top of page

450

CyberSpectrum Skills Assessment

Valid for one month

*Typical completion, beginning to end: 6-9 months, when studying regularly

CyberSpectrum

Adaptive Skills Assessment

A foundational course that introduces learners to fundamental concepts of cybersecurity, digital networking, and security landscape.

Series

XE Basics

Program Code

XE101

Duration

Self-Pace*

*Typical completion, beginning to end: 6-9 months, when studying regularly

Description

Start with a Level-2 scenario to benchmark your skills. Based on your performance, the assessment adapts - advancing to Level-3 if you excel, or focusing on Level-1 fundamentals if needed. Get a clear picture of your capabilities with comprehensive performance analysis and targeted recommendations.

What Our Clients Say

John Bryce.jpg
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”

— John Bryce Training Center, Israel

HLS Testomonial.jpg
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”

— Homeland Security

James CFC Testimonial.jpg
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”

— James Lim, CEO of Centre for Cybersecurity Institute, Singapore

Army Testimonial.jpg
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”

— Defense Forces

Program Recognition & Impact

Our adaptive assessment methodology draws from elite cybersecurity operations experience:

  • Built on military-grade evaluation frameworks

  • Tests real-world security capabilities

  • Provides detailed skill-gap analysis

  • Delivers actionable development paths

  • Used by defense and enterprise organizations

Real-World Training Environment

Face challenging scenarios that adapt to your demonstrated capabilities:   

  • Tackle real-world security challenges

  • Work with professional security tools

  • Experience multi-level security scenarios

  • Get instant performance feedback

  • Receive detailed capability analysis

What You Will Learn

Intro to Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.

Level-1
  • Description
    Intro-to-Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.

    Module 1: Intro to Networks

    This module delves into the basic of digital communication. Learners will understand digital sizes and binary, the language of computers. The module also demystifies IP addresses, differentiating between private, public, and general addresses. Furthermore, it explores network services, common protocols, DNS, and DHCP, setting a firm foundation for understanding how digital networks operate.

     

    • Digital Sizes

    • Binary

    • IP Addresses

    • Private Addresses

    • Public Addresses

    • General Addresses

    • Network Services

    • Services

    • Common Protocols

    • DNS

    • DHCP

     

    Module 2: Network Security

    This module offers a hands-on approach to understanding cybersecurity. Using tools such as Shodan and Google Dorks, learners will learn how to search the internet for sensitive information, demonstrating the vulnerability of digital data. The module also explores hashes, their uses, and different hash functions. Additionally, learners will familiarize themselves with encoding techniques like Hex and Base64, which play a significant role in data security.

     

    • Shodan

    • Searching with Shodan

    • Google Dorks

    • How Google Works

    • Basic Queries

    • Finding Sensitive Information

    • Hash

    • The Use of Hash

    • Different Hash Functions

    • Encoding

    • Hex

    • Base64

    Module 3: Network Data
    This module gives an in-depth understanding of network data analysis. Through hands-on practice with Command Prompt and Wireshark, students will learn how to examine and interpret network traffic. The module also introduces the OSI and TCP/IP models, integral frameworks in understanding network communication. Lastly, learners will master the use of Wireshark filters and statistics for effective data analysis.

    • Command Prompt

    • OSI and TCP/IP Model

    • Network Traffic

    • Wireshark Basics

    • Wireshark Filters

    • Wireshark Statistics
       

  • Description
    This training is geared towards introducing the Linux environment. The Linux Basics program aims to assist users with no prior experience, enabling them to get familiar with Linux and the rudiments of automation scripting.

    Module 1: Command-Line
    This module presents a comprehensive guide to understanding Linux, covering topics from its historical development, various distributions, basic commands, and terminal use to more complex topics such as file permissions, text manipulation, and handling archives. It aims to provide foundational knowledge for effectively working within the Linux environment.

    • Introduction

    • History of Linux

    • Linux Distributions

    • The Terminal

    • Basic Commands

    • Permissions

    • Text Manipulation

    • Working with Archives

    Module 2: Bash Scripting
    This module introduces the fundamental aspects of Bash scripting, starting from basic programming principles, crafting Bash scripts, obtaining user input, and performing mathematical operations, to utilizing logic statements and manipulating environment variables. It's designed to equip learners with the necessary skills to automate tasks in a Unix-like operating system.

