an incident response (IR) plan, analyze malware attacks, and begin to build security awareness programs to protect employees from social engineering attacks. 

  • Discuss the goals of computer forensics and how it is performed

  • Identify origins of malware via websites, email, removable media, third-party applications, and botnets

  • Recognize the similarities and differences between programming languages Python, Javascript, and PowerShell

  • Generate a plan on how to train users on the basics of security

Topic 13: Application Security

This key unit will focus on the Software Development Life Cycle (SDLC) and how DevSecOps has been emerging to ensure security is integrated into each phase of the cycle. This unit explores how you’ll ensure the integrity of new applications through several mini-projects.

  • Explain core concepts behind application security testing

  • Implement security across continuous integration and continuous delivery (CI/CD) pipeline

  • Identify and assess SQL vs. NoSQL databases

  • Issue recommendations on how to address security risks and vulnerabilities

Topic 14: Explainable AI and AI for Predictive Security Analytics

This unit focuses on the principles of Explainable AI (XAI) and its role in predictive security analytics. By the conclusion, you'll grasp the foundations of XAI, the potential of AI in security, and the ethical obligations accompanying its use.

  • Understand the key principles and techniques of Explainable AI (XAI)

  • Differentiate between various AI techniques used in cybersecurity for pattern recognition, risk assessment, and time series analysis

  • Learn the importance of ethical considerations in the deployment and application of AI in cybersecurity

Topic 15: Security Assessment and Testing

You are now entering the last core technical unit where you’ll practice red team skills of vulnerability scanning and penetration testing in labs. You’ll gain the skills for creating your own testing methodologies and prepare for Information Security Security (IS) audits. 

  • Use common network security tools to measure the vulnerability of computer systems and network devices

  • Use tools in a Windows server to perform audits and log them properly

  • Learn how a security administrator must strike a balance between security and data availability

Topic 16: AI in Malware Analysis and NLP for Cyber Security

Malware continues to pose significant challenges for organizations as traditional detection and analysis methods are struggling to keep up. In this unit, you will learn how AI and NLP is helping cybersecurity specialists gain a deeper understanding of how malicious software operates.

  • Learn the main purpose and various types of malware analysis

  • Explore AI techniques for malware detection, classification, and dynamic analysis

  • Understand how natural language processing (NLP) is used for advanced threat intelligence analysis, phishing detection, and social media monitoring

Topic 17: CompTIA Security+ Exam Prep

This unit prepares you to take the industry-wide recognized Security+ Exam. You’ll receive a voucher to sign up for the exam (it is included in the cost of this bootcamp). You must pass the Security+ exam to earn a certificate demonstrating fundamental cybersecurity skills and to be eligible for the Springboard Job Guarantee. 

  • Review domains of the CompTIA Security (SY0-601) certification exam

  • Receive tips on preparing for the exam from past cybersecurity students

  • Take mock exams in preparation for the exam

Topic 18: Building Your Portfolio: Capstone Project

During this capstone, you will be required to work on a hypothetical “structured walkthrough” penetration test. The guided capstone is designed to help you understand how various components that you learn throughout the bootcamp come together to form an experience that familiarizes you with a day-in-the-life of a security analyst. The five phases of the capstone include:

  • Phase 1: Perform Reconnaissance

  • Phase 2: Identify Targets and run Scans

  • Phase 3: Identify Vulnerabilities

  • Phase 4: Threat Assessment

  • Phase 5: Reporting

Topic 19: Career Support

Career units throughout the bootcamp will help you create a tailored job search strategy based on your background and goals. Topic include:

  • Types of industry roles 

  • Job search strategies

  • Building a network and using it to land interviews

  • Creating a high-quality resume, LinkedIn profile, and cover letter

  • Preparing for technical and non-technical interviews

  • Successful negotiation

NEW! AI learning units added to the cybersecurity curriculum

Learn to harness the power of AI with new learning units throughout your Cybersecurity curriculum. You’ll explore AI’s practical applications and leverage them to solve cybersecurity challenges, identify and respond to security threats and predict cyber threats and future attack trends. With AI by your side, you can become a powerful guardian of cyberspace, and a valuable asset to your employer.

Get CompTIA Security+ certified

We’ve partnered with CompTIA, the world's leading cybersecurity association, for this program. You’ll graduate with a CompTIA Security+ Certification which is chosen by more corporations and defense organizations to validate security skills than any other.

Join an industry-leading program

We’ve helped thousands of students learn skills and land jobs. It’s why we’ve been consistently recognized as an industry leader.

Best Bootcamp


Best Bootcamp


Best Bootcamp


  • Mastery from your mentor

    Build skills faster with an expert in your corner. Your mentor will keep you accountable and give you an insider's view.

  • Counsel from your career coach

    Get prepared for the job search. Your career coach will help you gain confidence and know-how to land the role.

  • Support from your student advisor

    Stay on track and achieve your goals. Your student advisor has your back and will keep you on track to graduation.

  • Collaboration from your community

    You’ve got a built-in community — students who, just like you, are betting big on themselves.

Mentor: Alissa Torres

Sr. Manager

Mentor: Travis Felder

Cybersecurity Architect

Mentor: Leonard Simon

MSSP Manager

Here’s why people like you choose Springboard

Taking the CompTIA Security+ exam and getting my certificate gave me leverage over other job candidates. It’s a highly sought-after certification and it’s quite difficult to get, so I’m really glad I was able to achieve that.

Catherine McKoy

From Childcare Provider

To Compliance Systems Analyst @ Alaska USA Credit Union

Springboard grads have achieved life-changing growth. You can too.


Average salary increase of Career Track graduates who provided pre- and post-course salaries.

December 2023


Of job-qualified individuals who reported an offer, received it within 12 months of graduation.

December 2023


Enrolled students in Springboard Career Tracks since our launch in 2016.

December 2023

An online cybersecurity bootcamp with a job guarantee

Invest in yourself with confidence with the Springboard Job Guarantee. If you put in the work and don't land a job, we'll give you a refund. Terms apply.

Eligibility for the Springboard Job Guarantee:

  • Bachelor’s Degree OR 1 year of relevant work experience OR 1 year of relevant military experience

  • Successful completion of all mandatory coursework, core projects, the CompTIA Security+ certification exam and career development tasks 

  • Fulfill all post-completion job search requirements — regular networking, job applications and interviewing


  • Pass an evaluation of baseline soft-skills, centered around communication, motivation, professionalism, analytical mindset, and commitment to learning

Apply to the next bootcamp

This cybersecurity bootcamp is a six-month program for students devoting 10-20 hours per week.

4 ways to fund your future

Everyone should have the opportunity for growth. That’s why we offer a range of payment options.

What are cybersecurity professionals earning?

These are the average salaries of cybersecurity analysts in the US.


Data as of November 2022; cross-referenced with Glassdoor, LinkedIn, Indeed, Payscale,, BuiltIn, and Comparably.

Why Springboard vs. other bootcamps

We're the only bootcamp to offer all the features below. Plus our program is designed to fit your schedule — all at an affordable cost (data as of December 2022).




Fullstack Academy

CompTIA Partner





1:1 Mentorship


Job Guarantee*



Upfront Tuition**





*Terms apply | **Total cost varies based on approved interest rate. Financing only available for U.S. residents

Your questions, answered

Ready to become a cybersecurity analyst? Apply now

Spots are limited, and we accept qualified applicants on a first-come, first-served basis. Start your free application. It takes just 5 minutes to complete.