script type="text/javascript"> _linkedin_data_partner_id = "29129";

A free, 7-week cybersecurity training, certification, and job placement program

in Washington, DC, attracting the brightest technical talent in the country.

Each quarter, just 10-15 are selected from hundreds of applicants.

Hire one of our operatives or join our next training operation.

CURRICULUM

OUR SERVICES

GETTING IN

HackEd logo

 THE PROGRAM

Situated in our nation’s Capital, HackEd is a 7 week, hands-on-keyboard cybersecurity training, certification, and job placement program.  And it’s free to participants.  There is no tuition.  HackEd has become very competitive, with over 700 applicants for just 10 spots in our Spring cohort.  (1.4% admissions rate).

 

We identify technical professionals with 90% of the necessary hands on and soft skills and provide them the final 10% required for successful careers in cybersecurity.  We then help our participants earn industry-recognized certifications and introduce them to employers who are hiring cybersecurity talent.  Our goal is to graduate well-rounded security professionals who are trained and ready to make an immediate impact in their new jobs.  HackEd has set aside one third of the spots in each operation for qualified women, minorities, and veterans of the Armed Forces.

 

We invite our employer partners to recruit from our program and we support them with the sourcing, vetting, training, and certifications, allowing them focus on the interviewing and hiring. Our aim is to provide our hiring partners with job-ready candidates who are trained to secure a company network from day one.

Work with your peers in a stimulating environment as you prepare for your next career move.

Learn from industry professionals and develop a comprehensive view of the cybersecurity field.

Showcase your skills to hiring managers and grow your professional network.

Enhance your technical skills and reach professional development milestones.

Collaborate with other professionals from diverse backgrounds and disciplines.

YOUR EXPERIENCE

This is not a comfortable academic program.  This is not online learning.  This is not a course on cybersecurity policy.  This is an immersive, hands-on-keyboard training operation, where you will start to develop new skills on our proprietary corporate network on Day One.

 

Each quarterly training operation is divided into seven week-long modules.  During the first half of the course, you will focus on offense, and then turn to defense during the second half.  The course culminates in a Capture-the-Flag competition in which participants attack and defend simultaneously.  Each quarter, our curriculum is updated and a new Operation is developed.

 

You are encouraged to pursue certifications at the 2-week (Security+), 5-week (Certified Ethical Hacker), and 7-week mark (Offensive Security Certified Professional).  During the program, you will develop and write your own tools, contribute to your own Github repositories, and participate in different bug bounty programs.

 

Spring Cohort, 2017

OUR CURRICULUM

Our curriculum is developed by Tyrone Wilson, Bud Roth, Daniel Ross, Rachel Winchester, and Peter Kim, author of “The Hacker Playbook” series.  Peter and Tyrone are talented penetration testers with a passion for teaching, Rachel is a creative game designer with an Intelligence background, and Dan and Bud are experts in cryptography and reverse engineering.

 

Our curriculum is gamified and you will train as an ‘operative’ on one of our training operations.  These operations are modeled after recent hacks in the news, and you will work on teams to find solutions.  Our games are designed to introduce real-world scenarios, promote team building, develop hands-on-keyboard experience, and keep you on your toes and thinking outside of the box.  Each operation is different and may incorporate elements of corporate espionage, cyber war, national security, political intrigue, and more.  One operation, ‘Comrade Enigma,’ is based on the Sony Pictures hack of 2014.

 

GETTING IN

Are you interested in hacking, reversing malware, forensics, or incident response, but don't know how to turn this passion into a career?  Security professionals come from all walks of life.  Some have college degrees, and many are self-taught.  Regardless of your education and background, there is a place for you here. We are looking for candidates with most of the following attributes:

You may apply to any or all of our upcoming sessions by clicking on the link below.  The deadline to apply to our Summer Session (June 5th - July 21st) is May 1st, and decisions will be issued on May 5th.  The deadline to apply to our Fall session (September 5th - October 20th) is August 1st, and decisions will be issued on August 5th. Apply today. And if you don’t get in this time, we’ll keep your info stored so that it’s easy to apply next time.  Good luck!

