Gain the required knowledge and
skill set to succeed in cybersecurity

Start Here. Go Anywhere.

Queen Mary University of London Cybersecurity Bootcamp can expand your professional skills and allow you to establish a solid foundation for a career in cybersecurity—no matter your current level of technical proficiency.

Our bootcamp features expert instructors who will guide you through the programme, during which you’ll learn how to secure data and defend the virtual world on a safe, cloud-based platform. You’ll learn the facets of ethical hacking and game-theory principles and ground yourself in the techniques needed to defend against real-world attacks, strengthen defences, and spot weaknesses in applications—all the skills that employers demand in today’s connected world.

״With nearly 3.5M
unfilled jobs globally,
there’s never been a
better time to join the
cybersecurity
industry״

Source: Cybersecurity
Ventures

img

Our hands-on curriculum
can fast-track your future
Learn more about the perks of our cybersecurity bootcamp

From the fundamentals to high-tech skills, the Cybersecurity Bootcamp will provide you with all the advanced
skills and digital knowledge you need to become a fully fledged professional in the cybersecurity field.

Become a cybersecurity professional

Begin building the skill set you need to thrive in cybersecurity under the guidance of expert instructors who
are eager to train the next generation of ethical hackers, digital defenders, and cybersecurity pros.

Hands-on courses

Gain real-world experience in an accelerated, online environment designed to launch the careers of professionals of all backgrounds and experience levels. Confidently enter the workforce with the hands-on training required to excel in the field of cybersecurity.

Cyber labs

Learn how to spot vulnerabilities on server, mobile, and desktop platforms, and create protections that defend against various threats in training exercises that simulate the real world. Complete cyber labs that have been crafted by cybersecurity experts to impart the knowledge needed to thrive in the field.

Virtual classroom

Make the most of cutting-edge instructional methodologies that are enhanced with cloud-based chat software, allowing you to virtually interact with your instructors. Attend our virtual classes at the weekend or in the evening from the comfort of your own home.

Industry-leading instructors

You will benefit from the current industry knowledge and the unique insider perspective of our expert instructors, who are well-versed in the cybersecurity field. Get access to personalised mentorship and guidance while you learn the ins and outs of the cybersecurity profession.

Gain the skills that
employers demand

Take advantage of our comprehensive career services package, maintained by a dedicated team of
professional development experts.

Networking opportunities

Gain access to local and global hiring partners looking for newly qualified cybersecurity candidates. Take part in virtual networking events that can introduce you to available opportunities when you complete the programme.

Career coaching

Leverage professional development support from our team of career coaches who are eager to help you reach your cybersecurity career goals. Benefit from personalised services like interview preparation, LinkedIn profile building, resume writing, and more.

Dedicated support

Keep in touch with a Student Success Manager who is dedicated to ensuring you have the support and resources necessary to succeed in the programme—and beyond. Connect with our Career Services department that offers personalised training and resources to help you land your dream career.

Job placement assistance

Partner with our Career Services department that can help you figure out what opportunities are available to you. Our personalised placement assistance will help you find new job opportunities and prepare you for the interview process before you start.

Explore
the curriculum
Get the
Course Catalogue

img

Programme overview

30-Hour Introductory Course |
370-Hour Extended Program

  • Introductory Course

    The introductory course gives learners the chance to test out the bootcamp before committing to the full programme. In just eight hours a week, spread out through a month’s worth of weekends and evenings, you’ll learn about basic command communication protocols and develop a solid understanding of basic operating system structures, as well as the cyber attack cycle. You will also get a feel for the online, virtual learning environment, including how the bootcamp’s interactions and classes flow.

    At the end of the introductory course, learners will take a summary exam that assesses their ability to successfully pursue cybersecurity as a career path.
  • Fundamentals phase

    In the Fundamentals phase, you will begin to understand the basics of cybersecurity. You’ll learn about Microsoft Windows and Linux operating systems, as well as basic network and cloud security. This phase also prepares learners for the more challenging Infrastructure Phase.
  • Microsoft Security

    The Microsoft Security course gives learners hands-on experience with widely used and modern versions of Microsoft Windows and Microsoft Server, which many companies across the world rely on exclusively to maintain their computer networks. During the course, learners will develop an understanding of how to administer and secure Microsoft operating systems and how to become good practitioners with the broader Microsoft product ecosystem.
  • Computer Networking

    At the heart of virtually every organisation’s technology is a computer network. In the Computer Networking course, learners will receive an overview of the topic, including network design, protocols, topologies, and devices.

