Welcome Amazon Students

Launch Your Career in Cybersecurity

Get Ready to Launch Your Career in Cybersecurity
#1 ranked cybersecurity training in the world, offered through our immersive, hands-on labs and a live-online instruction
26-week Amazon Cybersecurity Bootcamp cohort begins March 29. Enrollment deadline is March 21, 2022
95% of our alumni get hired due to our hands-on training and career support
Let's Get Started, Apply Today!
Complete the brief application and schedule an admissions advisor call.
Hero banner

Here's How to Enroll:

Apply and schedule an Admissions Advisor Call
Complete our free Cybersecurity Fundamentals Prep Course
Enroll using your Amazon Career Choice tuition voucher

Course Overview


March 29 - Sept. 22, 2022
(includes 1 break week for Prime Day)


Tues., Wed., Thurs.
4-6 pm CST
Office Hours Available





Learning Experience

Remote - Live Online
do you have questions?

We're here to help.

Apply and schedule a chat with our admissions advisor today.


Introduction to

This module introduces core principles that are essential to forming a security mindset, which include the CIA Triad (Confidentiality / Integrity / Availability), Defense-in-Depth, Authentication, and Authorization. Cybersecurity is a broad subject so this module provides a general overview of the different domains within security including Application Security, Network Security, Hardware Security, Physical Security, Mobile Security, Operational Security (SecOps/OpsSec), Incident Response, Identity and Access Management, Governance, Risk & Compliance (GRC), and Disaster Recovery / Business Continuity.

TOPICS: Key Elements, CIA Triad, Defense-In-Depth, Domain Landscape, AAA Services

Networking is the process of how connections are made and how computers and systems communicate with each other which forms the basis of cybersecurity. This module provides the foundational understanding for computer networking and covers network protocols that are used for data communication, networking hardware, subnetting, networking utilities and traffic analysis.

TOPICS: LAN / WAN, OSI Model, TCP / IP Model, Network Protocols, IP v4 & IP v6, TCP, UDP, ICMP, Ports and Services, Routing & Switching, NAT / PAT, DNS, Network segmentation, Subnetting, VLANS

TOOLS: Kali Linux, TCPDUMP, Netcat, Netstat, Dig, Nslookup, Whois, Packet Tracer, Nmap, Wireshark

This module focuses on how to understand, implement and manage a security program within an enterprise. Security professionals must have strong knowledge of how a company operates to implement effective security policies and procedures. You must understand who the organization’s employees, customers, suppliers, and competitors are and how digital information is created, accessed, and shared. Students will learn about the various compliance standards and security frameworks that are most used in the industry.

TOPICS: Cybersecurity governance and strategy, Risk management (Rating methodologies), Compliance (Legal / Regulatory / HIPAA / PCI - DSS)

TOOLS: NIST Cyber Security Framework, CIS Top 18 Framework
OSINT & Social

Open Source Intelligence (OSINT) is a tradecraft used for conducting reconnaissance and information against an adversary or target to gain insights into people or organizations. Students will learn how to gather information about a victim and craft a phishing campaign to compromise the victim’s organization. Knowledge of these simple offensive techniques will help students understand how to craft security awareness campaigns and defend against phishing attacks.

TOPICS: Information gathering with open source tools, Network and Domain enumeration, Anonymization on the Internet, Security Awareness, Social Engineering (Email / Phishing / In-Person / Telephony)

TOOLS: Kali Linux, Google Hacking Database, VPN, TOR Browser, Whois, DNS records, Traceroute, GoPhhish, Email Header Analysis, Shodan, theHarvester, OSINT Framework

An enterprise cannot properly defend their information unless they understand who they are defending against. This module discusses the current threat landscape, Advanced Persistent Threats (APTs) and dives into where threats are coming from and what is motivating the nation-state and non-nation-state threat actors.

