Loading...
Join the 2024 Batch - Offered Once A Year

Ready to launch your cybersecurity career?

Be market-ready in cybersecurity with our comprehensive 16-week LIVE training program!

Payment icon

168,400 $

Average Yearly Salary

Users icon

5.5 Million

2025 Job Vacancies

Statistics icon

$197 Billion

Cybersecurity Market Size

Cashback icon

12% Increasing

MENA Workforce Growth

Why This Path?

Expert Mentors

Train with industry-leading cybersecurity and ethical hacking experts who have worked with the world's biggest companies.

Hands-On Training

Put theory into practice with weekly assignments, all through practical labs and real-world examples that are tailored to market needs.

Dual-Focused Curriculum

Comprehensive training for both red and blue team roles, covering all necessary skills and preparing you for a wide range of positions.

Modules

Cybersecurity Essentials

3 Weeks

Begin your journey with our comprehensive module covering essential areas such as information security, network and infrastructure protection, cryptography, vulnerability management, penetration testing and writing Linux/Windows command lines! Explore various hacker archetypes and their adeptness in utilizing social engineering tactics. Furthermore, gain skills in information gathering as part of penetration testing.

Image

Wireless Security

1 Week

In this module, you will delve into essential aspects of wireless security. Learn to execute de-authentication attacks effectively and uncover vulnerabilities in WEP and WPA/WPA2 encryption protocols. Dive into advanced techniques such as wireless social engineering through the creation of Evil Twin networks. Additionally, you'll gain insights into Wi-Fi jamming methods, equipping you with a comprehensive skill set to tackle various wireless security challenges

Image

Network Security

2 Weeks

In this module, we'll delve into fundamental network protocols (IP, HTTP, DHCP, TCP, UDP, ARP), exploring their functions and vulnerabilities. These can be exploited for spoofing, hijacking, and man-in-the-middle attacks. We'll also study advanced threats, including the creation of malicious files for executing reverse shells and using command and control frameworks like Covenant Beacon. Practical exercises will simulate attacks on FTP, Windows Shares, RDP, SSH, and others, culminating in Active Directory vulnerability exploitation and preventive measures for network security.

Image

System Security

2 Weeks

This module focuses on the "after" of a breach, equipping you to understand and counter these threats. We'll delve into the methods attackers use to escalate privileges on various systems, including Windows, Linux, and Docker containers. By understanding these techniques, you'll be empowered to identify potential weaknesses and implement robust security measures to safeguard your organization's systems.

Image

Web/API Security

4 Weeks

In this module, you'll delve into understanding and practicing the OWASP top 10 vulnerabilities. You'll learn how to identify security issues in web applications and master techniques to mitigate vulnerabilities. Venture into the world of web pen testing and find out how you can earn rewards and improve your skills through Vulnerability Disclosure and Bug Bounty programs.

Image

Mobile Apps Security

1 Week

In this module, you'll delve into mobile security fundamentals, exploring the architecture of mobile operating systems and gaining hands-on experience in Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) with tools like Mobile Security Framework (MobSF). You'll also learn secure coding practices and best practices to safeguard mobile applications in today's interconnected world

Image

Detection Engineering

1 Week

This module empowers you to actively identify and neutralize threats within your organization's IT infrastructure. You'll learn to leverage advanced detection patterns, analyze telemetry data, and utilize in-depth tradecraft and artifact analysis. This comprehensive approach empowers you to recognize attacker footprints, reconstruct timelines of attacks, and effectively hunt down threats before they can cause significant damage.

Image

Reporting

1 Week

In this module, you will master essential management and report-writing skills in addition to technical expertise. Learn to effectively communicate cybersecurity findings and incidents to diverse stakeholders through clear, comprehensive reports. Gain proficiency in compiling detailed and actionable insights that bridge technical complexities with managerial understanding, ensuring impactful communication across all levels of an organization

Image

Benefits

Job Opportunities

Top graduates gain job offers or internships within our extensive industry network

Letter of Recommendation

Receive an official recommendation letter from Semicolon Security upon graduation

Industry Certificate

Earn an official industry certificate upon completing the program successfully

Acknowledge By

Your Mentors

Fayad Atwi

Program Manager & PMP

Kassem Bazzoun

Sr. Cybersecuriry Researcher

Majd Dhainy

Product Security Engineer

Bassem Bazzoun

Sr. Cybersecuriry Researcher

Hassan Al Achek

Penetration Tester / Red Teamer

Carl Metni

SOC Team Leader

Michel Rahme

Sr. Cybersecuriry Researcher

Ali Ayoub

Sr. Mobile Security Analyst

Abed Ayoub

WI-FI Security Software Engineer

Ahmad Mansour

Bug Bounty Hunter

Maitham Dhainy

M2 Cybersecurity - Politecnico Di Torino

Enrolment Process

1

Schedule Interview

Submit required enrollment information

2

Interview

Qualified applicants undergo interviews

3

Acceptance

Accepted candidates will join the path

Invest in Your Cybersecurity Future

Start Date: August 2024

$2,000 per trainee
  • 16-week live training program
  • Practical labs and real-world examples
  • 24/7 Mentors support and follow up
  • Up to 3 live in-person workshops
  • Job and internship opportunities

On average, around 30,000 companies and websites are hacked every day globally

"It takes 20 years to build a reputation and a few minutes of a cyber-incident to ruin it" - Stephane Nappo
If now isn't the right time to become a cybersecurity engineer, then when is? You are just one step away. See you in class in August 2024.

Map
Join the 2024 Batch - Offered Once A Year

Your Cart (0 items)

Product

{{ eachItem.title }}

      
Includes: {{ singleItem == 'ETH-101' ? 'Ethical Hacking Foundation' : (singleItem == 'WETH-201' ? 'Web Security Professional' : '') }}{{index==eachItem.bundle.length-1?'':', '}}
${{eachItem.price.final}}
${{eachItem.price.main}}
Your cart is empty
Proceed to checkout
Top
promo