
Education voucher at hand? Step into the fast lane: Contact us
Contact usYour bootcamp
Cyber Security Bootcamp
Next seat available


All content at a glance
Keyfacts
- Full-Time: 16 weeks (Mo – Fr, 09.00am – 6.30pm)
- Participants: approx. 15
- Coaches: 2 per bootcamp
- Location: Remote (live online)
- Course language: English
- Completion: Certificates CySA+, CompTIA Security +,CompTIA A+
- Future job: Cybersecurity Analyst, Network Security Engineer, Security Operations Center (SOC) Analyst
- Expected Salary: 60.000€ - 90.000€
- 100% financing: for unemployed & job seekers
Tech Stack
Download tech stacks
Become a Cyber Security Expert - at the neue fische bootcamp
Stop watching the news. Start securing the infrastructure. The demand for Cyber Security professionals is critical - and growing. At neue fische, we offer a highly specialized program that takes you from the fundamentals of IT to the analysis, defense, and mitigation of cyber threats, giving you a future-proof career with high impact. You have the determination to master complex challenges; we have the structured path to an essential role. This program provides comprehensive, expert-led training designed for everyone ready to secure a high-demand, high-stability career.
Hands-On Cyber Security Training for Job-Ready Re-Skillers
This 16-week program is built on practical application and industry relevance. We prioritize the "How will I use this on the job?" question.
➡️ Real-world application: You will work on real-world projects, receive personalized feedback, and master tools and methodologies that are in high demand across the IT security industry
➡️ A powerful portfolio: Through your Capstone project, you will build a strong portfolio that captures the attention of top employers, acting as clear, external validation of your new competence.
➡️ Career launchpad: With career coaching, portfolio tips, and targeted application support, you will be fully prepared to launch a successful career in cybersecurity. Our career services are focused on coaching you on how to leverage your professional maturity as a strength.
Why Cyber Security?
Cyber Security skills are a strategic investment, offering exceptional career stability and the chance to work on challenging, high-stakes projects. It’s a great choice for tech professionals looking for a lateral move, academics looking to put their strong problem solving skills to practical use, and even early-career entrants who want a strong basis for succeeding in a crowded tech junior market.
Our partner companies
Starting dates
The next dates: Cyber Security Bootcamp
Mar | 23rd Mar – 24th Jul ‘26 | Full-Time | Remote | English | Secure seat |
|---|
Curriculum
This is what you learn in our Cyber Security Bootcamp
Learn the fundamentals of IT security.
In the first phase of the boot camp, participants acquire basic knowledge in the field of IT and IT security. They learn about the central components of computer systems, how to set up and use workstations, and are introduced to the administration of operating systems. In addition, they deal with troubleshooting methods, basic data types, and the interaction of applications and IT systems. Another focus is on file systems, device interfaces, and the configuration of input devices. In addition, important interdisciplinary skills such as structured problem solving, independent work, and presentation skills are specifically developed. The content is taught in a practical workshop format that focuses on hands-on exercises and enables direct transfer into application.
Expand your IT knowledge and advance your skills.
In the second phase, participants deepen their IT fundamentals and at the same time build a solid foundation in cloud computing. They expand their technical understanding of key IT components such as cable types, power supplies, and storage solutions, as well as RAM, CPUs, and basic BIOS and UEFI configurations. Another focus is on the basics of network technology, including TCP/IP, router configuration, and systematic network troubleshooting. As the course progresses, the focus shifts to IT hardware, virtualization, and basic cloud concepts. In addition, participants learn about mobile devices, configuring peripherals, installing laptops, and troubleshooting printers. In the final phase, they prepare specifically for the CompTIA A+ Core 1 certification and review key content from the areas of hardware, networking, and IT security. In addition, they develop a basic understanding of cloud services and environments, shared security responsibilities, and the differences between cloud and on-premise systems, always with a clear focus on security awareness and best practices.m.
Expand your security knowledge and strengthen your networking skills.
In the third phase, participants deepen their knowledge of network technology and specifically expand their IT security skills. They deal with key network fundamentals such as the OSI model, network interfaces, Ethernet switching, and IPv4 addressing. Building on this, they learn to systematically analyze and troubleshoot IP-based networks, including through port scanning, the use of DHCP, and name resolution procedures. Another focus is on secure communication and authentication methods and understanding multi-level switch architectures. In addition, participants will take an in-depth look at wireless networks, remote access solutions, and network hardening measures. At the same time, they will further consolidate their understanding of cloud services and cloud environments, particularly with regard to shared security responsibilities and a strong awareness of security when dealing with networked systems.
