Professional Documents
Culture Documents
Springboard Cybersecurity Career Track Syllabus
Springboard Cybersecurity Career Track Syllabus
Springboard Cybersecurity Career Track Syllabus
Experts predict that there will be 2-3 million unfilled cybersecurity jobs in the coming
years. With today’s changing technological landscape, companies are making security a
top priority, fueling the demand for talented professionals who have strong cybersecurity
skills. These jobs are at the forefront of policing and ensuring safe, fair online activity.
Fostering a strong frontline defense is a great responsibility and organizations are
committed to creating secure environments.
At Springboard, a core part of our mission is to equip students with the skills and
knowledge they need to meet the cybersecurity skills gap head-on. By teaching in-
demand skills and training a skilled workforce, Springboard helps professionals tackle
new-economy jobs.
That’s why we launched the Cybersecurity Career Track, a 200+ hour online course
designed to prepare you for a cybersecurity career. You’ll learn by working through an
expert-curated curriculum and practicing your skills in a lab environment. To help you
develop strong professional skills, you’ll participate in mock interviews, network with a
dedicated community, and work 1-on-1 with a career coach to help you succeed in your
job search.
Springboard in numbers
2
Prerequisites
The Cybersecurity Career Track is ideal for people with backgrounds in technical fields (e.g. IT
or Computer Science) or in entry-level security roles.
Our admissions process screens for a foundational knowledge of programming and basic
security concepts.
Admission Process
3
Start application
How it works
1. Cost and schedule: The course costs $599 per month and most
students complete it within 6 months. For financing options, please
read more here. The course is fully online and allows you to study
anywhere and anytime you want. You’ll have 30-minute video calls with
your mentor every week and access to your Springboard account and
online community after you graduate.
5. Test your skills through practice labs: A lot of your time will be
spent working on hands-on projects and applying what you’re learning.
Working with your mentor, you’ll get experience finding and reporting on
various types of application security vulnerabilities and securing
operating systems.
4
6. Graduating from the course: You will exhibit your data science skills
through a capstone project which will be approved by your mentor.
Once you complete all assignments, you’ll receive a certificate which
describes your learning. You can even add this to your LinkedIn profile!
Mentors hold students accountable, help them grow, and impart real-world knowledge
and advice. Research shows that having a mentor makes you 5 times more likely to get
promoted and more likely to get a raise.
5
Career services
While you work through the course, you’ll get personalized 1-on-1 career coaching calls
at designated points in the career curriculum to address your specific situation. The
coaching sessions cover topics such as:
Career coaching calls normally last 30 minutes and mock technical interviews last 60
minutes.
This units focuses on measures taken to This section introduces you to threat
improve the security of an application modeling and the risks associated with
and highlights how to find, fix, and application development.
prevent security vulnerabilities.
Topics covered:
Topics covered: 1. Secure design architecture concepts
1. Security design principles within 2. Designing secure interfaces within
application development applications
2. Security software concepts, including 3. Virtualization, data loss prevention,
confidentiality, integrity, and and trusted computing
availability
3. Principle of least privilege and
separation of duties
UNIT 5
Programming and Implementation
UNIT 3 20+ hours
Secure Application Requirements In this unit, you’ll learn various secure
15+ hours
coding practices and how to test for
In this unit, you’ll review different secure vulnerabilities both during development
development frameworks and and in a production environment.
methodologies to ensure that data is
Topics covered:
protected and applications are securely
developed. 1. Finding and fixing malicious code
2. Identifying and preventing software
Topics covered: security vulnerabilities
1. Regulatory requirements during
development process
2. Data classification and privacy
7
Topics covered:
UNIT 6 1. Protecting company data during
Secure Application Testing deployment and production
20+ hours 2. Analyze software to ensure that it’s
securely configured and integrated
In this section, you’ll learn how to find
within the environment
vulnerabilities in applications,
strengthening your testing skills.
Topics covered:
Practice Labs
1. Test for known and unknown 50+ hours
vulnerabilities
2. Classify and track errors during the Each technical unit includes lab
development phase exercises to help you practice applying
tools and technologies to real-life
scenarios. You’ll gain hands-on
experience finding and reporting
UNIT 7
application security vulnerabilities while
Deployment and Maintenance
securing operating systems.
15+ hours
8
Capstone Project
15+ hours
For this project, you’ll be given several key elements of a fictitious application and a lab
environment to run actual security tools. You’ll follow a risk and vulnerability assessment
methodology and identify weaknesses and vulnerabilities within the environment.
After you complete the comprehensive risk and vulnerability assessment for the software
application, you’ll write a report of your findings and make recommendations for
improvements.
If you’re unsure whether your background, interests, and the course are
a good fit, please email us at nicole@springboard.com. Nicole, our
Admissions Manager, will help you think through the decision via email
or phone.
Schedule a call
9
Office Hours
You'll join other students and a host mentor to discuss a variety of topics. You can utilize
this time to get a better understanding of what other students are working on, ask
questions about cybersecurity, and learn more about getting into the industry.
2. Q&A Sessions
You can ask the host mentor questions about your
project work, industry trends, and interviews.