Cybersecurity Engineering
- All levels
- 18 and older
- $16,900
- Earn 169,000 reward points
- Price Lock Guarantee
- 11 Broadway, New York, NY
- 675 hours over 75 sessions
Thankfully we have 1 other Cybersecurity Class for you to choose from. Check our top choice below or see all classes for more options.
ONLC Training Centers @ 626 Reckson/RexCorp Plaza, Uniondale, NY & Virtually Online
Prepare to enhance your skills in cybersecurity with a comprehensive course that covers threats, attacks, vulnerabilities, identity management, and risk assessment. Ideal for IT professionals seeking to advance their careers in security architecture, engineering, administration, and more.
May 6th
10am–4:45pm EDT
Meets 5 Times
Learn the tech skills you’ll need for a new career in as little as 15 weeks. This cybersecurity course in New York City is designed for students with a technical background, helping you start a career in cybersecurity engineering and launching you into the forefront of global tech growth.
Join a mission. Secure the future with our proven curriculum.
Ready to change your career? Launch into one of the US' top 10 fastest-growing jobs with a career in cybersecurity engineering. Our 15-week immersive program has been developed in collaboration with top cybersecurity employers — you’ll learn the skills you need to jump right into cybersecurity’s frontlines and into the cybersecurity roles that employers are looking for.
Get job-ready with our employer-oriented curriculum, and hands-on experience in our unique Cyber Range lab environment—a sandbox where you can safely learn how to hack, explore, track, gather, break, and build things
What you'll learn: comprehensive cybersecurity engineering skills
Over 15 intense weeks on campus at Flatiron School New York City, our Cybersecurity Engineering curriculum will prepare you to jump into the cybersecurity industry. You’ll get fluent in cybersecurity tools like Python, Wireshark, Linux, Metasploit and more, and learn how to use them to defend against cybercriminals. The program includes 9 modules designed to fully prepare you for a career as a tier 1+ security engineer, technical analyst, penetration tester or consultant.
Network Security
You’ll focus on the core ideas in network security.
The first portion of the course will review of basic network protocols: Ethernet, 802.11 (WiFi), IP, UDP, TCP, ARP, DHCP, DNS, ICMP, BGP, SMTP, POP/IMAP, FTP, HTTP, IGMP, and the attacks on these basic technologies: TCP hijacking, ARP cache poisoning and domain spoofing, as well as countermeasures. '
You’ll then explore sniffing and port scanning, firewalls, IDSes and NIDSes and cover wireless protocols and their security.
System Security
You’ll focus on system architecture, operating system architecture, system exploits (hardware, operating system and memory). You’ll also utilize tools, including command line tools in Linux (xxd, gdb, etc) for further analysis of exploits.
Explore exploits and their countermeasures, including buffer overflows, TOCTOU, shellcode injections, integer overflows and off-by-one errors. You’ll cover basic Cloud security and migration considerations, hypervisor exploits and Android and iOS security.
Python
You’ll focus on basic Python scripting and applications in cybersecurity. The focus will be on basic scripting techniques, including loops and flow controls. Functions and modules will also be introduced with Crypto and OpenSSL packages being utilized, in particular.
You’ll focus on Governance, Risk, and Compliance (GRC). Learn how to engage all functional levels within the enterprise to deliver information system security.
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals – adversaries will invariably find and exploit weak links. By the end of the course, students will be able to implement GRC programs at the maturity level that many organizations are not at currently and to establish efficient, effective, and elegant Information security programs.
You’ll focus on engineering solutions to allow analyzing the logs in various network devices, including workstations, servers, routers, firewalls and other network security devices.
Explore the information stored in logs and how to capture this data for analyzing these logs with a Security Information and Event Manager (SIEM). You’ll learn the steps involved in incident response and crisis management.
You’ll gain an appreciation of how to conduct threat intelligence and other analysis. This course will focus on the analytical and planning skills required to conduct effective cyber threat intelligence.
You’ll focus on the core ideas in application security and PenTesting. Learn to describe the usage of Metasploit and other Kali Linux pentesting tools; describe the PenTesting Execution Standard (PTES); utilize attack tools to mount attacks against various types of networks and applications and use countermeasures to forestall these same attacks; and deliver a wide variety of payloads to attain and maintain backdoor access to a compromised machine and actions to combat these attacks, as well.
This course is designed with two main goals in mind. The first goal is to provide you with a strong theoretical foundation in the principles of modern cryptography. You’ll go through an essential (though not rigorous) treatment of encryption and authentication in the context of symmetric and public key cryptography. The second goal is to highlight the major cryptographic attacks from recent history, prod you to learn how to execute those attacks, and thereby learn how to best defend against them. Throughout the course, you’ll learn about tools for implementing cryptographic algorithms (OpenSSL), as well as tools for attacking and defending protocols that use encryption.
You’ll focus on a final capstone project summarizing learning from all parts of the Cybersecurity Engineering curriculum.
This will require detailed analysis of data, simulated and live action scenarios, installation and configuration of components or applications and other activities.
Due to the high costs of hardware, software, facilities and staff resources a non-refundable, non-transferable 25% of tuition is required per course, per participant.
People who viewed this class also viewed the following classes
Get quick answers from CourseHorse and past students.
The Flatiron School is a school for passionate people who want to love what they do. As an intensive school for those who love to create, the goal is to learn build awesome things with code.
The adult programs prepare students with little technical experience to build web and mobile applications in just...
Read more about The Flatiron School
This school has been carefully vetted by CourseHorse and is a verified NYC educator.
The Flatiron School
Flatiron, Manhattan
11 Broadway Ste 260
Btwn Morris St & Battery Pl
New York, New York 10004 Flatiron, Manhattan
11 Broadway Ste 260
Btwn Morris St & Battery Pl
New York, New York 10004
Booking this class for a group? Find great private group events
Or see all Professional Group Events
Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.
Secure your booking now and we'll match any price drop within 48 hours across all booking platforms, ensuring you never miss out on savings!
Maximize your savings with every purchase. Unlock rewards on every transaction, ensuring you get the most value out of your experience!
Enjoy hassle-free transactions without worrying about additional charges. With us, what you see is what you pay - no surprises!
Discover a curated selection of courses handpicked by experts in the field. Dive into quality content that suits your learning needs and interests!
More in IT
Get special date and rate options for your group. Submit the form below and we'll get back to you within 2 business hours with pricing and availability.