top of page

160

Every month

Valid until canceled

*Typical completion, beginning to end: 6-9 months, when studying regularly

Monthly Subscription

Learn at your own pace without time pressure

Flexible access to all cybersecurity training programs - start from basics and progress to advanced levels at your own rhythm.

Series

XE Basics

Program Code

XE101

Duration

Self-Pace*

*

Description

Start your journey from beginner to cybersecurity expert through our structured levels of training. Begin with the fundamentals and progress all the way to advanced security techniques.

Unlike fixed-duration packages, our subscription gives you complete freedom - learn at your own pace, take time to practice, and keep advancing as far as you want to go. Perfect for those who value flexibility and continuous learning.

What Our Clients Say

John Bryce.jpg
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”

— John Bryce Training Center, Israel

HLS Testomonial.jpg
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”

— Homeland Security

James CFC Testimonial.jpg
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”

— James Lim, CEO of Centre for Cybersecurity Institute, Singapore

Army Testimonial.jpg
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”

— Defense Forces

Program Recognition & Impact

Building on our military-grade training heritage:

  • Built on elite defense expertise

  • Progressive skill development path

  • Continuous content updates

  • Practical, hands-on learning approach

  • Career-focused advancement

Real-World Training Environment

Dive into hands-on cybersecurity challenges:

  • Access to Cyberium Arena simulator

  • Practice with industry-standard tools

  • Work on live systems and networks

  • Advanced scenarios with Specto-AI

  • Regular updates with new challenges

What You Will Learn

Intro to Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.

Intro-to-Cyber
  • This module delves into the basic of digital communication. Learners will understand digital sizes and binary, the language of computers. The module also demystifies IP addresses, differentiating between private, public, and general addresses. Furthermore, it explores network services, common protocols, DNS, and DHCP, setting a firm foundation for understanding how digital networks operate.

    Digital Sizes
    Binary
    IP Addresses
    Private Addresses
    Public Addresses
    General Addresses
    Network Services
    Services
    Common Protocols
    DNS
    DHCP

  • This module offers a hands-on approach to understanding cybersecurity. Using tools such as Shodan and Google Dorks, learners will learn how to search the internet for sensitive information, demonstrating the vulnerability of digital data. The module also explores hashes, their uses, and different hash functions. Additionally, learners will familiarize themselves with encoding techniques like Hex and Base64, which play a significant role in data security.

    Shodan
    Searching with Shodan
    Google Dorks
    How Google Works
    Basic Queries
    Finding Sensitive Information
    Hash
    The Use of Hash
    Different Hash Functions
    Encoding
    Hex
    Base64

  • This module gives an in-depth understanding of network data analysis. Through hands-on practice with Command Prompt and Wireshark, students will learn how to examine and interpret network traffic. The module also introduces the OSI and TCP/IP models, integral frameworks in understanding network communication. Lastly, learners will master the use of Wireshark filters and statistics for effective data analysis.

    Command Prompt
    OSI and TCP/IP Model
    Network Traffic
    Wireshark Basics
    Wireshark Filters
    Wireshark Statistics

bottom of page