DIGITAL MARKETING PROGRAM

20 Hours

Introductory Course

380 Hours

Extended Course

Program Objectives

Provide your Continuing Education students with the tools and knowledge today’s digital workplace requires.

Digital Marketers are employed to keep their thumb on the digital pulse as platforms and technologies evolve. Students enrolled in this course will learn will learn digital marketing fundamentals, terminology, existing advertising and social networking platforms, and the SEO and PPC techniques and tools needed to leverage the ever-evolving, digital marketing landscape. The program’s in-depth curricula will aid students in building a comprehensive digital portfolio filled with digital projects that utilize the marketing industry’s most in-demand tools and techniques.

Program Overview

This unique Introductory Course teaches students
about defensive cybersecurity and IT fundamentals
to assess if this is the right career path for them.
The course also ensures classroom success
by facilitating the advancement of only those
students with the necessary passion and skills to
ultimately land a career in the field.

At the end of the course, each student takes
a summary exam and has a one-on-one
assessment to examine their future in the
program. Most importantly, this course discusses
students’ expectations of working in cybersecurity
versus the reality

Material introduces students to the fundamentals
of Networking, the Linux and Windows operating
systems, and virtualization concepts. Students
also learn to run basic commands and computer
communication protocols, develop a firm
understanding of basic operating system
structures, and become familiarized with the
Cyber Attack Cycle. Experiential education
provides students with hands-on exercises so
they gain a better understanding of cybersecurity
countermeasures and defense techniques.

Countless companies worldwide rely on Windows
Server 2012 to manage their organization’s
computers and networks using Group Policy
Objects. Students learn how to set up domain
environments using Active Directory, which
enables central control of all computers and
users in a domain. This course also teaches
students how to manage network services, such
as DNS and DHCP servers, how to configure
security servers to harden systems, and the
differences between Windows Server 2012 and
newer versions, such as 2016 and 2019.

Today, network devices are installed in almost all business sectors, including government, finance, transportation, technology, healthcare, manufacturing, hospitality, and more. This course provides students with an in-depth understanding of various protocols, network layers, and devices.

Cybersecurity professionals must have a comprehensive understanding of networking. This course teaches all the necessary networking concepts, including protocols, topologies, and network devices. While participating in this course, students will be able to obtain their first cyberrelated certificate, since they will be prepared to take the CompTIA Network+ exam.*

This course focuses on the growing use of cloud platforms, and teaches how environments are managed and secured in the cloud. Students also build the knowledge base and skill set required to take the AWS Certified Cloud Practitioner exam.*

Many organizations today are moving their infrastructure to cloud platforms that include centralized managed solutions for all their needs. All their servers and databases are migrated to solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. These platforms provide services ranging from basic physical servers to completely managed solutions. Knowing how to leverage such platforms, work with them, and secure them, is a crucial aspect of today’s cyber industry.

This course teaches students how to manage and operate the Linux open-source operating system, and specifically the cybersecurity distribution known as Kali Linux. Students are taught the security aspects and hardening of such environments. This course also prepares students for the LPI Linux Essentials certification exam.*

Linux has grown very popular in recent years due to its use in IoT products and the benefits it lends to information security personnel. Students learn to navigate the Linux file system, run basic commands, configure network services, handle access permissions, and exploit mitigations.

The purpose of this course is to build the skills students need to secure, manage, and operate network communication equipment and systems for a variety of organizational types. During this course, students prepare for the Cisco Certified CyberOps Associate exam.*

The curriculum focuses on enabling students to achieve technical positions in organizations specializing in technological fields and business operations by giving them the digital skill set needed to stand out to active potential employers in the market.

This course provides students with the knowledge and practical training needed to design and maintain secure infrastructures. Students also learn to implement various security countermeasures and build the knowledge base required to take the CompTIA Security+ certification exams.*

This course provides an in-depth examination of the various defensive infrastructures. The curriculum focuses on how to design a secure architecture, and familiarizes students with various security measures that can be used to harden networks, devices, and cloud infrastructures. Students also learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a widespread open-source solution currently available on the market.

This course introduces students to basic programming concepts and how to implement them using Python, the Cyber and information security industry’s leading programming language. Students learn to set up a Python environment in Windows and Linux, advanced Python programming, and how to use external libraries. All material is taught via immersive training exercises, which provide students with firsthand experience in building tools to automate cybersecurity tasks.

Guidance is integrated into the cyber infrastructure courses to help students find a position in the role of Cybersecurity Practitioner, to become involved with IT and Network Operations Center (NOC) teams across a variety of organizations, and to become the cybersecurity specialist for those teams.

