
Launch Your Career in Cybersecurity

Here's How to Enroll:
Apply and schedule an Admissions Advisor Call
Complete our free Cybersecurity Fundamentals Prep Course
Enroll using your Amazon Career Choice tuition voucher
Course Overview
Length
Schedule
Tuition
Level
Learning Experience
We're here to help.
Apply and schedule a chat with our admissions advisor today.

Curriculum
Introduction to
Cybersecurity
This module introduces core principles that are essential to forming a security mindset, which include the CIA Triad (Confidentiality / Integrity / Availability), Defense-in-Depth, Authentication, and Authorization. Cybersecurity is a broad subject so this module provides a general overview of the different domains within security including Application Security, Network Security, Hardware Security, Physical Security, Mobile Security, Operational Security (SecOps/OpsSec), Incident Response, Identity and Access Management, Governance, Risk & Compliance (GRC), and Disaster Recovery / Business Continuity.
Networking
Networking is the process of how connections are made and how computers and systems communicate with each other which forms the basis of cybersecurity. This module provides the foundational understanding for computer networking and covers network protocols that are used for data communication, networking hardware, subnetting, networking utilities and traffic analysis.
TOOLS: Kali Linux, TCPDUMP, Netcat, Netstat, Dig, Nslookup, Whois, Packet Tracer, Nmap, Wireshark
Security
Program
This module focuses on how to understand, implement and manage a security program within an enterprise. Security professionals must have strong knowledge of how a company operates to implement effective security policies and procedures. You must understand who the organization’s employees, customers, suppliers, and competitors are and how digital information is created, accessed, and shared. Students will learn about the various compliance standards and security frameworks that are most used in the industry.
TOOLS: NIST Cyber Security Framework, CIS Top 18 Framework
OSINT & Social
Engineering
Open Source Intelligence (OSINT) is a tradecraft used for conducting reconnaissance and information against an adversary or target to gain insights into people or organizations. Students will learn how to gather information about a victim and craft a phishing campaign to compromise the victim’s organization. Knowledge of these simple offensive techniques will help students understand how to craft security awareness campaigns and defend against phishing attacks.
TOOLS: Kali Linux, Google Hacking Database, VPN, TOR Browser, Whois, DNS records, Traceroute, GoPhhish, Email Header Analysis, Shodan, theHarvester, OSINT Framework
Threat
Intelligence
An enterprise cannot properly defend their information unless they understand who they are defending against. This module discusses the current threat landscape, Advanced Persistent Threats (APTs) and dives into where threats are coming from and what is motivating the nation-state and non-nation-state threat actors.
TOOLS: Data Breach Reports, MITRE ATT&CK Framework
Scripting for
Security
Python has become increasingly popular in the offensive and defensive cyber communities. Tool developers and hackers primarily used Python, but with the rise of analysis-driven and proactive cyber activities, it is now a staple in the cybersecurity industry. In this self-paced module, students will learn the basics of scripting with Python to solve common and emerging cybersecurity challenges.
TOOLS: Python, Jupyter Lab, Git, PIP, VirtualENV
Security Operations
Architecture
The ability to prevent and detect cyber-attacks as they occur in real time is the epicenter of defending against cybercrime. Good defense starts with thoughtful network architecture design that leverages Cloud and on-prem technologies. In this module, students will learn about network architecture / design, virtual private cloud (VPC) configuration, end-point hardening and deployment, and secure two-factor authorization.
TOOLS: Kali Linux, AWS, Terraform, ScoutSuite, DUO, Lynis, Windows Security Policies, OpenVPN
