Download the Course Catalog
Become a Cybersecurity
Professional in 10 Months
Access Immersive Cybersecurity Training
The American University Cybersecurity Professional Program takes learners who have no experience in the field and gets them job-ready and fully qualified to meet the demands of today's job market in just 10 months. It focuses on getting you prepared with the exact skills needed to find employment in the field.
With over 700,000 job
openings nationwide,
there’s never been a
better time to join the
cybersecurity
industry.
Source:
Cyberseek.org
Gain Marketable Skills
to Succeed in the Field
Accelerated, Practical
Cybersecurity Training
Develop the advanced skills you’ll need from day one on the job by
training on the cybersecurity industry’s top tools and software.
Learn to Defend Against Cyberattacks
Build Job-Ready Cybersecurity Skills with Hands-on Simulations and Labs
TDX Arena and Cyber Labs
Companies look for candidates with practical knowledge and experiential training. With TDX Arena—our robust, cloud-based platform—and Cyber Labs, you can practice offensive and defensive tactics, and apply what you learn in class to the real world.
Expert Instructors
Classes are taught by cybersecurity professionals who are active in the field. They bring their knowledge and unique insights directly into the classroom, keep you up-to-date with the latest trends, and become your mentors through the program and beyond.
Hands-On Courses
Our accelerated career-prep program equips you with the education and hands-on skills you need to understand and apply the fundamentals of cybersecurity as you become a professional in the field.
Virtual Classroom
We built a 360° virtual learning ecosystem that enables fully remote, live classes and enhances your learning experience: from class recordings to collaborative communication tools and online practice simulations.
Benefit From Built-In
Support at Every Turn
An Ecosystem of Professionals Dedicated to Your Success
Student
Support
Student success managers follow learners and help them thrive throughout the program. They can help you access a wealth of resources, including tutoring sessions and test retakes, so you can stay on track and always get the support you need.
Career
Coaching
During the program, you will be matched with career coaches to help you pinpoint your professional goals and chart a path forward to the opportunities that are right for you. They will assist in polishing your resume and LinkedIn profiles, prep you for interviews, and more.
Professional
Community
We create the right opportunities for you to mingle and access a community of cybersecurity professionals, including local and national hiring partners. With online cybersecurity training in Washington, D.C. you can take advantage of networking events and set yourself up for success well beyond the program.
Job Search
Assistance
Looking for job opportunities can be overwhelming and time-consuming, especially as a new entrant to the industry. Our Career Outcomes team is committed to helping you pinpoint the best roles for you and jumpstart your professional path in cybersecurity.
Check out the
Course Catalog
Explore Our Cybersecurity Classes
Program Overview
30-Hour Introductory Course
| 370-Hour Extended Program
-
Introductory Course
The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future.
The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics. -
Part 1: Fundamentals
In the Fundamentals Phase of the program, learners will learn the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program. -
Microsoft Security
Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Learners will learn best practices for administrating and securing the Microsoft ecosystem of products. -
Computer Networking
Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices.
Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam.* -
Cloud Security
Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming much more commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms.
Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam.* -
Linux Security
The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available. Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam. -
Part 2: Cybersecurity Infrastructure
In the Infrastructure phase of the program, learners will begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners will get practical security skills and experience that will prepare them for the Advanced phase of the program. -
Network Security
Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. Learners will leave this course with the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions. -
Cyber Infrastructure & Technology
Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to ensure these important facets of everyday life are protected. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things, and environment security. This skill set is in high demand in both the business world, as well as in industry.
This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam.* -
Intro to Python for Security
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives Learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond. -
Part 3: Advanced Cybersecurity
In the Advanced phase of the program, learners will solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry. -
Offensive Security: Ethical Hacking
This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role. -
DFIR and Threat Hunting
When there’s a cyberattack, first responders are the first in line to analyze and contain the incident. The Digital Forensics & Incident will give learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering, and report the results. -
Game Theory Strategy in Cybersecurity
In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the thread actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically. -
Career Outcomes
Get the competitive edge you need to succeed in technical interviews with this specialized workshop. TDX Arena also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.
