Next cohort starts
October
24
- save your seat now!
Next cohort starts
October 24, 2022
- save your seat now!
Next cohort starts
October 24, 2022
- save your seat now!
Next cohort starts
October 24, 2022
- save your seat now!
Next cohort starts
October 24, 2022
- be sure to save your seat now!
Next session starts
October 24, 2022

Join Our #1 Ranked Cybersecurity Bootcamp

The time is now to jumpstart your career!
Limited Seats Remaining
Limited seats are available!
Enrollment deadline
approaching!

cyber heroes wanted!

Live-online classes in a highly supportive environment
95% of our alumni get hired, with job prep support during & after bootcamp.
Part-time class schedule accommodates a full-time work schedule.
No prior technical background or experience required.
CompTIA Security+ voucher included upon course completion.
Tuition = $12,500. Payment plans available.

Learn part-time, get certified, and gain on-the-job experience, with no previous IT background required. Free CompTIA Security+ voucher included.

#1 Ranked Cybersecureity Bootcamp - 5 Years Running

Award badge for 20217 Best Cybersecurity Bootcamps from switchupAward badge for 2018 Best Cybersecurity Bootcamps from switchupAward badge for 2019 Best Cybersecurity Bootcamps from switchupAward badge for 2020 Best Cybersecurity Bootcamps from switchupAward badge for 2021 Best Cybersecurity Bootcamps from switchup

We'll Help You Think Like a Hacker & Perform Like a Hero

Evolve Academy’s Cybersecurity Bootcamp has been awarded a #1 ranking for five years in a row. Our immersive cybersecurity training is delivered live-online in a classroom-type setting. Students watch pre-recorded lectures and lab tutorials outside the class, which allows more time in class for discussion and hands-on labs. This results in a deeper and more practical understanding of cybersecurity that makes you an in-demand candidate a career in cybersecurity.

Part-time class schedule includes evenings and Saturdays, accommodating a full-time work schedule.
Get job-ready in 5 months!
Instructors are industry experts who connect cybersecurity concepts to actual scenarios faced in the field.
Job preparation is included during and after the bootcamp.
CompTIA Security+ voucher included.

Real Work Experience & Job Preparation

Students perform live security assessment work for non-profit organizations under instructor supervision, giving students real work experience as a Cybersecurity Apprentice. This is invaluable to your job search as an important resume component and talking point in interviews.

Perform actual work as a cybersecurity professional.
Holistic job preparation training includes career coaching, resume and LinkedIn reviews, alumni networking and more.
Supportive community of instructors, fellow students and alumni builds a long-term network of cybersecurity professionals.

This knowledge, combined with our job preparation and career coaching services, boosts your ability to quickly land a position in the industry.

As A Graduate, You Receive:
Digital badge for Evolve Academy Cybersecurity Bootcamp Graduate

Certificate of Completion

Digital badge for Evolve Academy ESCP Certified

Evolve Security Certified Professional (ESCP) Certification

CompTIA Security+ certification voucher to take the certification within 90 days after the bootcamp at no cost

Live-Online Cybersecurity Bootcamp

20-Weeks

Live - Online

Part-Time

M, T, W, Th (7-9pm CST)
Every other Saturday (10am-3pm CST)

CPEs

290 hours

Tuition

$12,500

Level

Beginner

Remote

Live - Online
start your application
Limited Seats Remaining

“Even before I graduated from the Academy, I had 5 different offers.”

“I Chose Cybersecurity Because I Knew I Could Help People.”

A vast alumni and professional network to help you land a cybersecurity job after graduation.
Evolve graduates experience a 48% average median salary increase.
Job preparation and career coaching helps students throughout their job search process.

Reviews From Our Students

Joshua Raju

I've learned more in the past 4 months than I have in my entire life. As hard as it has been, it has been equally rewarding completing the bootcamp. The labs are very interesting and Read more... also very hands on which was a big factor in gaining real world experience.  I was able to land a job about a month after the class ended. This program quite literally changed my life.

Source of this review:
Angela Marafino

Evolve Security Academy has hands down changed my life! The remote course was delivered in such a way that it felt like we were actually in a live classroom and worked perfectly around a full time work schedule. Read more... I landed a job in cybersecurity by networking within the cohort. Attending Evolve’s cyber security bootcamp has been the best investment I have ever made and it changed my life in a matter of months!

Source of this review:
Victor Fernandez

My favorite part about my experience at Evolve was the professional focus that Evolve provides. Everything we did was related to the cybersecurity industry. Read more... The lecture, the labs, and the Meetups with guest instructors gave me more information and knowledge necessary to gain expertise in the cyber security industry.

