Cyber Security Engineer (Advanced)

Upcoming course: 27/1, 300 Hours / 6 Months, Evening course

Your best path to upskill and advacne your cybersecurity career. This part-time advanced cybersecurity program features expert instruction, hands-on projects, and live labs to practice handling the latest security attack vectors.

Studies suggest a huge shortage in Cyber Security Engineers and a constant increase in demand for this profession. According to Deloitte, “A massive and growing talent shortfall is one of the most critical challenges facing the cybersecurity world today. In fact, nowhere in IT is the talent shortage more pronounced than in the cyber arena.

Cyber attacks are on the rise everywhere you look, making cybersecurity one of the hottest professions in technology. The highly lucrative role of a Cyber Security Engineer puts up a fight against hackers looking to penetrate an organization’s network for malicious purposes.

Serve as The Forefront of Organizations' Defense

Learn how to prevent significant damage to an organization’s network. Graduates of this program develop in-depth knowledge of varied technologies, cybersecurity tools, emerging threats, typical vulnerabilities, and hacking patterns. The program establishes advanced skills in programming and automation of cyber attacks and defense, penetration testing, cyber forensics, and reverse engineering. 

Train with Industry Experts

Equip yourself to succeed in a rapidly expanding field with help from our network of cyber experts, instructors, hiring partners, and alumni. The Cyber Security Engineer curriculum was created in collaboration with the industry’s leading companies to make our programs as relevant as possible to the local industry’s needs and to hackers’ latest game.

Deliver a Professional Project

We believe that the best learning is done through hands-on work. Accordingly, the entire program is run as an ongoing lab during which students are required to install attack and defense environments, set up and build cybersecurity tools, and experience scenarios simulating real-world events. 

As the program covers diverse multidisciplinary knowledge and skills, the program’s final Bring-It-Together (BIT) Project will be devoted to conducting an integrative lab scenario that will require students to demonstrate knowledge, skills, and capabilities from all of the disciplines they have learned.

Who Is the Program For?

Individuals with some math skills and prior experience in programming, who aspire to launch a career in Cyber Security.
*Don’t have a programming background? A 70-hour introductory program is available to close those gaps. Otherwise, all candidates take a computerized assessment to ensure that they have the right personality, as well as the basic math and logic skills, to complete the programs and be successful in their future jobs.

Real-World Simulations in Cyber Labs

  • Advanced cyber labs for educating the next generation of cyber professionals.
  • Allows trainers to demonstrate and let students experience real-life scenariosStudents can experiment with potential responses in real-time.
  • Student dashboards and detailed reports provide complete analysis of learning and performance, which will help students learn from their failures and successes on an individual and team level.

Top Notch Professionals

This unique program was built by a professional team made up of the leading experts in Cyber Security, with vast knowledge and experience in training, too.

Eran Lasser

CEO of Wawiwa

Eran is a tech education entrepreneur with over 20 years of experience. Eran founded and managed four IT training companies: John Bryce Training (Israel), TRIG (China), JB-IQsoft (Hungary), KocBryce (Turkey). Eran also partnered to establish  DAN IT Education (Ukraine), Techub (Georgia), and more. In addition, Eran managed Mentergy, which provides e-learning and distance learning solutions. Over the years, he was responsible for the reskilling of more than 50,000 individuals now working as tech professionals.

Daniel Anderson

Chief Training Officer

Daniel is responsible for updating state-of-the-art topics in the company’s tech training programs, and for maintaining its training methodologies. Daniel was the Chief Trainer at the Israel Defense Force’s Tech Training Center and is a graduate of the IDF training process. He develops and delivers a wide range of programming courses, and is a Full-Stack Developer and Data Scientist.

Nadav Nachmias

Head of Cybersecurity Programs

Nadav (CISSP, MBA, Adv.) is a Cybersecurity specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response and Cyber Forensics).

Our Graduates Have Been Hired By the Best

Program Curriculum

  • Introduction to Linux OS Environment
  • Installing and Configuring Linux OS as a VM
  • System Folders and Permissions
  • Users Management and Ownership
  • Linux Services Management and Configuration
  • Bash Scripting
  • Linux Local System Exploit
  • Linux Process Manipulation and Control
  • Build your Lab Environment
  • Reconnaissance
  • Vulnerability Analysis
  • The Metasploit Framework
  • Payloads and Shells
  • Exploitation
  • Bypass Techniques
  • Post Exploitation
  • Reporting and Communicating
  • Planning and Scoping
  • Introduction to WebApp Security
  • Burp Suite (Target, Proxy, Scanner, Intruder, Repeater, Decoder)
  • The HTML Protocol
  • HTML Injection
  • XSS
  • Web Reconnaissance
  • Session Hijacking + Ways of Protection
  • Cross Site Request Forgery (CSRF)
  • Server-Side Request Forgery (SSRF)
  • Local File Inclusion (LFI)
  • Directory Traversal
  • RCE – Remote Code Execution
  • Blind Command injection
  • SQL injection
  • File Upload
  • Automation Scanners
  • Authentication
  • Programming Concepts and Python Basics
  • Identifying Services
  • Port Scanning and Banner Grabbing
  • Hacking Remote Services
  • Attacking Web Applications
  • Spiders and Web Crawlers
  • Automations and Mechanize
  • Networking with SCAPY
  • Offensive SCAPY
  • The Shodan API
  • Anti-Virus with Python
  • Digital Evidence Gathering
  • Computer Systems Infrastructures
  • Memory Storage and Management
  • File System Types and Common File Systems
  • Windows OS Forensics
  • Understanding NTFS and Storage Management
  • Steganography Techniques
  • Extracting Windows Registry and Query Manipulations
  • Windows Log System Explained
  • Working with RAW Image Format
  • Investigating and Recovering Deleted Information
  • How RAM Operates in Windows OS and Data extraction
  • Mastering Access-Data FTK imager
  • Memory Capture and Diagnostic Methodologies
  • File Forensics and Metadata Information
  • File Carving Techniques – Manual and Automatic Tools
  • Malware Analysis Definitions and Terminology
  • Static Malware Analysis as First Step – Tools and Achievements
  • Dynamic Malware Analysis – Preparing Sandbox Lab
  • Process Manipulation and Analysis
  • Assembly Programing Basics – Intel 80×86 Architecture (NASM)
  • Understanding Number Bases
  • Register Types and How Memory Data is Organized
  • RAM Memory from the Machines Point of View
  • Memory Management Order Little-Endian vs Big-Endian
  • Assembly Functions
  • Understanding the Stack and Registers
  • Debugging PE Binaries using GDB
  • Working with Additional Debuggers – OllyDBG and Immunity Debugger
  • Working with Disassembler – IDA Pro
  • Python Implementation in Assembly
  • Anti-Debugging and Anti-Forensics Techniques
  • Packing and Unpacking Data in the Memory
  • How Packers work UPX and Advance Packing
  • Buffer Overflow – Programing Concept
  • Buffer Overflow in Network Services
  • Buffer Overflow Vulnerabilities in Linux and Windows
  • Format String Vulnerability Abuse
  • Understanding and Building Cracks
  • Reverse Engineering Practical Phase
  • Introduction to IoT
  • IoT Attack Surface
  • Setting your own IoT Exploitation VM
  • Firmware Analysis
  • Emulating Firmware
  • Tempering IoT Firmware
  • WebApp Penetration for IoT Devices
  • Analyzing IoT Devices
  • Working with IoT Exploitation Devices

FAQs

Cyber Security Engineers create and execute secure network solutions that provide security against cyber-attacks and hackers. They also monitor and test systems and networks on a regular basis to ensure they’re functioning as intended and are safe to use. A Cyber Security Engineer’s duties include:

  • Identifying vulnerabilities and security threats, validating cybersecurity compliance, and reducing risk
  • Performing scanning and penetration testing
  • Providing security evaluations of software applications, systems, and networks
  • Selecting and implementing security controls

Yes! All graduates who have successfully completed the program will receive a Cyber Security Engineer certificate.

Thousands of alumni use their course certificate to demonstrate skills to potential employers, along with their LinkedIn networks. Our cyber programs are well-regarded by many top employers, who contribute to our curriculum and partner with us to train their own teams.

If there are no restrictions, studies take place mainly at our physical center. In case of any travel or gathering restrictions, the program moves seamlessly online – with live interactive sessions with your trainers. Some learning materials – like class recordings and topics for self-study – can be watched on-demand from anywhere. 

Register your interest, take a 1-hour online assessment test, and have a talk with one of our career advisors.

You might want to check out other programs that are suitable for individuals with no background in programming, such as our Cybersecurity Analyst program!

Don’t have a programming background? A 70-hour introductory program is available to close those gaps. Otherwise, all candidates take a computerized assessment to ensure that they have the right personality, as well as the basic math and logic skills, to complete the program and be successful in their future jobs. 

Want to Consult About Your Future Tech Career?

We'd love to help you with any questions!