Cybersecurity Foundations I

Cybersecurity Foundations I

Powered by

Advance your understanding with courses focused on system hardening, threat intelligence, and SIEM solutions. Develop the skills to protect and defend networks, respond to incidents, and implement security measures that keep systems safe from cyber threats.

$3,600.00 USD

$4,000.00 USD
30-Day Money-Back Guarantee

Financing and flexible payment options available. Learn more

Next Cohort Date

March 3, 2025
December 2, 2024

Program Features

Qualification

Industry Certificate

Duration

9 weeks

Commitment

20 hours weekly

Skill Level

Intermediate

Delivery

Weekly instruction, feedback and support

Start Date

First Monday of each month

Led By

Experienced industry instructors

Features

Flexible schedules and small class sizes (5 max)

Value

Affordable high quality education

Build your cybersecurity skillset

Take your cybersecurity skills to the next level with courses focused on system hardening, threat intelligence, and security information and event management (SIEM). You’ll learn how to protect and defend networks from cyber attacks, respond to incidents, and implement industry-standard security measures. These courses will provide you with the practical knowledge needed to assess and strengthen security postures, manage threat detection, and ensure compliance with governance, risk, and compliance (GRC) standards. By the end, you’ll be equipped to handle the complex challenges faced by cybersecurity professionals in today’s digital landscape.

The SMU x Flatiron School difference: 

  • Be mentored by a world-class cybersecurity expert
  • Small group classes (max 5 students)
  • 100% online programs

Program prerequisites: Cybersecurity Essentials.

To succeed in these courses, you should have:

  • A basic understanding of computer networking, including crucial concepts like IP addresses and subnetting.
  • Experience with Python scripting, including basic data structures and functions.- Familiarity with Linux and Windows operating systems, particularly regarding security features and command-line interface (CLI) usage.
  • Basic experience in using VirtualBox and configuring virtual machines
  • Experience installing Docker Desktop.

Upon completion of this program, you'll be able to move on to Cybersecurity Foundations II.

Curriculum

Industry-approved curriculum to support your journey into cybersecurity.

Threat Intelligence - 3 weeks

This comprehensive cyber threat intelligence course covers the fundamentals of CTI and its role in cybersecurity. You'll explore real-world applications, threat intelligence models like MITRE ATT&CK, and analyze security incidents. The course also emphasizes the importance of Governance, Risk, and Compliance (GRC) in cybersecurity strategy.

What you'll learn: 

  • Outline a response to an attack using security information and event management (SIEM) data.
  • Integrating GRC strategies in cybersecurity processes

System Hardening- 3 weeks

This course enhances your Linux skills with advanced commands and techniques, covers Active Directory security, common threats, and mitigation strategies. It includes cloud computing fundamentals, data protection methods, encryption, and privacy regulations. You'll also learn system hardening, scripting for automation, and monitoring system health for optimal security.

What you'll learn: 

  • Identify mitigation strategies to protect against future attacks.
  • Implement knowledge of system hardening to a scenario.

SIEM and Threat Hunting - 3 weeks

This course focuses on security incident detection and response, covering Security Information and Event Management (SIEM) solutions, log analysis, and threat intelligence. You'll explore advanced SIEM features, threat hunting techniques, and vulnerability management. The course ends with a project where you'll use SIEM and threat hunting to address a cybersecurity incident.

What you'll learn: 

  • Utilize SIEM solutions and threat hunting to solve a cybersecurity incident
  • Integrate Security Information and Event Management (SIEM) solutions to solve cybersecurity incidents

Tuition

Flexible small group classes are the best way to learn from top industry instructors in a fun, collaborative environment, while still getting plenty of personalized feedback.

Upfront

$3,600

Pay as You Go

$4,000

3 monthly payments of $1,334

Get in Touch

Course Mentors

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse tincidunt sagittis eros. Quisque quis euismod lorem.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Cybersecurity Foundations I FAQs

Learn more

Will I earn a certificate or some other credential when I complete the Foundations program?

Yes! Upon the completion of each program in the pathway, you will receive a Credly digital badge from SMU and a certificate from Flatiron School. Digital badges can be used in email signatures or digital resumes, and certificates can be displayed on portfolio websites and social media sites such as LinkedIn, Facebook, and Twitter.

Thousands of our community members use their program certificates and badges to demonstrate skills to potential employers — including our hiring partners — along with their LinkedIn networks. Our curriculum is powered by Flatiron School, whose programs are well-regarded by many top employers, who contribute to our curriculum, hire our community, and partner with us to train their own teams.

Can I skip the intro program and go directly to the Foundations program?

It is VERY occasionally possible to skip the essentials program and go directly to Foundations I. However, we highly recommend that most students do not skip Essentials as it covers a tremendous amount of information and skills that will be used throughout the entire career pathway program and will require some catching up if skipped.

The essentials program is still difficult and covers a ton of material that is necessary for proceeding in the following programs and won't be reviewed in  Foundations. All of the future program material will build upon the essentials.

If you would like to be considered to enter directly into the Foundations-level programs, you'll be required to submit materials demonstrating your proficiency in the materials covered in the Essentials program.

Ready to Make a Change?

Whether you want to build games, design products, prevent the next cyber attack, or create the next internet-breaking AI, we provide the training to bring your ideas to life.

Let's build your future together.

Apply Now