    Learners will also build a foundation that will allow them to study and take the CompTIA Network+ exam* upon completion of the Network Security course.
  • Cloud Security

    Platforms and infrastructure based in the cloud are becoming increasingly common in enterprise systems. The Cloud Security course will prepare learners to discuss, identify, compare, contrast and use various cloud service providers, including Amazon Web Services, Google Cloud, and Microsoft Azure.

    When they finish this course, learners will have a firm enough foundation in cloud-security knowledge to begin preparing to take the AWS Cloud Practitioner certification exam*.
  • Linux Security

    As the world’s most used operating system and an important cybersecurity tool, knowledge of Linux is essential for cybersecurity professionals. The Linux Security course will allow learners to familiarise themselves with using and manipulating Linux and various Linux variants, known as ‘distributions’.

    Upon completion of the course, learners can also begin preparing to take the LPI Linux Essentials certification exam*.
  • The Fundamentals Final Project – Building Your Own Environment

    The final project of the Fundamentals phase will see learners create an insecure small business infrastructure. Learners will then use the infrastructure to practise cyberattacks and forensics. When they finish the Fundamentals phase, learners will be able to include their project in a portfolio to demonstrate the skills and abilities they’ve learned.
  • Cybersecurity Infrastructure phase

    In the Infrastructure phase, learners will begin to focus more narrowly on security-related concepts and practices. During this phase of the programme, learners will study skills like Python programming, critical infrastructure security (CIS), and network security. Learners will leave this phase of the programme with the hands-on skills and experience necessary for the more rigorous Advanced phase.
  • Network Security

    When it comes to the internet and technology, almost everything takes place on a network. During the Network Security course, learners will acquire the skills of designing, suggesting, and implementing controls for secure networks—from the early design phases to post-implementation. Learners will leave the course with the skill set necessary for many technical positions.

    In addition, the Network Security course gives learners the foundation needed to start preparing to take the EC-Council CND exam*.
  • Cyber Infrastructure & Technology

    In the Cyber Infrastructure and Technology course, learners will begin developing skills needed to secure critical infrastructures like power plants, hospitals, and firefighting organisations. This course will get users ready to secure the supply chain, environmental and Industrial Internet of Things (IoT) sectors—both in the business world and in government.

    When they finish this course, learners will be ready to start studying to take the CompTIA Security+ certification exam*.
  • Introduction to Python for Security

    Whether you need to analyse data or scan systems and networks, the right tool for the job is often the one you build yourself, which is why programming is a critical skill for cybersecurity professionals. The Introduction to Python for Security course will familiarise learners with basic programming concepts in the Python coding language. In addition, they will get the hands-on experience needed to craft and modify scripts on the fly.
  • Cybersecurity Infrastructure Final Project

    In the final project of the Cybersecurity Infrastructure phase, learners will take the small business infrastructure created in the previous project and use it to demonstrate infrastructure-hardening skills by securing it against a cyber threat.
  • Advanced Cybersecurity phase

    In the Advanced phase, learners will continue building upon the skills and knowledge areas in the previous phases. In this phase, learners will get hands-on experience in advanced security concepts like game theory, incident response and digital forensics, and ethical hacking. Learners will leave the phase with a broad overview of the cybersecurity field and will be prepared to pursue a career in the industry.
  • Offensive Security: Ethical Hacking

    Sometimes the only way to stop a criminal is to think like one, which is why ethical hacking is a cornerstone of the cybersecurity industry. Ethical hacking, the art of attacking systems to find and secure weaknesses, includes the craft of professionals like Penetration Testers and GRC Auditors. In the Offensive Security: Ethical Hacking course, learners will build the foundation they need to pursue a career with an ethical-hacking focus.

    Upon completion of the course, learners will also be prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*
  • DFIR and Threat Hunting

    It’s impossible to stop every cyberattack. If one occurs, first-response professionals are critical in assessing the damage and analysing how to stop a future attack. In the Digital Forensics and Incident Response (DFIR) course, learners will get the tools and know-how necessary to respond to cyber incidents, gather evidence for the ensuing investigation, and accurately report the data to stakeholders.

    After finishing this course, learners will be well prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.
  • Game Theory Strategy in Cybersecurity

    In cybersecurity, the mathematical concepts of game theory are used to describe interactions between your business or organisation and unknown threats. The Game Theory Strategy in Cybersecurity course will give learners a solid foundation in the philosophy and mathematics of game theory and will learn how to use it to describe threats and cyber incidents. Additionally, learners will leave the course with a firmer grasp of the creative and novel thinking skills needed to become effective cybersecurity professionals.
  • Advanced Phase Final Project: Attack and Response

    In the final project of the Advanced phase, learners will continue to build upon the secure infrastructure created in the previous phases. They will design an attack to compromise the infrastructure, gather forensic evidence of the incident, and complete an investigative report detailing it.