TOPICS: Threat Sources & Events, Adversarial (Fraud / Theft , Insider Threat, Malicious Hackers, Malicious Code, Malware, Ransomware, Espionage), Non-adversarial (Errors and Omissions, Physical Infrastructure, Privacy and Data Sharing), Threat Motivations (Monetary, Hacktivism, IP Theft, Espionage)

TOOLS: Data Breach Reports, MITRE ATT&CK Framework
Scripting for

Python has become increasingly popular in the offensive and defensive cyber communities. Tool developers and hackers primarily used Python, but with the rise of analysis-driven and proactive cyber activities, it is now a staple in the cybersecurity industry. In this self-paced module, students will learn the basics of scripting with Python to solve common and emerging cybersecurity challenges.

TOPICS: Client Server Model, App and Web Servers, programming fundamentals, functions and classes, API connections, Regular Expressions

TOOLS: Python, Jupyter Lab, Git, PIP, VirtualENV
Security Operations

The ability to prevent and detect cyber-attacks as they occur in real time is the epicenter of defending against cybercrime. Good defense starts with thoughtful network architecture design that leverages Cloud and on-prem technologies. In this module, students will learn about network architecture / design, virtual private cloud (VPC) configuration, end-point hardening and deployment, and secure two-factor authorization.

TOPICS: Network Architecture Design, Virtual Private Cloud (VPC) design, configuration and deployment,  Firewalls (Access Control Lists / Filters / Rules / White List / Black List), Proxies, Remote Access, Virtual Private Network (VPN) configuration and deployment, Access Control, Infrastructure as Code, Cloud Infrastructure Auditing, Systems Hardening

TOOLS: Kali Linux, AWS, Terraform, ScoutSuite, DUO, Lynis, Windows Security Policies, OpenVPN
Security Operations Detection

Cybersecurity should always be proactive rather than reactive. It is much more difficult and expensive to address security after a system has been deployed. In this module, students will learn best practices for network threat modelling, prevention, and continuous monitoring and mitigation.

TOPICS: Detect / Defend, Traffic Analysis, Logging / Log Management, Security Information Event Management (SIEM), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Data Loss Prevention (DLP)

TOOLS: Kali Linux, IPtables, Snort, SIEM Dashboards, ELK Stack

A cybercriminal cannot do as much damage to an enterprise if they are unable to read the stolen data. This module covers the core concepts of encryption (Boolean Logic, Modulus Arithmetic, hashing) and how it is used within secure protocols (SSL, TLS, SSH). It focuses on how to implement and manage encryption policies within an enterprise (signatures, key management, PKI). Students will learn the importance of understanding the vulnerabilities and misconfigurations that commonly go wrong during implementation. At the end of the module, students use brute force, rainbow tables and various other hacker tools to crack passwords from hashed data.

TOPICS: Boolean Logic, Modulus Arithmetic, Symmetric / Asymmetric, Hashing, TLS / SSL, Disk encryption, Key Derivation Functions, Digital Signatures, Key Management: Public Key Infrastructure, Password Cracking: Rainbow Tables

TOOLS: OpenSSL, CertBot, Nginx,  MD5 / SHA, CertBot, Hydra, Hashcat
AppSec & Offensive

How do we know if all the policies, procedures, firewalls, ACLs, or intrusion detection and prevention systems are working unless we test them? This module focuses on how to review security programs and perform various security vulnerability assessments throughout an enterprise. Students will embody the mindset of a hacker and perform penetration tests where they mimic real-world attacks to identify methods to circumvent the security features of an application, system, or network. A successful penetration tester has in-depth knowledge of how networks, systems, and applications are defended. This module allows students to test everything they have learned thus far. Students participate in a competitive red team / blue team exercise to showcase their skills in a team environment.

