Cybersecurity Foundations I

Build Your Cybersecurity Skillset. Advance your understanding with courses focused on system hardening, threat intelligence, and SIEM solutions. Develop the skills to protect and defend networks, respond to incidents, and implement security measures that keep systems safe from cyber threats.

Powered by
Flatiron School

$3,600.00

$4,000.00
Part-time
Part-Time ()
Apply Now

$299.99/mo

$499.99/mo
Community-Powered Bootcamp
Apply Now

Financing and flexible payment options available. Learn more

Want more info?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Next Cohort Date

April 7, 2025
December 2, 2024

Course Features

Qualification

Industry Certificate

Duration

9 weeks

Commitment

20 hours weekly

Skill Level

Intermediate

Delivery

Weekly instruction, feedback and support

Start Date

April 7, 2025

Led By

Experienced industry instructors

Features

Flexible schedules and small class sizes (5 max)

Value

Affordable high quality education
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Build your cybersecurity skillset

Take your cybersecurity skills to the next level with courses focused on system hardening, threat intelligence, and security information and event management (SIEM). You’ll learn how to protect and defend networks from cyber attacks, respond to incidents, and implement industry-standard security measures. These courses will provide you with the practical knowledge needed to assess and strengthen security postures, manage threat detection, and ensure compliance with governance, risk, and compliance (GRC) standards. By the end, you’ll be equipped to handle the complex challenges faced by cybersecurity professionals in today’s digital landscape.

The Bletchley Institute x Flatiron School difference:

  • Be mentored by a world-class cybersecurity expert
  • Small group classes (max 5 students)
  • 100% online programs

Program pre-requisites: Cybersecurity Essentials.

To succeed in these courses, you should have:

  • A basic understanding of computer networking, including crucial concepts like IP addresses and subnetting.
  • Experience with Python scripting, including basic data structures and functions.- Familiarity with Linux and Windows operating systems, particularly regarding security features and command-line interface (CLI) usage.
  • Basic experience in using VirtualBox and configuring virtual machines
  • Experience installing Docker Desktop.

Upon completion of this program, you'll be able to move on to Cybersecurity Foundations II.

Objectives

  • Become familiar with industry essentials and best practices 
  • Learn to configure virtual machines with no prior knowledge
  • Gain confidence using industry-standard languages Python
  • Be mentored by a world-class cybersecurity expert
  • Small group classes (max 5 students)

Curriculum

Industry-approved curriculum to support your journey into cybersecurity.

Threat Intelligence - 3 weeks

This comprehensive cyber threat intelligence course covers the fundamentals of CTI and its role in cybersecurity. You'll explore real-world applications, threat intelligence models like MITRE ATT&CK, and analyze security incidents. The course also emphasizes the importance of Governance, Risk, and Compliance (GRC) in cybersecurity strategy.

What you'll learn: 

  • Outline a response to an attack using security information and event management (SIEM) data.
  • Integrating GRC strategies in cybersecurity processes

System Hardening- 3 weeks

This course enhances your Linux skills with advanced commands and techniques, covers Active Directory security, common threats, and mitigation strategies. It includes cloud computing fundamentals, data protection methods, encryption, and privacy regulations. You'll also learn system hardening, scripting for automation, and monitoring system health for optimal security.

What you'll learn: 

  • Identify mitigation strategies to protect against future attacks.
  • Implement knowledge of system hardening to a scenario.

SIEM and Threat Hunting - 3 weeks

This course focuses on security incident detection and response, covering Security Information and Event Management (SIEM) solutions, log analysis, and threat intelligence. You'll explore advanced SIEM features, threat hunting techniques, and vulnerability management. The course ends with a project where you'll use SIEM and threat hunting to address a cybersecurity incident.

What you'll learn: 

  • Utilize SIEM solutions and threat hunting to solve a cybersecurity incident
  • Integrate Security Information and Event Management (SIEM) solutions to solve cybersecurity incidents

Tuition

Upfront

$3,600

Pay as You Go

$4,000

3 monthly payments of $1,334

Your Life Won't Wait for a Career Change

Pick the option that best fits into your life.

Full-Time

You’re ready to commit to a full-time course load. You’ll graduate in 15 weeks thanks to a rigorous schedule and instructor support.

  • 15 week program
  • Required class time and office hours
  • Live instructor guidance and feedback
Tuition: $3,600.00 $4,000.00
Apply for Full-Time

Part-Time

Part-time is designed for busy people. If you don't have 8 hours to dedicate a day, then part-time is for you. Graduate in 45 weeks.

  • 45 week program
  • Optional study groups and office hours
  • Instructor guidance and feedback
Tuition: $3,600.00 $4,000.00
Apply for Part-Time

Community-Powered

The community-powered options offers peak flexibility. Pay a small fee each month for access to course material with no time limit for completion.

  • Unlimited learning time
  • Guidance and feedback via Discord community
  • Same top-tier education
  • Cancel membership anytime
Tuition: $299.00/mo $499.00/mo
Apply for Community-Powered

Course Mentors

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse tincidunt sagittis eros. Quisque quis euismod lorem.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Cybersecurity Foundations I FAQs

Learn more

What are the software and hardware requirements for the foundations programs?

Software:

Visual Studio will be used in this program and can be downloaded for free.

Hardware:

Students will need a computer that meets the minimum requirements for Visual Studio 2022.

Join us at the
Bletchley Institute

Be part of a community that dares to dream, to innovate, and to make a lasting impact on the world. Together, we can achieve mighty things.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.