CYBERSECURITY
PROFESSIONAL PROGRAM

30 Hours

Introductory Course

370 Hours

Extended Course

Program Objectives

Provide your Continuing Education students with the tools and knowledge today’s digital workplace requires.

Cyber Security Professionals are responsible for managing Cyber Security strategy, prevention of attacks, and handling attacks as they occur. Students enrolled in this course learn the fundamentals of networking, systems, and programming, and best practices in advanced Cyber Security strategy. They’ll hit the ground running as the go-to employees in any digital workplace, serving as the first line of defense against Cyber Threats.

Program Overview

This unique Introductory Course teaches students
about defensive cybersecurity and IT fundamentals
to assess if this is the right career path for them.
The course also ensures classroom success
by facilitating the advancement of only those
students with the necessary passion and skills to
ultimately land a career in the field.

At the end of the course, each student takes
a summary exam and has a one-on-one
assessment to examine their future in the
program. Most importantly, this course discusses
students’ expectations of working in cybersecurity
versus the reality

Material introduces students to the fundamentals
of Networking, the Linux and Windows operating
systems, and virtualization concepts. Students
also learn to run basic commands and computer
communication protocols, develop a firm
understanding of basic operating system
structures, and become familiarized with the
Cyber Attack Cycle. Experiential education
provides students with hands-on exercises so
they gain a better understanding of cybersecurity
countermeasures and defense techniques.

Countless companies worldwide rely on Windows
Server 2012 to manage their organization’s
computers and networks using Group Policy
Objects. Students learn how to set up domain
environments using Active Directory, which
enables central control of all computers and
users in a domain. This course also teaches
students how to manage network services, such
as DNS and DHCP servers, how to configure
security servers to harden systems, and the
differences between Windows Server 2012 and
newer versions, such as 2016 and 2019.

Today, network devices are installed in almost all business sectors, including government, finance, transportation, technology, healthcare, manufacturing, hospitality, and more. This course provides students with an in-depth understanding of various protocols, network layers, and devices.

Cybersecurity professionals must have a comprehensive understanding of networking. This course teaches all the necessary networking concepts, including protocols, topologies, and network devices. While participating in this course, students will be able to obtain their first cyberrelated certificate, since they will be prepared to take the CompTIA Network+ exam.*

This course focuses on the growing use of cloud platforms, and teaches how environments are managed and secured in the cloud. Students also build the knowledge base and skill set required to take the AWS Certified Cloud Practitioner exam.*

Many organizations today are moving their infrastructure to cloud platforms that include centralized managed solutions for all their needs. All their servers and databases are migrated to solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. These platforms provide services ranging from basic physical servers to completely managed solutions. Knowing how to leverage such platforms, work with them, and secure them, is a crucial aspect of today’s cyber industry.

This course teaches students how to manage and operate the Linux open-source operating system, and specifically the cybersecurity distribution known as Kali Linux. Students are taught the security aspects and hardening of such environments. This course also prepares students for the LPI Linux Essentials certification exam.*

Linux has grown very popular in recent years due to its use in IoT products and the benefits it lends to information security personnel. Students learn to navigate the Linux file system, run basic commands, configure network services, handle access permissions, and exploit mitigations.

The purpose of this course is to build the skills students need to secure, manage, and operate network communication equipment and systems for a variety of organizational types. During this course, students prepare for the Cisco Certified CyberOps Associate exam.*

The curriculum focuses on enabling students to achieve technical positions in organizations specializing in technological fields and business operations by giving them the digital skill set needed to stand out to active potential employers in the market.

This course provides students with the knowledge and practical training needed to design and maintain secure infrastructures. Students also learn to implement various security countermeasures and build the knowledge base required to take the CompTIA Security+ certification exams.*

This course provides an in-depth examination of the various defensive infrastructures. The curriculum focuses on how to design a secure architecture, and familiarizes students with various security measures that can be used to harden networks, devices, and cloud infrastructures. Students also learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a widespread open-source solution currently available on the market.

This course introduces students to basic programming concepts and how to implement them using Python, the Cyber and information security industry’s leading programming language. Students learn to set up a Python environment in Windows and Linux, advanced Python programming, and how to use external libraries. All material is taught via immersive training exercises, which provide students with firsthand experience in building tools to automate cybersecurity tasks.

Guidance is integrated into the cyber infrastructure courses to help students find a position in the role of Cybersecurity Practitioner, to become involved with IT and Network Operations Center (NOC) teams across a variety of organizations, and to become the cybersecurity specialist for those teams.

This course delves deeper into the mindset of criminal hackers to provide students with an indepth understanding of how black-hat hackers think, where they come from, and what they intend to do, in order to beat them at their own game and stay ahead of impending threats.