TOPICS: Assessment Approach, Testing Viewpoints (Internal / External, Overt / Covert, White box / Gray Box / Black Box), Mitigation and Remediation, OWASP Top 10, Vulnerability Scanning, Penetration Testing, Bug Bounty, DevSecOps, Red Team / Blue Team

TOOLS: Nmap, Metasploit, Nikto, Nessus, Burp Suite, Veracode, Shodan, Discover scripts, DNSExfiltrator, Qualys
Threat Hunting &
Incident Response

There are two types of companies: companies that know they have been breached and companies that do not know they have been breached. One-third of U.S. businesses were breached last year and nearly 75% were unaware of how the incident occurred. In this module, students learn why it is vital for companies to properly respond after a breach and have a process to perform a forensics analysis to learn how the breach occurred and understand how it affects the company.

TOPICS: CSIRT, NIST: IR Methodology (Preparation / Detection & Analysis / Containment, Eradication & Recovery / Post-Incident Activity), NIST: Forensics Process (Data Collection / Examination / Analysis / Reporting), Threat Intelligence (Cyber Kill Chain / Diamond Model)

TOOLS: NetworkMiner, Windows Event Logs, Volatility, BinText, Incident Response Tabletop exercises

During the final portion of the bootcamp, students apply what they have learned to a real-work environment by serving as a security apprentice to complete a security assessment for a non-profit organization. Students will work with their small group to conduct a vulnerability assessment, analyze the results, recommend appropriate remediation measures and develop a report for the executive management, thereby gaining valuable experience that will aid them in their job search. Students will follow the Evolve Security services methodology, used by our cybersecurity engineers, to conduct the assessment and learn what it is like to work directly with a client.


In addition to the technical cybersecurity training, students will learn the skills and strategy to confidently navigate their job search with our support. Job preparation training is integrated throughout the bootcamp and available after graduation. Through career coaching, cybersecurity resume prep, mock interviews, networking strategies, alumni connections and employer partners, students land jobs that launch their cybersecurity careers. Students are encouraged to take advantage of virtual and in-person EvolveSec Meetup events to connect with industry professionals and expand their network. We know what it takes to get a job in cybersecurity and support our students throughout their job search process.

TOPICS: Networking, LinkedIn Profile, Resume Prep, Interview Prep, Career Coaching, Job Search Strategy, Continuing Education
Our students

Our Academy graduates work for:

What is the

The Experience

Custom Course Schedule

Our training program was custom designed with a working Amazon Associate's schedule in mind. Classes run 3X a week for 25 weeks, no weekends, and includes a one week break during Amazon Prime week. Office hours are also available before and after classes.


A well-rounded cybersecurity professional can see the bigger picture and will thrive in the industry. Students gain a broad understanding of cybersecurity with the hands-on skills to apply it on the job. These skills help students enter the cybersecurity field and enable their long-term success.

Evolve Security Academy Certified

Students are eligible to earn a Certification of Completion after completing the bootcamp and passing the final exam. Students can also choose to attempt the Evolve Security Certified Professional (ESCP) certification exam after completing the course. Both certifications are awarded through digital badges, allowing students to showcase their clear and practical understanding of cybersecurity.

Lab Simulations/

We deliver hands-on, technical labs that delve into essential security concepts and real-world scenarios while incorporating industry-recognized open source and commercial tools. Students benefit from learning in a lab environment that mimics a hospital, allowing them to apply their skills in a simulated real-work environment as a Security Analyst.


We believe the most effective way to learn is with a live instructor and the support of peers. In addition to the full cohort learning environment, students are broken into small groups to work on labs and security apprentice projects, emphasizing the importance of teamwork and collaboration.

Gain Real Work

Students perform live security assessment work on non-profit organizations under instructor supervision, giving students the real work experience as a Security Apprentice.


Modeled after actual interview questions – students will complete competency assessments with an assistant instructor after each module to ensure all concepts are truly grasped.


Subject matter experts instruct throughout the program, exposing students to the most relevant industry best practices. Students benefit by expanding their professional network with industry leaders.


