Gather Here. Go Far

With locations in Tahlequah, Muskogee and Broken Arrow, NSU is Oklahoma’s immersive learning institution. Choose from in-person, blended or online learning options.

Scholarships

NSU is committed to assisting students in applying and earning scholarships. Whether you are an incoming freshman or a continuing/returning student, NSU has a wide variety of scholarship options for students to choose from.

Clubs and Organizations

From networking to leadership opportunities, NSU’s over 80 clubs and organizations allow our students to build lasting relationships while getting the full college experience.

Transfer Students

Whether you’re an incoming or current transfer student, NSU’s transfer advisors are available to assist you with transcript evaluation, information on degree programs and support services. NSU is where You Belong.

Graduate College

Whether transitioning to graduate school or returning to higher education, NSU’s graduate college is your next step. Choose from over 25 master's degrees and several certificate programs.

Cyber Security Bootcamp

This course is no longer available

The Cybersecurity Bootcamp at Northeastern State University is an accelerated training program, designed to successfully prepare someone with little or no IT background for an entry level job in cybersecurity. You’ll gain the technical knowledge and essential skills to launch your future career in cybersecurity. 

Why it Works

Developed around military training methodologies and hands on learning, our Bootcamp teaches you the key skills sought by employers through the following:

Accelerated Program:
Our Bootcamp is a streamlined curriculum focused on teaching you the specific skills you need for the job market. 

Hands-On Skills Training:
You will practice your technical skills with over 60 unique labs and over 100 different exercises. 

Blended Model:
You get the best of both online and self-paced learning. Our facilitator will support your learning experience while our online platform allows you to work at your own pace.

Career Services and Support:
You'll learn essential soft skills like teamwork and interview prep. When you graduate you will also be connected to a cyber network and community. 

Industry Leading Certifications:
ThriveDX Impact is an official partner of CertNexus and CompTIA and provides graduates with opportunity to take the CFR and Security+ certification exams at a special discounted price.

Boot Camp Format

Part time, 6 months: This will cover the same content, over a longer period of time and with classes occurring only twice a week, 4 hours each day. 

How Does it Work?

During the Bootcamp

  • Blended model combining in person and self-paced learning.
  • Accelerated streamlined curriculum.
  • Career services and support

Upon Graduation

  • Continued access to ThriveDX's online learning platform, including ongoing training covering emerging cyber threats and tools
  • Connection to a global alumni network and community

Frequently Asked Questions

You will need English reading proficiency, basic math and logic skills, and most of all, drive and motivation to learn in an accelerated environment. After admission, bootcampers will complete the self-paced Prework module (~20 hours) before the start of the Bootcamp, whose objective is to bring everyone to the same level of technical expertise.

Content for Region 2 Goes Here. If you need more rows or need to remove this row, use the add or remove row icons below. Yes! The Bootcamp requires no prior cybersecurity knowledge or experience. While it is not a requirement, a background in technology can be an advantage

Everything is browser-based so there is no need to install any app or software. We recommend using Chrome internet browser for best experience.

In order to participate effectively in the Bootcamp, you will need a laptop able to run video conferencing. This includes an up-to-date operating system, a stable high-speed internet connection,and a working camera and microphone. For a more detailed list please refer to the Zoom System Requirements. In addition, a second screen is recommended for optimal experience.

In order for you to practice the skills you learn, the Bootcamp includes over 100 unique hands-on exercises that run in virtual machines. These are safe environments where you will be able to run different operating systems, access various tools without installing them on your computer, and practice confidently without putting your computer at risk.

The instructor is the platform, which was developed by ThriveDX’s cybersecurity experts. Through the platform, you will access content as well as practice labs and scenarios. In addition, every cohort will be assigned a facilitator, who will be supporting your learning experience and ensuring no one is left behind.

Upon successful completion of the Bootcamp, you will receive a Certificate of Completion issued by ThriveDX Impact and Northeastern State aligned with the NICE-NIST Framework.

Module Descriptions

The Introductory Course explores the areas of networking, Linux and Windows operating systems, and virtualization concepts needed in today’s digital workplace. Participants will encounter practical training scenarios that mirror real-life cyberattacks and learn how to apply defense and protection measures. The course concludes with an aptitude exam to assess the learner’s understanding of cybersecurity principles and suitability for a career in the field.

Participants learn how to manage the networks and computers of an organization, as well as set up domain environments using Active Directory, DHCP and DNS servers, and other network services.

Computer networking is an integral part of modern organizational structure in nearly every industry. In this course, individuals take a deep-dive into network devices, layers, and protocols that are typically in use to provide the understanding of networks essential to a cybersecurity career. Included in this course is training applicable for the CompTIA Network+ certification exam.

Learners explore cloud storage, which is the infrastructure of choice for many businesses and organizations, including cloud platforms such as Google Cloud, Microsoft Azure, and AWS by Amazon. The course also covers how to ensure data integrity in the longer term, and provides training applicable to the AWS Certified Cloud Practitioner exam.

Learners discover the ins and outs of the open-source Linux operating system, especially the cybersecurity distribution known as Kali Linux. In addition to learning about Linux security, the Linux file system, and how to reinforce the OS environment, individuals gain  knowledge and skills applicable to the LPI Linux Essentials certification exam.

The ability to manage, secure, and operate network communication equipment is a critical role of the cybersecurity professional. Learners build skills on a variety of systems used in all types of organizations. In addition, the course covers core preparation for the Cisco Certified CyberOps Associate exam.

The course explores the various infrastructure defenses in use today, as well as secure architecture design. Participants also learn how to make networks, cloud infrastructures, and devices as secure as possible working with Security Information & Event Management (SIEM) solutions such as Splunk.

Learners delve into the world of basic programming and learn how to use one of the cyber industry’s most widely-used programming languages, Python. The course provides hands-on instruction on setting up a Python environment in Linux and Windows, advanced levels of programming with Python, and the use of external libraries. Individuals gain practical skills building and using tools for the automation of cybersecurity tasks.

Practical exercises and simulations take learners inside the minds of black hat hackers to understand how cybercriminals think, who they are, and how
to beat them at their own game. The course covers the gamut of cyberattacks, such as network attacks, social engineering attacks and application attacks, as well as defense strategies. Upon course completion, participants have added preparation for a range of industry  certification exams.

The in-depth course covers advanced threat hunting methods, including analytics of user behavior, intelligence, and situational awareness. It also
includes a deep examination of digital forensics and incident response (DFIR) and how to use them to investigate host and network attacks. Learners learn about the role of the Security Operations Center team in the organization and how it is activated to handle cyberattacks.

The only way to get ahead of hackers is to think like hackers and win at their own game. The course is designed to sharpen the learner’s strategic capabilities, build skills to apply fundamental Game Theory strategies to real-life cyberattacks, and teach innovative ways to solve an organization’s defense issues.

This course is dedicated to honing the learner’s job search in the cybersecurity industry. A host of specialist career topics and services are covered, including training for interviews; how to network; assistance in internship placement; and 1:1 meeting for resume writing, LinkedIn profile optimization, and more.