University-wide Navigation

UKY CYBERSECURITY RMF BOOTCAMP
POWERED BY FUSION CYBER

CYBER RISK MANAGEMENT BOOTCAMP

Learn the critical and in-demand field of cybersecurity from industry professionals to help you succeed in your career and secure your future.

Limited Seats Remaining

Get Bootcamp Info

START DATE

27th January 2025 and April 28th 2025

DURATION

24 Weeks

FORMAT

100% Online
WHY CYBER

SECURING OUR FUTURE

The need for skilled cybersecurity professionals has never been more critical. US executives consider cyberattacks the number 1 risk companies are facing today (Source: PWC). Experts are needed across industries as the digital world becomes increasingly interconnected. With this bootcamp, you’ll be well-prepared to land a high-paying cybersecurity job and build a stable career in this thriving industry.

455K

open cyber jobs
in the U.S

Source: Cyberseek
35%

job growth rate
from
2021-2031

Source: US B.L.S
$20T

projected global cost of
cybercrime in 2026

Source: Statista and Evolve Security
358%

malware increase
in 2020

Source: Help Net Security
CURRICULUM

ZERO TRUST RISK MANAGEMENT
FRAMEWORK TRAINING

The Cyber Risk Management Bootcamp, powered by Fusion Cyber, teaches students how to help organizations assess their resilience, defeat attacks, and stay ahead of the technological, legal, and policy challenges they may face. 

Our curriculum, recognized by the U.S. Department of Homeland Security, educates students in the Risk Management Framework, including CMMC, Defense, and Cyber Offense, and covers topics like Cybersecurity Foundations and Microsoft Security Core. We leverage cutting-edge AI tools, including CyberGPT Navigator and GPT Interview Simulator, offering an adapting, ever-improving, personalized experience that sets us apart.

Our virtual cyber range provides hands-on, browser-based keyboarding labs where students can respond to threats, attacks and hacks. With over one hundred hours of targeted, real-world training, we ensure our students gain not just theoretical knowledge but practical skills essential for excelling in the cybersecurity arena.

We offer a comprehensive career development track that’s not just about mastering cybersecurity skills, but also about launching students into the industry. Students engage in career development tasks and prepare for industry-accepted cybersecurity certification exams. We connect you with professionals, providing real-time market insights, and offer personalized career development support, making you not just certified but truly qualified.

The bootcamp can be completed in 24 weeks (non-credit). 

Certifications
CEH

CERTIFIED ETHICAL HACKER

CERTIFIED ETHICAL HACKER

EC-Council Certified Ethical Hacker Certification Boot Camp covers how to work with various systems to find out where their weaknesses or vulnerabilities may be and how you can identify and reinforce these gaps to prevent successful hacking attempts.

CISSP

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

The CISSP – Certified Information Systems Security Professional.

CISA

CERTIFIED INFORMATION SYSTEMS AUDITOR

CERTIFIED INFORMATION SYSTEMS AUDITOR

The Certified Information Systems Auditor (CISA) certification validates your knowledge of information systems auditing, assurance, control, security, cybersecurity, and governance.

Security+

SECURITY CERTIFICATION

SECURITY CERTIFICATION

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

SOC Analyst (C/SA)

SOC ANALYST (C/SA)

SOC ANALYST (C/SA)

The EC—Council Certified SOC Analyst (C/SA) certificate is the first step to joining a security operation center (SOC). It is engineered for current and aspiring Tier 1 and Tier II analysts to achieve proficiency in performing entry-level and intermediate-level operations.

Risk Management Framework Curriculum

Students will learn the fundamentals of information technology and security including the methodologies, frameworks, and processes organizations use to ensure the confidentiality, integrity, and availability of its information, data, and IT services.

  1. Cybersecurity Fundamentals
  2. Frameworks, Laws, and Regulatory Standards
  3. Security Policies, Procedures, & Processes
  4. Risk Management Concepts, Frameworks, and Legal Requirements
  5. Organizational Structures and Project Management
  6. IT Lifecycle Management
  7. IT Auditing

Students will be introduced to the NIST Risk Management Framework and demonstrate their understanding of this framework, widely used in both public and private sectors, by completing all steps in the process and creating artifacts to support a comprehensive information system security assessment based on NIST 800-53 rev 5.

  1. Cybersecurity Program Management
  2. Certification & Authorization
  3. Cybersecurity Awareness & Training
  4. System & Software Development Methodologies
  5. Supply Chain Risk Management
  6. Identity & Access Management
  7. Change, Configuration, Release, & Patch Management

Students will continue their assessment of security controls and developing artifacts to support a comprehensive information system security assessment based on NIST 800-53 rev 5. 

Students will present the results of their assessment and share their recommendation for authorizing the information system.

  1. Auditing
  2. Asset Management & Security
  3. IT Service Management
  4. Communication & Network Security
  5. Problem & Incident Management
  6. Business Continuity & Disaster Recovery
  7. Protecting PII
  8. Cryptography & Public Key Infrastructure
Fusion Centers SOC Apprenticeship Program (FCSA) Curriculum

Students will learn the fundamentals of information technology and security including the methodologies, frameworks, and processes organizations use to ensure the confidentiality, integrity, and availability of its information, data, and IT services.

