160
Every month
Valid until canceled
*Typical completion, beginning to end: 6-9 months, when studying regularly
Monthly Subscription
Learn at your own pace without time pressure
Flexible access to all cybersecurity training programs - start from basics and progress to advanced levels at your own rhythm.
Series
XE Basics
Program Code
XE101
Duration
Self-Pace*
*
Description
Start your journey from beginner to cybersecurity expert through our structured levels of training. Begin with the fundamentals and progress all the way to advanced security techniques.
Unlike fixed-duration packages, our subscription gives you complete freedom - learn at your own pace, take time to practice, and keep advancing as far as you want to go. Perfect for those who value flexibility and continuous learning.
What Our Clients Say
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”
— John Bryce Training Center, Israel
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”
— Homeland Security
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”
— James Lim, CEO of Centre for Cybersecurity Institute, Singapore
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”
— Defense Forces
Program Recognition & Impact
Building on our military-grade training heritage:
-
Built on elite defense expertise
-
Progressive skill development path
-
Continuous content updates
-
Practical, hands-on learning approach
-
Career-focused advancement
Real-World Training Environment
Dive into hands-on cybersecurity challenges:
-
Access to Cyberium Arena simulator
-
Practice with industry-standard tools
-
Work on live systems and networks
-
Advanced scenarios with Specto-AI
-
Regular updates with new challenges
What You Will Learn
Intro to Cyber is a foundational course that introduces learners to the fundamental concepts of cybersecurity. The syllabus is designed to provide a comprehensive understanding of the diverse aspects of the digital networking and security landscape.
Intro-to-Cyber
This module delves into the basic of digital communication. Learners will understand digital sizes and binary, the language of computers. The module also demystifies IP addresses, differentiating between private, public, and general addresses. Furthermore, it explores network services, common protocols, DNS, and DHCP, setting a firm foundation for understanding how digital networks operate.
Digital Sizes
Binary
IP Addresses
Private Addresses
Public Addresses
General Addresses
Network Services
Services
Common Protocols
DNS
DHCPThis module offers a hands-on approach to understanding cybersecurity. Using tools such as Shodan and Google Dorks, learners will learn how to search the internet for sensitive information, demonstrating the vulnerability of digital data. The module also explores hashes, their uses, and different hash functions. Additionally, learners will familiarize themselves with encoding techniques like Hex and Base64, which play a significant role in data security.
Shodan
Searching with Shodan
Google Dorks
How Google Works
Basic Queries
Finding Sensitive Information
Hash
The Use of Hash
Different Hash Functions
Encoding
Hex
Base64This module gives an in-depth understanding of network data analysis. Through hands-on practice with Command Prompt and Wireshark, students will learn how to examine and interpret network traffic. The module also introduces the OSI and TCP/IP models, integral frameworks in understanding network communication. Lastly, learners will master the use of Wireshark filters and statistics for effective data analysis.
Command Prompt
OSI and TCP/IP Model
Network Traffic
Wireshark Basics
Wireshark Filters
Wireshark Statistics