This course delves deeper into the mindset of criminal hackers to provide students with an indepth understanding of how black-hat hackers think, where they come from, and what they intend to do, in order to beat them at their own game and stay ahead of impending threats.

Students learn how to execute and defend against a variety of cyber attacks, including social engineering attacks, network attacks, application attacks, and cryptographic attacks. Hands-on labs provide students with the tools, knowledge, and specialized skill set needed to discover and exploit system vulnerabilities. This course provides further preparation for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams.*

This course covers digital forensics and incident response (DFIR). Curriculum focuses on preparing students for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams*. Students learn how to conduct successful threat hunting procedures, how to identify elusive threats that evade existing security countermeasures, how to handle cyber attacks as they occur, and the dynamics of working on a Security Operations Center (SOC) team.

Throughout this course, students study advanced threat hunting techniques such as machine learning, situational awareness, user behavior analytics, and intelligence. The curriculum seeks to deeply familiarize students with the role of SOC teams across a variety of organizations and how to prepare for and manage attacks in real time. Students also conduct an in-depth study of digital forensics and learn to investigate network attacks, host attacks, and how to reverse engineer malware to understand its purpose and execution on vulnerable systems.

Hackers always seem to be many steps ahead of us. The only way to defend ourselves and stay ahead of impending cyber threats is to become experts at divergent thinking and put ourselves in the mind of a hacker. This course introduces students to the fundamentals of Game Theory—a tool that is essential to understanding how players interact, the rational (or irrational) thinking of attackers, and thinking out of the box in terms of securing networks.

The course material broadens students’ perspectives on many strategic topics, equips them with the skills required to use Game Theory to model real-world scenarios, and teaches them to apply the methods to find solutions for the defense of an organization.

This specialized course provides students with the training and tools needed to land a position in the cybersecurity field. The course’s career planning services include personalized interview training, professional networking, internship placement assistance, and one-on-one consultations devoted to perfecting LinkedIn profiles and CVs.

01| Introductory Course
02 | Microsoft Security
03 | Computer Networking
04 | Cloud Security
05 | Linux Security
06 | Network Security
07 | Cyber Infrastructure & Technology
08 | Introduction to Python for Security
09 | Offensive Security: Ethical Hacking
10 | Incident Response & Threat Hunting
11 | Game Theory Strategy in Cybersecurity
12 | Career Services
course icon
Introductory Course

This unique Introductory Course teaches students about defensive cybersecurity and IT fundamentals to assess if this is the right career path for them. The course also ensures classroom success by facilitating the advancement of only those students with the necessary passion and skills to ultimately land a career in the field.

At the end of the course, each student takes a summary exam and has a one-on-one assessment to examine their future in the program. Most importantly, this course discusses students' expectations of working in cybersecurity versus the reality

Material introduces students to the fundamentals of Networking, the Linux and Windows operating systems, and virtualization concepts. Students also learn to run basic commands and computer communication protocols, develop a firm understanding of basic operating system structures, and become familiarized with the Cyber Attack Cycle. Experiential education provides students with hands-on exercises so they gain a better understanding of cybersecurity countermeasures and defense techniques.

course icon
Microsoft Security

Countless companies worldwide rely on Windows Server 2012 to manage their organization's computers and networks using Group Policy Objects. Students learn how to set up domain environments using Active Directory, which enables central control of all computers and users in a domain. This course also teaches students how to manage network services, such as DNS and DHCP servers, how to configure security servers to harden systems, and the differences between Windows Server 2012 and newer versions, such as 2016 and 2019.

course icon
Computer Networking

Today, network devices are installed in almost all business sectors, including government, finance, transportation, technology, healthcare, manufacturing, hospitality, and more. This course provides students with an in-depth understanding of various protocols, network layers, and devices.