    • Bash Scripting 

    • Introduction to Programming

    • Writing Bash Scripts

    • Getting User Input

    • Performing Math

    • Logic Statements

    • Environment Variables
       

    Module 3: Networking
    This outline provides a hands-on guide to network troubleshooting and configuring, starting from basic network problem diagnosis to package management in Linux systems. It includes practical examples of installing Debian packages and using the Advanced Packaging Tool (APT) for software management.

    • Network Troubleshooting

    • Network Configuring

    • Basic Network Troubleshooting

    • Package Management

    • Installing Deb Packages

    • Using the APT
       

  • Description
    Python, a user-friendly language widely employed for tool creation in various domains including cybersecurity, is the focus of this program. It offers learners a foundational grasp of programming logic and equips them with the skills to write basic scripts, thereby elevating their programming proficiency to a higher level.

    Module 1: Introduction to Python
    This module presents an introduction to Python programming, starting from its installation, understanding variables and Booleans, to exploring more complex data types like dictionaries and tuples. It further delves into the concept of loops, essential for creating repetitive tasks and workflows in Python.

    • Introduction

    • Installing of Python

    • Variables and Booleans

    • Dictionaries and Tuples

    • Loops

    Module 2: Conditions and Functions
    This module delves deeper into Python programming with a focus on conditionals and loop constructs, including 'while' and 'for' loops. It then expands on scoping, subroutines, various aspects of function usage, including handling external functions and exceptions, important for robust and efficient programming.

    • Conditions

    • Conditional Statements

    • While and For Loops

    • Scoping and Subroutines

    • Functions

    • Working with Functions

    • External Functions

    • Exceptions
       

    Module 3: Files I/O

    This module guides learners through the utilization of Python modules with a focus on file handling—reading and extracting data from files and writing into them. It additionally delves into the usage of the OS module, which allows Python scripts to interact with the operating system.

     

    • Python Modules

    • Reading Files

    • Extracting Data

    • Writing into Files

    • The OS Module

Level-2
  • Description
    The Network Research program is designed to introduce learners to the fundamental aspects of information security, employing Linux as a primary tool and providing exposure to various security threats.

    Module 1: Intro to Linux
    This module provides an in-depth look into virtualization, focusing on Linux. It begins with an overview of virtualization and Linux distros, guides on Linux installation, and using VMWare. It addresses network configurations, Linux administration topics like directory structures, user management, packages, file manipulation commands, and concludes with scripting and automation in Linux.

     

    • Virtualization

    • Introduction to Virtualization

    • About Linux Distro

    • Installing Linux

    • Working with VMWare

    • Bridged vs. NAT

    • Working with Linux

    • Linux Directories

    • Linux Users

    • Packages

    • File Manipulation Commands

    • Text and File Manipulation Technics

    • Linux Scripts and Automation

    Module 2: Networking
    This module offers a deep dive into key networking protocols and services. It starts by exploring the TCP/IP model, followed by detailed examinations of DNS, DHCP, and ARP protocols, then transitions into network services, providing insights into the workings of SSH, FTP, and the Apache web server. This comprehensive study of networking equips learners with crucial knowledge for managing and securing digital networks.

     

    • Protocols

    • TCP/IP Model

    • DNS

    • DHCP

    • ARP

    • Network Services

    • SSH

    • FTP

    • Apache

     

    Module 3: Network Security
    This module dives into network scanning and attack techniques. It starts with Nmap and Masscan, powerful tools for network scanning, then covers brute force and offline attack strategies. This course offers invaluable skills for network security testing.

    • Scanning

    • Nmap

    • Masscan

    • Brute Force

    • Offline Attacks

    • Creating Wordlists

    • Wireshark

    • Filtering and Parsing

    • Extracting Objects


    Module 4: Cyber Security
    This module delves into various network attacks and defense techniques. It covers Man-in-the-Middle (MiTM) and ARP Poisoning strategies, service brute-forcing, and analysis of cyberattacks. Learners are introduced to reverse and bind payloads, and hands-on training with Msfvenom and Msfconsole. Finally, it explores firewall operation, including port blocking and device monitoring, imparting critical skills for network security.

