top of page

Bootcamp Structure

Class description: Cybersecurity is in demand growing cyber-attacks, demand for safe and secure data, and other concerns mean that companies need professionals to keep their information safe. The market for Cybersecurity professionals requires new entrants. Reports like those from Enterprise Strategy Group, who publishes an annual survey on the state of IT, show this quite clearly. In their 2022 report, they identified Cybersecurity as the area most in need of skilled personnel.


Artificial Intelligence & Cybersecurity Solutions helps to address the demand for entry-level cybersecurity Professionals that exceeds the supply of available Cybersecurity Professionals. AICS Solutions provides training that helps our students to become entry-level Cybersecurity Professionals.



Daily schedule: The 15-week Full -Time Cybersecurity program schedule operates Monday through Friday from 10:00 am to 5:00 pm or 20- week Part –Time from 6:00 pm  to 9:30 pm. All students must attend the program at AI &CS and sign-in and sign-out each day they are in the classroom. The nine hours are divided into three, three-hour segments: pair programming formative assessment task block, mentor intervention block for retouching and extensions, and whole group classroom direct instruction block.
The pair programming formative assessment task block places two students together to work on an assignment. This enhances the learning by forcing the two students to interact regarding the assignment they are mutually working on together. A teaching assistant is also available during this time to help student pairs with any problems they are experiencing. Students are rotated through different pairs throughout the program to enable everyone to work with each other as a team and experience different levels of diversity.
The teaching assistant intervention block for re-teaching and extensions allows students to schedule time with mentors or mentors may seek out students experiencing specific problems with specific concepts from either student feedback or observation of the student’s assignments and/or projects. This allows students to address problems as early as possible to help them keep place with the other students in the program.
Whole group classroom direct instruction block includes all lectures and videos on Cybersecurity techniques, Linux, Networking, Penetration Testing, and all other classroom components listed in the Skills.
Additionally, AICS provides a monthly speaker series. The speaker series brings in employers to talk about Cybersecurity at their companies and to answer questions that the students may have about the processes and daily routines for entry-level Cybersecurity analyst at their company. AICS also provides a monthly alumni speaker series.

All daily assignments are to be completed before class starts. Instructional components may begin with a quick question and answer session over the previous daily assignment and current weekly project. AICS can be used as a workspace any time between 9:00 am and 10:00 pm Monday-Friday for those looking to work on projects or assignments beforehand.


Learning Objectives:


To become properly prepared to perform the functions of a security analyst or security engineer, it will be necessary to develop requisite skills. These include Linux, Microsoft Windows Servers, Network, and Cyber Security, including a conceptual knowledge of Python, and PowerShell. The tiered approach to learning designed in this course will provide you with the opportunity to demonstrate a mastery of these skills.

At the conclusion of this program, you will be able to demonstrate the following knowledge, skills, and abilities to a minimum level of 80 percent proficiency.

Linux+ CompTIA

Linux (CompTIA Linux XK0-005)

Week 1: Linux  


  • Introduction to Cybersecurity Bootcamp

  • Lesson 1: Performing Basic Linux Tasks

  • Lesson 2: Managing Users and Groups

  • Lesson 3: Managing Permissions and Ownership

  • Lesson 4: Managing Storage

  • Lesson 5: Managing Files and Directories

  • Lesson 6: Managing Kernel Modules

  • Lesson 7: Managing the Linux Boot Process

  • Lesson 8: Managing System Components


Week 2: Linux (Continued)


  •  Lesson 9: Managing Devices

  •  Lesson 10: Managing Networking

  •  Lesson 11: Managing Packages and Software

  •  Lesson 12: Securing Linux Systems

  •  Lesson 13: Working with Bash Scripts

  •  Lesson 14: Automating Tasks

  •  Lesson 15: Installing Linux


Microsoft Windows Server 2019

Microsoft Windows Server 2019/2022

   Week 3: Microsoft Windows Server 2019/2022


  • Lesson 1: Getting started with Windows Server 2019

  • Lesson 2: Configuring Windows Server 2019

  • Lesson 3: Implementing Hyper-V and Automated Server Deployment

  • Lesson 4: Introduction to Active Directory and Account Management

  • Lesson 5: Configuring Resource Access

  • Lesson 6: Configuring Printing Services

  • Lesson 7: Configuring and Managing Data Storage

  • Lesson 8: Implementing Network Services



Week 4: Microsoft Windows Server 2019/2022 (Continued)


  • Lesson 9: Configuring Remote Access Services

  • Lesson 10: Configuring Cloud Features

  • Lesson 11: Securing Windows® Server 2019

  • Lesson 12: Monitoring and Troubleshooting Windows® Server 2019

  • Lesson 14: PowerShell Scripting Concepts

  • Windows Server Review

  • Windows Server Examination



Network+ CompTIA 

Network (CompTIA Network+ N10-008)

Week 5: Network  


  • Lesson 1: Explaining the OSI and TCP/IP Models

  • Lesson 2: Explaining Properties of Network Traffic

  • Lesson 3: Installing and Configuring Switched

  • Lesson 4: Configuring IP Networks

  • Lesson 5: Installing and Configuring Routed Networks

  • Lesson 6: Configuring and Monitoring Ports and

  • Lesson 7: Explaining Network Application and Storage Issues

  • Lesson 8: Monitoring and Troubleshooting



Week 6: Network (Continued)

