Cybersecurity Foundations II

Cybersecurity Foundations II

Powered by

Delve into complex areas of cybersecurity, including penetration testing, security architecture, and incident response. Gain hands-on experience with industry-standard tools and strategies, and prepare to lead in defending against sophisticated cyber attacks.

$4,050.00 USD

$4,500.00 USD
30-Day Money-Back Guarantee

Financing and flexible payment options available. Learn more

Next Cohort Date

May 5, 2025
December 2, 2024

Program Features

Qualification

Industry Certificate

Duration

12 weeks

Commitment

20 hours weekly

Skill Level

Intermediate

Delivery

Weekly instruction, feedback and support

Start Date

First Monday of each month

Led By

Experienced industry instructors

Features

Flexible schedules and small class sizes (5 max)

Value

Affordable high quality education

Master advanced cybersecurity techniques

Delve into the more intricate aspects of cybersecurity with courses on penetration testing, security architecture, and incident response. You’ll gain expertise in identifying and exploiting system vulnerabilities, designing secure network architectures, and responding to cyber incidents with best practices in digital forensics and incident response. These courses will also cover advanced topics like API security and mobile device security fundamentals, preparing you to reduce an organization's cyber-attack surface area. By the end of these courses, you’ll be ready to lead in cybersecurity, equipped with the skills to protect digital infrastructures from even the most complex cyber-attacks.

The SMU x Flatiron School difference: 

  • Become familiar with industry essentials and best practices
  • Learn to configure virtual machines with no prior knowledge
  • Gain confidence using industry-standard languages Python
  • Be mentored by a world-class cybersecurity expert
  • Small group classes (max 5 students)

Program pre-requisites: Cybersecurity Essentials, Cybersecurity Foundations I.

For this advanced course, you’ll need:

  • Strong networking knowledge, including the ability to troubleshoot and secure networks.- Intermediate Python skills, with the ability to write scripts for security automation and analysis.
  • Experience with security tools and techniques, including SIEM solutions, system hardening, and penetration testing.
  • Foundational knowledge of cyber risk- Foundational knowledge of data protection.

Curriculum

Industry-approved curriculum to support your journey into cybersecurity.

Security Architecture and Frameworks - 3 weeks

This course covers secure architecture fundamentals, frameworks, and the consequences of insecure design. You'll learn to assess system vulnerabilities, understand secure network architecture, and explore zero-trust concepts, network segmentation, and cloud security. The course concludes with a project where you'll identify vulnerabilities using your knowledge of IT architecture and security.

What you'll learn:

  • Integrate knowledge of security architecture to identify vulnerabilities that are discovered.
  • Identify mitigation strategies to protect against future attacks.

Incidence Response - 3 weeks

This course covers digital forensics, including malware recognition and evaluation, Python skills for API security, and memory forensics for Windows and Linux. It concludes with a project where you'll use these skills to respond to a cybersecurity incident.

What you'll learn:

  • Identify mitigation strategies to protect against future attacks.
  • Conduct an investigation to an incident using best practices of digital forensics and incident response
  • Implement best practices for API security for organization security.

Penetration Testing - 3 weeks

This comprehensive course teaches you to ethically exploit vulnerabilities and identify security weaknesses. You'll learn social engineering, reconnaissance, scanning, enumeration, and post-exploitation strategies. Gain hands-on experience with tools like Burp Suite and Metasploit, and apply your skills in a real-world penetration testing project.

What you'll learn:

  • Develop and log corrective action methodology to a system vulnerability using industry standard techniques.  
  • Implement knowledge of nmap for penetration testing.

Penetration Testing Applications - 3 weeks

This course covers web application security, including common threats, secure coding, and penetration testing with industry tools. You'll master Active Directory attack methods, mitigation strategies, and credential dumping, and learn OT security best practices and emerging trends like AI and quantum cryptography. It also addresses mobile device security, including vulnerability identification, configuration, and scripting for automated scans. The course concludes with a web application security penetration testing project.

What you'll learn:

  • Develop and log corrective action methodology to a system vulnerability using industry standard techniques.  
  • Implement a methodology for building secure mobile architecture.

Tuition

Flexible small group class are the best way to learn from top industry instructors in a fun, collaborative environment, while still getting plenty of personalized feedback.

Upfront - Save 10%

$4,050

Pay as You Go

$4,500

3 monthly payments of $1,500

Get in Touch

Course Mentors

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse tincidunt sagittis eros. Quisque quis euismod lorem.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Cybersecurity Foundations II FAQs

Learn more

Will I earn a certificate or some other credential when I complete the Foundations program?

Yes! Upon the completion of each program in the pathway, you will receive a Credly digital badge from SMU and a certificate from Flatiron School. Digital badges can be used in email signatures or digital resumes, and certificates can be displayed on portfolio websites and social media sites such as LinkedIn, Facebook, and Twitter.

Thousands of our community members use their program certificates and badges to demonstrate skills to potential employers — including our hiring partners — along with their LinkedIn networks. Our curriculum is powered by Flatiron School, whose programs are well-regarded by many top employers, who contribute to our curriculum, hire our community, and partner with us to train their own teams.

Ready to Change the Game?

Whether you want to build games, design products, prevent the next cyber attack, or create the next internet-breaking AI, we provide the training to bring your ideas to life.

Let's build your future together.

Apply Now