Package

CYBER A to Z

TRAINING DURATION: FIFTEEN WEEKS

Includes fifteen courses, with 75 scenarios

The CYBERIUM ARENA supports any cyber training. ThinkCyber’s most significant advantage is the ability to provide the FULL PACKAGE in the cyber-security world: training, training materials, and simulator.

  • Base Evaluation Test (B.E.T) for the students – Built-in the simulator

  • Training book for the students

  • Presentations for the instructor

  • Labs and exercises, including step-by-step solutions

  • Trainer2Trainer support

LINUX

TR002

An Introduction to the Linux Operating System and command-line. 

This course will focus on empowering you to be an independent learner of the Linux operating system and learn how to use the Linux manually.

​Learn how to shell script through project-based training

NETWORK RESEARCH

NS106

The Network Research training aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. By the end of the training, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

WINDOWS FORENSICS

BT210

Windows Forensics is an essential skill in the cybersecurity world. This training covers a broad spectrum of aspects of the forensic investigation process performed on Windows OS. Participants will learn how different computer components work and how they can investigate after a cyber-incident. The training will focus on developing hands-on capabilities of forensics teams or individual practitioners.

PENETRATION TESTING

BT212

Penetration Testing training is a unique and in-depth course focusing on the practice of skilled penetration examiners and broad knowledge of finding weaknesses in organizations. Under this exceptional training, the students will acquire capabilities to identify infrastructure-level assaults.

WEBAPP SECURITY

RT422

The Web Application Security training will help participants understand major web application flaws and their exploitation, as well as learn a proven process for locating those flaws consistently. This training was designed to improve security specialists understand web application risks in their organization and learn how to conduct web app security assessments.

WEBAPP SECURITY

RT423

During this training, students will get knowledge and skills. Testers need to detect security vulnerabilities in web applications using a combination of manual and automated methods. Testing web-application security is not intuitive, and to be useful, you need an understanding of web application design, HTTP, JavaScript, browser behavior, and potentially other technologies. Today, companies worldwide use webservers to store data and are breached daily.

OFFENSIVE PYTHON

RT421

This training will teach the students Python scripting and Python security. This course is ideal for penetration testers and cybersecurity experts. During this part, the students will be introduced to Python and learn advanced techniques in creating cyber-defense and cyber-attack tools.

REVERSE ENGINEERING & MALWARE ANALYSIS

BT220

During this training, students will study the fundamentals of the C and Assembly languages, which will allow the students to understand all the processes that are running behind the scenes, including reading and writing to memory.

Students will get familiar with the program structure, data type, data movement instructions, arithmetic instructions, conditional instructions, interrupts, traps and exceptions, procedures, prologues and epilogues, syscall structure, and more.

REVERSE ENGINEERING & MALWARE ANALYSIS

BT221

Malware Analysis is the study and close examination of malware to understand its origins, purpose, and potential impact on the system. Malware analysts accomplish their tasks by using various tools and expert-level knowledge to understand not only what a piece of malware can do but also how it does it. This training provides participants with the practical skills and knowledge to be able to analyze malware and exposes them to a critical set of tools required for their tasks.

THREAT INTELLIGENCE & OSINT

BT209

This Threat Intelligence and OSINT training to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on sophisticated cyber-attacks. Starting with a better understating of threat intelligence on a strategic and operational level, to applying the cyber Intelligence lifecycle to the full-spectrum exercise of proactive network defense.

NETWORK FORENSICS

BT211

Network forensics relates to the analysis of network traffic to identify intrusions or anomalous activity. Compared to computer forensics, where evidence usually preserved on disk, network data is more volatile and unpredictable and therefore requires a different approach.

CYBER WARFARE

RT420

Cyber Warfare training is about large attacks using technology to attack a nation, causing comparable harm to actual warfare. This training sets the groundwork for specialization in cyber forensics, advanced cyber defense and penetrating testing.

WINDOWS EXPLOITATION

RT424

During this training, attendees will practice with the latest techniques and tools to discover vulnerabilities and exploit them. Main topics such as Privilege Escalation, penetration with PowerShell, and more will be taught for a wide range of software, including complex Windows applications, Web browsers, and critical Microsoft services.

EXPLOIT DEVELOPMENT

RT432

This training is designed to turn the students into high-level security experts. They will learn how to find critical vulnerabilities everywhere in the platforms an exploit them. This is must-have knowledge for anyone who aims to work as a professional hands-on performer in the security field.

EXPLOIT DEVELOPMENT

RT433

This training is a continuing course for Exploit Development (RT432). In this training, participants will now learn how to protect computer systems and create automation to identify weaknesses.

© 2020 by ThinkCyber

THE 2020

CYBERIUM