Cyber Analyst Bootcamp

Jumpstart your cybersecurity career by building the foundational skills you need to identify security threats, determine their scope, and report and mitigate accordingly.
Apply

Develop the Security Skills Employers Want

Whether you're just embarking on your cybersecurity journey, making a career transition, or looking to add new skills to your arsenal, Focal Point's Cyber Threat Analyst Bootcamp can help you build skills you can immediately apply.

Experience the Cyber Threat Analyst Bootcamp

Security Operations Advisory 8
Start this bootcamp as a novice and graduate as a skilled cybersecurity professional.
Cyber Analyst Bootcamp 2
Gain real-world, hands-on lab experience with an expert instructor by your side.
Cyber Analyst Bootcamp 3
There are 3.5 million open cybersecurity jobs in the U.S. Build the cutting-edge knowledge and capabilities employers are seeking.
Cyber Analyst Bootcamp 4
The average Cyber Threat Analyst earns an average salary of $89,000. Prepare for a career with infinite growth opportunities.
Cyber Analyst Bootcamp 5
Cyber Analyst Bootcamp 12

Delivery

Virtual Learning Platform
Cyber Analyst Bootcamp 14

Duration

12 weeks
Cyber Analyst Bootcamp 15

Next Start Date

January 3, 2022

Why Students Choose Focal Point

DevSecOps Services 6

John Doe

CTO @ACME
CTO @ACME
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna.
DevSecOps Services 7

Jackeline Perkins

Innovation Officer @PwC
Innovation Officer @PwC
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna.
Digital Transformation Risk 4

Bob Green

President of IT @Cloud Security inc
President of IT @Cloud Security inc
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna.

Cyber Threat Analyst Bootcamp Curriculum

Our course curriculum, labs, and capstone exercises expose you to cutting-edge technologies and techniques, equipping you for real-world scenarios.

Computer Foundations

The bootcamp kicks off with focused sessions on basic computer architecture, computer networking, code execution, regular expressions, and Python and PowerShell foundations.

01 Storage and I/O Devices
02 Switching and Routing
03 Scripting Principles

Security Foundations

Next, our instructors move into cybersecurity basics. This module focuses on key outcomes (e.g., goals, metrics), tools and resources, cloud security and zero trust strategy, and threat intelligence.

01 Measures of Success
02 SIEM Platforms
03 How to use Threat Intel

Detection and Monitoring

In this module, students explore key monitoring models, networking security monitoring, endpoint monitoring, and dashboards and event correlation.

01 Continuous Monitoring
02 Firewalls and IDS/IPS
03 Building a Dashboard

Investigation and Response

In the second half of this bootcamp, students study investigation and response techniques. This section covers live host forensics, network forensics, malware triage, and containment, mitigation, and eradication strategies.

01 Capturing Traffic
02 Tools of the Trade
03 Host Hardening/Patching

Reporting and Information Sharing

This portion of the bootcamp walks through one of the most important skills an analyst needs: reporting. This section covers reporting formats and uses and best practices for information sharing.

01 Technical Reporting
02 Business Impact Reporting
03 The Benefits of Sharing

Career Development

The bootcamp closes with sessions that focus on soft skills and strategies that will aid students as they seek a job in the cybersecurity field. Modules include job hunting strategies, communication skills, critical thinking and logic, and deductive reasoning.

01 Communication
02 Resume Writing
03 Interview Skills

Upcoming Sessions

January 3, 2022

Virtual

April 4, 2022

Virtual

July 8, 2022

Virtual

Tuition Expand All

  • Paid at the time of enrollment   $11,900
  • Total cost $11,900

Lorem Ipsum

Lorem Ipsum

Lorem Ipsum

Learn from Experienced Practitioners

Our instructors are trusted by leaders from the government and Fortune 500 for their expertise and teaching style. All our instructors have worked in various roles as cybersecurity practitioners, equipping them with unique insight into the challenges, technology, and attack scenarios faced by professionals in the field.

Cyber Analyst Bootcamp 6

Rachel Rados

Endpoint Live Forensics

Rachel is an Instructor at Focal Point Academy, specializing in Endpoint Live Forensics. Her teaching style is best described as consistent, concise, and empowering. Rachel's courses are designed to be very hands-on, building a strong understanding of key topics so they can be applied directly in daily work. Learn more about how Rachel got her start in cybersecurity and her top tips for building a career in cybersecurity.