  •  Lesson 9: Explaining Networking Attacks and Mitigations

  •  Lesson 10: Installing and Configuring Security Devices

  •  Lesson 11: Explaining Authentication and Access Controls

  •  Lesson 12: Deploying and Troubleshooting Cabling Solutions

  •  Lesson 13: Implementing and Troubleshooting

  •  Lesson 14: Comparing and Contrasting WAN Technologies

  •  Lesson 15: Using Remote Access Methods

  •  Lesson 16: Identifying Site Policies and Best Practices

  •  Network Design and Administration Review



Week 7: Network (Continued)

  •  Network Design and Administration Review

  •  Network Design and Administration Examination

Security+ CompTIA 

Security (CompTIA Security+ SY0-701)

Week 8: Security


  • Lesson 1: Comparing Security Role and Security Controls

  • Lesson 2: Explaining Threat Actors and Threat Intelligence

  • Lesson 3: Performing Security Assessments

  • Lesson 4: Identifying Social Engineering and Malware

  • Lesson 5: Summarizing Basic Cryptographic Concepts

  • Lesson 6: Implementing Public Key Infrastructure



Week 9: Security (Continued)


  • Lesson 7: Implementing Authentication Controls

  • Lesson 8: Implementing Identity and Account Management Controls

  • Lesson 9: Implementing Secure Network Designs

  • Lesson 10: Implementing Network Security Appliances

  • Lesson 11: Implementing Secure Network Protocols

  • Lesson 12: Implementing Host Security Solutions

  • Lesson 13: Implementing Secure Mobile Solutions

  • Lesson 14: Summarizing Secure Application Concepts



Week 10: Security (Continued)


  • Lesson 15: Implementing Secure Cloud Solutions

  • Lesson 16: Explaining Data Privacy and Protection Concepts

  • Lesson 17: Performing Incident Response

  • Lesson 18: Explaining Digital Forensics

  • Lesson 19: Summarizing Risk Management Concepts

  • Lesson 20: Implementing Cybersecurity Resilience

  • Lesson 21: Explaining Physical Security

  • Security Design and Administration Review


 Week 11: Security (Continued)


  • Security Design Review

  • Security Design Exam

Python Scripting 3.9

Python Scripting 3.9

Week 12: Python Scripting


  • Lesson 1: Introduction to Python

  • Lesson 2: Types, Objects, Values, and Variables

  • Lesson 3: Operators

  • Lesson 4: Storing Multiple Values in Collections

  • Lesson 5: Writing Python Scripts

  • Lesson 6: Making Choices

  • Lesson 7: Repeating Actions and Loops

  • Lesson 8: Using External Modules



Week 13: Python Scripting (Continued)


  • Lesson 9: Errors and Exceptions

  • Lesson 10: Creating Functions

  • Lesson 11: Reading in Tabular Data

  • Lesson 12: Producing Plots

  • Lesson 13: Analyzing Data from Multiple Files

  • Lesson 14: Filtering Data

  • Lesson 15: Tidying Up the Analysis

  • Lesson 16: Command-Line Programs

  • Python Scripting Review

 PowerShell Scripting 7.5.0

PowerShell Scripting

Week 14: PowerShell Scripting

  • Lesson 1:Course Overview

  • Lesson 2 Scripting Basic: Creating you First Script

  • Lesson 3 Enhancing Scrips with Paramenters

  • Lesson 4 Controlling Scrip Execution with Policies

  • Lesson 4 Introduction to Profiles in PowerShell

  • Lesson 5 Implementing Conditional logic

  • Lesson 6 Looping Constructs

Final Review and Examination

Week 15: Final Review and Examination

  • Security+ Review

  • Security Final Examination

  • Wrap Up

Cybersecurity Analytics Bootcamp

Learn the defensive and offensive cybersecurity skills you need to fight cybercrime and transform your career in 15 to 20 weeks.

AI & Cybersecurity Solutions Inc. is committed to providing our clients with top-of-the-line cybersecurity services and products that deliver real results. Our team has years of experience in the industry, and we stay ahead of emerging threats to better protect our clients. Our Cybersecurity Analytics Bootcamp provides comprehensive training in threat detection, forensics, intelligence analysis, and network security, equipping cybersecurity professionals with a skillset that is in high demand. Contact us today for more information on our cutting-edge AI cybersecurity solutions and training programs.

Cursos de formación
Inteligencia artificial 

IA y Cybersecurity Solutions Inc. es una empresa líder en inteligencia artificial y ciberseguridad comprometida a brindar soluciones efectivas e innovadoras que ayuden a los clientes a mantenerse a la vanguardia de las amenazas cibernéticas en constante evolución. Creemos firmemente que aplicando los últimos avances tecnológicos y las mejores prácticas en IA y ciberseguridad, podemos hacer del mundo un lugar más seguro. Nuestro equipo de expertos se dedica a desarrollar algoritmos de IA de código abierto que ayuden a nuestros clientes a alcanzar sus objetivos de manera más eficiente y con mayor precisión.

bottom of page