top of page
bg01.jpg

Israel Cyber Campus

The only cyber studies in Israel

using the Simulator Attack method - a smart simulator that allows you to learn more actively and accurately.
Yigal Unna
Campus President

Director General of the Israel National Cyber Directorate (INCD)

(2018-2022)

Veteran of 8200 - Elite Israeli Army intelligence unit

Magister (M.A.) in Business Administration

Bachelor (B.A.) in Management and History Studies

img01.png
"Cyber ​​is only learned from the professionals who worked on the defense front of the State of Israel."
Garry Kasparov
Board Member

Artificial intelligence expert accompanied by close and cyber lecturers
The world chess champion
(1985-2000)

img02.png
"Even in cyber, the best attack is defense. So make the smart decision: Israel cyber campus."
bg02.jpg

Why study at the
Israel Cyber ​​Campus?

  • A stuff of IDF 8200 unit lecturers

  • Practice using the world's most advanced simulator system

  • 70% of the studies plan is done with practical work - an artificial intelligence simulator that prepares you for 'the real world'

  • We prepare you for a cyber career in Israel and around the world

  • Preparation for external international certificated exams

  • Financing routes for students

BASIC COURSES

CHIEF INFORMATION SECURITY OFFICER
IT security became a critical issue with the evolution of information age 

IT security became a critical issue with the evolution of information age and the demand for professional CISOs’ in organizations increased, respectively.

GOVERNANCE, RISK & COMPLIANCY
GRC (Governance, Risk, and Compliance) is one of the Core courses for organizations

This training offers your organization a preventive, Real Time approach to governance, risk analysis and compliance. Risk Analysis and compliance activities can help the organization to prevent risk events and compliance violations, helping to protect the value of the organizations brand and assets. 
 

CYBER FOR MANAGERS
Managers need cyber methodology knowledge together with technical and management skills 

This course empowers you to become an effective manager and get up to speed quickly on information security issues and terminology. You won't just learn about security; you will learn how to manage security. 

CHIEF COMPLIANCY OFFICER
Primarily responsible for overseeing compliance within an organization

the CCO is responsible for establishing standards and implementing procedures to ensure that the compliance programs throughout the organization are effective and efficient in identifying, preventing, detecting, and correcting noncompliance with applicable laws and regulations.

CYBER FOR YOUNGSTERS
The Cyber for Youngsters students' program is the first step in the student's decision to choose in this field of study

This course enables the young the basic readiness to integrate into more advanced courses and trainings in the field of cyber and preparation to the army services.

FROM IT TO CYBER 
to become a SOC analyst, you need a practical skill in IT

The course aims to train professionals who will work in high sophistication IT and in entry-level positions in cybersecurity. 

bg04.jpg

PROFESSIONAL COURSES

ETHICAL HACKING
Ethical Hackers are like ninjas, they need to attack a corporate, steal information and yet, be quite and stealth. 

This course intends to allow a students to execute a penetration testing process using application and infrastructure attacks as network scanning, vulnerability assessment, web attacks, exploitation and lateral movement.

THREAT HUNTING
Threat Hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network.

The course offers a targeted search approach, using networks and datasets to identify threats when the goal is to find opponents' tactics, techniques and procedures. 

DIGITAL FORENSICS & INCIDENT RESPONSE
The science of gathering, preserving, analyzing, and presenting digital information and evidence in the organization

This field is relevant to corporate security professionals, government employees, and military officers and contractors. 

CLOUD SECURITY
More and more companies are now realizing the detrimental impact of internet crimes on the company's revenue and reputation, as well as the need for proof-of-protection.

This course covers Amazon Web Services, Azure, Google Cloud, and other cloud service providers (CSPs). Like foreign languages, cloud environments have similarities and differences. 

CYBER THREAT INTELLIGENCE
Businesses are becoming increasingly concerned about cyberattacks. 

Before you can protect your business and its digital assets, you must have basic understanding of some core terms when it comes to cybersecurity. Threat intelligence can identify and analyze cyber threats aimed at your business. The keyword is “analyzing” Threat intelligence is about sifting through piles of data.

SECOPS & ARCHITECTURE
This will ensure the proper handling of all hard copy and electronic information. 

Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. 

Secure Coding
This is a high-level Syllabus for Secure coding – which is planned for 2024.
Super Executives
An intensive and comprehensive program designed to equip executives with the essential knowledge and skills to navigate the complex world of cybersecurity.

The course covers various topics, including cyber threats, risk management, data protection, incident response, and compliance. Participants will gain a deep understanding of the latest cybersecurity technologies, strategies, and best practices to effectively protect their organizations from cyber attacks.

Malware Analisys
Understanding the capabilities of malware is critical to your ability to derive threat intelligence, respond to cybersecurity incidents, and fortify enterprise defenses. 

This course builds a strong foundation for reverse-engineering malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and many other freely available tools.

bg04.jpg

NEXT GENERATION

Youth cyber course
A unique program for high school students - training the next cyber warriors

The cyber program for young people provides the basic readiness to integrate into more advanced training and courses in the field of cyber and preparation for military service in these fields

Why take a cyber course?

In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.

Why take a cyber course?

In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.

Why take a cyber course?

In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.

Why take a cyber course?

In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.

bottom of page