Cybersecurity professionals must have a comprehensive understanding of networking. This course teaches all the necessary networking concepts, including protocols, topologies, and network devices. While participating in this course, students will be able to obtain their first cyberrelated certificate, since they will be prepared to take the CompTIA Network+ exam.*

course icon
Cloud Security

This course focuses on the growing use of cloud platforms, and teaches how environments are managed and secured in the cloud. Students also build the knowledge base and skill set required to take the AWS Certified Cloud Practitioner exam.*

Many organizations today are moving their infrastructure to cloud platforms that include centralized managed solutions for all their needs. All their servers and databases are migrated to solutions such as Amazon’s AWS, Google Cloud, or Microsoft Azure. These platforms provide services ranging from basic physical servers to completely managed solutions. Knowing how to leverage such platforms, work with them, and secure them, is a crucial aspect of today’s cyber industry.

course icon
Linux Security

This course teaches students how to manage and operate the Linux open-source operating system, and specifically the cybersecurity distribution known as Kali Linux. Students are taught the security aspects and hardening of such environments. This course also prepares students for the LPI Linux Essentials certification exam.*

Linux has grown very popular in recent years due to its use in IoT products and the benefits it lends to information security personnel. Students learn to navigate the Linux file system, run basic commands, configure network services, handle access permissions, and exploit mitigations.

course icon
Network Security

The purpose of this course is to build the skills students need to secure, manage, and operate network communication equipment and systems for a variety of organizational types. During this course, students prepare for the Cisco Certified CyberOps Associate exam.*

The curriculum focuses on enabling students to achieve technical positions in organizations specializing in technological fields and business operations by giving them the digital skill set needed to stand out to active potential employers in the market.

course icon
Cyber Infrastructure & Technology

This course provides students with the knowledge and practical training needed to design and maintain secure infrastructures. Students also learn to implement various security countermeasures and build the knowledge base required to take the CompTIA Security+ certification exams.*

This course provides an in-depth examination of the various defensive infrastructures. The curriculum focuses on how to design a secure architecture, and familiarizes students with various security measures that can be used to harden networks, devices, and cloud infrastructures. Students also learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a widespread open-source solution currently available on the market.

course icon
Introduction to Python for Security

This course introduces students to basic programming concepts and how to implement them using Python, the Cyber and information security industry's leading programming language. Students learn to set up a Python environment in Windows and Linux, advanced Python programming, and how to use external libraries. All material is taught via immersive training exercises, which provide students with firsthand experience in building tools to automate cybersecurity tasks.

Guidance is integrated into the cyber infrastructure courses to help students find a position in the role of Cybersecurity Practitioner, to become involved with IT and Network Operations Center (NOC) teams across a variety of organizations, and to become the cybersecurity specialist for those teams.

course icon
Offensive Security: Ethical Hacking

This course delves deeper into the mindset of criminal hackers to provide students with an indepth understanding of how black-hat hackers think, where they come from, and what they intend to do, in order to beat them at their own game and stay ahead of impending threats.

Students learn how to execute and defend against a variety of cyber attacks, including social engineering attacks, network attacks, application attacks, and cryptographic attacks. Hands-on labs provide students with the tools, knowledge, and specialized skill set needed to discover and exploit system vulnerabilities. This course provides further preparation for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams.*

course icon
Incident Response & Threat Hunting

This course covers digital forensics and incident response (DFIR). Curriculum focuses on preparing students for the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP** certification exams*. Students learn how to conduct successful threat hunting procedures, how to identify elusive threats that evade existing security countermeasures, how to handle cyber attacks as they occur, and the dynamics of working on a Security Operations Center (SOC) team.

Throughout this course, students study advanced threat hunting techniques such as machine learning, situational awareness, user behavior analytics, and intelligence. The curriculum seeks to deeply familiarize students with the role of SOC teams across a variety of organizations and how to prepare for and manage attacks in real time. Students also conduct an in-depth study of digital forensics and learn to investigate network attacks, host attacks, and how to reverse engineer malware to understand its purpose and execution on vulnerable systems.

course icon
Game Theory Strategy inCybersecurity

Hackers always seem to be many steps ahead of us. The only way to defend ourselves and stay ahead of impending cyber threats is to become experts at divergent thinking and put ourselves in the mind of a hacker. This course introduces students to the fundamentals of Game Theory—a tool that is essential to understanding how players interact, the rational (or irrational) thinking of attackers, and thinking out of the box in terms of securing networks.

The course material broadens students' perspectives on many strategic topics, equips them with the skills required to use Game Theory to model real-world scenarios, and teaches them to apply the methods to find solutions for the defense of an organization.

course icon
Career Services

This specialized course provides students with the training and tools needed to land a position in the cybersecurity field. The course's career planning services include personalized interview training, professional networking, internship placement assistance, and one-on-one consultations devoted to perfecting LinkedIn profiles and CVs.

