Cyber Science brings the bootcamp model to cybersecurity education with comprehensive, practical programs for launching your career or upping your tradecraft. We partner with top employers to provide the skilled talent the industry is searching for.
Students perform live security assessment work on not-for-profit companies, giving them the real work experience that is demanded by employers. So at the end of the program you get a nice line on your resume and the satisfaction of helping a non-for-profit organisation.
Cyber Science’s programs are directly based on market demands. Our lecturers are not just scholars—they are industry specialists, and the courses’ practical focus integrates hands-on work. This is why doezens of employers are looking to partner with us.
Cyber Science believes mastering cyber security takes practice. Accordingly, we have developed “real-time” attack simulation labs so that students undergo intensive training in realistic scenarios. With this experience, our graduates enter the market better prepared for future jobs.
Cyber Science brings you the knowledge and expertise from the best in the Israeli cyber security industry, which is internationally recognized as one of the most resilient in the world. Cyber Science curriculum are written by Israel’s top experts allowing you to tap into Israel’s latest cyber content.
There are two types of companies: those that have been hacked, and those who don’t know they have been hacked.
John Chambers, Cisco
• Virtualisation
• Linux
• Cisco
• Network intro (DNS,DHCP,OSI,TCP/IP, IPv4,IPv6)
• Routing and Switching
• Network setup and administration
• Routing protocols
• Introduction to server installation
• System configuration
• Active Directory management
• Server farm set up
• Policy creation with GPO
• Introduction to Python
• Installing Python on Windows
• Variable types
• Conditions and loops
• Data sort
• System function
• Function writing
• Communication with Socket-Python
• Introduction to information security
• Investigation and scanning
• Hacking and defending operation systems
• Brute force
• DDoS
• Wi-Fi
• Wireshark
• Trojans
• Post Exploitation
• Social Engineering
• Anonymity
• Man—In-The-Middle (MITM)
• Introduction to Ethical Hacking • Footprinting and Reconnaissance • Scanning Networks • Enumeration • System Hacking • Malware Threats • Sniffing • Social Engineering • Denial-of-Service • Session Hijacking • Hacking Webservers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS, Firewalls, and Honeypots • Cloud Computing • Cryptography • Cyber Security Attack Lab • Cyber Security Final Excersize
Variables • Conditions • Loops • ErrorHandling • OOP (Object Oriented Programing) • OOD (Object Oriented Design) • Inheritance • Design Patterns • Using Python For Hacking
• Services & Ports • Well Knows Network Design & Devices • Wireshark & Packet Sniffing • Network Encryption • Get The Domain Admins • Metasploit + Veil • Bypassing Switches
• Basic Privilege Escalation • Privilege Escalation Techniques • Privilege Escalation Using Permissions • Privilege Escalation Using Automated Tasks • Privilege Escalation Via Bad Configuration & Bad Architecture • Privilege Escalation Using Buffer Overflow & Debugging
• Understanding HTTP • Top 10 OWASP • Burp Suite /Fiddler • XSS • CSRF • RFD • Path Traversal • LFI\RFI • Bypassing Authentication • Shell Upload • SQL Injection
• Static Malware Analysis • Dynamic Malware Analysis • Assembly Registers • Debugging Using OllyDbg • Debugging Using Immunity Dbg • Debugging Using WinDbg • Debugging Using IdaDbg • Basic Debugging Techniques • Advanced Debugging Techniques • Anti Debugging • Packing & Unpacking • Manual Packing & Assembly Editing • Understand The CODE • Breakpoint Hardware • Breakpoint Software • Breakpoint Memory • Reversing Challenges • Final Exercise
iOS:
• Introduction to iOS Security • Exploiting iOS Applications • iOS Forensics and Data Recovery • iOS Malware and Backdoors
Android:
• Introduction to Android • Android Security Architecture • Android Permissions • Logging Based Vulnerabilities • Reversing Android Applications • Analyzing Android Malwares • Analyzing Android Traffic • Introduction to Drozer • Client Side Injection • Hooking Introduction and Setting up Insecure Bank • Analysis and Scripting using AndroGuard • Webview Based Vulnerabilities • Exploiting Webview with Metasploit