We are committed to helping our students enter the cybersecurity industry. Through job preparation training, career coaching, alumni networking and employer partners, students secure jobs that launch their career in cybersecurity.
Video Testimonial

Montessori School Teacher to
Information Security Analyst

As Seen On:

Angela Marafino
Cybersecurity Program
Manager at Microsoft
Receptionist Coordinator to Cybersecurity
Assessment Specialist
"Evolve Security Academy has hands down changed my life! The remote course was delivered in such a way that it felt like we were actually in a live classroom and worked perfectly around a full-time work schedule. I landed a job in cybersecurity by networking within the cohort. Attending Evolve’s cybersecurity bootcamp has been the best investment I have ever made and it changed my life in a matter of months!"

Frequently Asked Questions

What is the live-online Cybersecurity Bootcamp experience like?

The Cybersecurity Bootcamp is a mixture of live-online classes with our instructors and self-study through our custom-built learning management system called CyberLAB. Students watch pre-record videos prior to class so that the class time can be spent connecting cybersecurity concepts to real-life scenarios and getting hands-on with labs. Students will also work in smaller groups with teaching assistants to build teamwork skills while learning practical cybersecurity skills. Job preparation is integrated throughout the bootcamp with access to a career coach for one on one coaching and job prep support.

Do I need any previous technical experience or training to pursue for the Cybersecurity Bootcamp?

We are looking for students with the right attitude and aptitude for cybersecurity. Students who are passionate about learning security and are curious in nature will be successful in the Cybersecurity Bootcamp. We can teach you the technical skills that are needed to enter the industry, but you need to have the drive, work ethic, and passion to learn the skills that are needed.

Students are expected to be familiar with basic cybersecurity concepts, computer networking, and the Linux command line which can be learned through our free Cybersecurity Fundamentals prep course.

What can I do to prepare for the Cybersecurity Bootcamp?

Our Cybersecurity Fundamentals course will provide the best preparation on topics such as basic cybersecurity concepts, computer networking, and the Linux command line. You’re encouraged to join our free EvolveSec Meetup to learn more about current topics and trends in the cybersecurity industry through virtual events and start your professional networking. Recordings of past events are located here.

What is the time commitment inside and outside of the classroom?

The bootcamp is part-time with 25 weeks of live-online remote learning, and a one week break during Amazon Prime Week. Students are expected to spend a total of 12 hours (6 hours in-class, 6 hours outside of class) per week on Cybersecurity Bootcamp studies and watch assigned pre-recorded lectures before class.

The cohort takes place March 8 – September 1, 2022 with one break week for Prime Day.

Class meets each week on Tuesday, Wednesday and Thursday from 4-6 pm CST with office hours available.

What do I get when I graduate?

Upon successful completion of the bootcamp, graduates are able to not only understand the theory behind information security, but also how to apply it in real world situations.

In addition, graduates receive:

  • Certificate of Completion and digital badge upon successfully completing the course requirements and final exam
  • Eligible to attempt the Evolve Security Certified Professional (ESCP) certification exam
  • A network of cybersecurity professionals and experts from different organizations and backgrounds
  • Real world project experience as a Security Apprentice that can be shared with potential employers
  • Preparation for other information security certifications such as the CompTIA Security+ certification, if pursuing them
  • Job preparation services and support in landing a cybersecurity-related job
What is the hiring rate and employment data of Evolve Academy Cybersecurity Bootcamp graduates?
  • 94% of alumni actively seeking a cybersecurity position get hired within 6 months
  • Hired graduates experienced a median salary increase of 48%
  • Job seeking graduates were hired within 74 days on average
  • Graduates median total compensation was $68,000

Statistics last updated March 2021

How is the hiring rate determined?

The hiring rate is calculated based on statistics from our Cybersecurity Bootcamp alumni. This data is collected from graduates who were actively job seeking and were offered a full-time or a contract-to-hire job in the cybersecurity industry within 6 months of becoming an Evolve Security Certified Professional (ESCP).

