Two men engaged in a cybersecurity discussion, sitting across from each other at a desk in Evolve Academy office

Start Your
Cybersecurity career

With the #1 Ranked Bootcamp in the World
with a Job Offer Guarantee
  • Live online, part-time, instructor-led classes
  • Job offer guarantee within six months of graduation
  • 93% hiring rate for job-seeking students
  • Practical job-focused cybersecurity skills
  • No prior technical background or experience needed to enroll
  • CompTIA Security+ voucher included for certification preparation

About ESCP Certification
Cybersecurity Bootcamp

Course Length

20 weeks
Course Length Icon


Monday-Thursday (7-9pm CST)
Alternate Saturdays (10am-3pm CST)
Part Time Icon


210 hours
CPEs Icon


Tuition Icon

Learning Experience

Live Online
Learning Experience Icon

Job Offer Guarantee

Get a job offer within 6 months of bootcamp completion or ask for a tuition refund*
*Terms Apply

Our Alumni Stories

ESCP Cybersecurity Bootcamp Cohorts

ESCP Cybersecurity Bootcamp | July 2024

Remote Live-Online

ESCP Cybersecurity Bootcamp | October 2024

Remote Live-Online

Cybersecurity Bootcamp Payment options

pay later
$0 upfront

pay when you earn

Apply for an Income-Based Repayment (IBR) loan with Edly and pay when you get a job.

$160* / month

Pay Less Per Month

Apply for an educational loan through Climb, Ascent, or Meritize for  low monthly payments over an extended period.

*The monthly payment amount varies based on loan terms. A $160 monthly payment assumes an interest-only payment while in the bootcamp, a 60-month term, and a 13% interest rate.

$6,975 x2

Pay in Installments

Pay $6,975 before the bootcamp and $6,975 in week 10 of bootcamp.

$13,950   $13,450

Pay Upfront

Get $500 off your tuition when you make a one-time, upfront payment.

Evolve Academy Job Placement Data Graphic

Companies That Hire Our Graduates

job titles before our students transitioned into cybersecurity

word cloud with titles people had before switching to cybersecurity

job titles of our graduates

word cloud with titles graduates qualify for

the experience

Holistic Approach

A well-rounded cybersecurity professional can see the bigger picture and will thrive in the industry. Students gain a broad understanding of cybersecurity with the hands-on skills to apply it on the job. These skills help students enter the cybersecurity field and enable their long-term success.
Holistic Approach Icon

Evolve Security Academy Certified

Students are eligible to earn a Certification of Completion after completing the bootcamp and passing the final exam and an Evolve Security Certified Professional (ESCP) certification after passing the 24-hour hands-on lab exam. These certifications are awarded through digital badges, allowing students to showcase their clear and practical understanding of cybersecurity.
Academy Certification Icon

Lab Simulations / Tools

We deliver hands-on, technical labs that delve into essential security concepts and real-world scenarios while incorporating industry-recognized open source and commercial tools. Students will use tools like Burp Suite, Nessus, ELK Stack, Metasploit and more!
Lab Tools Icon

Student Teamwork

We believe the most effective way to learn is with a live instructor and the support of peers. In addition to the full cohort learning environment, students are broken into small groups to work on labs and security apprentice projects, emphasizing the importance of teamwork and collaboration.
Team Work Icon

Gain Real Work Experience

Students perform live security assessment work on non-profit organizations under instructor supervision, giving students the real work experience as a Security Apprentice.
Work Experience Icon

Group Competency Assessments

After each module, students are assessed as a group with a series of real interview questions to answer and model for the entire class, receiving correction, feedback and guidance from the instructor team in the process. This holistic approach allows students to demonstrate strengths in concepts while simultaneously preparing to answer real-life interview questions.
Threat Hunting Icon

Adjunct Instructors

Subject matter experts instruct throughout the program, exposing students to the most relevant industry best practices. Students benefit by expanding their professional network with industry leaders.
Instructors/Students Icon

Security+ Voucher

CompTIA Security+ is a respected technical certification. All students receive a voucher to pursue this certification after the bootcamp at no cost to further their training and showcase their skills. The certification, coupled with hands-on work experience as a security apprentice, helps students demonstrate their skills during the job search.
Security+ Voucher Icon

Job Preparation

We are committed to helping our students enter the cybersecurity industry. Through job preparation training, career coaching, alumni networking and employer partners, students secure jobs that launch their career in cybersecurity.
Job Preparation Icon

Awards & Recognitions

At Evolve Academy, we take pride in our commitment to excellence and the recognition we've received from prestigious organizations in the industry. We're honored to have been awarded for seven consecutive years, three times by Course Report and five times by SwitchUp. These awards serve as a testament to our dedication to providing comprehensive cybersecurity training that equips our students with the skills and knowledge necessary to excel in their careers.

