Ready to launch your cybersecurity career?
Be market-ready in cybersecurity with our comprehensive 16-week LIVE training program!
Why This Path?
Modules
Cybersecurity Essentials
3 Weeks
Begin your journey with our comprehensive module covering essential areas such as information security, network and infrastructure protection, cryptography, vulnerability management, penetration testing and writing Linux/Windows command lines! Explore various hacker archetypes and their adeptness in utilizing social engineering tactics. Furthermore, gain skills in information gathering as part of penetration testing.
Wireless Security
1 Week
In this module, you will delve into essential aspects of wireless security. Learn to execute de-authentication attacks effectively and uncover vulnerabilities in WEP and WPA/WPA2 encryption protocols. Dive into advanced techniques such as wireless social engineering through the creation of Evil Twin networks. Additionally, you'll gain insights into Wi-Fi jamming methods, equipping you with a comprehensive skill set to tackle various wireless security challenges
Network Security
2 Weeks
In this module, we'll delve into fundamental network protocols (IP, HTTP, DHCP, TCP, UDP, ARP), exploring their functions and vulnerabilities. These can be exploited for spoofing, hijacking, and man-in-the-middle attacks. We'll also study advanced threats, including the creation of malicious files for executing reverse shells and using command and control frameworks like Covenant Beacon. Practical exercises will simulate attacks on FTP, Windows Shares, RDP, SSH, and others, culminating in Active Directory vulnerability exploitation and preventive measures for network security.
System Security
2 Weeks
This module focuses on the "after" of a breach, equipping you to understand and counter these threats. We'll delve into the methods attackers use to escalate privileges on various systems, including Windows, Linux, and Docker containers. By understanding these techniques, you'll be empowered to identify potential weaknesses and implement robust security measures to safeguard your organization's systems.
Web/API Security
4 Weeks
In this module, you'll delve into understanding and practicing the OWASP top 10 vulnerabilities. You'll learn how to identify security issues in web applications and master techniques to mitigate vulnerabilities. Venture into the world of web pen testing and find out how you can earn rewards and improve your skills through Vulnerability Disclosure and Bug Bounty programs.
Mobile Apps Security
1 Week
In this module, you'll delve into mobile security fundamentals, exploring the architecture of mobile operating systems and gaining hands-on experience in Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) with tools like Mobile Security Framework (MobSF). You'll also learn secure coding practices and best practices to safeguard mobile applications in today's interconnected world
Detection Engineering
1 Week
This module empowers you to actively identify and neutralize threats within your organization's IT infrastructure. You'll learn to leverage advanced detection patterns, analyze telemetry data, and utilize in-depth tradecraft and artifact analysis. This comprehensive approach empowers you to recognize attacker footprints, reconstruct timelines of attacks, and effectively hunt down threats before they can cause significant damage.
Reporting
1 Week
In this module, you will master essential management and report-writing skills in addition to technical expertise. Learn to effectively communicate cybersecurity findings and incidents to diverse stakeholders through clear, comprehensive reports. Gain proficiency in compiling detailed and actionable insights that bridge technical complexities with managerial understanding, ensuring impactful communication across all levels of an organization
Benefits
Acknowledge By
Your Mentors
Fayad Atwi
Program Manager & PMP
Kassem Bazzoun
Sr. Cybersecuriry Researcher
Majd Dhainy
Product Security Engineer
Bassem Bazzoun
Sr. Cybersecuriry Researcher
Hassan Al Achek
Penetration Tester / Red Teamer
Carl Metni
SOC Team Leader
Michel Rahme
Sr. Cybersecuriry Researcher
Ali Ayoub
Sr. Mobile Security Analyst
Abed Ayoub
WI-FI Security Software Engineer
Ahmad Mansour
Bug Bounty Hunter
Maitham Dhainy
M2 Cybersecurity - Politecnico Di Torino
Enrolment Process
Schedule Interview
Submit required enrollment information
Interview
Qualified applicants undergo interviews
Acceptance
Accepted candidates will join the path
Invest in Your Cybersecurity Future
Start Date: August 2024
- 16-week live training program
- Practical labs and real-world examples
- 24/7 Mentors support and follow up
- Up to 3 live in-person workshops
- Job and internship opportunities
On average, around 30,000 companies and websites are hacked every day globally
"It takes 20 years to build a reputation and a few minutes of a cyber-incident to ruin it" - Stephane Nappo
If now isn't the right time to become a cybersecurity engineer, then when is? You are just one step away.
See you in class in August 2024.