     

    • Network Attacks 

    • MiTM

    • ARP Poisoning 

    • Service Brute-Force

    • Analyzing Attacks

    • Cyber Attack

    • Reverse and Bind Payloads

    • Working with Msfvenom

    • Working with Msfconsole

    • Firewall

    • About Firewall Operation

    • Blocking Ports

    • Monitoring Devices
       

Level-3
  • Description
    This SOC Operation module is designed for SOC organizations to implement a SOC solution and provide full guidance on the necessary skills and procedures to operate it. The program provides participants with all aspects of a SOC team to keep the enterprise's adversary.

    Module 1: Windows Domain
    This focused module centers on Sysmon, a powerful Windows system monitoring tool. It teaches learners how to use Sysmon for comprehensive event logging, contributing to a deeper understanding of Windows domain operations.

    • Windows Server

    • Installing Windows Server

    • Configuring Windows Server

    • Managing Features

    • Windows Events

    • Sysmon

    • Windows Domain

    • Installing AD DS

    • Configuring AD DS

    • Managing Domain Protocols

    • Working with Group Policy

    • Working with Wireshark

    Module 2: SOC Environment
    This module includes the Firewalls configuration and management using pfSense, including the creation of firewall and NAT rules. It involves real-time system monitoring and explores Intrusion Detection and Prevention Systems (IDS/IPS). Participants gain hands-on experience with Snort, understanding rule structures, configuration, and advanced traffic analysis using the NAT feature.

    • Firewalls

    • pfSense Installation

    • Configuring FW Rules

    • Configuring NAT Rules

    • Installing and Managing Packages

    • Real-Time Monitoring 

    • IDS/IPS

    • Working with Snort

    • Snort Rules Structure

    • Setting and Configuring Rules

    • Passing Traffic using the NAT Feature

    • Analyzing Advanced Rules

    Module 3: Using the SIEM
    This module guides participants through the essential components of Security Information and Event Management (SIEM). It initiates with the exploration of ELK stack, covering event monitoring, search methods, custom queries, and alert settings. The latter part delves into Splunk, teaching how to monitor events, the fundamentals of Search Processing Language (SPL).

    • ELK

    • Monitoring Events

    • Different Search Methods

    • Custom Queries

    • Setting Alerts

    • Splunk

    • Monitoring with Splunk

    • Splunk Alerts

    Module 4: Threat Hunting
    This module immerses participants into advanced aspects of cybersecurity. It begins with comprehensive log analysis, incorporating advanced filtering and threat hunting via events and MITRE ATT&CK. Participants work with Sysmon and its configuration, followed by exploring YARA for rule creation and threat hunting.

    • Log Analysis

    • Analyzing Logs

    • Advanced Filtering

    • MITRE ATT&CK

    • Hunting via Events

    • Creating Hunting Rules

    • Sysmon

    • Configuring XML Settings

    • Analyzing Sysmon Events

    • YARA

    • Rules Structure

    • Hunting with YARA

    • Incident Response

    • IR Playbooks

    • Investigating Files
       

  • Description
    Windows Forensics plays a crucial role in cybersecurity. Trainees will understand the data storage mechanisms of the Windows OS and acquire the skills to conduct investigations during and post cyber incidents.

    Module 1: Digital Data
    This module explores file and disk handling, encoding, and number systems, delving into digital sizes and SSD features. It includes hands-on training with a Hex Editor and teaches disk and file viewing techniques. The section proceeds to cover automatic carving, and methods to examine system files and metadata in Windows.

    • Files and Disks

    • Encoding

    • Number Systems

    • Digital Sizes

    • Solid State Drive (SSD) Features

    • Hex Editor

    • Working with Offsets

    • Viewing Files

    • Viewing Disks

    • Automatic Carving

    • Carving Methods

    • Automatic Carvers

    • Windows System Files

    • Metadata

    • Viewing Metadata

    • Modified Accessed Created

    • Editing Exif Data

    Module 2: File Forensics 
    This module delves into steganography, teaching how to identify, extract, and create hidden files. It transitions into hard disk analysis, focusing on system files and Master File Table (MFT) analysis. It also imparts hands-on experience with Forensic Toolkit (FTK), a crucial tool for digital forensics. This module equips learners with vital skills in data hiding and disk analysis.

