Cybersecurity Foundations Bootcamp


Applied Cybersecurity Essentials (ACE) Bootcamp

Asynchronous hybrid format. 100% Online

  • Fintech CertificationPerformance-based Certificate Awarded by the National CyberWatch Center
  • fintech training12 Week Blended Program
  • blockchain training
  • Hybrid format (fully online course with opportunities for face-to-face tutoring in Philadelphia)

Starting September 11, 2019

Registration closes on September 4

In association with and taught by Casey O’Brien of National Cyberwatch:


The Applied Cybersecurity Essentials (ACE) bootcamp prepares students to sit for the CompTIA Security+ exam


Considering a move to the cybersecurity field? According to a recent Cybersecurity Ventures prediction, “there will be 3.5 million unfilled cybersecurity positions by 2021.” Cybersecurity hiring is growing due to a dramatic rise in cybercrime, new government regulation, and privacy concerns. 

Forecasts for cybersecurity growth have failed to keep pace with the dramatic rise in cybercrime and privacy concerns. 

The Cyberseek consortium notes that “Jobs that require cybersecurity knowledge take longer to fill. These jobs remain open for 79 days on an average – longer than almost any other IT skill.

The Allegro Applied Cybersecurity Essentials (ACE) Bootcamp is an effective way to jumpstart a move to the cybersecurity field.

Program Goals

  • To prepare students with the technical knowledge and skills needed to protect and defend computer systems and networks.
  • To develop graduates that can plan, implement, and monitor cyber security mechanisms to help ensure the protection of information technology assets.
  • To develop graduates that can identify, evaluate, and prioritize risks to organizations and create effective policies and procedures to migrate these risks.

Program Coverage

Module 1

Introduction to Information Security, Information Security Trends, Career Exploration, and Professional Certifications

  • Current and evolving threat landscape
  • Fundamental security concepts (e.g., Confidentiality, Integrity, Availability)

Module 2

Threats and Vulnerabilities

  • Social Engineering (SE)
  • Malicious Software (Malware)
  • Denial of Service (DoS)/ Distributed DoS
  • Software exploitation

Module 3

 Governance, Risk Management, and Compliance (GRC):

  • Risk assessment/analysis
  • Business Continuity Planning
  • Privacy
  • Legal (e.g., Criminal/Civil/Administrative law)

Module 4

Identity and Access Management 

  • Identification
  • Authentication
  • Authorization
  • Accountability

Module 5

Physical Security

  • Secure facility planning
  • Physical security access controls

Module 6

Security Engineering

  • Disaster Recovery (DR) planning/implementation
  • Secure network design
  • Secure application development

Module 7

 Fundamentals of Cryptography

  • Classic cryptographic techniques
  • Symmetric
  • Asymmetric
  • Hashing

Module 8

Public Key Infrastructure (PKI)

  • Key Management
  • Digital Certificates
  • Certificate Authorities (CAs)

Module 9

Security Testing

  • Tests
  • Assessments
  • Audits

Module 10

Security Operations

  • Categories of computer crime
  • Detection
  • Incident Management/Response

Competency-based personalized course content based on learner’s prior knowledge and skills

The Executive Format blends online learning with face to face sessions with the faculty.

Rather than passively receiving and reiterating information, you can take an active role in your education and contribute to your own learning. You can work with the faculty members to set learning goals for yourself, and can work toward them through blended learning by combining face-to-face online interaction with your faculty.

Each learner gets a customized course shell, or customized content based on their initial assessment that they take before the class starts. This allows us to personalize the course and helps the learner only focus on the material they need to master, instead of having to waste time with material they have already demonstrated they know.

Program Learning Outcomes

Upon completion of this course the student will be able to:

  • Apply what they learned directly to their work
  • Identify the goals of Information Security
  • Determine the factors involved in developing a secure Information Security strategy
  • Identify common attacks and describe how to safeguard against them
    Identify, evaluate, and prioritize risks to organizations
  • Create effective policies and the procedures to enforce them
    Differentiate between physical security, disaster recovery, and business continuity
  • Describe the basics of cryptography
  • Utilize network diagrams; and
    Demonstrate appropriate and ethical behavior and good work habits


About the Faculty


Casey has more than 20 years of industry experience in information security and large-scale IT implementation and project management in challenging and cutting edge computing environments that include both the public and private sectors.

As a scholarly practitioner, Casey continues to develop curriculum and teach numerous cybersecurity-related courses. Casey’s research interests include cybersecurity competition design and practice analysis; scalable and cost-effective information security laboratories; and agile and accelerated information security curriculum development. Casey also teaches internationally and is a frequent invited speaker at various conferences.

Attend an Information Session

Register to attend an upcoming information session

Contact a Program Counselor @ 717-674-4532  for more information.

How do you join?


There are limited seats for this batch and selection is based on review of your application and a telephone interview.


Wait for Selection

Pay Course Fee

Register for Courses

Batch Start

Seats are limited

Register to receive notice of the release of the online application.

Allegro Learning Solutions

Accredited by the Middle States Commission on Higher Education, Harrisburg University is known for their outstanding science and technology-focused degree programs. The institution fosters a diverse community of learners, provides access and support to students who want to pursue a career in science and technology and supports business creation and economic development.

National Cyberwatch

National Cyberwatch is a consortium of higher education institutions, businesses, and government agencies focused on collaborative efforts to advance Information Security education and strengthen the national cybersecurity workforce. It continues to update and create model Information Security curricula, which supports the growth of cybersecurity education.

Still have questions? Please refer to the ACS bootcamp FAQ section.