Launch or accelerate your cyber security career

Welcome to Cyber Science

Cyber Science brings the bootcamp model to cybersecurity education with comprehensive, practical programs for launching your career or upping your tradecraft. We partner with top employers to provide the skilled talent the industry is searching for.

Features of
Bootcamp

Gain Real Work Experience

Students perform live security assessment work on not-for-profit companies, giving them the real work experience that is demanded by employers. So at the end of the program you get a nice line on your resume and the satisfaction of helping a non-for-profit organisation.

Job-Oriented Programs

Cyber Science’s programs are directly based on market demands. Our lecturers are not just scholars—they are industry specialists, and the courses’ practical focus integrates hands-on work. This is why doezens of employers are looking to partner with us.

Cyber Labs

Cyber Science believes mastering cyber security takes practice. Accordingly, we have developed “real-time” attack simulation labs so that students undergo intensive training in realistic scenarios. With this experience, our graduates enter the market better prepared for future jobs.

Israeli Expertise

Cyber Science brings you the knowledge and expertise from the best in the Israeli cyber security industry, which is internationally recognized as one of the most resilient in the world. Cyber Science curriculum are written by Israel’s top experts allowing you to tap into Israel’s latest cyber content.

John Chambers

There are two types of companies: those that have been hacked, and those who don’t know they have been hacked.

John Chambers, Cisco

Introduction to Cyber Security

Network Introduction

• Virtualisation
• Linux
• Cisco
• Network intro (DNS,DHCP,OSI,TCP/IP, IPv4,IPv6)
• Routing and Switching
• Network setup and administration
• Routing protocols

Windows Server 2012

• Introduction to server installation
• System configuration
• Active Directory management
• Server farm set up
• Policy creation with GPO

Introduction to Python

• Introduction to Python
• Installing Python on Windows
• Variable types
• Conditions and loops
• Data sort
• System function
• Function writing
• Communication with Socket-Python

Cyber infrastructure

• Introduction to information security
• Investigation and scanning
• Hacking and defending operation systems
• Brute force
• DDoS
• Wi-Fi
• Wireshark
• Trojans
• Post Exploitation
• Social Engineering
• Anonymity
• Man—In-The-Middle (MITM)

Bootcamp Subjects

Hacking fundamentals & C|EH Exam

• Introduction to Ethical Hacking • Footprinting and Reconnaissance • Scanning Networks • Enumeration • System Hacking • Malware Threats • Sniffing • Social Engineering • Denial-of-Service • Session Hijacking • Hacking Webservers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS, Firewalls, and Honeypots • Cloud Computing • Cryptography • Cyber Security Attack Lab • Cyber Security Final Excersize

Python Programming For Security

Variables • Conditions • Loops • ErrorHandling • OOP (Object Oriented Programing) • OOD (Object Oriented Design) • Inheritance • Design Patterns • Using Python For Hacking

Infrastructure

• Services & Ports • Well Knows Network Design & Devices • Wireshark & Packet Sniffing • Network Encryption • Get The Domain Admins • Metasploit + Veil • Bypassing Switches

Privilege Escalation Linux

• Basic Privilege Escalation • Privilege Escalation Techniques • Privilege Escalation Using Permissions • Privilege Escalation Using Automated Tasks • Privilege Escalation Via Bad Configuration & Bad Architecture • Privilege Escalation Using Buffer Overflow & Debugging

Web Application Penetration Testing

• Understanding HTTP • Top 10 OWASP • Burp Suite /Fiddler • XSS • CSRF • RFD • Path Traversal • LFI\RFI • Bypassing Authentication • Shell Upload • SQL Injection

Introduction To Malware Analysis & Reverse Engineering

• Static Malware Analysis • Dynamic Malware Analysis • Assembly Registers • Debugging Using OllyDbg • Debugging Using Immunity Dbg • Debugging Using WinDbg • Debugging Using IdaDbg • Basic Debugging Techniques • Advanced Debugging Techniques • Anti Debugging • Packing & Unpacking • Manual Packing & Assembly Editing • Understand The CODE • Breakpoint Hardware • Breakpoint Software • Breakpoint Memory • Reversing Challenges • Final Exercise

Mobile Security

iOS:

• Introduction to iOS Security • Exploiting iOS Applications • iOS Forensics and Data Recovery • iOS Malware and Backdoors

Android:

• Introduction to Android • Android Security Architecture • Android Permissions • Logging Based Vulnerabilities • Reversing Android Applications • Analyzing Android Malwares • Analyzing Android Traffic • Introduction to Drozer • Client Side Injection • Hooking Introduction and Setting up Insecure Bank • Analysis and Scripting using AndroGuard • Webview Based Vulnerabilities • Exploiting Webview with Metasploit

Ready to kick off your career?