Introductory Course (30 Hours)
The primary objective of the Introductory Course is to introduce participants to the cybersecurity industry and the multitude of opportunities that exist within the current landscape. In addition, the course provides an overview of some of the core concepts in cybersecurity and previews how those concepts will be covered within the extended program. When the course ends, learners complete an assessment exam and consult with an admissions advisor who can help them make an informed decision on whether they are a good fit to continue to the extended program and if pursuing a career in cybersecurity is the best choice for their future.
The course begins with the fundamentals of information security and risk management, ensuring that participants understand the business context of cybersecurity. Participants are then introduced to networking and network security fundamentals, the Linux and Microsoft platforms and related security, and unique considerations for software security. The concept and role of offensive security are introduced, and the course concludes with an explanation of how to contextualize threats and threat actors within the previous topics.
Part 1: Fundamentals
In the Fundamentals Phase of the program, learners will learn the basics of the cybersecurity career path. It includes training on Microsoft Windows, Linux, and basic network and cloud security. This phase acts as foundational training for the more rigorous portions of the program.
Microsoft Security (40 Hours)
Many companies across the globe rely on Windows Server to manage their computers, networks, and infrastructure. The Microsoft Security course will give learners a real-world, hands-on education in both modern and widely used versions of Microsoft Windows and Microsoft Server. Learners will learn best practices for administrating and securing the Microsoft ecosystem of products.
Computer Networking (50 Hours)
Computer networking is an essential skill for cybersecurity professionals since networks are used in a variety of fields—including health care, finance, technology, manufacturing, travel, and more. The Computer Networking course will give learners a firm understanding of computer network basics, including protocols, topologies, network design, and devices.
Additionally, the Computer Networking course will give learners a foundation for preparing to take the CompTIA Network+ exam.*
Cloud Security (15 Hours)
Cloud solutions like Amazon Web Services, Google Cloud, and Microsoft Azure are all becoming much more commonplace as more organizations adopt them. The Cloud Security course prepares learners to discuss, identify, compare, contrast, and use common cloud service platforms and providers. It also covers security offerings so that learners can understand how to implement security for cloud-based platforms.
Upon completion of the course, learners will have a foundation of cloud security knowledge that they can use to prepare for the AWS Cloud Practitioner certification exam.*
Linux Security (30 Hours)
The Linux Security course imparts knowledge and practical skills on the most used operating system in the world—one that is absolutely essential to cybersecurity professionals. Learners will learn all of the basics of using and manipulating Linux and will also learn about the various Linux distributions available. Upon course completion, learners can begin preparing for the LPI Linux Essentials certification exam.
Part 2: Cybersecurity Infrastructure
In the Infrastructure phase of the program, learners will begin focusing exclusively on security concepts and practices. This phase allows course participants to study Python programming, network security, and Critical Infrastructure Security (CIS). Learners will get practical security skills and experience that will prepare them for the Advanced phase of the program.
Network Security (35 Hours)
Networks are the foundation for nearly everything on the internet. Learners will leave this course with the skills needed to suggest, design, or implement controls to build secure networks from the design stage to post-implementation. Learners will leave this course with the digital skill set and know-how needed to appeal to potential employers looking to fill technical positions.
Cyber Infrastructure & Technology (40 Hours)
Critical infrastructure consists of anything from fire and rescue departments to power plants that keep the lights on. In the Critical Infrastructure Security course, you’ll develop the skills needed to ensure these important facets of everyday life are protected. Learners will develop knowledge to ensure supply chain, Industrial Internet of Things, and environment security. This skill set is in high demand in both the business world, as well as in industry.
This course will prepare learners to begin studying for the industry-standard CompTIA Security+ exam.*
Intro to Python for Security (25 Hours)
Sometimes the best cybersecurity tool is the one you make yourself. Often, cybersecurity professionals find themselves needing to analyze data, scan a system, or review hosts on a network in a novel way. The Python for Security course gives learners the tools they need to create these custom scripts on the fly, serving as an introduction to basic programming concepts in Python.
Whether you need a web scraper or a network sniffing tool, having a firm understanding of programming allows you to build your own tools and modify others on the fly. This Python for Security course gives Learners the knowledge and tools needed to create custom scripts. It also serves as an introduction to basic programming concepts, which can be used in Python and beyond.