Students learn how to execute and defend against a variety of cyber attacks, including social engineering attacks, network attacks, application attacks, and cryptographic attacks. Hands-on labs provide students with the tools, knowledge, and specialized skill set needed to discover and exploit system vulnerabilities. This course provides further preparation for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams.*

This course covers digital forensics and incident response (DFIR). Curriculum focuses on preparing students for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams*. Students learn how to conduct successful threat hunting procedures, how to identify elusive threats that evade existing security countermeasures, how to handle cyber attacks as they occur, and the dynamics of working on a Security Operations Center (SOC) team.

Throughout this course, students study advanced threat hunting techniques such as machine learning, situational awareness, user behavior analytics, and intelligence. The curriculum seeks to deeply familiarize students with the role of SOC teams across a variety of organizations and how to prepare for and manage attacks in real time. Students also conduct an in-depth study of digital forensics and learn to investigate network attacks, host attacks, and how to reverse engineer malware to understand its purpose and execution on vulnerable systems.

Hackers always seem to be many steps ahead of us. The only way to defend ourselves and stay ahead of impending cyber threats is to become experts at divergent thinking and put ourselves in the mind of a hacker. This course introduces students to the fundamentals of Game Theory—a tool that is essential to understanding how players interact, the rational (or irrational) thinking of attackers, and thinking out of the box in terms of securing networks.

The course material broadens students’ perspectives on many strategic topics, equips them with the skills required to use Game Theory to model real-world scenarios, and teaches them to apply the methods to find solutions for the defense of an organization.

This specialized course provides students with the training and tools needed to land a position in the cybersecurity field. The course’s career planning services include personalized interview training, professional networking, internship placement assistance, and one-on-one consultations devoted to perfecting LinkedIn profiles and CVs.

01| Introductory Course
02 | Microsoft Security
03 | Computer Networking
04 | Cloud Security
05 | Linux Security
06 | Network Security
07 | Cyber Infrastructure & Technology
08 | Introduction to Python for Security
09 | Offensive Security: Ethical Hacking
10 | Incident Response & Threat Hunting
11 | Game Theory Strategy in Cybersecurity
12 | Career Services
course icon
Introductory Course

This unique Introductory Course teaches students about defensive cybersecurity and IT fundamentals to assess if this is the right career path for them. The course also ensures classroom success by facilitating the advancement of only those students with the necessary passion and skills to ultimately land a career in the field.

At the end of the course, each student takes a summary exam and has a one-on-one assessment to examine their future in the program. Most importantly, this course discusses students' expectations of working in cybersecurity versus the reality

Material introduces students to the fundamentals of Networking, the Linux and Windows operating systems, and virtualization concepts. Students also learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle. Experiential education provides students with hands-on exercises so they gain a better understanding of cybersecurity countermeasures and defense techniques.

course icon
Microsoft Security

Countless companies worldwide rely on Windows Server 2012 to manage their organization's computers and networks using Group Policy Objects. Students learn how to set up domain environments using Active Directory, which enables central control of all computers and users in a domain. This course also teaches students how to manage network services, such as DNS and DHCP servers, how to configure security servers to harden systems, and the differences between Windows Server 2012 and newer versions, such as 2016 and 2019.

course icon
Computer Networking

Today, network devices are installed in almost all business sectors, including government, finance, transportation, technology, healthcare, manufacturing, hospitality, and more. This course provides students with an in-depth understanding of various protocols, network layers, and devices.

Cybersecurity professionals must have a comprehensive understanding of networking. This course teaches all the necessary networking concepts, including protocols, topologies, and network devices. While participating in this course, students will be able to obtain their first cyberrelated certificate, since they will be prepared to take the CompTIA Network+ exam.*

course icon
Cloud Security

This course focuses on the growing use of cloud platforms, and teaches how environments are managed and secured in the cloud. Students also build the knowledge base and skill set required to take the AWS Certified Cloud Practitioner exam.*

Many organizations today are moving their infrastructure to cloud platforms that include centralized managed solutions for all their needs. All their servers and databases are migrated to solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. These platforms provide services ranging from basic physical servers to completely managed solutions. Knowing how to leverage such platforms, work with them, and secure them, is a crucial aspect of today’s cyber industry.

course icon
Linux Security

This course teaches students how to manage and operate the Linux open-source operating system, and specifically the cybersecurity distribution known as Kali Linux. Students are taught the security aspects and hardening of such environments. This course also prepares students for the LPI Linux Essentials certification exam.*

Linux has grown very popular in recent years due to its use in IoT products and the benefits it lends to information security personnel. Students learn to navigate the Linux file system, run basic commands, configure network services, handle access permissions, and exploit mitigations.

course icon
Network Security

The purpose of this course is to build the skills students need to secure, manage, and operate network communication equipment and systems for a variety of organizational types. During this course, students prepare for the Cisco Certified CyberOps Associate exam.*