 

Note: You must be ready to look for a new job from among our hiring partners, and most openings are based on the East coast.  On the application, you can indicate your geographic preferences. If you are not interested in finding a new job, or you are a foreign national or international student without US work authorization, you are not eligible for the free training program.  However, you may take advantage of our additional course offerings and webinars. Email us at info@hackeducate.com for details.

 

FAQ

  • WHERE IS THE PROGRAM LOCATED?

    The program is taught in a modern space overlooking the Potomac at 1776, in Arlington, Virginia, minutes from Washington, DC.  Lunch is cooked on the premises and provided twice weekly.  1776 right near the Crystal City metro station, which is served by the Blue and Yellow lines.  Parking is available in the building.  Check out 1776 at  www.1776.vc

  • WHERE CAN I STAY?

    You are welcome to find your own accommodation with friends, family, AirBnb, Homeaway, or in another short-term rental.  We have negotiated a nightly rate with a nearby modern hotel in the range of $79/night single or $150/night shared.  Upon acceptance, let us know if you would like to consider this option. We can also facilitate a roommate match with other students if desired.

  • IS THIS A FULL TIME PROGRAM? WHAT ARE THE HOURS?

    This is a full-time intensive, in-person, hands-on-keyboard program.  We teach from 8.30-12.30 and then work in our labs in the afternoon.  You will have 24/7 access to our space. This is not a part-time or nights/weekends program.  You will not be able to hold a job while attending our course.

  • WHY DC?

    DC has more cybersecurity talent and resources than any other city in the world.

     

  • WHEN WILL I LEARN IF I'VE GOTTEN INTO THE PROGRAM?

    Decisions are issued one month before the start of the training operation.

     

  • I DIDN'T GET IN.  CAN I RE-APPLY?

    Certainly.  You may apply as many times as you like.

  • HOW OFTEN WILL YOU RUN THIS SEVEN WEEK PROGRAM A YEAR?

    We run 4 training operations per year.  Our next session will be held in from June 5th - July 21st and September 5th - October 20th The deadlines to apply for these sessions are May 1st and August 1st, respectively.  Follow us on Twitter (@hackeducate) for updates on dates, deadlines, etc.

     

WHY ATTEND?

If you are able to get into the program, and you’re willing to spend 7 weeks with us, you’ll leave here able and ready to enter an organization and secure the network from Day One.  You’ll grow your professional network and make new friends.  You’ll learn how to break things. You’ll capture a bunch of flags. You’ll leave here ready for a career in cybersecurity.

 

We invest in you, and our hiring partners invest in us if they hire from the program. While you’re with us, you’ll gain exposure to a variety of companies that are interested in hiring people like you.  You’ll also hear from industry professionals who will tell you what to expect in your first new security job.  You’ll also be part of a talented and growing alumni group.

 

We don’t care if you’re 18 or 65, whether you went to college or not, and most employers in this field don’t either.  They want to see that you have the skills for the job.  Apply now by clicking on the link below.  See you in DC.

 

 

 

 

 

 

 

 

OUR SERVICES

Hire from the program

Are you tired of headhunting and ready to find fresh talent? Save money and time by letting us handle the labor-intensive sourcing, technical vetting, training, and industry certifications on your behalf.  We admit just 1-2% of applicants and train them to be job-ready from Day One.

Dedicated Pipeline Development

Do you have many cybersecurity openings?  Let HackEd identify and screen candidates based on your requirements, and then put candidates through a custom track with a curriculum tailored to your company's needs.  By shifting the labor-intensive marketing/vetting/training process to us, this is a low-impact opportunity to make 10-20 job-ready hires each quarter with candidates not currently in your pipeline.

Recruiting & Staffing

Recruiting for top talent?  Contact us to discuss your requirements and let us conduct a search for candidates in our applicant pool and in our wider network and community.  Our recruiting team will perform the sourcing and screening and our technical team will handle the preliminary technical vetting.  Our process sets you up for strong interviews and a quicker time-to-hire.

