94 Office Hours
For personalized learning
Mon - Thurs Classes
70 + Labs
With real world scenarios
Capstone attempt include
Bootcamp classes are instructed live Monday - Thursday from 7pm-9pm CST Classes are hosted on our custom built platform. Students have access to personal virtual machines to learn the skills they will need to apply in a corporate network that is under attack from advanced threat actors.
Our instructors work directly with students to update their resumes and prepare for interviews with potential employers.
CDCP Cert. Attempt
At the end of every bootcamp students have a chance to complete the Cyber Defense Certified Professional capstone project and achieve a certification.
With scheduled office hours and multiple instructors for every bootcamp, students get all the attention they need to succeed.
Book a call with our team
What is the Cyber Defense Certified Professional Accreditation?
The Cyber Defense Certified Professional accreditation is a practical application of the knowledge, tools, techniques, and procedures acquired through the Cyber Defense Analyst bootcamp. The certificate is only awarded after successful completion of the Cyber Defense Analyst bootcamp and capstone project.
The Cyber Defense Certified Professional is filling a gap in cyber defense certification for both the hard and soft skills that are required and in high demand within the cyber community.
This is accomplished through a battery of real-world security operations scenarios that students must overcome and articulate in a detailed report that includes the appropriate executive summary, findings, recommendations and remediation steps along with applicable evidence.
This course is designed to provide a practical and real-world experience for students.
The objective is to empower students with realistic and applicable skills that can be applied on the job. The bootcamp is fast-paced, high volume and challenging.
Holders of a Cyber Defense Certified Professional certificate have demonstrated the knowledge, skills, and practical application to work within a security operations team.
Go for Gold
Holders of the GOLD CDCP demonstrate an excellence in delivery, technical skill, and comprehension of assigned challenges. Only one student can be nominated for GOLD status per cohort and only IF they exceed our traditional passing standards for CDCP.
The Cyber Defense Analyst Bootcamp is an investment of $9,500 USD.
To reserve your spot a deposit of $1,000 USD is required. Deposits can be placed online after clicking “Enroll Now” or by booking a call with our team.
By clicking “Reserve Your Spot” or “Enroll Now” you will be asked for your registration details and directed to a checkout to reserve your spot with a $1,000 USD deposit. For full payment, multiple financing options are available.
A $500 discount is available to first responders, active duty and military veterans from Canada and the USA.
A $1,000 discount is available for students who register more than 4 weeks in advance.
Early registration discount
Receive $1,000 off tuition when you register more than four weeks before the cohort start date. Register by August 6th to save $1,000 on September's tuition.
Apply for financing
We've partnered with Climb Credit to offer flexible financing options.
Starts Sept. 7, 2021 (register by Aug 6th & save $1,000)
Starts Jan. 10, 2022 (register by Dec 10th & save $1,000)
What students say
Rated a top Cyber Security Bootcamp
Frequently Asked Questions
Cyber Defense Analyst Bootcamp
We have early bird discounts of $1000 off tuition if you enroll no later than 4 weeks before the bootcamp starts.
We have partnered with Climb Credit to offer flexible financing to students. Apply with Climb Credit for the amount that you will need to finance. Climb offers two different payment options.
2. Loan payments are available for terms of up to 36 months at a 6.99% interest rate with a standard $1,000 deposit.
To apply for financing, click here.
Yes, if there is still room in your desired Cohort you may defer your enrollment to another future Cohort (for the same course/bootcamp). If you need to defer your enrollment, tell our team as soon as possible to secure your spot in a future Cohort.
Deposits are non-refundable. However, Pathways payment plans are built to accept all applicants.
No. Although, we do recommend being comfortable using a computer and completing basic tasks on a computer. Students must complete the pre-requisite Cyber Foundations course before the live instructions which outlines basic, foundational skills you will need to succeed in CDA.
Yes. We welcome students from the UK and Canada to attend the CDCP bootcamp.
Classes begin on the first day of the Cohort and run 14 weeks, Monday through Thursday from 7pm-9pm CST. (8pm – 10pm EST or 5pm-7pm PST)
Our students get hired in roles Cyber Security Analyst, Cyber Security Engineer, Security Consultant, Digital Forensics & Incident Response Analyst, Compliance Analyst (see note on job titles below).
A FREE course for those interested in a career in Cyber Security and have no idea where to start with it.
The course is a pre-requisite to the Cyber Defense Analyst Bootcamp.
You'll learn about the most prevalent cyber risks and threats and the basics of Windows, Linux, and networking.
If you like this course, you'll likely really enjoy Cyber Security!