  1. Orientation and Exam Preparation and Learning Resources
  2. Cybersecurity Fundamentals
  3. Privacy Concepts and Social Engineering
  4. Information Security and Privacy Laws [Industry Speaker]
  5. Team Activity: Understanding the Impacts of AI and Cyber Warfare
  6. IT and Cybersecurity Governance
  7. IT Lifecycle Management
  8. Industry Speaker and Career Development

Students will dive into the second 8-weeks as part of an immersive journey exploring a vast cybersecurity landscape, where they’ll become adept at operating within a security operations center (SOC). Students will grasp the essentials of various operating systems and file systems, from Windows to Unix and Linux, while they decode the language of computers with binary and IP addressing, skills will be sharpened in networking fundamentals, cybersecurity foundations, and secure software design while paving the way to becoming a proficient Security Operations Specialist. Lastly, students will prepare to shape the future of cybersecurity with hands-on experience in AI applications and automation in incident response.

Overview of cybersecurity landscape, importance of security operations specialists, fusion cyber inc apprenticeship program overview, and denmark technical college partnership.

  1. OS and File System Familiarization
  2. Binary Understanding and IP Addressing
  3. Networking Foundations: Packets and Open Systems Interconnect Model, Switching and Routing, Gateways and Modems, and Firewalls and Perimeter Defense Systems.
  4. Foundation of Cybersecurity: Basics, Historical Threats, and Evolution of SOC
  5. Website Building and Security: How built, connections, securing, and webapps.
  6. Secure Software Design: practices, frameworks, reviews, testing & validation.
  7. SOC Fundamentals: Structure and Functions of a Security Operations Center (SOC), Role of a Security Operations Specialist, Collaboration in a SOC Environment, Tools, and Technologies Used in a SOC.
  8. Understanding AI in Security Operations: Introduction, applications in SOC, ML in Threat Detection, Automation in IR Challenge – Cybersecurity Foundations – Web Application Security – OWASP Top 10 Challenges – Secure Coding – SOC Analyst 1 – SOC Analyst 2

Students will embark on this 8-week final leg of their apprenticeship journey, where threat hunting will become their new forte. Students will proactively sniff out threats with advanced hunting techniques backed by real-world case studies while honing their skills in incident response, mastering the phases of triage and strategic plan development. Students will delve into vulnerability analysis, assessing and prioritizing risks with continuous monitoring. This journey continues by understanding good backup and disaster recovery (DR) acumen integrating incident response with solid DR planning and testing. This comprehensive program culminates in polishing student’s professional prowess— from networking and industry certifications to mental health awareness to stay sharp on the job—equipping students with the tools for a resilient and future-ready career in cybersecurity.

  1. Threat Hunting: what, Proactive vs Reactive Threat Hunting, Techniques and Strategies for Effective Threat Hunting, and Real-life Examples and Case Studies
  2. Incident Response: Frameworks, Phases, Incident Triage & Analysis, and developing an IRP.
  3. Vulnerability Analysis: Introduction, Vulnerability Scanning, Prioritization & Remediation, and Continuous Monitoring.
  4. Backup and Disaster Recovery: Introduction, Storage, Implementation, Planning, Testing, and IR Integration
  5. Fusion Cyber Inc. Apprenticeship Program: Program Structure and Curricumn, Hands-on Training and Practical Exercises, Mentorship and Learning Community, Mental Health in Cybersecurity, Success Stories from Program Graduates.
  6. Professional Development: Building a Career in Cybersecurity, Networking and Industry Involvement, Certifications and Continued Learning, Resume Building and Job Searching Tips
  7. Future of Security Operations: Emerging Trends in Cybersecurity, Evolving Role of Security Operations Specialists, and Continuous Learning and Adaptation.
  8. Prep for Red vs Blue Team Final Exam – Beta Testing – Red Team Challenges – Threat Hunter – Security Management – JR Penetration Tester – Data Backup – MITRE ATT&CK – Security Awareness
Scholarships are available

Contact us for a personalized discussion of your financing options, including partial scholarships, ISAs, federal financial aid, and veteran’s benefits.

ABOUT US

University of Kentucky + Fusion Cyber

University of Kentucky: Founded in 1865, the University of Kentucky is a public, land grant university dedicated to improving people’s lives through excellence in education, research and creative work, service and health care. As Kentucky’s flagship institution, the university plays a critical leadership role by promoting diversity, inclusion, economic development and human well-being. At the College of Engineering, we train students to solve monumental engineering challenges through rigorous programs and enriching experiences and partnerships with industry that lead to meaningful careers, and in an environment where students can cultivate curiosity. We are a community making the future better through engineering.

Fusion Cyber is comprised of leaders in online education and SaaS enterprise technologies used by over 100 million people worldwide, together with intelligence community veterans and cybersecurity practitioners. Our mission is to educate diverse groups of learners from varying backgrounds in cybersecurity, building a generational impact for their families while protecting businesses and our country. We are dedicated to helping our boot camp students achieve a successful and rewarding future.

Our Pedigree

Fusion Cyber’s alumni have secured positions in a diverse array of prestigious organizations, spanning both the public and private sectors. Our graduates have landed roles at leading tech companies like Google and Lockheed Martin, renowned educational institutions like MIT and George Mason University, and critical government agencies like the DoD, U.S. Navy, and US Army. 

Our CISO Board of Advisors is an elite group of industry leaders with specialized expertise across various sectors, from insurance and finance to health care to the DoD. Their collective knowledge and guidance ensure that Fusion Cyber’s training program remains at the cutting edge, providing students with the most relevant and impactful education in the cybersecurity field.

image jpg: CIA
image jpg: FDA
image jpg: L3
image jpg: NIST
image jpg: NSA
image jpg: airforce
image jpg: blackboard
image jpg: defense
image jpg: ey
image jpg: motorola
image jpg: presidium

LET’S ACCELERATE YOUR CAREER

The next boot camp starts January 27th, 2025.