script type="text/javascript"> _linkedin_data_partner_id = "29129";

A free, 7-week cybersecurity training, certification, and job placement program

in Washington, DC, attracting the brightest technical talent in the country.

Hire one of our operatives or join our next training operation.

Hackers:

Take The Robots

Puzzle Challenge!

Play Now

HackEd logo

Send Me Info On:

Submitting Form...

 

Thank you

Apply Now

 THE PROGRAM

Situated in our nation’s Capital, HackEd is a 7 week, hands-on-keyboard cybersecurity training, certification, and job placement program.  And it’s free.  There is no tuition.  Our curriculum is gamified and our ‘operatives’ work on teams in a training operation.

 

We identify technical professionals with 90% of the necessary IT and communication skills and provide them the final 10% required for successful careers in cybersecurity.  We then help our participants earn industry-recognized certifications and introduce them to employers who are hiring cybersecurity talent.  Our goal is to graduate well-rounded security professionals who are trained and ready to make an immediate impact in their new jobs.  HackEd has set aside one third of the spots in each operation for qualified women, minorities, and veterans of the Armed Forces.

 

We invite our employer partners to recruit from our program and we support them with the sourcing, vetting, training, and certifications, letting them focus on the interviewing and hiring. Our aim is to provide our hiring partners with job-ready candidates who are trained and ready to secure a company network from day one.

YOUR EXPERIENCE

This is not a comfortable academic program.  This is not online learning.  This is not cybersecurity policy.  This is an immersive, hands-on-keyboard training operation, where you will start to develop new skills on our proprietary corporate network on Day One.

 

Each operation is divided into seven week-long modules.  During the first half of the course, you will focus on defense, and then turn to offense during the second half.  The course culminates in a week-long Capture-the-Flag competition in which participants attack and defend simultaneously.  Each quarter, our curriculum is updated and a new Operation is developed.

 

You are encouraged to pursue certifications at the 2-week (Security+), 5-week (Certified Ethical Hacker), and 7-week mark (Offensive Security Certified Professional).  During the program, you will develop and write your own tools, contribute to your own Github repositories, and participate in different bug bounty programs.

 

APPLY NOW

OUR CURRICULUM

Our curriculum is developed by Tyrone Wilson, Rachel Winchester, and Peter Kim, author of “The Hacker Playbook” series.  Peter and Tyrone are talented penetration testers with a passion for teaching, and Rachel is a creative game designer with an Intelligence background.

 

Our curriculum is gamified and you will train as an ‘operative’ on one of our training operations.  These operations are modeled after recent hacks in the news, and you will work on teams to find solutions.  Our games are designed to introduce real-world scenarios, promote team building, develop hands-on-keyboard experience, and keep you on your toes.  Each operation is different and may incorporate elements of corporate espionage, cyber war, national security, political intrigue, and more.  Our Winter Operation, ‘Comrade Enigma,’ is based on the Sony Pictures hack of 2014.

 

GETTING IN

Are you interested in hacking, reversing malware, forensics, or incident response, but don't know how to turn this into a career?  Security professionals come from all walks of life.  Some have college degrees, and many are self-taught.  Regardless of your education and background, there is a place for you here. We are looking for candidates with most of the following attributes:

You may apply to ANY of our upcoming sessions by clicking on the link below.  The deadline to apply to our Spring Session (April 3rd - May 19th) is February 26th, and decisions will be issued on March 1st.  Apply today. And if you don’t get in this time, we’ll keep your info stored so that it’s easy to apply next time.  Good luck!

 

Note: You must be ready to look for a new job from among our hiring partners, and most openings are based on the East and West coasts.  On the application, you can indicate your geographic preferences.

APPLY NOW

FAQ

  • WHERE IS THE PROGRAM LOCATED?

    The program is taught in a modern space overlooking the Potomac at 1776, in Arlington, Virginia, minutes from Washington, DC.  Lunch is cooked on premises and provided twice weekly.  1776 right near the Crystal City metro station, which is served by the Blue and Yellow lines.  Parking is available in the building.  Check out 1776 at  www.1776.vc

  • WHERE CAN I STAY?