Source of this review:
David Kordesh

This is by far the most valuable single course I've ever gone through, purely due to the value of the material we were taught. It is heavily reliant on giving its students hands-on experience with system and security tools. Read more... By the time I was done, I was answering questions in job interviews that the interviewers told me they would only expect a person with years of experience to answer.

Source of this review:

Our Graduates Are Known Here:

There Are Over 600,000 Unfulfilled Jobs In Cybersecurity.

Evolve Security not only offers cybersecurity training but is also a technical cybersecurity services company. This ensures curriculum is up-to-date with industry standards. Labs are based on real-world scenarios encountered by Evolve Security’s security engineers, therefore students learn not only the theory behind cybersecurity but also how to apply it in an actual job.

SwitchUp’s #1 Ranked Cybersecurity Bootcamp For 2022

Launch your cybersecurity career in 20 weeks. Training is offered live-online with virtual classes, recorded lectures and lab tutorials.

Best Cybersecurity Bootcamp Winner, 5 years running
Switchup, Google, Course Report

Graduates qualify for many positions, including

Schedule a 10-minute,
no-pressure talk with an advisor now!

FAQ

Will I get a job?

On average, 95% of active job seekers get hired within 63 days. Working with our career coaches, students will develop a tailored road map for their job search that will help them navigate their job search successfully.

How do you help me in getting a job?

Students are supported in their job search with job preparation integrated throughout the bootcamp experience. Students receive coaching about their job search strategy, LinkedIn, resume, and professional networking. After graduation, you also have access to a career coach to support you in your job search.

Do you offer payment options or financing?

Yes. You receive an instant $250 savings when you pay your tuition in full before the bootcamp begins.‍ You can also pay 50% upfront and the remaining balance by week 10 of the bootcamp. Other payment options are available when you finance through Ascent.

Are scholarships available?

Yes, partial merit-based scholarships are available. Prospective students may apply for a scholarship by including a personal essay about why they are deserving during the bootcamp application process. Scholarship recipients are selected following the admissions advisor call and prospective students are informed upon acceptance into the bootcamp.

Will I get to know others in this Live-online Bootcamp?

Yes, students form a close community with classmates and alumni. During your live online classes, you’re face-to-face with other students in your cohort and in your small groups (8-10 students). Students and instructors also communicate daily through Slack and have access to our alumni channel to build a network with 500+ other Evolve graduates.

What makes cybersecurity such a rewarding career?

Cybersecurity is a rapidly expanding field. This has created a shortage of cybersecurity professionals, resulting in numerous positions that need to be filled. If you enjoy fast-paced work where you’re always learning, you’ll excel in a cybersecurity career.

Are any prerequisites needed to enroll?

You can enroll without any prior IT or development experience. However, incoming students are expected to be familiar with basic cybersecurity concepts, computer networking, and the Linux command line. Start with our Cybersecurity Fundamentals course to learn the basics and prepare for the bootcamp which is required for all incoming students.

How many hours a day will I be learning?

Live-online classes meet Monday -Thursday. (7-9 p.m. CST) and every other Saturday (10 a.m.-3 p.m. CST) with office hours available. Students are expected to spend a total of 20 hours per week on Cybersecurity Bootcamp studies, including in-class and individual work. On average, individual work is about 8 hours a week.

As Seen On

cybersecurity bootcamp
What is the

Curriculum

Introduction to
Cybersecurity

This module introduces core principles that are essential to forming a security mindset, which include the CIA Triad (Confidentiality / Integrity / Availability), Defense-in-Depth, Authentication, and Authorization. Cybersecurity is a broad subject so this module provides a general overview of the different domains within security including Application Security, Network Security, Hardware Security, Physical Security, Mobile Security, Operational Security (SecOps/OpsSec), Incident Response, Identity and Access Management, Governance, Risk & Compliance (GRC), and Disaster Recovery / Business Continuity.

TOPICS: Key Elements, CIA Triad, Defense-In-Depth, Domain Landscape, AAA Services, OWASP Top 10: NIST Special Publications
Networking

Networking is the process of how connections are made and how computers and systems communicate with each other which forms the basis of cybersecurity. This module provides the foundational understanding for computer networking and covers network protocols that are used for data communication, networking hardware, subnetting, networking utilities and traffic analysis.

