• Application closes on

    27 May, 2026
  • Program Duration

    21 weeks
  • Learning Format

    Live, Online, Interactive

Why Join this Program

Corporate Training

Enroll your employees into this program, NOW!

Fast-track Your Career

After completing the course, learners have made successful career transitions, boosted career growth, and got salary hikes.

Graduate Achievements

Top-Reported Salary

$350k

Average Salary

$76k

Employers Hiring Grads

1500+

Our Alumni In Top Companies

Program Overview

Learn Cybersecurity with UT Dallas in this online bootcamp. Gain skills in network security, ethical hacking, risk management, and cloud security, master industry tools, and complete hands-on labs and real-world projects. Build practical expertise to protect digital assets and become job-ready in cybersecurity.

Key Features

  • Simplilearn Career Service helps you get noticed by top hiring companies

    Program Details

    The Cybersecurity Bootcamp has 11 units. Starting with foundational operating systems and networking concepts, you’ll advance through network defense, ethical hacking, vulnerability testing, malware analysis, and GenAI applications with industry-relevant projects to showcase your practical skills.

    Learning Path

      • Understand OS architecture and file system management.
      • Explore networking principles and topologies.
      • Learn TCP/IP and OSI models.
      • Apply cryptography and wireless security fundamentals.
      • Analyze key enterprise security concepts.
      • Implement SIEM and SOAR for event monitoring.
      • Design access control and authentication strategies.
      • Apply Zero Trust and IAM principles.
      • Apply secure coding and web application security principles.
      • Identify and mitigate OWASP Top 10 threats.
      • Use threat modeling for proactive defense.
      • Understand cyber resilience in operations.
      • Detect and remediate common application weaknesses.
      • Practice secure coding to prevent exploits.
      • Explore SQL injection, XSS, and command injection.
      • Understand the importance of regular patching and updates.
      • Recognize and categorize malware and ransomware types.
      • Conduct malware and ransomware analysis.
      • Apply digital forensics and response strategies.
      • Leverage cyber threat intelligence for early detection.
      • Perform reconnaissance and footprinting techniques.
      • Apply Cyber Kill Chain methodology.
      • Conduct active and passive scanning.
      • Use tools like NMap and Wireshark for assessment.
      • Perform vulnerability assessments and penetration tests.
      • Analyze social engineering and DDoS attack vectors.
      • Implement cloud and container security.
      • Manage vulnerabilities across environments using advanced tools.
      • Understand Generative AI and LLM concepts.
      • Develop effective prompts for AI models.
      • Apply fine-tuning techniques for custom use cases.
      • Utilize tools like ChatGPT for practical applications.
      • Apply GenAI in threat detection and response.
      • Develop AI-driven cyber playbooks and triage processes.
      • Analyze ethical risks of GenAI use in security.
      • Implement defensive strategies using LLM-based tools.
      • Design and present an integrated cybersecurity solution.
      • Apply knowledge across domains to address real threats.
      • Deliver professional reports and presentations.
    Electives:
      • Understand and apply cybersecurity risk management concepts
      • Identify and mitigate common threats, vulnerabilities, and attacks
      • Respond to security incidents and perform basic digital forensics

    17+ Skills Covered

    • Generative AI Applications
    • CompTIA Security Exam Preparation
    • Red Team
    • Cyber Threat Intelligence
    • Incident Response
    • Vulnerability Analysis
    • Penetration Testing
    • Web Application Security
    • Ethical Hacking
    • Malware Analysis
    • Cloud Security
    • Networking and Scripting
    • Blue Team
    • Public Key Infrastructure
    • Cryptography
    • WLAN Security
    • Operating Systems

    27+ Tools Covered

    Linux_LSUWindowsSplunkMetasploit CybernmapWIRESHARKChatGPTnessusShodanOWASPCS-OWASP Threat DragonnjRATNoribenCS-PEstudioRanSimCS-CrunchCS-BinwalkCS-Spiderfoot7zip_LSUattify_LSUaws_LSUbeebox_LSUCmder_LSUHping_LSUscappy_LSUTor_LSUWhois_LSU

    Industry Projects

    • Project 1

      Securing Linux Honeypots

      Deploy honeypots and automate IP blocking to mitigate SSH attacks on Linux servers.

    • Project 2

      Forensics and Steganography

      Recover hidden data from a deleted JPG file using forensic tools and image analysis.

    • Project 3

      Footprinting and Reconnaissance

      Use Google Dorks and Nmap to find vulnerabilities and perform security risk assessments.

    • Project 4

      Android Exploitation

      Remotely access device data and evaluate Android app vulnerabilities with Metasploit.

    • Project 5

      Secure File Management

      Implement role-based access control and monitoring to secure team file storage.

    • Project 6

      Kali Vulnerability Assessment

      Scan and analyze network vulnerabilities using Kali Linux and Metasploitable VM.

    • Project 7

      Social Engineering Simulation

      Launch phishing payloads, analyze compromises, and conduct email forensics.

    • Project 8

      DoS Attack Simulation

      Simulate, analyze, and mitigate DoS attacks on web servers in a lab setting.

