top of page

FROM IT TO CYBER

line01.jpg
line01_edited.jpg
chess-icon.png
bg02.jpg

AUDIENCE

IT Support Professionals, IT Technicians and Professionals with a degree in Informatics, Networks, Systems and Computer Engineering, at an early stage of their career and who are targeting the cybersecurity market.

PRE-REQUISITES

Candidates with understanding of development, networking, Linux and Windows domain, Installation and operation of Windows Desktop, Windows Server and Linux operating systems; Basic knowledge of TCP/IP family network protocols.

LOCATION

  • Online

  • Face to face (bootcamp)

  • Hybrid

  • Train-the-Trainer

DESCRIPTION

The course aims to train professionals who will work in high sophistication IT and in entry-level positions in cybersecurity. To begin the journey to become a SOC analyst, you need a practical skill in IT and getting familiar with information security systems alongside basic understanding of terminology, methodology, and countermeasures. 
Through theoretical and practical training, this course provides the needed skillset to start the process of becoming a SOC analyst for beginners with limited or no prior experience. 
The dynamics of the classes is very immersive, with most of the classes focused on market practice, where the student will be always encouraged to get their “hands on”.

COURSE OBJECTIVES

After completing this course, you should be able to

  • Get familiar with attack methods, models and processes 

  • Write detailed reports 

  • Create advanced risk assessment relate on a technically evidences 

  • Get public information about corporates using open-source resources  

  • Develop Macros (VBA) to create malicious office files 

  • Get access to networks and hosts using enumeration and password attack techniques 

  • Build anonymous environment for attacking 

  • Penetrate web applications

  • Get familiar with tunneling methods 

  • Use PowerShell to attack and spread in Windows domain environment 

  • Understand the defender’s perspective – security systems, forensics 

  • Avoid detection by anti-viruses, IDS and firewalls 

  • Write malware and exploit using python

Study structure and study subjects

The program will include 120 academic study hours. Success in the program requires active participation in the lessons, personal work at home, attendance at least 85% of the lessons and passing the final exam successfully.

The format of the studies

Scope of the program: 120 academic hours

30 sessions of 4 academic hours, twice a week - online training

bg01.jpg

COURSE SYLLABUS

bottom of page