Cybersecurity Bootcamp- prepare for a Future in Cyber Security with Expert Training

Secure your future with our comprehensive Cyber Security Bootcamp - learn the skills needed to keep you safe in the digital age!

Our Bootcamps


  • Prerequisite (Access to Lab Environment; Getting familiar with Kali)
  • Foot printing and Reconnaissance (Wireshark; theHarvester; Recon-ng; OSRFramework; Maltego)
  • Scanning Networks (Nmap (CLI & GUI); Nikto; HPING3)
  • Password Cracking (Zydra; Hydra; JTR; L0phtCrack)
  • Wireless Networks
  • Malware Threats
  • Social Engineering
  • Exploitation (Metasploit | Metasploitable VM)
  • Vulnerability Assessment (OpenVAS; Nessus)
  • Evading IDS
  • Firewalls
  • Honeypots (Snort;KFSensor Honeypot IDS; Nmap EvasionTechniques; HTTP/FTP Tunneling)


  • Cryptography (HashCalc; Advanced Encryption Package; VeraCrypt; OpenSSL)
  • Network Forensic Tools Analysis (Tshark; Xplico)
  • Email Forensics
  • Application Password Crackers (Password Cracking Tools)
  • File System Analysis (FAT,NTFS, Ext2, Ext3, UFS1, and UFS2)
  • Computer Forensics Investigation
  • Data Acquisition and Duplication
  • Steganography and Image File Forensics (Steganography Tools)
  • Malware Forensics (Malware Forensics Tools)
  • Windows Forensic Tools (Helix, Autopsy, The Sleuth Kit (TSK), Cryptocurrency Mining, Web Security Tools, Firewalls, Log Viewers and Web Attack Investigation Tools.)

Schedule an Appointment

Click here to schedule an appointment with our Director. See if this works for you. Free, no strings


We take you from where you are to a Cyber Job

  • Compliment to the Academically focused MS program of Coursework
  • Intensive Hands-On Experience that is Unique to Cyber Programs
  • Boot Camp experience at off-site
  • Builds on MS coursework and Ties Together the learning experience
  • Contracted with CCI under the direction of Morgan State University Faculty
  • High Impact Experience to secure Navy support
  • Students leave with a Capstone Project which includes the development of a unique Cyber attack, Analysis, Detection, Forensics
  • Cyber Test Bed that includes: Attack Tools, Network Analysis/Visualization, Attack Detection, Forensics