Security Operations Detection
Cybersecurity should always be proactive rather than reactive. It is much more difficult and expensive to address security after a system has been deployed. In this module, students will learn best practices for network threat modelling, prevention, and continuous monitoring and mitigation.
TOOLS: Kali Linux, IPtables, Snort, SIEM Dashboards, ELK Stack
Cryptography
A cybercriminal cannot do as much damage to an enterprise if they are unable to read the stolen data. This module covers the core concepts of encryption (Boolean Logic, Modulus Arithmetic, hashing) and how it is used within secure protocols (SSL, TLS, SSH). It focuses on how to implement and manage encryption policies within an enterprise (signatures, key management, PKI). Students will learn the importance of understanding the vulnerabilities and misconfigurations that commonly go wrong during implementation. At the end of the module, students use brute force, rainbow tables and various other hacker tools to crack passwords from hashed data.
TOOLS: OpenSSL, CertBot, Nginx, MD5 / SHA, CertBot, Hydra, Hashcat
AppSec & Offensive
Security
How do we know if all the policies, procedures, firewalls, ACLs, or intrusion detection and prevention systems are working unless we test them? This module focuses on how to review security programs and perform various security vulnerability assessments throughout an enterprise. Students will embody the mindset of a hacker and perform penetration tests where they mimic real-world attacks to identify methods to circumvent the security features of an application, system, or network. A successful penetration tester has in-depth knowledge of how networks, systems, and applications are defended. This module allows students to test everything they have learned thus far. Students participate in a competitive red team / blue team exercise to showcase their skills in a team environment.
TOOLS: Nmap, Metasploit, Nikto, Nessus, Burp Suite, Veracode, Shodan, Discover scripts, DNSExfiltrator, Qualys
Threat Hunting &
Incident Response
There are two types of companies: companies that know they have been breached and companies that do not know they have been breached. One-third of U.S. businesses were breached last year and nearly 75% were unaware of how the incident occurred. In this module, students learn why it is vital for companies to properly respond after a breach and have a process to perform a forensics analysis to learn how the breach occurred and understand how it affects the company.
TOOLS: NetworkMiner, Windows Event Logs, Volatility, BinText, Incident Response Tabletop exercises
Security
Apprenticeship
During the final portion of the bootcamp, students apply what they have learned to a real-work environment by serving as a security apprentice to complete a security assessment for a non-profit organization. Students will work with their small group to conduct a vulnerability assessment, analyze the results, recommend appropriate remediation measures and develop a report for the executive management, thereby gaining valuable experience that will aid them in their job search. Students will follow the Evolve Security services methodology, used by our cybersecurity engineers, to conduct the assessment and learn what it is like to work directly with a client.
Job
Preparation
In addition to the technical cybersecurity training, students will learn the skills and strategy to confidently navigate their job search with our support. Job preparation training is integrated throughout the bootcamp and available after graduation. Through career coaching, cybersecurity resume prep, mock interviews, networking strategies, alumni connections and employer partners, students land jobs that launch their cybersecurity careers. Students are encouraged to take advantage of virtual and in-person EvolveSec Meetup events to connect with industry professionals and expand their network. We know what it takes to get a job in cybersecurity and support our students throughout their job search process.
Our Academy graduates work for:









The Experience
Custom Course Schedule
Holistic
Approach
Evolve Security Academy Certified
Lab Simulations/
Tools
Student
Teamwork
Gain Real Work
Experience
Competency
Assessments
Adjunct
Instructors
Job
Preparation
Check out what graduates are saying about us online.
Montessori School Teacher to
Information Security Analyst

As Seen On:






Receptionist Coordinator to Cybersecurity
Assessment Specialist
Frequently Asked Questions
The Cybersecurity Bootcamp is a mixture of live-online classes with our instructors and self-study through our custom-built learning management system called CyberLAB. Students watch pre-record videos prior to class so that the class time can be spent connecting cybersecurity concepts to real-life scenarios and getting hands-on with labs. Students will also work in smaller groups with teaching assistants to build teamwork skills while learning practical cybersecurity skills. Job preparation is integrated throughout the bootcamp with access to a career coach for one on one coaching and job prep support.
We are looking for students with the right attitude and aptitude for cybersecurity. Students who are passionate about learning security and are curious in nature will be successful in the Cybersecurity Bootcamp. We can teach you the technical skills that are needed to enter the industry, but you need to have the drive, work ethic, and passion to learn the skills that are needed.
Students are expected to be familiar with basic cybersecurity concepts, computer networking, and the Linux command line which can be learned through our free Cybersecurity Fundamentals prep course.
Our Cybersecurity Fundamentals course will provide the best preparation on topics such as basic cybersecurity concepts, computer networking, and the Linux command line. You’re encouraged to join our free EvolveSec Meetup to learn more about current topics and trends in the cybersecurity industry through virtual events and start your professional networking. Recordings of past events are located here.
The bootcamp is part-time with 25 weeks of live-online remote learning, and a one week break during Amazon Prime Week. Students are expected to spend a total of 12 hours (6 hours in-class, 6 hours outside of class) per week on Cybersecurity Bootcamp studies and watch assigned pre-recorded lectures before class.
The cohort takes place March 8 – September 1, 2022 with one break week for Prime Day.
Class meets each week on Tuesday, Wednesday and Thursday from 4-6 pm CST with office hours available.
Upon successful completion of the bootcamp, graduates are able to not only understand the theory behind information security, but also how to apply it in real world situations.
In addition, graduates receive:
- Certificate of Completion and digital badge upon successfully completing the course requirements and final exam
- Eligible to attempt the Evolve Security Certified Professional (ESCP) certification exam
- A network of cybersecurity professionals and experts from different organizations and backgrounds
- Real world project experience as a Security Apprentice that can be shared with potential employers
- Preparation for other information security certifications such as the CompTIA Security+ certification, if pursuing them
- Job preparation services and support in landing a cybersecurity-related job
- 94% of alumni actively seeking a cybersecurity position get hired within 6 months
- Hired graduates experienced a median salary increase of 48%
- Job seeking graduates were hired within 74 days on average
- Graduates median total compensation was $68,000
Statistics last updated March 2021
The hiring rate is calculated based on statistics from our Cybersecurity Bootcamp alumni. This data is collected from graduates who were actively job seeking and were offered a full-time or a contract-to-hire job in the cybersecurity industry within 6 months of becoming an Evolve Security Certified Professional (ESCP).
Graduates who are included in our success and hiring metrics meet all of the following criteria:
- Sought employment opportunities in information security.
- Met the Actively Job Seeking expectations which includes taking ownership of job search, following job preparation curriculum, networking online and in-person, continuous education and working with a career coach.
- Successfully completed the Evolve Academy Bootcamp (having no unexcused attendance for classes, labs, and workshops) and earned the ESCP certification.
- Paid all tuition payments on time and in full.
- Responsive and engaged throughout their job search process.
- Took all phone and in-person interviews made available to them.
- Accepted a job in the cybersecurity industry.
Graduates who are not included in our success and hiring metrics:
- Took an extended leave of absence during the 6-month window and did not engage with job search support resources. We will support these students upon their re-engagement.
- Pursued other educational or training programs within the 6 months window.
Candidates who successfully complete the Evolve Academy cybersecurity curriculum are qualified for the following positions depending on their background and experience (not a comprehensive list).
Tier 1 roles for those with no technical background:
- IT Helpdesk
- Associate Cybersecurity Engineer
- Cybersecurity Analyst
Tier 2 roles for those with some technical background and higher attitude and aptitude for cybersecurity:
- Systems Engineer
- Security Engineer
- Security Analyst/Engineer
- Cybersecurity Analyst/Engineer
- Network Security Analyst/Engineer
- InfoSec/IT Security Analyst/Engineer:
- Security Operations Center (SOC) Analyst
- Security Sales Engineer
- Associate Security Consultant (Technical/Compliance)
A Windows or Mac machine with at least an i7 processor and at least 8 GBs RAM is required.
- Apply and then schedule an admissions advisor meeting to get your questions answered.
- Complete our free Cybersecurity Fundamentals prep course which takes ~8-12 hours.
- Enroll by signing our agreement and using your Amazon Career Choice tuition voucher.
Yes! You can request a school accommodation through Amazon, which is a temporary schedule change lasting for the duration of the Amazon Career Choice program you have enrolled in. A school accommodation can be requested to help employees attend classes without using paid personal time or unpaid time.
At this time, Evolve Academy is only approved to accept students at any of the following sites: Charleston, SC, Des Moines, IA, Huntsville, AL, Milwaukee, WI, Montgomery, AL and Omaha, NE.
You can apply for a voucher by going to AmazonCareerChoice.com. Next, you’ll select the ‘Pathways’ track and fill out a voucher application. Once you receive your approved voucher, you will digitally sign it and submit a copy to an Evolve Admissions Advisor to secure your seat in the Cybersecurity Bootcamp.
The Amazon Cybersecurity Bootcamp tuition is $5,250. The Amazon Career Choice Program offers 100% tuition coverage up to the yearly tuition maximum depending on your part-time or full-time status. The annual tuition maximum is $5,250 for full-time employees and $2,625 for part-time employees.
Option 1: Pay in full – upfront.
- 100% remaining tuition due one week before the bootcamp start date.
Option 2: Financing
- We partner with a third-party lender, Ascent Funding, to provide affordable personal loans. Visit their website for details on how to apply and to calculate your financing.
Amazon Associates who meet the following criteria will be eligible to apply for the Evolve Academy Cybersecurity Bootcamp through the Amazon Career Choice program:
- You are a part-time or full-time Amazon employee working at any of the Amazon sites Evolve Academy has been approved in
- You have been employed by Amazon for at least 90 continuous days