    Upon completion of the full programme, learners will have the ability to add the reports, code, and designs from all three final projects to build a portfolio that can be used to demonstrate skills and experience to potential employers.
  • Career Services

    The Career Services sessions are designed to help learners prepare for every aspect of technical interviews. There are also resources like the CyWar hub, which features a dedicated suite of tools including career guides and asynchronous classes that can be used to help learners become cybersecurity professionals.
Icon

Introductory Course

30 Hours

The introductory course gives learners the chance to test out the bootcamp before committing to the full programme. In just eight hours a week, spread out through a month’s worth of weekends and evenings, you’ll learn about basic command communication protocols and develop a solid understanding of basic operating system structures, as well as the cyber attack cycle. You will also get a feel for the online, virtual learning environment, including how the bootcamp’s interactions and classes flow.

At the end of the introductory course, learners will take a summary exam that assesses their ability to successfully pursue cybersecurity as a career path.

Icon

Fundamentals phase

In the Fundamentals phase, you will begin to understand the basics of cybersecurity. You’ll learn about Microsoft Windows and Linux operating systems, as well as basic network and cloud security. This phase also prepares learners for the more challenging Infrastructure Phase.

Icon

Microsoft Security

11 lessons – 40 hours

The Microsoft Security course gives learners hands-on experience with widely used and modern versions of Microsoft Windows and Microsoft Server, which many companies across the world rely on exclusively to maintain their computer networks. During the course, learners will develop an understanding of how to administer and secure Microsoft operating systems and how to become good practitioners with the broader Microsoft product ecosystem.

Icon

Computer Networking

12 lessons – 50 hours

At the heart of virtually every organisation’s technology is a computer network. In the Computer Networking course, learners will receive an overview of the topic, including network design, protocols, topologies, and devices.

Learners will also build a foundation that will allow them to study and take the CompTIA Network+ exam* upon completion of the Network Security course.

Icon

Cloud Security

4 lessons – 15 hours

Platforms and infrastructure based in the cloud are becoming increasingly common in enterprise systems. The Cloud Security course will prepare learners to discuss, identify, compare, contrast and use various cloud service providers, including Amazon Web Services, Google Cloud, and Microsoft Azure.

When they finish this course, learners will have a firm enough foundation in cloud-security knowledge to begin preparing to take the AWS Cloud Practitioner certification exam*.

Icon

Linux Security

8 lessons – 30 hours

As the world’s most used operating system and an important cybersecurity tool, knowledge of Linux is essential for cybersecurity professionals. The Linux Security course will allow learners to familiarise themselves with using and manipulating Linux and various Linux variants, known as ‘distributions’.

Upon completion of the course, learners can also begin preparing to take the LPI Linux Essentials certification exam*.

Icon

The Fundamentals Final Project – Building Your Own Environment

The final project of the Fundamentals phase will see learners create an insecure small business infrastructure. Learners will then use the infrastructure to practise cyberattacks and forensics. When they finish the Fundamentals phase, learners will be able to include their project in a portfolio to demonstrate the skills and abilities they’ve learned.

Icon

Cybersecurity Infrastructure phase

In the Infrastructure phase, learners will begin to focus more narrowly on security-related concepts and practices. During this phase of the programme, learners will study skills like Python programming, critical infrastructure security (CIS), and network security. Learners will leave this phase of the programme with the hands-on skills and experience necessary for the more rigorous Advanced phase.

Icon

Network Security

9 lessons – 35 hours

When it comes to the internet and technology, almost everything takes place on a network. During the Network Security course, learners will acquire the skills of designing, suggesting, and implementing controls for secure networks—from the early design phases to post-implementation. Learners will leave the course with the skill set necessary for many technical positions.

In addition, the Network Security course gives learners the foundation needed to start preparing to take the EC-Council CND exam*.

Icon

Cyber Infrastructure & Technology

10 lessons – 40 hours

In the Cyber Infrastructure and Technology course, learners will begin developing skills needed to secure critical infrastructures like power plants, hospitals, and firefighting organisations. This course will get users ready to secure the supply chain, environmental and Industrial Internet of Things (IoT) sectors—both in the business world and in government.

When they finish this course, learners will be ready to start studying to take the CompTIA Security+ certification exam*.

