8 weeks
The Bootcamp is a bundle of courses starting at the introduction to cyber and ending with hands-on simulator training.
Course overview
Bootcamp
Defenders (Blue Team)
Windows Forensics.​
Attackers (Red Team)
Penetration Tester.​
Monitoring (Purple Team)
SOC Analyst.​
The Bundle includes all the Programs in Levels 1 and 2, and select your choice of the Career Paths:
Defenders Blue Team
Attackers Red Team
Monitoring Purple Team
what's in the
bundle?
Level 1
Level 2
Level 3
David
Our trainers
An accredited expert and focal point of knowledge in information security and cyber operations with over 15 years of experience in hi-tech and startups. Researches, explores, trains, and instructs on cyber security topics, engages with military, government and enterprise customers worldwide.
A senior trainer to special forces and secret services worldwide.
SKILLS Cyber security research ✦ Cyber operations and warfare ✦ Forensics ✦ SCADA security ✦ Consulting and Training.
The labs hold questions and tasks to support the training.
Labs
The coursebooks accompany the lecturers and students alike in cybersecurity studies.
Book
Provide participants possible situations from cybersecurity or cyberterrorism to solve.
Scenarios
Trainees must complete a practical built-in project, produce defense and assault tools.
Project
Level One
Level Two
Network Research
The Network Research program is aimed at the basic worlds of information security with the help of Linux and familiarity with various attacks in the worlds of security. The course sets the groundwork for later specialization in cyber forensics, advanced cyber defense, and penetration testing.
Level Three
Windows Forensics
Windows Forensics is an essential skill in the cybersecurity world. Participants will learn how different computer components work and how to investigate during and after a cyber incident. The training will focus on developing hands-on capabilities of forensics teams or individual practitioners.
Penetration Testing
Penetration tests help find flaws in the system to take appropriate security measures to protect the data and maintain functionality. This training focuses on running a penetration testing and take on the complex task of effectively targeting and planning a penetration in a traditionally secured environment.