Cyber Analyst Bootcamp 7

Paul "Sal" Salcido

Operating Systems, Networking, and Malware

Sal is an instructor on the Operating Systems, Networking and Malware tracks. He has been a member of the Focal Point Academy team since March of 2016, and he brings us more than a decade of experience as an instructor in various facets of Cyber Security, including Computer Hardware Architecture, OS theory, and OS Internals for Linux, Unix and Windows. Sal has held several industry certifications, GIAC-GSEC, MCP and Network+ among them. He is an alumnus of the University of Southern Illinois, Carbondale, where he studied Instructional Systems design, and is a former U.S. Navy Cryptologic Technician.

Home 6

Instructor Name

Title or Course Name

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore

Admission Process

The Cyber Threat Analyst bootcamp is designed for beginners and no experience is required - just a logical reasoning test and brief interview to get started.

Application

Complete a short application describing your current role, job status, career goals, preferred dates, and funding sources.

  • Fill out application
  • Select preferred dates
  • Should take 30 minutes

Assessment

Take a logic-based test and share a little bit about your past job history, skills, and technology experience.

  • Logical-reasoning assessment
  • Desktop recommended
  • 30-45 minutes

Decision

The Focal Point team reviews your application, assessment results, and dates and provides an entrance decision.

  • Review by panel
  • Dates and funding considered
  • Takes 5-7 days for final decision
Have a question?

Contact Us

Focal Point is excited to assist you on your career journey. Please complete this short form and we will get in touch with you.

Featured Content

Recommended reading for those looking to explore the world of cybersecurity.
Cyber Analyst Bootcamp 13
Blog

3 Lessons Learned from 2021 Cybersecurity Events

2021 kept cybersecurity professionals busy – from the fallout of SolarWinds at the start of the year to Log4j at the close. By March of 2021, there were 1,291 breaches recorded, 95% of which were the result of...
Learn More
Top 5 Cyber Jobs
Blog

The 5 Most In-Demand Cybersecurity Jobs of 2022

Offering competitive pay, career advancement, remote work opportunities, a rewarding daily environment, and, most importantly, job security, the field of cybersecurity provides a promising career outlook...
Learn More
DevSecOps Services 7
Blog

Value by Design: Tips for Integrating Privacy and Security into your DevOps Processes

In 2021, most companies agree security and privacy are key concerns for their products. However, implementing privacy and security in a product is still a challenge. The go-to approach of building a product...
Learn More

This is a test

 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce et fringilla nisi. Nulla sed luctus nisi. Suspendisse elit massa, egestas eu nisi in, malesuada dapibus ligula. Nam nibh ligula, tincidunt vel accumsan eu, imperdiet vitae velit. Maecenas vitae nisl a velit varius tincidunt. Curabitur placerat mattis ex, nec elementum lectus pulvinar id. Morbi porta sapien non mauris malesuada, ut dignissim velit dignissim. Nullam maximus ligula vitae ex luctus congue. Donec nec diam eu risus congue aliquet non quis ligula. Aliquam a turpis leo.

  • Nulla vel eleifend ipsum.
  • Donec quis mi loborti
  • elementum erat nec
  • tempus neque.

Another

Nam tortor erat, elementum eu interdum quis, hendrerit a sapien. Suspendisse vehicula urna quis tortor volutpat, ac condimentum leo ullamcorper. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Praesent commodo nibh et quam venenatis, non commodo metus pulvinar. Vivamus nec magna sem.

Proin commodo ex viverra, vehicula sem nec, accumsan nisl. Quisque dui enim, mollis nec ipsum vel, tristique accumsan nunc. Aenean ultricies rutrum turpis, ornare blandit mi accumsan eu. Sed pharetra dolor vitae elementum congue. Donec eu justo convallis, sagittis nisi sit amet, convallis ante. Suspendisse nec convallis quam, eu rutrum arcu. Pellentesque sit amet bibendum metus. Integer nisl tortor, sagittis vel orci pellentesque, ullamcorper elementum leo. Maecenas in erat nisl. Nulla ac elementum urna. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque nec venenatis libero.