    • Steganography

    • Identify Hidden Files

    • Extracting Hidden Files

    • Creating Hidden Files

    • Hard Disk Analysis

    • System Files

    • MFT Analysis

    • Working with FTK

    Module 3: Collecting Evidence
    This module delves into the analysis of digital artifacts. It focuses on registry analysis, including data extraction and examination of NTUSER.DAT files. The module concludes with techniques for conducting a general search and the use of registry viewers, thereby enhancing learners' understanding of digital artifact investigation.

    • Artifacts

    • Artifact Directories

    • Browsers

    • Shadow Copies

    • Registry Analysis

    • Extracting Data

    • NTUSER.DAT Analysis

    • General Search

    • Registry Viewers

    Module 4: Analysis
    This module delves into the complex realms of memory, event, network, and malware analysis. It imparts key skills for inspecting computer memory, investigating system events, analyzing network interactions, and examining malicious software, thereby equipping learners with critical abilities for cyber forensics investigations.

    • Memory Analysis

    • Creating an Image

    • Working with Volatility

    • Carving Data from RAM

    • Events Analysis

    • Event Viewers

    • Setting Audit Policy

    • Custom Search

    • Network Analysis

    • Service Protocol Analysis

    • Identifying Darknet Connections

    • Malware Analysis

    • Basic Static Analysis

    • Basic Dynamic Analysis

  • Description
    The Penetration Testing training equips learners with crucial skills to identify and exploit system vulnerabilities. Covering data gathering, system infiltration, post-breach techniques, and emphasizing WebApp Security, this program prepares participants to effectively safeguard digital assets against cyber threats.

    Module 1: Collecting Information
    This module empowers learners with fundamental penetration testing skills. It commences with Information Gathering, enabling understanding of targeted systems. Scanning follows, teaching detection of open ports and services. Lastly, Enumeration provides detailed system information, critical for crafting effective cyberattack strategies.

    • Information Gathering

    • Whois and Dmitry

    • Google and GHDB

    • Shodan CLI

    • DNS Reconnaissance

    • Online Databases

    • Scanning

    • Nmap Scanning

    • NSE Scripting

    • Enumeration

    • Services

    • Msfconsole

    • Enumeration Tools

    • Vulnerabilities Detection Methods

    • Nessus

    Module 2: Exploitation
    This module is focused on the practical aspects of penetration testing, with a keen focus on Exploitation. It starts by teaching the methodologies to leverage vulnerabilities for unauthorized system access. Further, it explores payloads, which are pieces of code executed post successful exploitation, providing crucial insights into cyberattack mechanics.

    • Exploitation

    • Brute Force Tools

    • Exploits Database

    • Msfconsole

    • Exploiting Manually

    • Payloads

    • Msfvenom Payloads

    • Payloads Automation

    • Meterpreter

    Module 3: Post Exploitation
    Post exploitation tactics, used after gaining unauthorized access, are explored, giving insights into maintaining access, data extraction, and covering tracks. Furthermore, it examines social engineering, a human manipulation tactic for information or access, underscoring the human element in cybersecurity.

    • Local vs. Remote Exploits

    • Privilege Escalation

    • Persistence

    • Disabling Security

    • Social Engineering

    • Online Services

    • BeEF

    • Phishing Frameworks

    • Advanced Techniques

    Module 4: WebApp Security
    This module sheds light on the crucial aspect of safeguarding web applications. It navigates through various aspects of web application security, highlighting common vulnerabilities, and providing effective strategies to counteract them. A key focus is on securing data transactions, user authentication processes, and ensuring overall application integrity.

    • HTML Basics

    • About OWASP

    • XSS

    • LFI/RFI

    • Brute Force

    • SQL Injection

    • Web Payloads

    • Reverse Shell

    • Burp Suite

    • Proxy

    • Repeater

    • Intruder

    • Encoder

bottom of page