25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

Rutgers Cybersecurity Bootcamp

Mutasem Ayyoush

Earner demonstrated proficiency in networking, systems, web technologies, databases, and defensive and offensive cybersecurity. Through assignments and challenges augmented by team projects, experience is gained in methods, techniques, and best practices for accurately conveying the severity of the risks facing an organization’s security posture. Problem-solving skills are learned by researching and applying new skills independently. The course includes a total of 240 contact hours for a total of 24 continuing education units. Earning Criteria -- Network Security: For their first project, students are tasked to collaborate in small groups to build, secure, and protect a cloud application that hosts their own cyber blog. This project results in tangible deliverables that demonstrate knowledge of cloud, cloud security, networking, web development, cryptography, and network security. Students prepare a professional presentation where they demonstrate interview skills by speaking technically about different project features while also explaining the development process. -- Defensive Security: For this project, students work in groups to design a custom monitoring environment to protect a fictional organization. Students use Splunk to research and design a monitoring solution for their fictional organization, then determine whether that monitoring solution will protect their organization from several simulated attacks. Once completed, students showcase their defensive projects with professional presentations. -- Offensive Security: Students work in teams to attack a fictional organization and determine its vulnerabilities. First, students attempt to exploit vulnerabilities on the organization's web application. Next, students attempt to exploit the organization's Linux and Windows servers in turn. The project is structured as a Capture the Flag (CTF) style competition, so that each vulnerability that students exploit correlates with a "flag," and flags are worth various point amounts depending on the difficulty level of the exploit. -- Test Prep and Final Projects: The program culminates with a focus on certification preparation for Security+ and CEH exams. Learners also engage in a final group research project that showcases the skills they've learned in this class. On the final day of class, they give professional presentations of their work at the cyber class conference, bootCon. -- In addition to these projects, students must complete and turn in all but two homework assignments in order to stay eligible for the course certificate.

Skills / Knowledge

  • Networking
  • Packet Analysis
  • Wireshark
  • Windows and Linux Hardening
  • Cybersecurity
  • Secure Network Design and Architecture
  • Risk Management
  • Cryptography
  • Vulnerability Assessment
  • Identity and Access Management
  • Cloud Security
  • Ethical Hacking and Penetration
  • Kali Linux
  • Metasploit
  • Burp Suite
  • Web Vulnerabilities and Security
  • Digital Forensics Methods
  • Penetration Testing
  • Bash Scripting
  • PowerShell Scripting

Issued on

December 7, 2023

Expires on

Does not expire
Job Insights

These are the most common job titles and employers with the most open positions related to this credential.

Showing results for United States.

Top job titles related to this credential
0 0 5 5 10 10 15 15 Percentage MILITARY INTELLIGENCE SYSTEMS MAINTAINER/INTEGRATOR MILITARY INTELLIGENCE SYSTEMS MAINTAINER/INTEGRATOR CYBER OPERATIONS SPECIALIST CYBER OPERATIONS SPECIALIST CYBERSECURITY ENGINEER CYBERSECURITY ENGINEER
0 0 2 2 4 4 6 6 8 8 10 10 12 12 14 14 Percentage
Legend
  • MILITARY INTELLIGENCE SYSTEMS MAINTAINER/INTEGRATOR
  • CYBER OPERATIONS SPECIALIST
  • CYBERSECURITY ENGINEER
Top Employers
0 0 10,000 10,000 20,000 20,000 30,000 30,000 40,000 40,000 50,000 50,000 Jobs FBI FBI US Navy Reserve US Navy Reserve Ivy Exec Ivy Exec EY EY Cherry Bekaert Cherry Bekaert
0 0 10,000 10,000 20,000 20,000 30,000 30,000 40,000 40,000 50,000 50,000 Jobs
Legend
  • FBI
  • US Navy Reserve
  • Ivy Exec
  • EY
  • Cherry Bekaert