banner

Cyber Security

Worldwide, there has been growing concern about cyber-attacks driving demand for cybersecurity professionals. Bootcamps from Mid-America Christian University prepare students begin to prepare for an entry-level role as a cybersecurity analyst, incident responder, or a penetration tester. These professionals are adept at securely managing IT infrastructure, identifying cybersecurity risks, effectively responding to incidents and communicating and collaborating with stakeholders.

Cybersecurity Safeguards Our Digital World

In today's world, where our daily activities, work, and personal connections rely heavily on digital spaces, the need for cybersecurity experts is more pressing than ever. With a staggering 3.5 million global positions expected to remain unfilled by 2025, there's a clear call to action for those considering where to focus their career efforts​ (Cybercrime Magazine)​. Cybersecurity isn’t just about guarding computers and data—it’s about protecting our way of life in a digitally connected world.

This field is rapidly evolving and expanding, which means it consistently offers new and exciting challenges that are crucial in shaping the technological landscape. Now is the perfect time to dive in, especially since employers are increasingly valuing skills over degrees. Skills in areas like artificial intelligence, cloud computing security, and proactive threat detection are in high demand​ (Home | ISC2)​. By stepping into a cybersecurity career, you’re not just securing a job—you’re also playing a key role in making the digital world a safer place for everyone. This is a call to all problem solvers and protectors: your skills are needed more than ever.

We offer a variety of cybersecurity bootcamp pathways, all designed specifically to prepare learners with the skills and certifications needed for the most in-demand job roles in the field today:

Foundational Path: 16 Weeks | Starts at $8,500 | Mapped to Entry Level Jobs

Intermediate Path: 22 Weeks | Starts at $9,500 | Mapped to Mid-Level Roles

Advanced Path: 28 Weeks | Starts at $12,500 | Mapped to Mid-Level + Roles

Most learners qualify for discounts or scholarships. Ask about options available to you!

Market Trends

  • University of Maryland research indicates that there is a cyber attack every 39 seconds.
  • As 5G and machine learning proliferate, ransomware attacks, data breaches and the imminent threat of cyberwarfare continue to rise.
  • There were more than 660,000 cybersecurity-related job openings in the United States over the past year alone.

Job Demand

28%Year on Year growth for Cybersecurity specialists.

Source: CompTIA "State of Cybersecurity 2024"

31% Projected growth for Information Security Analysts (2019-29).

Source: Occupational Outlook Handbook, USBLS

3M Unfilled job roles in the field of cybersecurity globally

Source: World Economic Forum, Future of Jobs Report

overview

Program Outline and Highlights

The Foundational Bootcamp Path helps students build a strong networking and OS foundation. It emphasizes design, implementation, and administration of IP networks. Students become competent at Linux systems administration, and learn how to deploy and manage common applications and services using Linux servers. They are encouraged to develop an automation mindset and build the skills to automate routine IT infrastructure deployment, configuration, and monitoring activities. The Foundational Bootcamp also includes built-in exam preparation and vouchers for the CompTIA A+ Certification exam, recognized as an industry standard certification.

The Intermediate Bootcamp Path builds upon the foundational phase, introducing students to security frameworks that give them a conceptual understanding of IT assets, threats, vulnerabilities, and risks. They learn to install and configure network security devices and perform penetration testing to identify threats and vulnerabilities. This pathway also includes dedicated training and exam vouchers for the CompTIA Security + Certification exam (in addition to all content and benefits from the Foundational Path).

The Advanced Bootcamp Path extends the skillset trained, teaching students to manage and analyze cyber-attack incidents in compliance with standard incident response and security operations procedures. Students will gain hands-on experience in networking operations, ethical hacking, threat detection and more. This pathway also included dedicated training and exam vouchers for the CompTIA Security Analyst (CySA+) Certification exam (in addition to all content and benefits from the Foundational and Intermediate Paths).

Student Guidelines

  • Students must possess the curiosity and a determination to persist with the demanding hands-on exercises and assignments.
  • In addition, students need to fulfill the below requirements:
    • High School Diploma from an accredited institution
    • Spoken and written English skills
    • Appropriately configured PC with webcam and headset
    • Uninterrupted internet connection
    • Uninterrupted time to complete the learning activities on schedule

Delivery Guidelines

  • Sessions will be conducted between 6:00PM – 10:00PM EST ON MONDAYS AND 6:00PM - 8:00PM EST ON THURSDAYS. 
  • Live online lectures on context-setting and concept building concepts
  • 60% of the program is hands-on i.e. in each program, a student would spend over 60% of time on coding or hands-on activities

Who Should Attend?

