Worldwide, there has been growing concern about cyber-attacks. The FBI’s Internet Crime Complaint Center logged over 790,000 complaints from the public in 2020 – an increase of 69% from 2019. As the value of our digital assets and communications grows, and we become more dependent on digital solutions in our professional and personal lives we need cybersecurity specialists trained on the latest security tools, technologies, and processes to safeguard us. Proactive security skills are amongst the Top 10 disruptive technology skills of 2020 and demand for skilled people in this area are projected to grow by 39% over a 5-year period.
Cybersecurity professionals are expected to have a strong foundation in areas such as Networking, Programming, Systems Administration, and IT Infrastructure Management. Moving beyond foundational skills they need to be well versed in the core security functions of vulnerability and threat identification, protection and defense of IT assets. They will need to detect cyber-attacks and security breaches and implement the required response and recovery procedures.
Duration: 6 Months
Course Fee: $13,000 USD
Source: LinkedIn’s 2020 Emerging Jobs Report
Source: Occupational Outlook Handbook, USBLS
Source: World Economic Forum, Future of Jobs Report 2020
Our program begins by helping students build a strong networking and OS foundation. It emphasizes design, implementation, and administration of IP networks. Students become competent at Linux systems administration, and learn how to deploy and manage common applications and services using Linux servers. They are encouraged to develop an automation mindset and build the skills to automate routine IT infrastructure deployment, configuration, and monitoring activities.
After the foundation phase, students are introduced to security frameworks that give them a conceptual understanding of IT assets, threats, vulnerabilities, and risks. They learn to install and configure network security devices and perform penetration testing to identify threats and vulnerabilities. Further on, they learn to manage and analyze cyber-attack incidents in compliance with standard incident response and security operations procedures.
Students who are keen on taking up a cybersecurity incident analyst role or those looking for a career shift into cybersecurity can take up this program. No prior programming experience is required to do this program – just curiosity and a determination to persist with the demanding hands-on exercises and assignments. Some other basic requirements are:
Our program gradually transforms students with no information technology background into cybersecurity incident analysts, incident responders and penetration testers. They become adept at securely managing IT infrastructure, identifying cybersecurity risks, effectively responding to incidents, and communicating and collaborating with stakeholders.
On successful completion of all the assignments and projects, each student will be able to:
This program is designed to build the knowledge and skills required to perform the tasks required for the Cybersecurity Specialist role. As part of the learning journey, students build the right attitude that sets them up for seamlessly transitioning to this role, as well as making them aware of some of the best practices that professionals are expected to adopt. The tough challenges that they encounter as part of the program and the capstone project help accelerate their experience. As part of our holistic approach to making them job-ready we ensure that students are equipped with the right technical and engineering competencies.
Doing this program is not just about attending live sessions alone – it is also about following through and completing the hands-on assignments and projects. For an assignment to be considered complete, students must refactor their solution after getting it reviewed. Assignment completion is necessary to move forward in the program.
Question 1What is Auburn University Office of Professional & Continuing Education (OPCE) relationship with Stackroute Learning?
Auburn University Office of Professional & Continuing Education (OPCE) has partnered with Stackroute Learning to deliver quality technical bootcamps.
Question 2How is my academic progress measured and monitored?
The academic progress of a student is governed by the provisions contained in the Student academic progress policy (SAP) in vogue at the time of enrollment detailed in the latest student manual available here Student Manual. The SAP policy details the academic commitment expected of a student on a weekly basis in terms of assignments to be submitted for review and feedback
Question 3What do I get at the completion of the program?
You will receive a Certificate of Completion from Auburn University OPCE
Question 4When are the bootcamps currently scheduled to start?
Cohorts in each of the various virtual program tracks (Cybersecurity, Data Analytics, Cloud Systems Administration and Web Development) typically start every month. Please call 1-334-746-6173 to get more details
Question 5Can I keep working while studying in the program?
Yes, our virtual programs are designed specifically to address the challenges of individuals who are employed but actively pursuing a career change or advancement in their existing field. The part-time schedule allows you to continue working or pursue other interests, while advancing your skills through your active participation in the program
Question 6How long does the program take to complete?
Students are expected to complete the program in 6 – 7 months depending on the program.
Question 7What is the tuition or cost for the program?
The cost of the program is $13,000 USD
Question 8Do you provide career planning support?
Yes, we offer students career support and coaching throughout the duration of the program. Students have an opportunity to develop a working relationship with a career advisor to discuss resume building, job sourcing, interview techniques and salary negotiations.
Question 9How are you different from other programs I can join or other locations?
What makes our bootcamp different is our extensive relationships with leading global companies that hire information technology professionals. Our decades long relationships with global companies provides us with insight and understanding of the specific skills that many employers are demanding as part of their digital transformation efforts. Working with companies, we built our programs to embed these mission critical skills and abilities into our programs so that students who successfully complete the program can be prepared for many entry level jobs in today’s technology-focused workforce.
Question 10What criteria do you look for in potential students applying to the program?
We believe the main criteria for success in our bootcamp is your effort and determination to succeed, as well as time. You will need to be prepared to dedicate the necessary time to the program in order to be successful (typically between 10-12 hours per week)
Question 11How much time should I expect to dedicate to this program?
Our program requires you to participate in
For a total expected time commitment of 12-15 hours per week.
Question 12Do I need to possess an undergraduate degree to be eligible for the program?
No. You are required to possess a High School Diploma from an accredited institution or a GED, as well as being proficient in spoken and written English.
Question 13Do I need to have previous experience in information technology before enrolling in one of the virtual programs?
No specific experience is needed as long as you are determined and eager to learn.
Question 14Will I need to purchase books?
All materials and access to virtual labs and other learning environment will be provided to you and are included in the tuition/cost of the bootcamp.
Question 15Are there any scholarships available?
Students who elect to pay their tuition in advance of starting the program are eligible to receive a discount on the published tuition.
Question 16Who are the faculty for the programs?
Our faculty (Lead Mentors/Instructors) are typically working professionals who are subject matter experts in their field. They are encouraged to bring real-world experience and situations into our classrooms to expose our students to projects and challenges that replicate the experiences you may have as a working professional in the information technology sector.
Question 17Are the courses available online or in person?
Courses are available 100% virtually with live online sessions.
Question 18I’m an employer. How can I hire one of your students or become a hiring partner?
You can contact one of our Career Services professionals at email@example.com
Question 19Do I need my own computer?
You will need an appropriately configured PC with webcam, headset, and uninterrupted internet connection. Required specifications for your PC are as follows:
Question 20Can I use Mac Book for the program?
We recommend the use of Windows Machine for better experience throughout the program. Should you use the Mac Book, we may not be able to provide the technical support.
Question 21Do I need to purchase any application / software before starting the program?
If you have enrolled in the Data Analytics program, you must have a working copy of Microsoft Excel installed. You do not need to purchase any application for the other tracks.
Question 22Can I use the free Excel version from Office 365?
Although Excel is offered free of charge from Office 365, the tool is different in some regards from the Desktop version. You may not be able to perform tasks as demonstrated by the instructor in the Online version. You will additionally have a lot of difficulty downloading and uploading data files to and from both the learning portal and Office 365. For this reason, we recommend using the Downloadable version of Excel program. Additionally, you may not find any support if you decide to use the Office 365 version.