Cyber Security

Worldwide, there has been growing concern about cyber-attacks driving demand for cybersecurity professionals. This bootcamp can help students begin to prepare for an entry-level role as a cybersecurity analyst, inicident responder, or a penatration tester. These professionals are adept at securely managing IT infrastructure, identifying cybersecurity risks, effectively responding to incidents and communicating and collaborating with stakeholders.

Cybersecurity Safeguards our Digital World

Worldwide, there has been growing concern about cyber-attacks. The FBI’s Internet Crime Complaint Center logged over 790,000 complaints from the public in 2020 – an increase of 69% from 2019. As the value of our digital assets and communications grows, and we become more dependent on digital solutions in our professional and personal lives we need cybersecurity specialists trained on the latest security tools, technologies, and processes to safeguard us. Proactive security skills are amongst the Top 10 disruptive technology skills of 2020 and demand for skilled people in this area are projected to grow by 39% over a 5-year period.


Cybersecurity professionals are expected to have a strong foundation in areas such as Networking, Programming, Systems Administration, and IT Infrastructure Management. Moving beyond foundational skills they need to be well versed in the core security functions of vulnerability and threat identification, protection and defense of IT assets. They will need to detect cyber-attacks and security breaches and implement the required response and recovery procedures.

Duration: 6 Months

Course Fee: As low as $8,500 USD

Most learners qualify for discounts or scholarships. Ask about options available to you!

Market Trends

  • University of Maryland research indicates that there is a cyber attack every 39 seconds.
  • As 5G and machine learning proliferate, ransomware attacks, data breaches and the imminent threat of cyberwarfare continue to rise.
  • There is a high demand for cybersecurity professionals across industries

Job Demand

30%Year on Year growth for Cybersecurity specialists.

Source: LinkedIn’s 2020 Emerging Jobs Report

31% Projected growth for Information Security Analysts (2019-29).

Source: Occupational Outlook Handbook, USBLS

29% Global Companies believe cybersecurity is a top priority.

Source: World Economic Forum, Future of Jobs Report 2020


Program Outline and Highlights

Our program begins by helping students build a strong networking and OS foundation. It emphasizes design, implementation, and administration of IP networks. Students become competent at Linux systems administration, and learn how to deploy and manage common applications and services using Linux servers. They are encouraged to develop an automation mindset and build the skills to automate routine IT infrastructure deployment, configuration, and monitoring activities.

After the foundation phase, students are introduced to security frameworks that give them a conceptual understanding of IT assets, threats, vulnerabilities, and risks. They learn to install and configure network security devices and perform penetration testing to identify threats and vulnerabilities. Further on, they learn to manage and analyze cyber-attack incidents in compliance with standard incident response and security operations procedures.

Student Guidelines

  • Students must possess the curiosity and a determination to persist with the demanding hands-on exercises and assignments.
  • In addition, students need to fulfill the below requirements:
    • High School Diploma from an accredited institution
    • Spoken and written English skills
    • Appropriately configured PC with webcam and headset
    • Uninterrupted internet connection
    • Uninterrupted time to complete the learning activities on schedule

Delivery Guidelines

  • Sessions will be conducted between 6:00PM – 10:00PM EST ON MONDAYS AND 6:00PM - 8:00PM EST ON THURSDAYS. 
  • Live online lectures on context-setting and concept building concepts
  • 60% of the program is hands-on i.e. in each program, a student would spend over 60% of time on coding or hands-on activities

Who Should Attend?

Students who are keen on taking up a cybersecurity incident analyst role or those looking for a career shift into cybersecurity can take up this program. No prior programming experience is required to do this program – just curiosity and a determination to persist with the demanding hands-on exercises and assignments. Some other basic requirements are:

  • High School Diploma from an accredited institution
  • Spoken and written English skills
  • Appropriately configured PC with webcam and headset
  • Uninterrupted internet connection
  • Uninterrupted time to complete the learning activities on schedule

Exit Profile

Our program gradually transforms students with no information technology background into cybersecurity incident analysts, incident responders and penetration testers. They become adept at securely managing IT infrastructure, identifying cybersecurity risks, effectively responding to incidents, and communicating and collaborating with stakeholders.