The curriculum focuses on enabling students to achieve technical positions in organizations specializing in technological fields and business operations by giving them the digital skill set needed to stand out to active potential employers in the market.

course icon
Cyber Infrastructure & Technology

This course provides students with the knowledge and practical training needed to design and maintain secure infrastructures. Students also learn to implement various security countermeasures and build the knowledge base required to take the CompTIA Security+ certification exams.*

This course provides an in-depth examination of the various defensive infrastructures. The curriculum focuses on how to design a secure architecture, and familiarizes students with various security measures that can be used to harden networks, devices, and cloud infrastructures. Students also learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a widespread open-source solution currently available on the market.

course icon
Introduction to Python for Security

This course introduces students to basic programming concepts and how to implement them using Python, the Cyber and information security industry's leading programming language. Students learn to set up a Python environment in Windows and Linux, advanced Python programming, and how to use external libraries. All material is taught via immersive training exercises, which provide students with firsthand experience in building tools to automate cybersecurity tasks.

Guidance is integrated into the cyber infrastructure courses to help students find a position in the role of Cybersecurity Practitioner, to become involved with IT and Network Operations Center (NOC) teams across a variety of organizations, and to become the cybersecurity specialist for those teams.

course icon
Offensive Security: Ethical Hacking

This course delves deeper into the mindset of criminal hackers to provide students with an indepth understanding of how black-hat hackers think, where they come from, and what they intend to do, in order to beat them at their own game and stay ahead of impending threats.

Students learn how to execute and defend against a variety of cyber attacks, including social engineering attacks, network attacks, application attacks, and cryptographic attacks. Hands-on labs provide students with the tools, knowledge, and specialized skill set needed to discover and exploit system vulnerabilities. This course provides further preparation for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams.*

course icon
Incident Response & Threat Hunting

This course covers digital forensics and incident response (DFIR). Curriculum focuses on preparing students for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams*. Students learn how to conduct successful threat hunting procedures, how to identify elusive threats that evade existing security countermeasures, how to handle cyber attacks as they occur, and the dynamics of working on a Security Operations Center (SOC) team.

Throughout this course, students study advanced threat hunting techniques such as machine learning, situational awareness, user behavior analytics, and intelligence. The curriculum seeks to deeply familiarize students with the role of SOC teams across a variety of organizations and how to prepare for and manage attacks in real time. Students also conduct an in-depth study of digital forensics and learn to investigate network attacks, host attacks, and how to reverse engineer malware to understand its purpose and execution on vulnerable systems.

course icon
Game Theory Strategy inCybersecurity

Hackers always seem to be many steps ahead of us. The only way to defend ourselves and stay ahead of impending cyber threats is to become experts at divergent thinking and put ourselves in the mind of a hacker. This course introduces students to the fundamentals of Game Theory—a tool that is essential to understanding how players interact, the rational (or irrational) thinking of attackers, and thinking out of the box in terms of securing networks.

The course material broadens students' perspectives on many strategic topics, equips them with the skills required to use Game Theory to model real-world scenarios, and teaches them to apply the methods to find solutions for the defense of an organization.

course icon
Career Services

This specialized course provides students with the training and tools needed to land a position in the cybersecurity field. The course's career planning services include personalized interview training, professional networking, internship placement assistance, and one-on-one consultations devoted to perfecting LinkedIn profiles and CVs.

01 |

TRIAL COURSE

02 |

INTRODUCTION TO PYTHON FOR SECURITY

03 |

GAME THEORY STRATEGY IN CYBER SECURITY

04 |

OPERATING SYSTEM SECURITY: WINDOWS & LINUX

05 |

NETWORK SECURITY

06 |

CYBER INFRASTRUCTURE & TECHNOLOGY

07 |

OFFENSIVE SECURITY: ETHICAL HACKING

08 |

INCIDENT RESPONSE & THREAT HUNTING

09 |

CAREER SERVICES

Program Objectives

HackerU equips its partners in Continuing Education with the essential tools students need to get ahead in today's digital workplace.

Global Education

Students receive the training to pass the industry’s most essential certification exams: CCNA, CCENT, CompTIA Security+, CompTIA CySA+, CompTIA Cloud+, Linux LPI Essentials, Microsoft MCSA.

Appropriate For Beginners

This course is suitable for students with no prior background in IT or Cyber Security. Those with some experience in technology are also fit to enroll in this program.

Career Advancement

With this program, students take advantage of the opportunity to build stronger skill sets and advance their careers with a dynamic, market-driven curriculum. 

Global Education
Students receive the training to pass the industry’s most essential certification exams: CCNA, CCENT, CompTIA Security+, CompTIA CySA+, CompTIA Cloud+, Linux LPI Essentials, Microsoft MCSA.

Appropriate For Beginners

This course is suitable for students with no prior background in IT or Cyber Security. Those with some experience in technology are also fit to enroll in this program.

Career Advancement

With this program, students take advantage of the opportunity to build stronger skill sets and advance their careers with a dynamic, market-driven curriculum. 

Career-Prep Curriculum

Work with us to build a curriculum designed to meet current market demands.

Israeli Expertize

Incomparable instruction rooted in the expertise of Israel’s Cyber Security elite.

Career-Prep Curriculum
Work with us to build a curriculum designed to meet current market demands.
Israeli Expertize

Incomparable instruction rooted in the expertise of Israel’s Cyber Security elite.

Certifications

This program provides hands-on training and preparation for the following industry exams:

Network+

Network+ By Comptia

AWS

AWS Certified Cloud Practitioner

LPI

Network+ By Comptia

CCNA

CCNA Cyberops By Cisco

Security+

Security+ By Comptia

CYSA+

CYSA+ By Comptia

SSCP

SSCP By ISC2

Network+

Network+ By Comptia

AWS

AWS Certified Cloud Practitioner

LPI

Network+ By Comptia

CCNA

CCNA Cyberops By Cisco

Security+

Security+

CYSA+

CYSA+ By Comptia

SSCP

SSCP By ISC2

The Hackeru Process

Every student enrolled in a Continuing Education program empowered by HackerU’s curriculum gets the benefit of our unique training and career development process.

Appropriate For Beginners

A 30-hour trial course covering the fundamentals of the Cyber and IT fields ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.* *Terms & Conditions Apply

Extended Course Enrollment

All students who pass the Trial Course and who choose to continue on to the Extended Program have shown great potential for succeeding in the field of Cyber Security.

Jump-Starting Careers

Each student receives the hands-on training Cyber Security Professionals need to meet and exceed the prestigious market demands required by today’s employers. Career services are built in to the program, providing students with guidance in transitioning to an active Cyber career.

Trial Course Selection

A 30-hour trial course covering the fundamentals of the Ethical Hacking field ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.*

*Terms & Conditions Apply

Extended Course Enrollment

All students who pass the Trial Course and who choose to continue on to the Extended Program have shown great potential for succeeding in the advanced field of Ethical Hacking.

Jump-Starting Careers

Each student receives the hands-on training and knowledge Ethical Hackers need to meet and exceed the prestigious market demands required by today’s employers. Career services are built into the program, providing students with guidance in transitioning to an active Cyber career.

Trial Course Selection

A 30-hour trial course covering the fundamentals of the Cyber and IT fields ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.*

*Terms & Conditions Apply

Extended Course Enrollment

All students who pass the Trial Course and who choose to continue on to the Extended Program have shown great potential for succeeding in the field of Cyber Security.

Jump-Starting Careers

Each student receives the hands-on training Cyber Security Professionals need to meet and exceed the prestigious market demands required by today’s employers. Career services are built in to the program, providing students with guidance in transitioning to an active Cyber career.

Give Your Students
the Code to Career Success

Our Expert Advisors

Leading Israeli Cyber Security Specialists Lend Their World-Class Expertise to HackerU’s Curricula.

Ilan Mindel

With over 6 years of cyber-tech leadership, Ilan is the Chief Technology Officer at HackerU Solutions as well as an Information Security Instructor at HackerU. He has a robust record of Ethical Hacking success and is known as one of the best in his field in Israel.

Ajay Menendez

Ajay has 30 years of experience as a cybersecurity professional, technology engineer, master instructor, education developer, executive program director and security evangelist. He is a pioneer in cybersecurity bootcamp education and his work has been ranked among the best in the United States.

Omri Sagron

Head of Cyber Security at HackerU, Omri Sagron shares his vast experience in the fields of IT, Critical Infrastructure, and Cyber Security. In the Israel Defense Forces, he achieved the rank of Captain in MAMRAM, an elite group where he served with distinction.

Nir Jacob Saias

Nir Jacob Saias is a Penetration Tester at Bugsec and teaches Penetration Testing and Web App Security at HackerU. He is a former Israel Defense Forces communications officer and has served a in multitude of technology and Cybersecurity roles.

The Right Student for This Program

This program is for individuals who want to reskill and enter the financially rewarding field of Cyber Security, a dynamic, fast-growing field known for its high job security, lucrative benefits, and mobility.

Technical Aptitude

Cyber Security professionals have an appetite for all things Cyber and thrive in a fast-paced, challenging Cyber environment. They can use their innate technical talent and capabilities to upskill to a career in Cybersecurity.

Responsibility

Cyber Security professionals are responsible for maintaining organizations’ core Cyber Security activities. Commitment is critical, as they’re tasked with determining Cyber vulnerabilities on a global scale.

Determination

Cyber Security professionals have a knack for solving high-level problems. They’re always looking for new challenges to overcome because they believe that finding solutions offers opportunity for discovery.

Skip to content