    You are welcome to find your own accommodation with friends, family, AirBnb, Homeaway, or in other short-term rental.  We have negotiated a nightly rate with a nearby modern hotel in the range of $100/night single or $50-60/night shared.  Upon acceptance, let us know if you would like to consider this option and we will provide you with options for individual or shared rooms and facilitate a roommate match with other students.

  • IS THIS A FULL TIME PROGRAM? WHAT ARE THE HOURS?

    This is a full-time intensive, in-person, hands-on-keyboard program.  We teach from 8.30-12.30 and then focus on our project assignments in the afternoon.  This is not a part-time or nights/weekends program.  You will have 24/7 access to our space.

  • WHY DC?

    DC has more cybersecurity talent and resources than any other city in the world.

     

  • WHEN WILL I LEARN IF I'VE GOTTEN INTO THE PROGRAM?

    Decisions are issued one month before the start of the training operation.

     

  • I DIDN'T GET IN.  CAN I RE-APPLY?

    Certainly.  You may apply as many times as you like.

  • HOW OFTEN WILL YOU RUN THIS SEVEN WEEK PROGRAM A YEAR?

    HOW OFTEN WILL YOU RUN THIS SEVEN-WEEK PROGRAM PER YEAR?

    We run 4 training operations per year.  Our next session will be held in March/April, then June/July, and September/October.  Follow us on Twitter (@hackeducate) for updates on dates, deadlines, etc.

     

WHY ATTEND?

If you are able to get into the program, and you’re willing to spend 7 weeks with us, you’ll leave here able and ready to enter an organization and secure the network from Day One.  You’ll make new friends.  You’ll learn how to break things. You’ll capture a bunch of flags. You may even leave here with a job.  You’ll leave here ready for a career in cybersecurity.

 

We invest in you, and our hiring partners invest in us if they hire from the program. While you’re with us, you’ll gain exposure to a variety of companies that are interested in hiring people like you.  You’ll also hear from industry professionals who will tell you what to expect in your first new security job.  You’ll also be part of a talented alumni group.

 

We don’t care if you’re 18 or 65, whether you went to college or not, and most employers in this field don’t either.  They want to see that you have the skills for the job.  Apply now by clicking on the link below.  See you in DC.

 

 

 

 

 

 

 

 

HIRE FROM THE PROGRAM

  • SAVE MONEY AND TIME

    We handle the sourcing, vetting, training, and certifications, letting you focus on the interviewing and hiring.

  • FACE TIME

     Gain exposure to the next generation of cyber security professionals.

     

  • ON-DEMAND ACCESS

    Engage with us when you’re hiring, tune out when you’re not.

     

  • BUILD YOUR NETWORK

    Join our professional community and meet students, alumni, teachers, other employers, speakers, mentors, advisers, and investors.

     

  • HIRE EFFICIENTLY

    It’s free to participate, and you’ll only pay a fee when you find the perfect match and hire from the program.

     

  • ACCESS FRESH TALENT

    Stop poaching and start hiring new talent in the industry.

Are you hiring cybersecurity talent?  Are you having difficulty filling your open positions?  Recruit from our program.  We understand it's difficult to find, screen, hire, and train cyber security specialists, and our program is designed with you in mind.  How does it work?

 

It’s free to get started, and there are many ways to recruit from our program.  Our program offers you a unique way to interact with candidates before deciding whether to interview them or not.  You’ll be able to review resumes, interact with our students, examine their code, check out projects, assign us a pen test, attend our happy hours, participate in our Capture-the-Flag competition, deliver a guest lecture, speak at our meetup groups, assign us a project, host our students onsite, and conduct interviews.  There’s only a fee if you find the right candidate and hire from the program.

 

Here are some of the benefits of participating in our program:

HIRE NOW

LEADERSHIP

HackEd is committed to providing the best possible learning experience to our students and a new and creative recruiting approach to our hiring partners.