On successful completion of all the assignments and projects, each student will be able to:

  • Perform network administration and troubleshooting on Linux
  • Automate tasks using shell scripting
  • Configure and manage application servers
  • Install, configure, and monitor network security devices
  • Ensure IT infrastructure assets are securely provisioned
  • Manage advanced server configurations and virtual IT infrastructure
  • Ensure proper configuration and security of fixed and mobile end-point devices
  • Scan, monitor and perform penetration testing to identify threats and vulnerabilities
  • Troubleshoot and document security incidents
  • Work in an Agile team environment
  • Comply with standard operating procedures and practices to track, report, manage and analyze incidents

Program Coverage – Competencies - Knowledge and Skills

This program is designed to build the knowledge and skills required to perform the tasks required for the Cybersecurity Specialist role. As part of the learning journey, students build the right attitude that sets them up for seamlessly transitioning to this role, as well as making them aware of some of the best practices that professionals are expected to adopt. The tough challenges that they encounter as part of the program and the capstone project help accelerate their experience. As part of our holistic approach to making them job-ready we ensure that students are equipped with the right technical and engineering competencies.

Doing this program is not just about attending live sessions alone – it is also about following through and completing the hands-on assignments and projects. For an assignment to be considered complete, students must refactor their solution after getting it reviewed. Assignment completion is necessary to move forward in the program.

Programs FAQs

Question 1How is my academic progress measured and monitored?


The academic progress of a student is governed by the provisions contained in the Student academic progress policy (SAP) in vogue at the time of enrollment detailed in the latest student manual available here Student Manual. The SAP policy details the academic commitment expected of a student on a weekly basis in terms of assignments to be submitted for review and feedback

Question 2What is the tuition or cost for the program?


The cost of the program is $13,000 USD, however we offer a variety of discounts, scholarships and financing options that allow most learners to complete the program for as little as $8,500. We highly recommend learners apply for scholarships and have made the application process extremely simple. Your dedicated program consultant can walk you through the process of securing scholarship funding.

Question 3Are there any scholarships available?


Yes! Our scholarship application requires only a few simple steps and may qualify you for a tuition reduction of up to 35% off standard pricing. Your program consultant can assist you throughout the application process and scholarship decisions are typically awarded within 2-3 business days.

Students who opt to forego scholarships can still receive a $1000 tuition discount if they elect to pay their tuition in advance of starting the program rather than financing their bootcamp. are eligible to receive a discount on the published tuition.

Question 4What do I get at the completion of the program?


You will receive a Certificate of Completion from Point Park University

Question 5When are the bootcamps currently scheduled to start?


Cohorts in each of the various virtual program tracks (Web Development, Data Analytics, Cybersecurity and Cloud Systems Administration) typically start every month. Please call (412) 392-7249 to get more details

Question 6Can I keep working while studying in the program?


Yes, our virtual programs are designed specifically to address the challenges of individuals who are employed but actively pursuing a career change or advancement in their existing field. The part-time schedule allows you to continue working or pursue other interests, while advancing your skills through your active participation in the program.

Question 7How long does the program take to complete?


Students are expected to complete the program in 6 – 7 months depending on the program. 

Question 8Do you provide career planning support?


Yes, we offer students career support and coaching throughout the duration of the program. Students have an opportunity to develop a working relationship with a career advisor to discuss resume building, job sourcing, interview techniques and salary negotiations.

Question 9How are you different from other programs I can join or other locations?


What makes our bootcamp different is our extensive relationships with leading global companies that hire information technology professionals. Our decades long relationships with global companies provides us with insight and understanding of the specific skills that many employers are demanding as part of their digital transformation efforts. Working with companies, we built our programs to embed these mission critical skills and abilities into our programs so that students who successfully complete the program can be prepared for many entry level jobs in today’s technology-focused workforce.