LEADERSHIP

HackEd is committed to providing the best possible learning experience to our students and a new and creative recruiting approach to our hiring partners.

JON FERRIS

CEO



Jon is focused on providing the best possible experience to both program participants and hiring partners alike. Prior to this, Jon co-founded The Data Incubator, a successful data science training program.  He managed the company’s expansion and built a talented partnerships team that attracted over 250 hiring partners.  Program alumni now work for top companies around the world.

PETER KIM

TECHNOLOGY



Author of “The Hacker Playbook” series.  Peter has worked as a penetration tester and incident responder for the utility, entertainment, financial, and government sectors.”  He is passionate about teaching and runs LETHAL, one of the country's largest ethical hacker meetup groups.

 

TYRONE WILSON

SECURITY/LEARNING



Tyrone E. Wilson is an Information Security professional with over 20 years of experience in Information Technology. As an information systems analyst for the Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Wilson is also the organizer of the world’s largest cybersecurity meetup group, “D.C. Cyber Security Professionals,” with over 3500 professionals. Tyrone is passionate about teaching and helping people transition into the Industry.

JASON CHEN

STRATEGY



Jason is a business strategy consultant, investor, and serial entrepreneur with a passion for companies with a social mission. He is also a Entrepreneur-in-Residence at Techstars and Director for their Startup Next DC program that is supporting early-stage cyber security companies.

Julie Mosallem

PARTNERSHIPS



Julie is focused on establishing and supporting our partnerships with employers and with our community.  She has a background in IT analysis and recruiting, and she possesses a passion for learning new technologies and tools.  Julie is excited to be blazing the trail for aspiring cybersecurity talent.

RACHEL WINCHESTER

CURRICULUM

Rachel Winchester has worked for and with the US Intelligence Community for 18 years, where she is an innovation expert and a futurist. She has served in multiple overseas posts in positions ranging from support to counter-terrorism. Rachel’s current work applies training, facilitation, narrative, and game design to intelligence. She writes for the Center for the Study of Intelligence and her blog on hacking is the second most popular blog on the IC's secure network. Rachel is behind the gamification of HackEd’s curriculum.

TOBIAS MCCURRY

CURRICULUM

Tobias Mccurry is a top penetration tester, with over over 15 years’ experience in different areas of IT. Tobias specializes in identifying vulnerabilities that have been previously unidentified. He works to lower client risk by evaluating and mitigating critical vulnerabilities. Tobias has published in the SANS Reading Room, Hacker Academy, and the Infosec Institute. He holds a B.S in Computer Science and is pursuing Master of Science in Information Security Engineering with SANS. He maintains multiple industry certifications.

Bud Roth

CURRICULUM

Bud is a senior leader with security clearance and 25 years' experience with the SEC, DOD, and Deloitte.  He is also fluent in Japanese and holds a black belt in Judo.

Daniel Ross

CURRICULUM

Dan is a PhD mathematician with engineering experience at Google.  He has experience with machine learning and cryptography, and is most passionate about exploit development.



KATIE STEFANICH

PARTNERSHIPS



Katie is  passionate about stopping evolving cyber threats from thwarting innovation. She has experience in conducting cybersecurity maturity assessments and authoring enterprise-wide incident management strategies. Katie also has extensive experience with startups through Startup Weekend, Techstars, and Booz Allen Hamilton’s Strategic Innovation Group.

NICOLE SHADOWEN

COMMUNITY

Nicole Shadowen is a technical solutions architect by training, and has worked with startups in San Francisco, Washington, D.C. and New York City. Nicole is pursuing her M.S. in Digital Forensics and Cybersecurity at John Jay College, earned her B.S. in psychology from the University of Virginia. She is passionate about bringing new people into the industry, especially women and minorities.

NICK MORPUS

SOCIAL MEDIA

Nick is a digital markets analyst, social media strategist, and visual design consultant. He has a background in politics, economics, and journalism, but decided to apply his creative passions and marketing skills to building up the tech industry.