JON FERRIS

CEO



Jon is focused on providing the best possible experience to both program participants and hiring partners alike. Prior to this, Jon co-founded The Data Incubator, a successful data science training program.  He managed the company’s expansion and built a talented partnerships team that attracted over 250 hiring partners.  Program alumni now work for top companies around the world.

PETER KIM

TECHNOLOGY



Author of “The Hacker Playbook” series.  Peter has worked as a penetration tester and incident responder for the utility, entertainment, financial, and government sectors.”  He is passionate about teaching and runs LETHAL, one of the country's largest ethical hacker meetup groups.

 

TYRONE WILSON

SECURITY/LEARNING



Tyrone E. Wilson is an Information Security professional with over 20 years of experience in Information Technology. As an information systems analyst for the Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Wilson is also the organizer of the world’s largest cybersecurity meetup group, “D.C. Cyber Security Professionals,” with over 3500 professionals. Tyrone is passionate about teaching and helping people transition into the Industry.

JASON CHEN

STRATEGY



Jason is a business strategy consultant, investor, and serial entrepreneur with a passion for companies with a social mission. He is also a Entrepreneur-in-Residence at Techstars and Director for their Startup Next DC program that is supporting early-stage cyber security companies.

Julie Mosallem

PARTNERSHIPS



Julie is focused on establishing and supporting our partnerships with employers and with our community.  She has a background in IT analysis and recruiting, and she possesses a passion for learning new technologies and tools.  Julie is excited to be blazing the trail for aspiring cybersecurity talent.

RACHEL WINCHESTER

CURRICULUM

Rachel Winchester has worked for and with the US Intelligence Community for 18 years, where she is an innovation expert and a futurist. She has served in multiple overseas posts in positions ranging from support to counter-terrorism. Rachel’s current work applies training, facilitation, narrative, and game design to intelligence. She writes for the Center for the Study of Intelligence and her blog on hacking is the second most popular blog on the IC's secure network. Rachel is behind the gamification of HackEd’s curriculum.

TOBIAS MCCURRY

CURRICULUM

Tobias Mccurry is a top penetration tester, with over over 15 years’ experience in different areas of IT. Tobias specializes in identifying vulnerabilities that have been previously unidentified. He works to lower client risk by evaluating and mitigating critical vulnerabilities. Tobias has published in the SANS Reading Room, Hacker Academy, and the Infosec Institute. He holds a B.S in Computer Science and is pursuing Master of Science in Information Security Engineering with SANS. He maintains multiple industry certifications.

NICHOLAS MILLER

ADMISSIONS



Nick is focused on our admissions process and works to bring out the best in every applicant. He has a background in neuroscience, communications, non-profit development management, event coordination, and donor relations. Nick helps our applicants through the process and identifies top talent for our employer partners. He is excited to support the growth of talent in cybersecurity.

NICK MORPUS

SOCIAL MEDIA

Nick is a digital markets analyst, social media strategist, and visual design consultant. He has a background in politics, economics, and journalism, but decided to apply his creative passions and marketing skills to building up the tech industry.



KATIE STEFANICH

PARTNERSHIPS



Katie is  passionate about stopping evolving cyber threats from thwarting innovation. She has experience in conducting cybersecurity maturity assessments and authoring enterprise-wide incident management strategies. Katie also has extensive experience with startups through Startup Weekend, Techstars, and Booz Allen Hamilton’s Strategic Innovation Group.

NICOLE SHADOWEN

COMMUNITY

Nicole Shadowen is a technical solutions architect by training, and has worked with startups in San Francisco, Washington, D.C. and New York City. Nicole is pursuing her M.S. in Digital Forensics and Cybersecurity at John Jay College, earned her B.S. in psychology from the University of Virginia. She is passionate about bringing new people into the industry, especially women and minorities.

HIRE NOW

PRESS INQUIRIES

 

CONTACT US

 

COPYRIGHT © 2016 HackEd, ALL RIGHTS RESERVED








