Education voucher at hand? Step into the fast lane: Contact us

Contact us
DE|EN

Your bootcamp

Cyber Security Bootcamp

Next seat available

Mar 23, 2026
Want to learn Cyber Security? Perfect! Learn about networks, IT security, cryptography, and access management, and secure Windows, macOS, and Linux. Proven and tested by the best – our training program is used by IBM and Red Hat for their teams.
Get startedGoogle rating 4.6
100%
funding available
100% funding available
Man smiling while using a laptop
18
different programs
70%
Labour market integration
7K+
> 7k alumni
10+
Years of experience

All content at a glance

Keyfacts

  • Full-Time: 16 weeks (Mo – Fr, 09.00am – 6.30pm)
  • Participants: approx. 15
  • Coaches: 2 per bootcamp
  • Location: Remote (live online)
  • Course language: English
  • Completion: Certificates CySA+, CompTIA Security +,CompTIA A+
  • Future job: Cybersecurity Analyst, Network Security Engineer, Security Operations Center (SOC) Analyst
  • Expected Salary: 60.000€ - 90.000€
  • 100% financing: for unemployed & job seekers

Tech Stack

CompTIA
Linux/macOS
CySA+

Download tech stacks

Become a Cyber Security Expert - at the neue fische bootcamp

Stop watching the news. Start securing the infrastructure. The demand for Cyber Security professionals is critical - and growing. At neue fische, we offer a highly specialized program that takes you from the fundamentals of IT to the analysis, defense, and mitigation of cyber threats, giving you a future-proof career with high impact. You have the determination to master complex challenges; we have the structured path to an essential role. This program provides comprehensive, expert-led training designed for everyone ready to secure a high-demand, high-stability career.

Hands-On Cyber Security Training for Job-Ready Re-Skillers

This 16-week program is built on practical application and industry relevance. We prioritize the "How will I use this on the job?" question.

➡️ Real-world application: You will work on real-world projects, receive personalized feedback, and master tools and methodologies that are in high demand across the IT security industry

➡️ A powerful portfolio: Through your Capstone project, you will build a strong portfolio that captures the attention of top employers, acting as clear, external validation of your new competence.

➡️ Career launchpad: With career coaching, portfolio tips, and targeted application support, you will be fully prepared to launch a successful career in cybersecurity. Our career services are focused on coaching you on how to leverage your professional maturity as a strength.

Why Cyber Security?

Cyber Security skills are a strategic investment, offering exceptional career stability and the chance to work on challenging, high-stakes projects. It’s a great choice for tech professionals looking for a lateral move, academics looking to put their strong problem solving skills to practical use, and even early-career entrants who want a strong basis for succeeding in a crowded tech junior market.




Our partner companies

Starting dates

The next dates: Cyber Security Bootcamp

Mar
23rd Mar24th Jul ‘26

Full-Time

Remote

English

Secure seat

Curriculum

This is what you learn in our Cyber Security Bootcamp

Learn the fundamentals of IT security.

In the first phase of the boot camp, participants acquire basic knowledge in the field of IT and IT security. They learn about the central components of computer systems, how to set up and use workstations, and are introduced to the administration of operating systems. In addition, they deal with troubleshooting methods, basic data types, and the interaction of applications and IT systems. Another focus is on file systems, device interfaces, and the configuration of input devices. In addition, important interdisciplinary skills such as structured problem solving, independent work, and presentation skills are specifically developed. The content is taught in a practical workshop format that focuses on hands-on exercises and enables direct transfer into application.

Expand your IT knowledge and advance your skills.

In the second phase, participants deepen their IT fundamentals and at the same time build a solid foundation in cloud computing. They expand their technical understanding of key IT components such as cable types, power supplies, and storage solutions, as well as RAM, CPUs, and basic BIOS and UEFI configurations. Another focus is on the basics of network technology, including TCP/IP, router configuration, and systematic network troubleshooting. As the course progresses, the focus shifts to IT hardware, virtualization, and basic cloud concepts. In addition, participants learn about mobile devices, configuring peripherals, installing laptops, and troubleshooting printers. In the final phase, they prepare specifically for the CompTIA A+ Core 1 certification and review key content from the areas of hardware, networking, and IT security. In addition, they develop a basic understanding of cloud services and environments, shared security responsibilities, and the differences between cloud and on-premise systems, always with a clear focus on security awareness and best practices.m.

Expand your security knowledge and strengthen your networking skills.

In the third phase, participants deepen their knowledge of network technology and specifically expand their IT security skills. They deal with key network fundamentals such as the OSI model, network interfaces, Ethernet switching, and IPv4 addressing. Building on this, they learn to systematically analyze and troubleshoot IP-based networks, including through port scanning, the use of DHCP, and name resolution procedures. Another focus is on secure communication and authentication methods and understanding multi-level switch architectures. In addition, participants will take an in-depth look at wireless networks, remote access solutions, and network hardening measures. At the same time, they will further consolidate their understanding of cloud services and cloud environments, particularly with regard to shared security responsibilities and a strong awareness of security when dealing with networked systems.

Tauche tief in die Sicherheitsanalyse ein.

In the fourth phase, participants delve deeply into the analysis of IT security and the fundamentals of governance, risk, and compliance (GRC). They gain a thorough understanding of key security concepts, including threat actors, cryptographic methods, risk management, authentication mechanisms, and incident response processes. Building on this, there is a special focus on threat detection and analysis, including malware, network attacks, and basic penetration testing methods. In the final phase, participants prepare specifically for the Security+ certification, review exam-relevant content, and practice with practical exercises. In addition, they learn the basics of security risk assessment, become familiar with the key requirements of ISO 27001, and explore policy-based security management. The continuous improvement process is taught using the PDCA cycle, and the relationship between technical IT security, business requirements, and regulatory requirements is clearly explained.

Continue exploring Security Analysis and prepare for the CySA+ exam.

In the fifth phase, participants expand their skills in security analysis and prepare specifically for the CySA+ certification exam. The focus is on analyzing threat actors, identifying vulnerabilities, professional incident response processes, and continuous network security monitoring. Building on this, they learn how to perform vulnerability scans in web, application, and cloud environments and apply their knowledge in practical incident response workshops and hands-on projects. Participants then deepen their understanding of vulnerability exploitation, scripting for automating security-related processes, and structured risk analysis. In addition, topics such as endpoint security, malware analysis, secure coding, and the basic principles of ethical hacking are also covered. The final phase involves intensive preparation for the CySA+ exam, including vulnerability management, risk assessment, and targeted exam simulations to ensure optimal exam readiness by the exam date.

Final Capstone Project focused on Technical Documentation, Security Assessments, and Remediation Plans.

In the final phase, participants apply the knowledge they have acquired in the boot camp in a comprehensive final project with a practical focus. The focus is on creating technical documentation, performing structured security analyses, and developing well-founded action plans to remedy identified vulnerabilities. The project work is continuously developed through trial presentations, targeted feedback, and iterative revisions. The program concludes with a final capstone presentation in which the results are compiled and presented. With this last step, participants demonstrate their technical, methodological, and communication skills and successfully complete the program.

Refer us and get 500€ !

Simple and affordable

Education must be affordable. Check out all the financing options now.

Education voucher
Agentur für Arbeit

Pay directly
No problem

Payment by the employer
Re- & Upskilling

To the education voucher
Two people working together on a laptop in an office.

These steps are important to take the course

Whether you have dropped out of university, are on short-time work, are threatened with unemployment or have lost your job, your time will be well spent if you become more digital. Please note that the process of getting an education voucher from the employment agency can take a relatively long time. We therefore advise you to follow the procedure below.
Step 1

Register as a jobseeker early

In order to receive your education voucher for your retraining from the employment agency, the Jobcenter or the Labour Office, you should register as a jobseeker at an early stage. It is therefore very important that you first make an appointment with the relevant office. It's best to do it now!

Step 2

Get your educational offer from us

The next step on the way to your IT training voucher is quick and easy: Contact us! We will create an official training offer for you that you can then submit to the employment agency, the Jobcenter or the employment office.

Step 3

Apply for the training voucher

Now it's down to the nitty-gritty: With the training offer we have created, you now go back to your responsible office and apply for your training voucher. As soon as it is approved, you can start your new career with us. We look forward to seeing you!

FAQ

Really good questions, helpful answers

You still have questions about the training, the prices, the financing, etc.? Then take a look here or contact us directly.

It's designed for all entry levels. There're no diploma or technical prerequisites required for this course, whatsoever.

Your skills will be assessed through a combination of activities. Such include individual quizzes that are automatically graded on our learning platform, a final capstone project evaluated by a coach, and oral presentations covering both technical and non-technical topics.

Our bootcamp is perfect for anyone interested in Cyber Security, regardless of their background. Whether you're a beginner or looking to switch careers, you'll learn the fundamentals of IT security and how to protect against digital threats. No prior knowledge required – we’ll teach you everything from Security Analysis to practical measures against cyberattacks.

The following additional tools are available for your training: 

  • Instant messaging to communicate with the coach and the rest of your cohort 

  • A videoconferencing tool to join the various mentoring sessions

In a world where digital threats are constantly evolving, Cyber Security is more critical than ever. Companies across all industries face the challenge of protecting their data and systems from cyberattacks – and they need experts to help them do it. The demand for IT security professionals is skyrocketing as cyber threats become more sophisticated.

By investing in a Cyber Security Bootcamp, you're not only enhancing your skills but also securing a future-proof career in a rapidly growing field. Simply put? Cyber Security specialists are in higher demand than ever.

For example, you can get started in the following jobs: Cybersecurity Analyst, Network Security Engineer, Security Operations Center (SOC) Analyst.


Our Students Say

Do not miss out.
Subscribe to our newsletter.

I would like to receive email updates from neue fische. This decision can be revoked at any time. Information on how we handle your data can be found in our privacy note.