Course Report Award Badge 2021Course Report Award Badge 2022Course Report Award Badge 2023
Best Cybersecurity Bootcamp 2017 BadgeBest Cybersecurity Bootcamp 2018 BadgeBest Cybersecurity Bootcamp 2019 BadgeBest Cybersecurity Bootcamp 2020 BadgeBest Cybersecurity Bootcamp 2021 BadgeBest Cybersecurity Bootcamp 2021 Badge


Introduction to Cybersecurity

This module introduces core principles that are essential to forming a security mindset, which include the CIA Triad (Confidentiality / Integrity / Availability), Defense-in-Depth, Authentication, and Authorization. Cybersecurity is a broad subject so this module provides a general overview of the different domains within security including Application Security, Network Security, Hardware Security, Physical Security, Mobile Security, Operational Security (SecOps/OpsSec), Incident Response, Identity and Access Management, Governance, Risk & Compliance (GRC), and Disaster Recovery / Business Continuity.
 Key Elements, CIA Triad, Defense-In-Depth, Domain Landscape, AAA Services
Points of Data Entry Icon


Networking is the process of how connections are made and how computers and systems communicate with each other which forms the basis of cybersecurity. This module provides the foundational understanding for computer networking and covers network protocols that are used for data communication, networking hardware, subnetting, networking utilities and traffic analysis.
LAN / WAN, OSI Model, TCP / IP Model, Network Protocols, IP v4 & IP v6, TCP, UDP, ICMP, Ports and Services, Routing & Switching, NAT / PAT, DNS, Network segmentation, Subnetting, VLANS
Kali Linux, TCPDUMP, Netcat, Netstat, Dig, Nslookup, Whois, Packet Tracer, Nmap, Wireshark
Networking Icon

Security Program

This module focuses on how to understand, implement and manage a security program within an enterprise. Security professionals must have strong knowledge of how a company operates to implement effective security policies and procedures. You must understand who the organization’s employees, customers, suppliers, and competitors are and how digital information is created, accessed, and shared. Students will learn about the various compliance standards and security frameworks that are most used in the industry.
Cybersecurity governance and strategy, Risk management (Rating methodologies), Compliance (Legal / Regulatory / HIPAA / PCI - DSS)
NIST Cyber Security Framework, CIS Top 18 Framework
Security Program Icon

OSINT & Social Engineering

Open Source Intelligence (OSINT) is a tradecraft used for conducting reconnaissance and information against an adversary or target to gain insights into people or organizations. Students will learn how to gather information about a victim and craft a phishing campaign to compromise the victim’s organization. Knowledge of these simple offensive techniques will help students understand how to craft security awareness campaigns and defend against phishing attacks.
Information gathering with open source tools, Network and Domain enumeration, Anonymization on the Internet, Security Awareness, Social Engineering (Email / Phishing / In-Person / Telephony)
Kali Linux, Google Hacking Database, VPN, TOR Browser, Whois, DNS records, Traceroute, GoPhhish, Email Header Analysis, Shodan, theHarvester, OSINT Framework
Engineering Icon

Threat Intelligence

An enterprise cannot properly defend their information unless they understand who they are defending against. This module discusses the current threat landscape, Advanced Persistent Threats (APTs) and dives into where threats are coming from and what is motivating the nation-state and non-nation-state threat actors.
Threat Sources & Events, Adversarial (Fraud / Theft , Insider Threat, Malicious Hackers, Malicious Code, Malware, Ransomware, Espionage), Non-adversarial (Errors and Omissions, Physical Infrastructure, Privacy and Data Sharing), Threat Motivations (Monetary, Hacktivism, IP Theft, Espionage)
Data Breach Reports, MITRE ATT&CK Framework
Cybersecurity Threads Icon

Scripting for Security

Python has become increasingly popular in the offensive and defensive cyber communities. Tool developers and hackers primarily used Python, but with the rise of analysis-driven and proactive cyber activities, it is now a staple in the cybersecurity industry. In this self-paced module, students will learn the basics of scripting with Python to solve common and emerging cybersecurity challenges.
Client Server Model, App and Web Servers, programming fundamentals, functions and classes, API connections, Regular Expressions
Python, Jupyter Lab, Git, PIP, VirtualENV
Scripting Icon