Jonathan Benjamin

COMMUNITY

As HackEd’s Community Manager, Jonathan is focused on ensuring everything runs smoothly. Jonathan developed a passion for cybersecurity while pursuing his degrees in psychology and criminology, and he has furthered this interest with certificates in terrorism and cybersecurity. He has worked as a cybersecurity analyst for Deloitte.

Workforce Development & Training

Are you looking for ways to reward and retain your existing cybersecurity team?  Help keep your team up-to-date with industry best practices and ensure your current infrastructure is in good hands.  Our hands-on-keyboard training can be delivered as a seven-week intensive, or in week-long modules.  Our content is customizable and can be delivered onsite, offsite, or remotely.  Our training is entirely skills-oriented and participants work in Sentinel™, our proprietary lab environment.

 

Curriculum Licensing

Is your school, company, or organization looking for curriculum to teach your members?  It is expensive and labor-intensive to develop and maintain a corporate network that is riddled with vulnerabilities.  By licensing our curriculum and our proprietary Sentinel™ lab environment, your program can be up and running quickly.  As a cloud-based managed service, we handle the updates and maintenance so that you can focus on teaching.

 

HIRE NOW

PRESS INQUIRIES

 

CONTACT US

 

COPYRIGHT © 2016 HackEd, ALL RIGHTS RESERVED

  • Hire from the Program

    Are you hiring cybersecurity talent? Are you having difficulty filling your open positions? Recruit from our program. We understand it's difficult to find, screen, hire, and train cyber security specialists, and our program is designed with you in mind. How does it work?

    It’s free to get started, and there are many ways to recruit from our program. Our program offers you a unique way to interact with candidates before deciding whether to interview them or not. You’ll be able to review resumes, meet our students, examine their code, assign us a pen test, attend our happy hours, speak to the classroom, send a team to our Capture-the-Flag competition, assign us a project, host our students onsite, and conduct interviews. There’s only a fee if you find the right candidate and hire from the program.

  • Creating dedicated talent pipeline from my company

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus sollicitudin interdum mauris sed sollicitudin. Morbi in viverra massa. Pellentesque nec lectus et leo ultrices ultricies. Nunc ut leo non erat tincidunt laoreet. Morbi ut justo eros. Morbi quis blandit dui, eu rhoncus risus. Nulla arcu elit, finibus eu orci a, vulputate semper lacus.

     

  • Recruiting / Staffing Services

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus sollicitudin interdum mauris sed sollicitudin. Morbi in viverra massa. Pellentesque nec lectus et leo ultrices ultricies. Nunc ut leo non erat tincidunt laoreet. Morbi ut justo eros. Morbi quis blandit dui, eu rhoncus risus. Nulla arcu elit, finibus eu orci a, vulputate semper lacus.

     

  • Corporate Training

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus sollicitudin interdum mauris sed sollicitudin. Morbi in viverra massa. Pellentesque nec lectus et leo ultrices ultricies. Nunc ut leo non erat tincidunt laoreet. Morbi ut justo eros. Morbi quis blandit dui, eu rhoncus risus. Nulla arcu elit, finibus eu orci a, vulputate semper lacus.

     

  • Curriculum Licensing

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus sollicitudin interdum mauris sed sollicitudin. Morbi in viverra massa. Pellentesque nec lectus et leo ultrices ultricies. Nunc ut leo non erat tincidunt laoreet. Morbi ut justo eros. Morbi quis blandit dui, eu rhoncus risus. Nulla arcu elit, finibus eu orci a, vulputate semper lacus.

     









Are you hiring cybersecurity talent?  Are you having difficulty filling your open positions?  Recruit from our program.  We understand it's difficult to find, screen, hire, and train cyber security specialists, and our program is designed with you in mind.  How does it work?

 

It’s free to get started, and there are many ways to recruit from our program.  Our program offers you a unique way to interact with candidates before deciding whether to interview them or not.  You’ll be able to review resumes, meet our students, examine their code, assign us a pen test, attend our happy hours, speak to the classroom, send a team to our Capture-the-Flag competition, assign us a project, host our students onsite, and conduct interviews.  There’s only a fee if you find the right candidate and hire from the program.

 

Here are some of the benefits of participating in our program: