Cyber Security Engineer (Advanced)
Upcoming course: 27/1, 300 Hours / 6 Months, Evening course
Your best path to upskill and advacne your cybersecurity career. This part-time advanced cybersecurity program features expert instruction, hands-on projects, and live labs to practice handling the latest security attack vectors.
Studies suggest a huge shortage in Cyber Security Engineers and a constant increase in demand for this profession. According to Deloitte, “A massive and growing talent shortfall is one of the most critical challenges facing the cybersecurity world today. In fact, nowhere in IT is the talent shortage more pronounced than in the cyber arena.”
Cyber attacks are on the rise everywhere you look, making cybersecurity one of the hottest professions in technology. The highly lucrative role of a Cyber Security Engineer puts up a fight against hackers looking to penetrate an organization’s network for malicious purposes.
Servir como a vanguarda da defesa das organizações
Learn how to prevent significant damage to an organization’s network. Graduates of this program develop in-depth knowledge of varied technologies, cybersecurity tools, emerging threats, typical vulnerabilities, and hacking patterns. The program establishes advanced skills in programming and automation of cyber attacks and defense, penetration testing, cyber forensics, and reverse engineering.
Train with Industry Experts
Equip yourself to succeed in a rapidly expanding field with help from our network of cyber experts, instructors, hiring partners, and alumni. The Cyber Security Engineer curriculum was created in collaboration with the industry’s leading companies to make our programs as relevant as possible to the local industry’s needs and to hackers’ latest game.
Entrega um Projeto Profissional
We believe that the best learning is done through hands-on work. Accordingly, the entire program is run as an ongoing lab during which students are required to install attack and defense environments, set up and build cybersecurity tools, and experience scenarios simulating real-world events.
As the program covers diverse multidisciplinary knowledge and skills, the program’s final Bring-It-Together (BIT) Project will be devoted to conducting an integrative lab scenario that will require students to demonstrate knowledge, skills, and capabilities from all of the disciplines they have learned.
Para quem é este Programa?
Individuals with some math skills and prior experience in programming, who aspire to launch a career in Cyber Security.
Real-World Simulations in Cyber Labs
- Laboratórios cibernéticos avançados para formar a próxima geração de profissionais cibernéticos.
- Permite que os trainers demonstrem e deixem os alunos vivenciar cenários da vida real. Os alunos podem experimentar o potencial com respostas em tempo real.
- Os Dashboard dos alunos e relatórios detalhados fornecem um análise completa da aprendizagem e desempenho, que ajudará os alunos a aprender com suas falhas e sucessos em nível individual e de equipa.
Profissionais de primeira linha
Este programa exclusivo foi construído por uma equipa de profissionais composta pelos principais especialistas em Cyber Security, com vasto conhecimento e experiência também em formação.
Eran Lasser
CEO of Wawiwa
Eran is a tech education entrepreneur with over 20 years of experience. Eran founded and managed four IT training companies: John Bryce Training (Israel), TRIG (China), JB-IQsoft (Hungary), KocBryce (Turkey). Eran also partnered to establish DAN IT Education (Ukraine), Techub (Georgia), and more. In addition, Eran managed Mentergy, which provides e-learning and distance learning solutions. Over the years, he was responsible for the reskilling of more than 50,000 individuals now working as tech professionals.
Daniel Anderson
Chief Training Officer
Daniel is responsible for updating state-of-the-art topics in the company’s tech training programs, and for maintaining its training methodologies. Daniel was the Chief Trainer at the Israel Defense Force’s Tech Training Center and is a graduate of the IDF training process. He develops and delivers a wide range of programming courses, and is a Full-Stack Developer and Data Scientist.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav (CISSP, MBA, Adv.) é especialista em segurança cibernética com mais de 15 anos de experiência, com foco em estratégias de segurança cibernética, arquitetura e reskiling de colaboradores em empresas. A sua experiência prática tornou-o intuitivo a desenvolver diversos programas e materiais de formação em várias áreas de Segurança Cibernética (incluindo Gestão de Segurança Cibernética, Tratamento e Resposta a Incidentes e Forense Cibernética).
A nossa metodologia fez com que trainees no final do programa tenham sido empregados nestas empresas
Program Curriculum
- Introduction to Linux OS Environment
- Installing and Configuring Linux OS as a VM
- System Folders and Permissions
- Users Management and Ownership
- Linux Services Management and Configuration
- Bash Scripting
- Linux Local System Exploit
- Linux Process Manipulation and Control
- Build your Lab Environment
- Reconnaissance
- Vulnerability Analysis
- The Metasploit Framework
- Payloads and Shells
- Exploitation
- Bypass Techniques
- Post Exploitation
- Reporting and Communicating
- Planning and Scoping
- Introduction to WebApp Security
- Burp Suite (Target, Proxy, Scanner, Intruder, Repeater, Decoder)
- The HTML Protocol
- HTML Injection
- XSS
- Web Reconnaissance
- Session Hijacking + Ways of Protection
- Cross Site Request Forgery (CSRF)
- Server-Side Request Forgery (SSRF)
- Local File Inclusion (LFI)
- Directory Traversal
- RCE – Remote Code Execution
- Blind Command injection
- SQL injection
- File Upload
- Automation Scanners
- Authentication
- Programming Concepts and Python Basics
- Identifying Services
- Port Scanning and Banner Grabbing
- Hacking Remote Services
- Attacking Web Applications
- Spiders and Web Crawlers
- Automations and Mechanize
- Networking with SCAPY
- Offensive SCAPY
- The Shodan API
- Anti-Virus with Python
- Digital Evidence Gathering
- Computer Systems Infrastructures
- Memory Storage and Management
- File System Types and Common File Systems
- Windows OS Forensics
- Understanding NTFS and Storage Management
- Steganography Techniques
- Extracting Windows Registry and Query Manipulations
- Windows Log System Explained
- Working with RAW Image Format
- Investigating and Recovering Deleted Information
- How RAM Operates in Windows OS and Data extraction
- Mastering Access-Data FTK imager
- Memory Capture and Diagnostic Methodologies
- File Forensics and Metadata Information
- File Carving Techniques – Manual and Automatic Tools
- Malware Analysis Definitions and Terminology
- Static Malware Analysis as First Step – Tools and Achievements
- Dynamic Malware Analysis – Preparing Sandbox Lab
- Process Manipulation and Analysis
- Assembly Programing Basics – Intel 80×86 Architecture (NASM)
- Understanding Number Bases
- Register Types and How Memory Data is Organized
- RAM Memory from the Machines Point of View
- Memory Management Order Little-Endian vs Big-Endian
- Assembly Functions
- Understanding the Stack and Registers
- Debugging PE Binaries using GDB
- Working with Additional Debuggers – OllyDBG and Immunity Debugger
- Working with Disassembler – IDA Pro
- Python Implementation in Assembly
- Anti-Debugging and Anti-Forensics Techniques
- Packing and Unpacking Data in the Memory
- How Packers work UPX and Advance Packing
- Buffer Overflow – Programing Concept
- Buffer Overflow in Network Services
- Buffer Overflow Vulnerabilities in Linux and Windows
- Format String Vulnerability Abuse
- Understanding and Building Cracks
- Reverse Engineering Practical Phase
- Introduction to IoT
- IoT Attack Surface
- Setting your own IoT Exploitation VM
- Firmware Analysis
- Emulating Firmware
- Tempering IoT Firmware
- WebApp Penetration for IoT Devices
- Analyzing IoT Devices
- Working with IoT Exploitation Devices
FAQs
Cyber Security Engineers create and execute secure network solutions that provide security against cyber-attacks and hackers. They also monitor and test systems and networks on a regular basis to ensure they’re functioning as intended and are safe to use. A Cyber Security Engineer’s duties include:
- Identifying vulnerabilities and security threats, validating cybersecurity compliance, and reducing risk
- Performing scanning and penetration testing
- Providing security evaluations of software applications, systems, and networks
- Selecting and implementing security controls
Sim! Todos os graduados que concluíram com êxito o programa will receive a Cyber Security Engineer certificate.
Milhares de ex-alunos usam seu certificado de curso para demonstrar habilidades a potenciais empregadores, juntamente com suas redes do LinkedIn. O conteúdo do nosso programa de Cybersecurity é valorizado pelos principais empregadores, que contribuem para nosso currículo e em parceria connosco.
Se não houver restrições, os estudos acontecem por agora no nosso centro físico. Todo o conteúdo é online e brevemente vamos iniciar programas full online e híbridos e com isso prevemos sessões interativas online com seus trainers. Os materiais de estudo, como gravações de aulas e tópicos para trabalhos de casa, podem ser visualizados online no perfil do aluno.
Registe o seu interesse abaixo, fará depois um Teste Diagnóstico online de aproximadamente 1 hora e por fim feedback do nosso Program Consultant.
Pode descobrir outros cursos ou programas that are suitable for individuals with no background in programming, such as our Cybersecurity Analyst program!
Don’t have a programming background? A 70-hour introductory program is available to close those gaps. Otherwise, all candidates take a computerized assessment to ensure that they have the right personality, as well as the basic math and logic skills, to complete the program and be successful in their future jobs.