Students who are keen on taking up a cybersecurity incident analyst role or those looking for a career shift into cybersecurity can take up this program. No prior programming experience is required to do this program – just curiosity and a determination to persist with the demanding hands-on exercises and assignments. Some other basic requirements are:

  • High School Diploma from an accredited institution
  • Spoken and written English skills
  • Appropriately configured PC with webcam and headset
  • Uninterrupted internet connection
  • Uninterrupted time to complete the learning activities on schedule

Exit Profile

Our program gradually transforms students with no information technology background into cybersecurity incident analysts, incident responders and penetration testers. They become adept at securely managing IT infrastructure, identifying cybersecurity risks, effectively responding to incidents, and communicating and collaborating with stakeholders.

On successful completion of all the assignments and projects, each student will be able to:

  • Perform network administration and troubleshooting on Linux
  • Automate tasks using shell scripting
  • Configure and manage application servers
  • Install, configure, and monitor network security devices
  • Ensure IT infrastructure assets are securely provisioned
  • Manage advanced server configurations and virtual IT infrastructure
  • Ensure proper configuration and security of fixed and mobile end-point devices
  • Scan, monitor and perform penetration testing to identify threats and vulnerabilities
  • Troubleshoot and document security incidents
  • Work in an Agile team environment
  • Comply with standard operating procedures and practices to track, report, manage and analyze incidents

Program Coverage – Competencies - Knowledge and Skills

This program is designed to build the knowledge and skills required to perform the tasks required for the Cybersecurity Specialist role. As part of the learning journey, students build the right attitude that sets them up for seamlessly transitioning to this role, as well as making them aware of some of the best practices that professionals are expected to adopt. The tough challenges that they encounter as part of the program and the capstone project help accelerate their experience. As part of our holistic approach to making them job-ready we ensure that students are equipped with the right technical and engineering competencies.

Doing this program is not just about attending live sessions alone – it is also about following through and completing the hands-on assignments and projects. For an assignment to be considered complete, students must refactor their solution after getting it reviewed. Assignment completion is necessary to move forward in the program.

Programs FAQs

Question 1How is my academic progress measured and monitored?

Answers

The academic progress of a student is governed by the provisions contained in the Student academic progress policy (SAP) in vogue at the time of enrollment detailed in the latest student manual available here Student Manual. The SAP policy details the academic commitment expected of a student on a weekly basis in terms of assignments to be submitted for review and feedback

Question 2What is the tuition or cost for the program?

Answers

The cost of the program is $13,000 USD, however we offer a variety of discounts, scholarships and financing options that allow most learners to complete the program for as little as $8,500. We highly recommend learners apply for scholarships and have made the application process extremely simple. Your dedicated program consultant can walk you through the process of securing scholarship funding.

Question 3Are there any scholarships available?

Answers

Yes! Our scholarship application requires only a few simple steps and may qualify you for a tuition reduction of up to 35% off standard pricing. Your program consultant can assist you throughout the application process and scholarship decisions are typically awarded within 2-3 business days.

Students who opt to forego scholarships can still receive a $1000 tuition discount if they elect to pay their tuition in advance of starting the program rather than financing their bootcamp. are eligible to receive a discount on the published tuition.

Question 4What do I get at the completion of the program?

Answers

You will receive a Certificate of Completion from MACU.

Question 5When are the bootcamps currently scheduled to start?

Answers

Cohorts in each of the various virtual program tracks (Cybersecurity, Data Analytics, Cloud Systems Administration and Web Development ) typically start every month. Please call 405-666-5340 to get more details

Question 6Can I keep working while studying in the program?

Answers

Yes, our virtual programs are designed specifically to address the challenges of individuals who are employed but actively pursuing a career change or advancement in their existing field. The part-time schedule allows you to continue working or pursue other interests, while advancing your skills through your active participation in the program.

Question 7How long does the program take to complete?

Answers

Students are expected to complete the program in 6 – 7 months depending on the program.

Question 8Do you provide career planning support?