TOPICS: LAN / WAN, OSI Model, TCP / IP Model, Network Protocols, IP v4 & IP v6, TCP, UDP, ICMP, Ports and Services, Routing & Switching, NAT / PAT, DNS, Network segmentation, Subnetting, VLANS.

TOOLS: Kali Linux, TCPDUMP, Netcat, Netstat, Dig, Nslookup, Whois, Packet Tracer, Nmap, Wireshark.
Security Program

This module focuses on how to understand, implement and manage a security program within an enterprise. Security professionals must have strong knowledge of how a company operates to implement effective security policies and procedures. You must understand who the organization’s employees, customers, suppliers and competitors are and how digital information is created, accessed, and shared. Students will learn about the various compliance standards and security frameworks that are most commonly used in the industry.

TOPICS: Cybersecurity governance and strategy, Risk management (Rating methodologies), Compliance (Legal / Regulatory / HIPAA / PCI - DSS).

TOOLS: NIST Cyber Security Framework, CIS Top 20 Framework.
OSINT & Social Engineering

Open Source Intelligence (OSINT) is a tradecraft used for conducting reconnaissance and information against an adversary or target to gain insights into people or organizations. Students will learn how to gather information about a victim and craft a phishing campaign to compromise the victim’s organization. Knowledge of these simple offensive techniques will help students understand how to craft security awareness campaigns and defend against phishing attacks.

TOPICS: Information gathering with open source tools, Network and Domain enumeration, Anonymization on the Internet, Security Awareness, Social Engineering (Email / Phishing / In-Person /Telephony).

TOOLS: Kali Linux, Google Hacking Database, VPN, TOR Browser, Whois, DNS records, Traceroute.
Threat Landscape

An enterprise cannot properly defend their information unless they understand who they are defending against. This module discusses the current threat landscape and dives into where threats are coming from and what is motivating the threat actors.

TOPICS: Threat Sources & Events, Adversarial (Fraud / Theft , Insider Threat, Malicious Hackers, Malicious Code, Malware, Ransomware, Espionage), Non-adversarial (Errors and Omissions, Physical Infrastructure, Privacy and Data Sharing), Threat Motivations (Monetary, Hacktivism, IP Theft, Espionage).

TOOLS: Data Breach Reports, MITRE & CK Framework.
Scripting for Security

Python has become increasingly popular in the offensive and defensive cyber communities. Tool developers and hackers primarily used Python, but with the rise of analysis-driven and proactive cyber activities, it is now a staple in the cybersecurity industry. In this module, students will learn the basics of scripting with Python to solve common and emerging cybersecurity challenges.

TOPICS: Client Server Model, App and Web Servers, programming fundamentals, functions and classes, API connections, Regular Expressions.

TOOLS: Python, JupyterLab, Git, PIP, VirtualENV.
Security Operations Architecture

The ability to prevent and detect cyber-attacks as they occur in real time is the epicenter of defending against cybercrime. Good defense starts with thoughtful network architecture design that leverages Cloud and on-prem technologies. In this module, students will learn about network architecture / design, virtual private cloud (VPC) configuration, end-point hardening and deployment, and secure two- factor authorization.

TOPICS: Network Architecture Design, Virtual Private Cloud (VPC) design, configuration and deployment, Firewalls (Access Control Lists / Filters / Rules / White List / Black List), Proxies, Remote Access, Virtual Private Network (VPN) configuration and deployment, Access Control, Infrastructure as Code, Cloud Infrastructure Auditing, Systems Hardening.

TOOLS: Kali Linux, AWS, Terraform, ScoutSuite, DUO, Lynis, Windows Security Policies, OpenVPN.
Security Operations Threat Modeling

Cybersecurity should always be proactive rather than reactive. It is much more difficult and expensive to address security after a system has been deployed. In this module, students will learn best practices for network threat modelling, prevention, and continuous monitoring and mitigation.

TOPICS: Detect / Defend, Traffic Analysis, Logging / Log Management, Security Information Event Management (SIEM), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Data Loss Prevention (DLP).

TOOLS: Kali Linux, IPtables, Snort, Splunk, Security Onion, Carbon Black, SIEM Dashboards.
Cryptography

A cyber-criminal cannot do as much damage to an enterprise if they are unable to read the stolen data. This module first focuses on the core concepts of encryption (Boolean Logic, Modulus Arithmetic, hashing) and how it is used within secure protocols (SSL, TLS, SSH). It focuses on how to implement and manage encryption policies within an enterprise (signatures, key management, PKI). Students will learn the importance of understanding the vulnerabilities and misconfigurations that most commonly go wrong during implementation. At the end of the module, students use brute force, rainbow tables and various other hacker tools to crack passwords from hashed data.

TOPICS: Boolean Logic, Modulus Arithmetic, Symmetric / Asymmetric, Hashing, TLS / SSL, Disk encryption, Key Derivation Functions, Digital Signatures, Key Management: Public Key Infrastructure, Password Cracking: Rainbow Tables.

TOOLS: OpenSSL, CertBot, Nginx, MD5 / SHA, VeraCrypt, Bcrypt, Hydra, Hashcat.
AppSec & Offensive Security

How do we know if all the policies, procedures, firewalls, ACLs, or intrusion detection and prevention systems are working unless we test them? This module focuses on how to review security programs and perform various security vulnerability assessments throughout an enterprise. Students will embody the mindset of a hacker and perform penetration tests where they mimic real-world attacks to identify methods to circumvent the security features of an application, system or network. A successful penetration tester has in-depth knowledge of how networks, systems, and applications are defended. This module allows students to test everything they have learned thus far. Students participate in a competitive red team / blue team exercise to showcase their skills in a team environment.

TOPICS: Assessment Approach, Testing Viewpoints (Internal / External, Overt / Covert, White box / Gray Box / Black Box), Mitigation and Remediation, OWASP Top 10, Vulnerability Scanning, Penetration Testing, Bug Bounty, DevSecOps, Red Team / Blue Team.

TOOLS: Nmap, Bettercap, Metasploit, Nikto, Nessus, Burp Suite, Veracode, Shodan, Discover scripts, DNS Exfiltration, OWASP Zap, Qualys.
Threat Hunting & Incident Response

There are two types of companies: companies that know they have been breached and companies that do not know they have been breached. One-third of U.S. businesses were breached last year and nearly 75% were unaware of how the incident occurred. In this module, students learn why it is vital for companies to properly respond after a breach and have a process to perform a forensics analysis to learn how the breach occurred and understand how it affects the company.

TOPICS: CSIRT, NIST: IR Methodology (Preparation / Detection & Analysis / Containment, Eradication & Recovery / Post-Incident Activity), NIST: Forensics Process (Data Collection / Examination / Analysis / Reporting), Threat Intelligence (Cyber Kill Chain / Diamond Model).

TOOLS: FireEye Redline (Mandiant), Volatility, BinText, Incident Response Tabletop exercises.
Security Apprenticeship

During the final portion of the bootcamp, students apply what they have learned to a real-work environment by serving as a security apprentice to complete a security assessment for a non-profit organization. Students will work with their small group to conduct a vulnerability assessment, analyze the results, recommend appropriate remediation measures and develop a report for the executive management, thereby gaining valuable experience that will aid them in their job search. Students will follow the Evolve Security services methodology, used by our cybersecurity engineers, to conduct the assessment and learn what it is like to work directly with a client.

Job Preparation

In addition to the technical cybersecurity training, students will learn the skills and strategy to confidently navigate their job search with our support. Job preparation training is integrated throughout the bootcamp and available after graduation. Through career coaching, cybersecurity resume prep, mock interviews, networking strategies, alumni connections and employer partners, students land jobs that launch their cybersecurity careers. Students are encouraged to take advantage of virtual and in-person EvolveSec Meetup events to connect with industry professionals and expand their network. We know what it takes to get a job in cybersecurity and support our students throughout their job search process.

TOPICS: Networking, LinkedIn Profile, Resume Prep, Interview Prep, Career Coaching, Job Search Strategy, Continuing Education, CompTIA Security+.
JUMPSTART YOUR CYBERSECURITY CAREER

Join Our Award-Winning Cybersecurity Bootcamp

Limited Seats Remaining
Live-Online cybersecurity Bootcamp

94% of alumni get hired due to our bootcamp’s practical and hands-on training, integrated real work experience and career support.

Prepare for the OSCP exam
with Offensive Security's Authorized Training Partner

Part-time class schedule with classes meeting in the evenings, Monday-Thursday, and every other Saturday, accommodating a full-time work schedule.
No prior technical background or experience required.
Job preparation support offered during and after the bootcamp.
Gain real work experience as a Cybersecurity Apprentice.
CompTIA Security+ voucher included.
Advance your cybersecurity career with the industry's most prestigious certification for penetration testing in just 18 weeks.
Avg. Rating: 4.85
(78 reviews)
Avg. Rating: 4.86
(131 reviews)
Avg. Rating: 4.9
(89 reviews)
Avg. Rating: 5
(9 reviews)