    • Project 9

      Penetration Testing with GenAI

      Perform full-scope black-box testing on Metasploitable2 using GenAI automation.

    • Project 10

      Exploitation and GenAI

      Exploit FTP vulnerabilities with Metasploit, guided by GenAI for attack decisions.

    • Project 11

      AI Powered SQL Injection

      Simulate SQL injection and generate AI-driven reports using SQLMap and TinyLLaMA.

    Disclaimer - The projects have been built leveraging real publicly available datasets from organizations.

    prevNext

    An Immersive Learning Experience

    Learn from Industry Experts

    Learn from instructors focused to equip you with hands-on skills and industry first curriculum.

    Flexi Learn

    Missed a class? Access recordings to always maintain learning progress and keep up with your cohort.

    Mentoring session(s)

    Expert guidance sessions from mentors for doubt clarifications, project assistance, and learning support.

    Learning Support

    Get a dedicated Cohort Manager for all your queries and help you succeed at every learning step.

    Learn from Industry Experts
    Learn from instructors focused to equip you with hands-on skills and industry first curriculum.
    Flexi Learn
    Mentoring session(s)
    Learning Support

    Program Advisors

    • Andrew Renteria

      Andrew Renteria

      Master of Science in Cybersecurity, University of Maryland Global Campus

      Over 10 years of progressive experience in defensive and offensive security, digital forensics, and incident response within high-stakes environments—including the U.S. Department of Defense (DoD).

    • Tony Picarazzi

      Tony Picarazzi

      Bachelor of Science in Computer Science, James Madison University

      Certified in a range of relevant credentials, including ISACA Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA), Certified Ethical Hacker (C|EH), and CompTIA Security+

    • Joshua Mann

      Joshua Mann

      Master of Science, University of Phoenix

      Proven experience in advanced cybersecurity operations, using tools like DirB, Hydra, and Metasploit, and deploying key defense frameworks such as Cyber Kill Chain, NIST, and Defense in Depth to detect and mitigate complex cyber threats.

    • Lauren Eisenhart

      Lauren Eisenhart

      Master of Forensic Science - The George Washington University

      Over 15 years of cybersecurity expertise working with premier organizations such as the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Defense Information Systems Agency (DISA).

    prevNext

    Career Support

    Career Assistance

    During your bootcamp and for a full year after your graduation, you can access the Fullstack Academy Career Success Program to help achieve your desired career outcomes.
    1:1 career coaching and interview prep

    1:1 career coaching and interview prep

    Access to a curated career success platform

    Access to a curated career success platform

    Career success workshops & career practicum lessons

    Career success workshops & career practicum lessons

    Alumni panels, guest lectures, and other industry events

    Alumni panels, guest lectures, and other industry events

    Batch Profile

    This program caters to working professionals from a variety of industries and backgrounds; the diversity of our students adds richness to class discussions and interactions.

    • The class consists of learners from excellent organizations and diverse industries
      Industry
      Information Technology - 53%Software Product - 26%Others - 21%
      Companies
      Wells Fargo
      American Express
      Netflix
      Accenture
      Amazon
      Nvidia
      JP Morgan Chase
      Microsoft
      Cisco
      Youtube
      Facebook

    Testimonial

    “After I finished the bootcamp, I passed my CompTIA Security+ Exam with a voucher that was given to me from Fullstack Academy. The bootcamp has given me a lot more options in terms of what I'm able to do with my career. I enjoy what I do, the people I work with, and the opportunity to give back.”

    Zack Throckmorton

    Cybersecurity AnalystCACI

    What other learners are saying

    Admission Details

    Application Process

    The application process consists of three simple steps:

    STEP 1

    Submit Application

    Complete the online application form by providing the required information.

    STEP 2

    Reserve Your Seat

    Speak with your student advisor about the details of the bootcamp.

    STEP 3

    Start Learning

    Receive an admissions decision and start your program on the cohort date.

    Eligibility Criteria

    For admission to the Cybersecurity Bootcamp, candidates must:

    Be at least 18 years or older
    Have earned a high school diploma or GED equivalent
    No prior tech experience required

    Admission Fee & Financing

    The admission fee for this program is $9,995

    Financing Options

    We are dedicated to making our programs accessible. We are committed to helping you find a way to budget for this program and offer a variety of financing options to make it more economical.

    Total Program Fee

    $9,995

    23% off

    $12,995

    Pay In Installments, as low as

    $1,000/month

    You can pay monthly installments for Post Graduate Programs using Splitit or Klarna payment option with low APR and no hidden fees.

    Apply Now

    Program Benefits

    • Go from beginner to Cyber job-ready in just 26 weeks
    • Get a strong network of 13,000+ Fullstack Academy alumni
    • Experience 200+ hours of instructor-led 100% online classes
    • #3 Best Public University in Texas
    • Get hands-on training with 25+ hands-on projects

    Program Cohorts

    Next Cohort

    Other Cohorts

    Got Questions Regarding Cohort Dates?
    • Acknowledgement
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.
    • *All trademarks are the property of their respective owners and their inclusion does not imply endorsement or affiliation.
    • Career Impact Results vary based on experience and numerous factors.