Cybersecurity Foundations II

Master Advanced Cybersecurity Techniques. Delve into complex areas of cybersecurity, including penetration testing, security architecture, and incident response. Gain hands-on experience with industry-standard tools and strategies, and prepare to lead in defending against sophisticated cyber attacks.

Powered by
Flatiron School

$4,700.00

$5,200.00
Part-time
Part-Time ()
Apply Now

$299.99/mo

$499.99/mo
Community-Powered Bootcamp
Apply Now

Financing and flexible payment options available. Learn more

Want more info?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Next Cohort Date

July 7, 2025
December 2, 2024

Course Features

Qualification

Industry Certificate

Duration

12 weeks

Commitment

20 hours weekly

Skill Level

Intermediate

Delivery

Weekly instruction, feedback and support

Start Date

July 7, 2025

Led By

Experienced industry instructors

Features

Flexible schedules and small class sizes (5 max)

Value

Affordable high quality education
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Master advanced cybersecurity techniques

Delve into the more intricate aspects of cybersecurity with courses on penetration testing, security architecture, and incident response. You’ll gain expertise in identifying and exploiting system vulnerabilities, designing secure network architectures, and responding to cyber incidents with best practices in digital forensics and incident response. These courses will also cover advanced topics like API security and mobile device security fundamentals, preparing you to reduce an organization's cyber-attack surface area. By the end of these courses, you’ll be ready to lead in cybersecurity, equipped with the skills to protect digital infrastructures from even the most complex cyber-attacks.

The Bletchley Institute x Flatiron School difference:

  • Become familiar with industry essentials and best practices
  • Learn to configure virtual machines with no prior knowledge
  • Gain confidence using industry-standard languages Python
  • Be mentored by a world-class cybersecurity expert
  • Small group classes (max 5 students)

Program pre-requisites: Cybersecurity Essentials, Cybersecurity Foundations I.

For this advanced course, you’ll need:

  • Strong networking knowledge, including the ability to troubleshoot and secure networks.- Intermediate Python skills, with the ability to write scripts for security automation and analysis.
  • Experience with security tools and techniques, including SIEM solutions, system hardening, and penetration testing.
  • Foundational knowledge of cyber risk- Foundational knowledge of data protection.

Upon program completion, you'll be able to move on to the Cybersecurity Capstone.

Objectives

  • Become familiar with industry essentials and best practices 
  • Learn to configure virtual machines with no prior knowledge
  • Gain confidence using industry-standard languages Python
  • Be mentored by a world-class cybersecurity expert
  • Small group classes (max 5 students)

Curriculum

Industry-approved curriculum to support your journey into cybersecurity.

Security Architecture and Frameworks - 3 weeks

This course covers secure architecture fundamentals, frameworks, and the consequences of insecure design. You'll learn to assess system vulnerabilities, understand secure network architecture, and explore zero-trust concepts, network segmentation, and cloud security. The course concludes with a project where you'll identify vulnerabilities using your knowledge of IT architecture and security.

What you'll learn:

  • Integrate knowledge of security architecture to identify vulnerabilities that are discovered.
  • Identify mitigation strategies to protect against future attacks.

Incidence Response - 3 weeks

This course covers digital forensics, including malware recognition and evaluation, Python skills for API security, and memory forensics for Windows and Linux. It concludes with a project where you'll use these skills to respond to a cybersecurity incident.

What you'll learn:

  • Identify mitigation strategies to protect against future attacks.
  • Conduct an investigation to an incident using best practices of digital forensics and incident response
  • Implement best practices for API security for organization security.

Penetration Testing - 3 weeks

This comprehensive course teaches you to ethically exploit vulnerabilities and identify security weaknesses. You'll learn social engineering, reconnaissance, scanning, enumeration, and post-exploitation strategies. Gain hands-on experience with tools like Burp Suite and Metasploit, and apply your skills in a real-world penetration testing project.

What you'll learn:

  • Develop and log corrective action methodology to a system vulnerability using industry standard techniques.  
  • Implement knowledge of nmap for penetration testing.

Penetration Testing Applications - 3 weeks

This course covers web application security, including common threats, secure coding, and penetration testing with industry tools. You'll master Active Directory attack methods, mitigation strategies, and credential dumping, and learn OT security best practices and emerging trends like AI and quantum cryptography. It also addresses mobile device security, including vulnerability identification, configuration, and scripting for automated scans. The course concludes with a web application security penetration testing project.

What you'll learn:

  • Develop and log corrective action methodology to a system vulnerability using industry standard techniques.  
  • Implement a methodology for building secure mobile architecture.

Tuition

Upfront

$4,700

Pay as You Go

$5,200

3 monthly payments of $1,734

Your Life Won't Wait for a Career Change

Pick the option that best fits into your life.

Full-Time

You’re ready to commit to a full-time course load. You’ll graduate in 15 weeks thanks to a rigorous schedule and instructor support.

  • 15 week program
  • Required class time and office hours
  • Live instructor guidance and feedback
Tuition: $4,700.00 $5,200.00
Apply for Full-Time

Part-Time

Part-time is designed for busy people. If you don't have 8 hours to dedicate a day, then part-time is for you. Graduate in 45 weeks.

  • 45 week program
  • Optional study groups and office hours
  • Instructor guidance and feedback
Tuition: $4,700.00 $5,200.00
Apply for Part-Time

Community-Powered

The community-powered options offers peak flexibility. Pay a small fee each month for access to course material with no time limit for completion.

  • Unlimited learning time
  • Guidance and feedback via Discord community
  • Same top-tier education
  • Cancel membership anytime
Tuition: $299.00/mo $499.00/mo
Apply for Community-Powered

Course Mentors

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse tincidunt sagittis eros. Quisque quis euismod lorem.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Full Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Cybersecurity Foundations II FAQs

Learn more

What are the software and hardware requirements for the foundations programs?

Software:

Visual Studio will be used in this program and can be downloaded for free.

Hardware:

Students will need a computer that meets the minimum requirements for Visual Studio 2022.

Join us at the
Bletchley Institute

Be part of a community that dares to dream, to innovate, and to make a lasting impact on the world. Together, we can achieve mighty things.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.