top of page

Cyber Security Bootcamp

course bundle 

 
 
 
 
 
 

Hands on Cyber Security training by experts in the space.

 
 

8 weeks

 
 

The Bootcamp is a bundle of courses starting at the introduction to cyber and ending with hands-on simulator training. 

 
 
Image by Redd

Course overview

Bootcamp 

 
 
 
 
 
 
 
certificate.jpg
ccjwfa-owl.png

Defenders (Blue Team)

Windows Forensics.​

certificate.jpg
ccjpt-owl.png

Attackers (Red Team)

Penetration Tester.​

certificate.jpg
ccjsa-owl.png

Monitoring (Purple Team)

SOC Analyst.​

The  Bundle includes all the Programs in Levels 1 and 2, and select your choice of the Career Paths:

 

Defenders      Blue Team

Attackers       Red Team

Monitoring     Purple Team

 
 
 
 

what's in the 

bundle? 

 
 
 
 
 
 
Introduction to cyber

Level 1

 
 
 

Level 2

 
Linux Fundamentas
Python Fundamentas
Network Security

Level 3

 
choose a stream
 
Windows Forensics
Penetration Testing
SOC Analyst
david.png

David

Our trainers

 
 
 
 
 
 

An accredited expert and focal point of knowledge in information security and cyber operations with over 15 years of experience in hi-tech and startups. Researches, explores, trains, and instructs on cyber security topics, engages with military, government and enterprise customers worldwide.

 

A senior trainer to special forces and secret services worldwide.

 

SKILLS Cyber security research ✦ Cyber operations and warfare ✦ Forensics ✦ SCADA security ✦ Consulting and Training.

 
 
 

The labs hold questions and tasks to support the training.

Labs

 
 
 

The coursebooks accompany the lecturers and students alike in cybersecurity studies.

Book

 
 
 

Provide participants possible situations from cybersecurity or cyberterrorism to solve.

Scenarios

 
 

Trainees must complete a practical built-in project, produce defense and assault tools.

Project

 
 

Level One

 

Intro to cyber security

 

Intro to Cyber is an essential module that covers the core concepts of the cyber world and allows the participants to quickly view the complex world of digital crimes.

Linux Fundamentals

 

This training covers basic use in the Linux environment. The Linux Fundamentals program is designed for non-experienced users, helping them become comfortable with Linux and basic automation scripting capabilities.

Python Fundamentals

 

Python is an easy language used by many to build tools in different fields, including cyber. This program provides the students with a stepping-stone on understanding programming logic and creating basic scripts to take their skills to the next level.

Level Two

 

Network Research

 

The Network Research program is aimed at the basic worlds of information security with the help of Linux and familiarity with various attacks in the worlds of security. The course sets the groundwork for later specialization in cyber forensics, advanced cyber defense, and penetration testing.

Level Three

 

SOC Analyst

 

This SOC Operation module is designed for SOC organizations to implement a SOC solution and provide full guidance on the necessary skills and procedures to operate it. The program provides participants with all aspects of a SOC team to keep the enterprise's adversary.

Windows Forensics

 

Windows Forensics is an essential skill in the cybersecurity world. Participants will learn how different computer components work and how to investigate during and after a cyber incident. The training will focus on developing hands-on capabilities of forensics teams or individual practitioners.

Penetration Testing

 

Penetration tests help find flaws in the system to take appropriate security measures to protect the data and maintain functionality. This training focuses on running a penetration testing and take on the complex task of effectively targeting and planning a penetration in a traditionally secured environment.

Our Labs and Simulator

 
The simulator offers a three-sixty solution, including labs, books, reports, projects, and international certifications preparation. It is a high-end simulator focused on cybersecurity training issues such as cyber-attacks and operations technology; through these scenarios, participants are trained.
bottom of page