01 |

Introductory Course

02 |

MARKETING & COMMUNICATION FUNDAMENTALS

03 |

SITE HTML + CSS, BUILDING A WORDPRESS WEBSITE

04 |

SEO + ONLINE STORE OPTIMIZATION

05 |

COPYWRITING

06 |

UX (USER EXPERIENCE)

07 |

GOOGLE ANALYTICS

08 |

MOBILE SITE MANAGEMENT & PROMOTION

09 |

CUSTOMER RELATIONSHIP MANAGEMENT

10 |

GOOGLE ADWORDS (PPC)

11 |

SOCIAL MEDIA MARKETING: ORGANIC & PAID

12 |

CAREER SERVICES

Program Objectives

HackerU equips its partners in Continuing Education with the essential tools students need to get ahead in today's digital workplace.

Real-Life Exercises
Students gain relevant digital marketing strategy experience by studying the latest trends in digital marketing and advertising.
Career-Prep Curriculum

Collaborate with us to develop a curriculum designed to meet current market demands.

Israeli Expertise
Incomparable instruction models rooted in the expertise of Israel’s Digital Marketing elite.
Career Advancement

Programs provide the education training essential for acquiring a career in Digital Marketing.

Real-Life Exercises
Students gain relevant digital marketing strategy experience by studying the latest trends in digital marketing and advertising.
Career-Prep Curriculum
Collaborate with us to develop a curriculum designed to meet current market demands.
Israeli Expertize
Incomparable instruction models rooted in the expertise of Israel’s Digital Marketing elite.
Career Advancement
Programs provide the education training essential for acquiring a career in Digital Marketing.
Real-Life Exercises
Students gain relevant digital marketing strategy experience by studying the latest trends in digital marketing and advertising.
Career-Prep Curriculum
Collaborate with us to develop a curriculum designed to meet current market demands.
Israeli Expertize
Incomparable instruction models rooted in the expertise of Israel’s Digital Marketing elite.
Career Advancement
Programs provide the education training essential for acquiring a career in Digital Marketing.

The Hackeru Process

Every student enrolled in a Continuing Education program empowered by HackerU’s curriculum gets the benefit of our unique philosophy and training process.

Introductory Course Selection

A 20-hour Introductory course covering Digital Marketing essentials with an assurance that the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.* *Terms & Conditions Apply

Extended Course Enrollment

All students who pass the Introductory Course and who choose to continue on to the Extended Program are passionate about the field and have been recommended to continue on in the program by their instructors.

Jump-Starting Careers

The Digital Marketing Professional Program equips students with the best-practices and up-to-date tech experience that the industry demands and will evolve as the field does to include skill-sets and abilities not yet defined. Graduates of a HackerU-powered Digital Marketing Program will be at the forefront of the marketing revolution equipped to leverage fundamental techniques across numerous digital platforms.

Trial Course Selection

A 30-hour trial course covering the fundamentals of the Ethical Hacking field ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.*

*Terms & Conditions Apply

Extended Course Enrollment

All students who pass the Trial Course and who choose to continue on to the Extended Program have shown great potential for succeeding in the advanced field of Ethical Hacking.

Jump-Starting Careers

Each student receives the hands-on training and knowledge Ethical Hackers need to meet and exceed the prestigious market demands required by today’s employers. Career services are built into the program, providing students with guidance in transitioning to an active Cyber career.

Trial Course Selection

A 30-hour trial course covering the fundamentals of the Cyber and IT fields ensures the program remains competitive and affords students the opportunity to assess their compatibility with the program and industry. If they decide not to continue, a 75% refund is guaranteed.*

*Terms & Conditions Apply

Extended Course Enrollment

All students who pass the Trial Course and who choose to continue on to the Extended Program have shown great potential for succeeding in the field of Cyber Security.

Jump-Starting Careers

Each student receives the hands-on training Cyber Security Professionals need to meet and exceed the prestigious market demands required by today’s employers. Career services are built in to the program, providing students with guidance in transitioning to an active Cyber career.

Give Your Students
the Code to Career Success

The Right Student for This Program

This program is for professionals with a knack for all things digital who are looking to make their passion for multimedia a career.

Digital Aptitude

Digital marketers are excited by the latest technologies and are passionate about learning how innovators are leveraging these emerging tools. Having the aptitude to be a digital marketer means being able to build upon what is known to create something new.

Curiosity

The drive to build effective digital marketing strategies across a wide variety of verticals is crucial to success in the field. As a digital marketer, brainstorming innovative marketing methods should both excite and motivate you.

Tenacity

Algorithms and trends are as easily predicted as the fundamentals of digital marketing often make them seem. It’s crucial digital marketers remain upbeat and motivated in the event their strategies do not gain the traction they predicted.
Skip to content