Cyber Security course
TAME Range Cyber simulator
Guidance and support
From our career development incubator at no cost
With a huge network of employer relationships
Receive a prestigious certificate from a joint project with IAI-ELTA Systems
Create a significant advantage on your CV and in the job market
Receive guidance and support throughout the training process until successful completion and employment in the field
At ICCP, we believe in empowering the next generation of cybersecurity professionals to confront the challenges of an increasingly interconnected world.
Join us today and become a part of the elite team of experts shaping the future of digital defense.
The program chapters and study modules
In this module we will learn more about the world of corporate networks.
We will understand how a corporate office communication network is built. We will understand how it works and how information is transferred in the network Between computers, sending messages/emails, what is the layer model, how to build a corporate network correctly and also about the security aspects of corporate networks.
Learning and understanding how a corporate network works – is an essential and basic thing in the cyber world.
In addition, we will learn to plan and establish a corporate network in Cisco's Packet Tracer software.
We will talk about information security aspects of a corporate network, and more.
• Network basics
• Network architectures (OSI Model)
• What are hubs, switches, routers
• IP Addresses
• IP Subnetting
• Network topologies
• Ethernet basics
• TCP and UDP
• DNS and DHCP
• Routing
• VLANs
• Cisco device initial configurations
• Different Versions of Windows
• Windows vs. Linux vs. MAC
• Oracle Virtual Box
• Installing Oracle Virtual Box
• Creating First Virtual Machine
• Windows Installation and Configuration
• System Access and File System
• System Administration
• Advance Windows Administration
• Roles , Features
• Active Directory
• Windows Scripting and Command Line
• Networking and System Updates
• History of Linux
• Linux Version
• Install and using Ubuntu
• Linux File System
• most Common Linux Management Commands
• Basic Bash Scripting
• User & Group
• Wireshark fundamentals
• OSINT & Social Engineering
• Google Hacking
• Dictionary/Password Attacks
• Man-In-The-Middle
• Network Scanning and Known CVE exploitation
• Command & Control – Metasploit
• Network Anonymity
• Windows Privilege Escalation
• Linux Privileges Escalation
In this module we will get to know the most popular programming language – PYTHON.
We will learn the principles of programming in the PYTHON language and develop tools for information security purposes in the Linux environment.
• Variables
• Data Types
• Casting
• Operators
• String Formatting
• Conditions
• While Loop
• For loop
• Functions
• Lists
• Tuples
• Working With Files
• Web application technologies
• HTML Tags
• CSS
• Cookies
• Rest Api
• Databases
• Web Architecture
• Web application technologies
• OWASP top 10 attacks
• BurpSuite
• Cross-Site Scripting (XSS)
• CSRF
• SSRF
• SQL injection
• LFI/RFI
• XXE
• Exploit File Upload mechanism
• Web Shells
• WordPress Exploitation
In this module we will get to know the world of mobile application development in the Android environment.
We will get to know how an Android application works and how it is developed, we will see how reverse engineering for mobile applications is basically done.
• Introduction to Android & Android Studio
• Reversing Android Application
• Analysing Android Traffic
• SSL Pinning and ways to bypass
• Introduction to MobSF
• Introduction to SOC Analysis
• Overview of SOC analysis and its
role in cybersecurity
• Introduction to cybersecurity frameworks
• Overview of SIEM tools and their functions
• Log collection and analysis
• SOC Tools And Softwates
• Creating SIEM rules and alerts
• Best practices for SOC operations
• Cyber security incident types and categories.
• incident Response Introduction
• Windows Forensics
• Windows Forensics
• Pickup File Analysis
• Security monitoring
In this module students will learn how to use machine learning and other AI techniques.
To detect and exploit vulnerabilities in computer systems, networks and applications. The students will help with artificial intelligence based tools, for the benefit of realizing attacks and streamlining processes.
In this module, students will get to know ChatGPT and its limitations in depth, as well as learn to explore and bypass some of the limitations of artificial intelligence tools, and harness AI tools for the benefit of cyber defense and attack.
• Using AI Tools
• Understand the principles of AI and machine learning as they apply to penetration testing
• Learn how to use AI to automate the penetration testing process and increase efficiency
• Using AI Tools to Implement Attack
• Using AI Tools to Write Penetration Testing Report.
About us
The International Center for Cyber Professions (ICCP) offers a variety of courses in high demand and provides training to the world’s most advanced professional certificates.
Operates the College of the Treasury Department of the government of Israel
Manages the technological college of the idf’s communication and cyber division
Operates the largest technological College in Israel in combination with Elta
Constructs technological incubators in the largest academic colleges in Israel
Operates the placement system for senior unemployed people in the Israeli employment service
With a huge network of employer relationships
Approved exclusively in Israel by the EC Council– Operates dozens of projects with the Israeli Ministry of Defense for cyber professions
ICCP – The International Center for Cyber Professions
Most of the trainings are taught in conjunction with the RANGE TAMETM trainer, which enables practical experiences in hyper-realistic scenarios similar to security organizations in Israel and around the world.
TAME™ Range – Turnkey Cyber Competency Center
edX was founded by Harvard and MIT