Cyber Security

Up your skills. Take the next step in tech through our bootcamp training programs.

Cyber Security

What is Cyber Security?

Cybersecurity is a critical and expansive field that focuses on protecting computers, networks, programs, and data from unauthorized access, damage, or attack. It encompasses a range of practices, technologies, and processes designed to safeguard digital assets and sensitive information from cyber threats such as hacking, malware, data breaches, and identity theft.

Core Focus

  • Follow the design process

    Network Security

    The practice of securing a computer network and implementing measures to protect the integrity, confidentiality, and accessibility of network and data.

  • Apply UX concepts

    Disaster Recovery and Business Continuity

    This defines how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data.

  • Understand UX research

    User Education

    Users must understand the importance of following best practices like not clicking on unknown links or downloading suspicious attachments in emails.

Cyber Security Foundations

The Cyber Secruity Foundations Course allows students to learn more about the day-to-day of development roles, as well as begin their journey into using code to build small projects. Students are able to ask questions from mentors during this lower-commitment programming to understand the possibilities of employment in tech.

Dates: Upcoming cohorts coming soon

Location: These courses will take place via Zoom and at our downtown St Paul location.

Full Stack Curriculum

Network Security Course: This course covers topics like network architecture, operations, security against network intrusions, and security hardening. It includes learning about firewalls, VPNs, proxy servers, DDoS attacks, IP spoofing, and other network attacks, as well as creating incident reports using the NIST CSF Framework.

Tools of the Trade: Linux and SQL: This course begins with an introduction to operating systems, focusing on Linux, including its architecture, installation, and command-line usage. It also covers SQL, including queries, filters, and basic commands.

Assets, Threats, and Vulnerabilities: Taught by a Google security engineer, this course delves into asset classification, risks, security controls, data encryption best practices, user authorization, common threats, vulnerabilities, and data security threats like malware and cross-site scripting.

Sound the Alarm: Detection and Response: This course teaches incident detection and response, including interpreting network communications, using packet sniffing tools, and practicing with IDS and SIEM tools.

Location: This is a hybrid course with office availability at Osborn370.

Our next cohort will be in 2024. For information, please fill out this interest form.