Part 3: Advanced Cybersecurity
In the Advanced phase of the program, learners will solidify existing skills and begin building new ones in advanced security concepts like game theory, digital forensics, incident response, and ethical hacking. By the end of this phase, learners will have a more complete view of cybersecurity and will be well-prepared to enter the industry.
Offensive Security: Ethical Hacking (50 Hours)
This course is a deep dive into the world of ethical hacking, which is critical to the cybersecurity industry. Ethical hackers can include anyone from penetration testers to GRC auditors. The Ethical Hacking course lets the learner get into the mindset of criminal hackers and provides them with the foundation needed to pursue a career with ethical hacking as the primary role.
DFIR and Threat Hunting (60 Hours)
When there’s a cyberattack, first responders are the first in line to analyze and contain the incident. The Digital Forensics & Incident will give learners the necessary tools to appropriately respond to attacks, conduct various types of investigations and evidence gathering, and report the results.
Game Theory Strategy in Cybersecurity (10 hours)
In cybersecurity, game theory allows professionals to analyze the nature of cyberattacks by viewing each incident as a series of games and players. This allows them to describe the interactions and outcomes between a threat and an organization without knowing who the thread actually is. The Game Theory course covers the basics of philosophy and mathematics and also provides experience in how to use game theory in cybersecurity. This course helps develop soft skills that are highly critical in cybersecurity by fostering a learner’s ability to think creatively and critically.
Career Outcomes (15 Hours)
Get the competitive edge you need to succeed in technical interviews with this specialized workshop. TDX Arena also hosts a dedicated resource hub that includes detailed career guides as well as asynchronous classes.
Prepare Yourself for
Industry-Standard Exams
Those who are new to the cybersecurity industry are much more likely to be hired if they obtain industry-standard and internationally recognized certifications. To help boost your credentials, we’ve created an in-depth resource to help you prepare and study for cybersecurity certification exams.
-
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration. -
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Learners with security and compliance experience in AWS Cloud will have a key requirement for passing the exam -- as well as providing their knowledge to prospective employers. -
CompTIA Network+
The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies. -
CompTIA Security+
The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing. -
(ISC)² SSCP – Systems Security Certified Practitioner**
For learners who have achieved one year of experience after completion of their program.
Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.
The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
LPI Linux Essentials
The Linux LPI Essentials exam offers learners a way to verify their knowledge of the Linux operating system, as well as the workings of various open-source applications. The exam tests the ability to manage users and groups on Linux and also measures their competency with the Linux command line, system permissions and security, basic network configuration skills, and overall Linux administration.
AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification exam is meant for individuals with knowledge of the widespread AWS Cloud platform, as well as its infrastructure and systems. Learners with security and compliance experience in AWS Cloud will have a key requirement for passing the exam -- as well as providing their knowledge to prospective employers.
CompTIA Network+
The CompTIA Network+ certification exam measures a learner’s ability and knowledge of network device configuration, management, and troubleshooting. It also tests a cybersecurity professional’s familiarity with emerging mobile, cloud, communication, and virtualization technologies.
CompTIA Security+
The CompTIA Security+ certification exam takes learners a step above the CompTIA Network+ exam. Considered an entry-level certification in the cybersecurity field, the CompTIA Security+ exam measures a candidate’s skill over a wide range of disciplines, including networks, systems, security administration, and penetration testing.
(ISC)² SSCP – Systems Security Certified Practitioner**
For learners who have achieved one year of experience after completion of their program.
Learners with at least one year of experience after the completion of their program can take the (ISC)² SSCP – Systems Security Certified Practitioner certification exam.
The (ISC)² SSCP exam is meant for cybersecurity professionals who have proven, practical, and hands-on experience and knowledge of the security environment. Once they obtain this certification, individuals have proof that they can carry out the implementation, monitoring, and administration of information technology infrastructure according to information security best practices, policies, and procedures.
Program Tuition
Invest in your professional development with the job-ready skill set you need to enter the
field of cybersecurity.
30-Hour Introductory Course
$180
370-Hour Extended Program
$17,800
Requirements
Internet access
Drive, ambition, and passion
Introductory course and admission exam
Tuition, fees, and deposits subject to change.