Icon

Introduction to Python for Security

7 lessons – 25 hours

Whether you need to analyse data or scan systems and networks, the right tool for the job is often the one you build yourself, which is why programming is a critical skill for cybersecurity professionals. The Introduction to Python for Security course will familiarise learners with basic programming concepts in the Python coding language. In addition, they will get the hands-on experience needed to craft and modify scripts on the fly.

Icon

Cybersecurity Infrastructure Final Project

In the final project of the Cybersecurity Infrastructure phase, learners will take the small business infrastructure created in the previous project and use it to demonstrate infrastructure-hardening skills by securing it against a cyber threat.

Icon

Advanced Cybersecurity phase

In the Advanced phase, learners will continue building upon the skills and knowledge areas in the previous phases. In this phase, learners will get hands-on experience in advanced security concepts like game theory, incident response and digital forensics, and ethical hacking. Learners will leave the phase with a broad overview of the cybersecurity field and will be prepared to pursue a career in the industry.

Icon

Offensive Security: Ethical Hacking

12 lessons – 50 hours

Sometimes the only way to stop a criminal is to think like one, which is why ethical hacking is a cornerstone of the cybersecurity industry. Ethical hacking, the art of attacking systems to find and secure weaknesses, includes the craft of professionals like Penetration Testers and GRC Auditors. In the Offensive Security: Ethical Hacking course, learners will build the foundation they need to pursue a career with an ethical-hacking focus.

Upon completion of the course, learners will also be prepared to finish studying for the EC-Council CEH (Certified Ethical Hacker) certification exam*

Icon

DFIR and Threat Hunting

15 lessons – 60 hours

It’s impossible to stop every cyberattack. If one occurs, first-response professionals are critical in assessing the damage and analysing how to stop a future attack. In the Digital Forensics and Incident Response (DFIR) course, learners will get the tools and know-how necessary to respond to cyber incidents, gather evidence for the ensuing investigation, and accurately report the data to stakeholders.

After finishing this course, learners will be well prepared to finish studying for the EC-Council CSA (Certified SOC Analyst) certification exam*.

Icon

Game Theory Strategy in Cybersecurity

2 lessons – 10 hours

In cybersecurity, the mathematical concepts of game theory are used to describe interactions between your business or organisation and unknown threats. The Game Theory Strategy in Cybersecurity course will give learners a solid foundation in the philosophy and mathematics of game theory and will learn how to use it to describe threats and cyber incidents. Additionally, learners will leave the course with a firmer grasp of the creative and novel thinking skills needed to become effective cybersecurity professionals.

Icon

Advanced Phase Final Project: Attack and Response

In the final project of the Advanced phase, learners will continue to build upon the secure infrastructure created in the previous phases. They will design an attack to compromise the infrastructure, gather forensic evidence of the incident, and complete an investigative report detailing it.

Upon completion of the full programme, learners will have the ability to add the reports, code, and designs from all three final projects to build a portfolio that can be used to demonstrate skills and experience to potential employers.

Icon

Career Services

3 sessions – 15 hours

The Career Services sessions are designed to help learners prepare for every aspect of technical interviews. There are also resources like the CyWar hub, which features a dedicated suite of tools including career guides and asynchronous classes that can be used to help learners become cybersecurity professionals.

*While the curriculum provides the knowledge needed to perform well on industry exams, this is not a test-preparation programme, where the primary focus is the learners’ performance on the exam. Certification exams are not conducted as part of the programme and require additional costs not included in tuition.

Prepare for
globally recognized
cybersecurity certifications

Aspiring cybersecurity professionals are more likely to get hired if they obtain certifications that are internationally recognised and demonstrate a candidate’s skills and abilities. In an effort to help you boost your credentials, we have created a detailed hub of resources that can help you prepare for some of these certification exams.

There are a couple of two-week breaks built into the Cybersecurity Bootcamp during which learners will have the opportunity to take non-mandatory asynchronous classes that are focused on preparing them for certification exams. The CyWar platform also features examination study guides, question banks, challenges designed to help learners practise for exams, and a ‘Cyberpedia’ with a wealth of knowledge about the field.

We recommend learners pursue one certification during each phase of the programme according to their own career goals.