Question 10What criteria do you look for in potential students applying to the program?


We believe the main criteria for success in our bootcamp is your effort and determination to succeed, as well as time. You will need to be prepared to dedicate the necessary time to the program in order to be successful (typically between 10-12 hours per week)

Question 11Do I need to possess an undergraduate degree to be eligible for the program?


No. You are required to possess a High School Diploma from an accredited institution or a GED, as well as being proficient in spoken and written English.

Question 12How much time should I expect to dedicate to this program?


Our program requires you to participate in

  • Four (4) hours of scheduled/live in-class lecture and guided lab session.
  • Three (3) hours optional scheduled/live office hours for individual support.
  • Two (2) hours of scheduled/Live in-class lab review.
  • Additionally, three (3) to five (5) hours of time out of class is expected to be necessary to complete assignments and prepare for course assessments.

For a total expected time commitment of 12-15 hours per week.

Question 13Do I need to have previous experience in information technology before enrolling in one of the virtual programs?


No specific experience is needed as long as you are determined and eager to learn.

Question 14Will I need to purchase books?


All materials and access to virtual labs and other learning environment will be provided to you and are included in the tuition/cost of the bootcamp.

Question 15Who are the faculty for the programs?


Our faculty (Lead Mentors/Instructors) are typically working professionals who are subject matter experts in their field. They are encouraged to bring real-world experience and situations into our classrooms to expose our students to projects and challenges that replicate the experiences you may have as a working professional in the information technology sector.

Question 16Are the courses available online or in person?


Courses are available 100% virtually with live online sessions.

Question 17I’m an employer. How can I hire one of your students or become a hiring partner?


You can contact one of our Career Services professionals at

Question 18Do I need my own computer?


You will need an appropriately configured PC with webcam, headset, and uninterrupted internet connection. Required specifications for your PC are as follows:

  • To attend the program, students are expected to use their own computer and have an uninterrupted broadband internet connection.
  • Hardware Requirements:
    • Laptop/Desktop with Intel i5 (or later) with minimum 8 GB RAM (recommend 16 GB RAM).
    • Minimum of 50+ GB Free HDD Space.
    • Windows 10 (Patched with Latest Security Updates)
    • HD Webcam.
    • Audio enabled preferably with headset.
  • Software Requirements:
    • Google Chrome Browser.
    • To join the virtual live sessions, students will need to download, and setup zoom client on their computer (one time setup) as required.
    • For offline work, students will need to install zoom and join zoom channel with their registered email.
    • From time to time, students may be required to install a few software updates during different parts of the program. Faculty will share the details during the respective stages of the program. The software needs may vary from program to program. These are mostly either open sources or evaluation version.
    • For some of the programs, MS Office tools would be required. For example, Data Analytics program will require students to have MS Excel.

Question 19Can I use Mac Book for the program?


We recommend the use of Windows Machine for better experience throughout the program. Should you use the Mac Book, we may not be able to provide the technical support.

Question 20Can I use a Chrome Book or Tablet for my bootcamp?


Unfortunately, Chrome Book PCs and most personal tablet devices do not provide the necessary technical capabilities to effectively complete live sessions and many asynchronous assignments. If you have additional questions about your specific device's compatibility with our bootcamp requirements, please refer to Question 18 above or ask your Program Consultant who will be happy to assist!

Question 21Do I need to purchase any application / software before starting the program?


If you have enrolled in the Data Analytics program, you must have a working copy of Microsoft Excel installed. You do not need to purchase any application for the other tracks.

Question 22Can I use the free Excel version from Office 365?


Although Excel is offered free of charge from Office 365, the tool is different in some regards from the Desktop version. You may not be able to perform tasks as demonstrated by the instructor in the Online version. You will additionally have a lot of difficulty downloading and uploading data files to and from both the learning portal and Office 365. For this reason, we recommend using the Downloadable version of Excel program. Additionally, you may not find any support if you decide to use the Office 365 version.