Answers

Yes, we offer students career support and coaching throughout the duration of the program. Students have an opportunity to develop a working relationship with a career advisor to discuss resume building, job sourcing, interview techniques and salary negotiations.

Question 9How are you different from other programs I can join or other locations?

Answers

What makes our bootcamp different is our extensive relationships with leading global companies that hire information technology professionals. Our decades long relationships with global companies provides us with insight and understanding of the specific skills that many employers are demanding as part of their digital transformation efforts. Working with companies, we built our programs to embed these mission critical skills and abilities into our programs so that students who successfully complete the program can be prepared for many entry level jobs in today’s technology-focused workforce.

Question 10What criteria do you look for in potential students applying to the program?

Answers

We believe the main criteria for success in our bootcamp is your effort and determination to succeed, as well as time. You will need to be prepared to dedicate the necessary time to the program in order to be successful (typically between 10-12 hours per week)

Question 11Do I need to possess an undergraduate degree to be eligible for the program?

Answers

No. You are required to possess a High School Diploma from an accredited institution or a GED, as well as being proficient in spoken and written English.

Question 12How much time should I expect to dedicate to this program?

Answers

Our program requires you to participate in

  • Four (4) hours of scheduled/live in-class lecture and guided lab session.
  • Three (3) hours optional scheduled/live office hours for individual support.
  • Two (2) hours of scheduled/Live in-class lab review.
  • Additionally, three (3) to five (5) hours of time out of class is expected to be necessary to complete assignments and prepare for course assessments.

For a total expected time commitment of 12-15 hours per week.

Question 13Do I need to have previous experience in information technology before enrolling in one of the virtual programs?

Answers

No specific experience is needed as long as you are determined and eager to learn.

Question 14Will I need to purchase books?

Answers

All materials and access to virtual labs and other learning environment will be provided to you and are included in the tuition/cost of the bootcamp.

Question 15Who are the faculty for the programs?

Answers

Our faculty (Lead Mentors/Instructors) are typically working professionals who are subject matter experts in their field. They are encouraged to bring real-world experience and situations into our classrooms to expose our students to projects and challenges that replicate the experiences you may have as a working professional in the information technology sector.

Question 16Are the courses available online or in person?

Answers

Courses are available 100% virtually with live online sessions.

Question 17I’m an employer. How can I hire one of your students or become a hiring partner?

Answers

You can contact one of our Career Services professionals at macustudentsupport@stackroute.com

Question 18Do I need my own computer?

Answers

You will need an appropriately configured PC with webcam, headset, and uninterrupted internet connection. Required specifications for your PC are as follows:

  • To attend the program, students are expected to use their own computer and have an uninterrupted broadband internet connection.
  • Hardware Requirements:
    • Laptop/Desktop with Intel i5 (or later) with minimum 8 GB RAM (recommend 16 GB RAM).
    • Minimum of 50+ GB Free HDD Space.
    • Windows 10 (Patched with Latest Security Updates)
    • HD Webcam.
    • Audio enabled preferably with headset.
  • Software Requirements:
    • Google Chrome Browser.
    • To join the virtual live sessions, students will need to download, and setup zoom client on their computer (one time setup) as required.
    • For offline work, students will need to install zoom and join zoom channel with their registered email.
    • From time to time, students may be required to install a few software updates during different parts of the program. Faculty will share the details during the respective stages of the program. The software needs may vary from program to program. These are mostly either open sources or evaluation version.
    • For some of the programs, MS Office tools would be required. For example, Data Analytics program will require students to have MS Excel.

Question 19Can I use Mac Book for the program?

Answers

We recommend the use of Windows Machine for better experience throughout the program. Should you use the Mac Book, we may not be able to provide the technical support.

Question 20Do I need to purchase any application / software before starting the program?

Answers

If you have enrolled in the Data Analytics program, you must have a working copy of Microsoft Excel installed. You do not need to purchase any application for the other tracks.

Question 21Can I use the free Excel version from Office 365?

Answers

Although Excel is offered free of charge from Office 365, the tool is different in some regards from the Desktop version. You may not be able to perform tasks as demonstrated by the instructor in the Online version. You will additionally have a lot of difficulty downloading and uploading data files to and from both the learning portal and Office 365. For this reason, we recommend using the Downloadable version of Excel program. Additionally, you may not find any support if you decide to use the Office 365 version.