  • LPI Linux Essentials

    The Linux LPI Essentials certification exam tests knowledge of the Linux operating system and open-source applications. Obtaining the certificate demonstrates a candidate’s knowledge in managing users and groups on Linux, as well as competency with the Linux command line, security permissions, basic networking configurations, and system administration.
  • AWS Certified Cloud Practitioner

    The AWS Certified Cloud Practitioner certificate demonstrates a holder’s knowledge of Amazon Web Services (AWS) and its infrastructure, including the security and compliance facets of the cloud platform. Individuals with the aforementioned experience should consider the certificate to prove competency to prospective employers.
  • CompTIA Network+

    The CompTIA Network+ certification exam tests a candidate’s skills in configuring, managing and troubleshooting both networks and network devices. It also measures a learner’s ability to become familiar with emerging trends like cloud, virtualisation, communication, and mobile technologies.
  • EC-Council CND – Certified Network Defender

    The Certified Network Defender certificate demonstrates a candidate’s knowledge of various network-security skills, such as protecting, detecting, and responding to threats and incidents. Learners who are interested in pursuing a Network Administrator role should consider this certificate.
  • CompTIA Security+

    The CompTIA Security+ certificate, which is considered a ‘step up’ from CompTIA Network+, is an entry-level cybersecurity certificate that verifies a learner’s skill over a wide range of technology disciplines, such as systems, administration, networking, and penetrating testing.
  • EC-Council CSA – Certified SOC Analyst

    The Certified SOC Analyst certification exam tests a candidate’s knowledge of security operations centre (SOC) tasks, including advanced incident detection, log management, incident response, and more. Designed for current and aspiring Tier I and Tier II SOC analysts, you should consider this if you are interested in pursuing a SOC-based role.
  • EC-Council CEH – Certified Ethical Hacker

    The Certified Ethical Hacker certification exam measures knowledge of ethical hacking from a vendor-neutral perspective. Consider this if you have skills in penetration testing and knowledge of related resources and tools, or if you are looking to pursue a role with ethical hacking as a primary responsibility.
  • (ISC)² SSCP – Systems Security Certified Practitioner**

    For learners who have at least one year of experience after completion of the programme.

    The (ISC)² SSCP exam verifies that a candidate has experience in implementing, monitoring and administering IT infrastructure according to information-security policies, procedures, and best practices. It should be considered by learners who have proven security knowledge and hands-on experience in the field.

LPI Linux Essentials

The Linux LPI Essentials certification exam tests knowledge of the Linux operating system and open-source applications. Obtaining the certificate demonstrates a candidate’s knowledge in managing users and groups on Linux, as well as competency with the Linux command line, security permissions, basic networking configurations, and system administration.

AWS Certified Cloud Practitioner

The AWS Certified Cloud Practitioner certificate demonstrates a holder’s knowledge of Amazon Web Services (AWS) and its infrastructure, including the security and compliance facets of the cloud platform. Individuals with the aforementioned experience should consider the certificate to prove competency to prospective employers.

CompTIA Network+

The CompTIA Network+ certification exam tests a candidate’s skills in configuring, managing and troubleshooting both networks and network devices. It also measures a learner’s ability to become familiar with emerging trends like cloud, virtualisation, communication, and mobile technologies.

EC-Council CND – Certified Network Defender

The Certified Network Defender certificate demonstrates a candidate’s knowledge of various network-security skills, such as protecting, detecting, and responding to threats and incidents. Learners who are interested in pursuing a Network Administrator role should consider this certificate.

CompTIA Security+

The CompTIA Security+ certificate, which is considered a ‘step up’ from CompTIA Network+, is an entry-level cybersecurity certificate that verifies a learner’s skill over a wide range of technology disciplines, such as systems, administration, networking, and penetrating testing.

EC-Council CSA – Certified SOC Analyst

The Certified SOC Analyst certification exam tests a candidate’s knowledge of security operations centre (SOC) tasks, including advanced incident detection, log management, incident response, and more. Designed for current and aspiring Tier I and Tier II SOC analysts, you should consider this if you are interested in pursuing a SOC-based role.

EC-Council CEH – Certified Ethical Hacker

The Certified Ethical Hacker certification exam measures knowledge of ethical hacking from a vendor-neutral perspective. Consider this if you have skills in penetration testing and knowledge of related resources and tools, or if you are looking to pursue a role with ethical hacking as a primary responsibility.

(ISC)² SSCP – Systems Security Certified Practitioner**

For learners who have at least one year of experience after completion of the programme.

The (ISC)² SSCP exam verifies that a candidate has experience in implementing, monitoring and administering IT infrastructure according to information-security policies, procedures, and best practices. It should be considered by learners who have proven security knowledge and hands-on experience in the field.

** Learners must have a minimum of one year of cumulative work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) in order to be certified.

Programme tuition

Tuition for the Cybersecurity Bootcamp at Queen Mary University of London is £12,450, not including the cost of £180 for the Introductory Course.

30-Hour introductory course

₤180

370-Hour extended programme

₤12,450

Program Requirements

Internet access

Drive, ambition, and passion

Introductory course and admission exam

Tuition, fees, and deposits subject to change.

img
Skip to content