Security Operations Architecture

The ability to prevent and detect cyber-attacks as they occur in real time is the epicenter of defending against cybercrime. Good defense starts with thoughtful network architecture design that leverages Cloud and on-prem technologies. In this module, students will learn about network architecture / design, virtual private cloud (VPC) configuration, end-point hardening and deployment, and secure two-factor authorization.
Network Architecture Design, Virtual Private Cloud (VPC) design, configuration and deployment,  Firewalls (Access Control Lists / Filters / Rules / White List / Black List), Proxies, Remote Access, Virtual Private Network (VPN) configuration and deployment, Access Control, Infrastructure as Code, Cloud Infrastructure Auditing, Systems Hardening
Kali Linux, AWS, Terraform, ScoutSuite, DUO, Lynis, Windows Security Policies, OpenVPN
Data Architecture Icon

Security Operations Detection

Cybersecurity should always be proactive rather than reactive. It is much more difficult and expensive to address security after a system has been deployed. In this module, students will learn best practices for network threat modelling, prevention, and continuous monitoring and mitigation.

Detect / Defend, Traffic Analysis, Logging / Log Management, Security Information Event Management (SIEM), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Data Loss Prevention (DLP)
Kali Linux, IPtables, Snort, SIEM Dashboards, ELK Stack
Security Operations Icon


A cybercriminal cannot do as much damage to an enterprise if they are unable to read the stolen data. This module covers the core concepts of encryption (Boolean Logic, Modulus Arithmetic, hashing) and how it is used within secure protocols (SSL, TLS, SSH). It focuses on how to implement and manage encryption policies within an enterprise (signatures, key management, PKI). Students will learn the importance of understanding the vulnerabilities and misconfigurations that commonly go wrong during implementation. At the end of the module, students use brute force, rainbow tables and various other hacker tools to crack passwords from hashed data.
Boolean Logic, Modulus Arithmetic, Symmetric / Asymmetric, Hashing, TLS / SSL, Disk encryption, Key Derivation Functions, Digital Signatures, Key Management: Public Key Infrastructure, Password Cracking: Rainbow Tables
OpenSSL, CertBot, Nginx,  MD5 / SHA, CertBot, Hydra, Hashcat
Cryptography Icon

AppSec & Offensive Security

How do we know if all the policies, procedures, firewalls, ACLs, or intrusion detection and prevention systems are working unless we test them? This module focuses on how to review security programs and perform various security vulnerability assessments throughout an enterprise. Students will embody the mindset of a hacker and perform penetration tests where they mimic real-world attacks to identify methods to circumvent the security features of an application, system, or network. A successful penetration tester has in-depth knowledge of how networks, systems, and applications are defended. This module allows students to test everything they have learned thus far. Students participate in a competitive red team / blue team exercise to showcase their skills in a team environment.
Assessment Approach, Testing Viewpoints (Internal / External, Overt / Covert, White box / Gray Box / Black Box), Mitigation and Remediation, OWASP Top 10, Vulnerability Scanning, Penetration Testing, Bug Bounty, DevSecOps, Red Team / Blue Team
Nmap, Metasploit, Nikto, Nessus, Burp Suite, Veracode, Shodan, Discover scripts, DNSExfiltrator, Qualys
Application Security Icon

Threat Hunting & Incident Response

There are two types of companies: companies that know they have been breached and companies that do not know they have been breached. One-third of U.S. businesses were breached last year and nearly 75% were unaware of how the incident occurred. In this module, students learn why it is vital for companies to properly respond after a breach and have a process to perform a forensics analysis to learn how the breach occurred and understand how it affects the company.
CSIRT, NIST: IR Methodology (Preparation / Detection & Analysis / Containment, Eradication & Recovery / Post-Incident Activity), NIST: Forensics Process (Data Collection / Examination / Analysis / Reporting), Threat Intelligence (Cyber Kill Chain / Diamond Model)
NetworkMiner, Windows Event Logs, Volatility, BinText, Incident Response Tabletop exercises
Threat Hunting Icon

Security Apprenticeship

Cybersecurity should always be proactive rather than reactive. It is much more difficult and expensive to address security after a system has been deployed. In this module, students will learn best practices for network threat modelling, prevention, and continuous monitoring and mitigation.
Apprenticeship Icon

Job Preparation

In addition to the technical cybersecurity training, students will learn the skills and strategy to confidently navigate their job search with our support. Job preparation training is integrated throughout the bootcamp and available after graduation. Through career coaching, cybersecurity resume prep, mock interviews, networking strategies, alumni connections and employer partners, students land jobs that launch their cybersecurity careers. Students are encouraged to take advantage of virtual and in-person EvolveSec Meetup events to connect with industry professionals and expand their network. We know what it takes to get a job in cybersecurity and support our students throughout their job search process.
Networking, LinkedIn Profile, Resume Prep, Interview Prep, Career Coaching, Job Search Strategy, Continuing Education
Job Preparation Icon