Get started here: https://leveleffect.com/home/cyber-security-foundations/
They're all the same position just with different naming conventions due to no standardized name in the private sector. The public sector as per the NIST federally mandated security framework calls these roles a “Cyber Defense Analyst” which is what we adhere to and have built our curriculum in accordance with
The Cyber Defense Analyst is a title suggested by the NIST NICE framework that is the same as these positions
The abilities, knowledge, skills, and tasks for this role can be found:
A Security Operations Center (SOC) is where the cyber security team works from in most organizations
Cyber Defense Analyst / Cyber Security Analyst
This is the majority of the jobs on the market and will likely be your starting position. You're the first point of contact to triage and respond to security incidents based on your "Tier" level and actively monitor the network for threats. There are generally three tiers and each has greater responsibility and expectations to resolve incidents.
This could be another starting position but some technical experience will vastly expedite your success. You're responsible for ensuring everyone is following the rules but more importantly following the RIGHT rules and live in the land of processes, policies, documentation, and meetings. You'll work with just about everyone and have a birds-eye view of the security program preparing gap analyses and roadmaps to ensure the company security program is effective. You'll learn or become well-versed in PCI (credit card), HIPAA (health information), SOX (financial) and more legal/federal requirements.
Cyber Security Engineer
Part analyst, developer, and sysadmin, and generally considered a role after some experience as an analyst. When you're not supporting analyst activities you'll primarily be building out and implementing secure infrastructure/architecture and solutions with the IT or DevOps or Development team or with other Engineers. You'll work a lot of cloud technology and ensuring availability of resources are met in secure methods that prevent unauthorized access to accounts/data/services.
Threat Intelligence Analyst/Engineer
Part technical writer, part analyst and generally considered a role after some experience. You'll research, prepare, and present detailed reports on relative adversaries including their techniques, tactics, procedures and how your network can best stay focused and respond to these threats.
Incident Response Analyst/Engineer
Part analyst/part threat intel. A more specific analyst that is focused on responding to immediate threats and prepares playbooks to respond to them for others to follow. Creates log and traffic alerting logic using industry tools. This is typically not entry level and only available in larger organizations with funds to support it.
Not likely an entry level role but if you're skilled enough by self-teaching it can be. Accounts for a very small percentage of the jobs and is considered to be the "hacker". Your main function is to audit security controls under tight/strict scope put in place by defenders and see if you can circumvent them largely by looking for misconfigured permissions and known vulnerabilities and then preparing and presenting lengthy technical reports that detail your findings and recommended remediation steps to prevent them from happening or mitigating them with the resources available.
This is along the lines of penetration testing but with little to no rules and is focused more on specific targets like "gain access to this database by whatever means" or simulate what advanced persistent threats (like Hafnium and REvil) may try to execute on your network. This role requires a lot of experience and is likely to include phishing and physical entry to the location to test overall security.
Digital Forensics or Malware Analyst/Engineer
A specialist role that focuses on post-incident analysis. Your function is to take apart malware and figure out how it works or dive deep into memory and disk data that is assumed to be hard to find/disassemble and recover the pieces. This role requires years of experience and likely only in public sectors or very profitable tech/fintech/health companies.
A Security+ cert may get you some more screening interviews by recruiters for entry level jobs, and may be required for certain federal/public sector positions.
If you're not taking a bootcamp or a graduate program, a certificate is a great way to demonstrate your interest and has a lower cost.
It gives you a good broad range of theoretical knowledge but you'll still need to supplement this with hands-on training (self-taught or paid) to be effective at work.
It may be necessary to get for advancement or pay raises after you're employed, and may be required for public sector work.
CISSP is for managerial/supervisory positions and requires actual job experience that must be vetted by an awarded CISSP holder for you to receive yours.
The CISSP cert could show demonstrated interest for getting into cyber, but there are better/more appropriate pursuits like Security+, Bootcamps, and self-teaching.
If you're interested in penetration testing or going the offensive route, this is a great certificate to go after currently.
It will highly increase your interview rate and should provide base skills to be ahead in technical interviews, but won't guarantee you a job as it does not currently test for lateral movement and complete active directory exploitation which is the majority of what you’ll encounter on the job.
Supplement pursuit of this cert with a lot of focus on Windows and Active Directory exploitation self-teaching/paid-teaching to make up for missed areas and you’ll be set up for success.
CTF stands for "Capture the Flag" where you need to find a pattern of text on the system like "LE-R99451-13375" These text patterns require you to use your knowledge of operating systems to traverse abnormal system configurations and permissions in order to find them. CTFs test on your ability to find "abnormal" configurations... however these will likely not be "common" misconfigurations as seen in the real world. They are the closest thing to "Cyber Olympics" that is currently out there.
Experienced professionals as your Instructors
Thinking about Cyber Security?
Take a quiz and see if it's right for you.
Technical Aptitude Test
Not sure if you have the technical skills to work in Cyber Security? Take the quiz and see for yourself.
Cyber Career Quiz
Explore your skills and get matched with the Cyber Security role that is right for you.
Book a call with our team