Graduates who are included in our success and hiring metrics meet all of the following criteria:

  • Sought employment opportunities in information security.
  • Met the Actively Job Seeking expectations which includes taking ownership of job search, following job preparation curriculum, networking online and in-person, continuous education and working with a career coach.
  • Successfully completed the Evolve Academy Bootcamp (having no unexcused attendance for classes, labs, and workshops) and earned the ESCP certification.
  • Paid all tuition payments on time and in full.
  • Responsive and engaged throughout their job search process.
  • Took all phone and in-person interviews made available to them.
  • Accepted a job in the cybersecurity industry.

Graduates who are not included in our success and hiring metrics:

  • Took an extended leave of absence during the 6-month window and did not engage with job search support resources. We will support these students upon their re-engagement.
  • Pursued other educational or training programs within the 6 months window.
What kind of jobs do graduates qualify for after completing the bootcamp?

Candidates who successfully complete the Evolve Academy cybersecurity curriculum are qualified for the following positions depending on their background and experience (not a comprehensive list).

Tier 1 roles for those with no technical background:

  • IT Helpdesk
  • Associate Cybersecurity Engineer
  • Cybersecurity Analyst

Tier 2 roles for those with some technical background and higher attitude and aptitude for cybersecurity:

  • Systems Engineer
  • Security Engineer
  • Security Analyst/Engineer
  • Cybersecurity Analyst/Engineer
  • Network Security Analyst/Engineer
  • InfoSec/IT Security Analyst/Engineer:
  • Security Operations Center (SOC) Analyst
  • Security Sales Engineer
  • Associate Security Consultant (Technical/Compliance)
What hardware and software do I need?

A Windows or Mac machine with at least an i7 processor and at least 8 GBs RAM is required.

What is the admissions and enrollment process?
  1. Apply and then schedule an admissions advisor meeting to get your questions answered.
  2. Complete our free Cybersecurity Fundamentals prep course which takes ~8-12 hours.
  3. Enroll by signing our agreement and using your Amazon Career Choice tuition voucher.
Can I change my work schedule if it conflicts with class?

Yes! You can request a school accommodation through Amazon, which is a temporary schedule change lasting for the duration of the Amazon Career Choice program you have enrolled in. A school accommodation can be requested to help employees attend classes without using paid personal time or unpaid time.

Can any Amazon employee take the Amazon Cybersecurity Bootcamp?

At this time, Evolve Academy is only approved to accept students at any of the following sites: Charleston, SC, Des Moines, IA, Huntsville, AL, Milwaukee, WI, Montgomery, AL and Omaha, NE.

How do I apply for a Career Choice Program voucher?

You can apply for a voucher by going to AmazonCareerChoice.com. Next, you’ll select the ‘Pathways’ track and fill out a voucher application. Once you receive your approved voucher, you will digitally sign it and submit a copy to an Evolve Admissions Advisor to secure your seat in the Cybersecurity Bootcamp.

How much of my tuition will be covered by the Amazon Career Choice Program?

The Amazon Cybersecurity Bootcamp tuition is $5,250. The Amazon Career Choice Program offers 100% tuition coverage up to the yearly tuition maximum depending on your part-time or full-time status. The annual tuition maximum is $5,250 for full-time employees and $2,625 for part-time employees.

If the Amazon Career Choice Program does not cover all of my tuition, what are my payment options?

Option 1: Pay in full – upfront.

  • 100% remaining tuition due one week before the bootcamp start date.

Option 2: Financing

  • We partner with a third-party lender, Ascent Funding, to provide affordable personal loans. Visit their website for details on how to apply and to calculate your financing.

What are the requirements to be approved to take this bootcamp through the Amazon Career Choice Program?

Amazon Associates who meet the following criteria will be eligible to apply for the Evolve Academy Cybersecurity Bootcamp through the Amazon Career Choice program:

  • You are a part-time or full-time Amazon employee working at any of the Amazon sites Evolve Academy has been approved in
  • You have been employed by Amazon for at least 90 continuous days