Tauche tief in die Sicherheitsanalyse ein.
In the fourth phase, participants delve deeply into the analysis of IT security and the fundamentals of governance, risk, and compliance (GRC). They gain a thorough understanding of key security concepts, including threat actors, cryptographic methods, risk management, authentication mechanisms, and incident response processes. Building on this, there is a special focus on threat detection and analysis, including malware, network attacks, and basic penetration testing methods. In the final phase, participants prepare specifically for the Security+ certification, review exam-relevant content, and practice with practical exercises. In addition, they learn the basics of security risk assessment, become familiar with the key requirements of ISO 27001, and explore policy-based security management. The continuous improvement process is taught using the PDCA cycle, and the relationship between technical IT security, business requirements, and regulatory requirements is clearly explained.
Continue exploring Security Analysis and prepare for the CySA+ exam.
In the fifth phase, participants expand their skills in security analysis and prepare specifically for the CySA+ certification exam. The focus is on analyzing threat actors, identifying vulnerabilities, professional incident response processes, and continuous network security monitoring. Building on this, they learn how to perform vulnerability scans in web, application, and cloud environments and apply their knowledge in practical incident response workshops and hands-on projects. Participants then deepen their understanding of vulnerability exploitation, scripting for automating security-related processes, and structured risk analysis. In addition, topics such as endpoint security, malware analysis, secure coding, and the basic principles of ethical hacking are also covered. The final phase involves intensive preparation for the CySA+ exam, including vulnerability management, risk assessment, and targeted exam simulations to ensure optimal exam readiness by the exam date.
Final Capstone Project focused on Technical Documentation, Security Assessments, and Remediation Plans.
In the final phase, participants apply the knowledge they have acquired in the boot camp in a comprehensive final project with a practical focus. The focus is on creating technical documentation, performing structured security analyses, and developing well-founded action plans to remedy identified vulnerabilities. The project work is continuously developed through trial presentations, targeted feedback, and iterative revisions. The program concludes with a final capstone presentation in which the results are compiled and presented. With this last step, participants demonstrate their technical, methodological, and communication skills and successfully complete the program.
Simple and affordable
Education must be affordable. Check out all the financing options now.

These steps are important to take the course
Register as a jobseeker early
In order to receive your education voucher for your retraining from the employment agency, the Jobcenter or the Labour Office, you should register as a jobseeker at an early stage. It is therefore very important that you first make an appointment with the relevant office. It's best to do it now!
Get your educational offer from us
The next step on the way to your IT training voucher is quick and easy: Contact us! We will create an official training offer for you that you can then submit to the employment agency, the Jobcenter or the employment office.
Apply for the training voucher
Now it's down to the nitty-gritty: With the training offer we have created, you now go back to your responsible office and apply for your training voucher. As soon as it is approved, you can start your new career with us. We look forward to seeing you!
FAQ
Really good questions, helpful answers
It's designed for all entry levels. There're no diploma or technical prerequisites required for this course, whatsoever.
Your skills will be assessed through a combination of activities. Such include individual quizzes that are automatically graded on our learning platform, a final capstone project evaluated by a coach, and oral presentations covering both technical and non-technical topics.
Our bootcamp is perfect for anyone interested in Cyber Security, regardless of their background. Whether you're a beginner or looking to switch careers, you'll learn the fundamentals of IT security and how to protect against digital threats. No prior knowledge required – we’ll teach you everything from Security Analysis to practical measures against cyberattacks.
The following additional tools are available for your training:
Instant messaging to communicate with the coach and the rest of your cohort
A videoconferencing tool to join the various mentoring sessions
In a world where digital threats are constantly evolving, Cyber Security is more critical than ever. Companies across all industries face the challenge of protecting their data and systems from cyberattacks – and they need experts to help them do it. The demand for IT security professionals is skyrocketing as cyber threats become more sophisticated.
By investing in a Cyber Security Bootcamp, you're not only enhancing your skills but also securing a future-proof career in a rapidly growing field. Simply put? Cyber Security specialists are in higher demand than ever.
For example, you can get started in the following jobs: Cybersecurity Analyst, Network Security Engineer, Security Operations Center (SOC) Analyst.

