
Yigal Unna
Campus President
Director General of the Israel National Cyber Directorate (INCD)
(2018-2022)
Veteran of 8200 - Elite Israeli Army intelligence unit
Magister (M.A.) in Business Administration
Bachelor (B.A.) in Management and History Studies

"Cyber is only learned from the professionals who worked on the defense front of the State of Israel."
Garry Kasparov
Board Member
Artificial intelligence expert accompanied by close and cyber lecturers
The world chess champion
(1985-2000)

"Even in cyber, the best attack is defense. So make the smart decision: Israel cyber campus."

Why study at the
Israel Cyber Campus?
-
A stuff of IDF 8200 unit lecturers
-
Practice using the world's most advanced simulator system
-
70% of the studies plan is done with practical work - an artificial intelligence simulator that prepares you for 'the real world'
-
We prepare you for a cyber career in Israel and around the world
-
Preparation for external international certificated exams
-
Financing routes for students
BASIC COURSES
CYBER FOR MANAGERS
Managers need cyber methodology knowledge together with technical and management skills
This course empowers you to become an effective manager and get up to speed quickly on information security issues and terminology. You won't just learn about security; you will learn how to manage security.
CHIEF COMPLIANCY OFFICER
Primarily responsible for overseeing compliance within an organization
the CCO is responsible for establishing standards and implementing procedures to ensure that the compliance programs throughout the organization are effective and efficient in identifying, preventing, detecting, and correcting noncompliance with applicable laws and regulations.
GOVERNANCE, RISK & COMPLIANCY
GRC (Governance, Risk, and Compliance) is one of the Core courses for organizations
This training offers your organization a preventive, Real Time approach to governance, risk analysis and compliance. Risk Analysis and compliance activities can help the organization to prevent risk events and compliance violations, helping to protect the value of the organizations brand and assets.
CYBER THREAT INTELLIGENCE
Businesses are becoming increasingly concerned about cyberattacks.
Before you can protect your business and its digital assets, you must have basic understanding of some core terms when it comes to cybersecurity. Threat intelligence can identify and analyze cyber threats aimed at your business. The keyword is “analyzing” Threat intelligence is about sifting through piles of data.
CISSP
IT security became a critical issue with the evolution of information age.
Security Instructors CISSP or Certification Course Overview Professional is a globally recognized certification offered by the ISC2 (International Information Systems Security Certification Consortium(. The certification validates a candidate’s ability and expertise in all fields of information security.
CYBER FOR YOUNGSTERS
The Cyber for Youngsters students' program is the first step in the student's decision to choose in this field of study
This course enables the young the basic readiness to integrate into more advanced courses and trainings in the field of cyber and preparation to the army services.

PROFESSIONAL COURSES
ETHICAL HACKING
Ethical Hackers are like ninjas, they need to attack a corporate, steal information and yet, be quite and stealth.
This course intends to allow a students to execute a penetration testing process using application and infrastructure attacks as network scanning, vulnerability assessment, web attacks, exploitation and lateral movement.
CLOUD SECURITY
More and more companies are now realizing the detrimental impact of internet crimes on the company's revenue and reputation, as well as the need for proof-of-protection.
This course covers Amazon Web Services, Azure, Google Cloud, and other cloud service providers (CSPs). Like foreign languages, cloud environments have similarities and differences.
CRYPTOGRAPHY
Cryptography is an indispensable tool for protecting information in computer systems.
In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic.
SECOPS & ARCHITECTURE
This will ensure the proper handling of all hard copy and electronic information.
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability.
SECURE CODING
This is a high-level Syllabus for Secure coding – which is planned for 2024.
MALWARE ANALISYS
Understanding the capabilities of malware is critical to your ability to derive threat intelligence, respond to cybersecurity incidents, and fortify enterprise defenses.
This course builds a strong foundation for reverse-engineering malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and many other freely available tools.

NEXT GENERATION
Youth cyber course
A unique program for high school students - training the next cyber warriors
The cyber program for young people provides the basic readiness to integrate into more advanced training and courses in the field of cyber and preparation for military service in these fields
Why take a cyber course?
In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.
Why take a cyber course?
In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.
Why take a cyber course?
In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.
Why take a cyber course?
In today's digital age, businesses are increasingly at risk of cyber-attacks, which can result in financial loss, reputational damage and legal consequences. Therefore, it is essential for businesses to prioritize cyber security and ensure that employees receive adequate training in cyber security best practices. One effective way to achieve this is by enrolling in a cyber course.