Hacker Pro Youth Cyber ​​Course

Children and youth can also learn professional hacking and cyber studies.
The question is what to study? You need to understand how the computer works, how information passes through the Internet, and also how people think - it all starts with people.
The Hacker Pro Youth Cyber ​​Course distills you with the hottest and most up-to-date topics in cyber, hacking and information security, from the basic level to a high level of execution of intrusions, protections and information security.

👈 Course cost: NIS 5,400
 

This is what it looks like in our class:

For details and registration

You can fill out the form and a skyscraper representative will contact you within a few hours

Child class:

About the program: The Cyber ​​Course for Youth Hacker Pro

In the Hacker Pro youth cyber course - we will build websites and learn how to upload them to the server, build computer applications related to the cyber worlds, program in 4 different code languages, and wait for you crazy cyber activities like cracking passwords, hacking accounts and even create your own real computer virus. The course starts from a bite level and no prior knowledge is required.

  • Basic English. You need to know how to pronounce simple letters and words.

  • Basic technical skills.
    No, you do not need to know how to program. You need to know how to operate your computer browser, save a file, install software, extract files and use common keyboard shortcuts.

  • Personal interview with the course director.

    Why? To get to know you a little 🙂 and just to make sure it's a good match, for you and us

  • The course includes 40 sessions in total over a year
  • The meetings are held once a week
  • The length of each session is 90 minutes
  • On holidays and special occasions there are no meetings
  • The meetings take place Online On the ZOOM platform
    Or as frontal studies in the educational institutions in which we operate
  • All course sessions are recorded and will be available to you after the lesson
  • XNUMXth grade and up.
  • Girls and boys interested in learning the worlds of cyber, information security and hacking
  • Home computer with internet connection and camera.
    Activating the camera in our courses is Required
  • Computer with vista minimum Of i3 processor, and about 4 GB of RAM.
    Windows operating system preference (versions 7 or 10)
    How do I check my computer specifications? below Short explanatory video

Study format

The Cyber ​​Course for Youth Hacker Pro is divided into several modules arranged in chronological order according to increasing level of difficulty:

In the opening module of the course we will get to know better the tool that will be our best friend during the course - the computer.

  • Computer and network architecture
  • Computer components + how to choose a computer that suits you
  • Concepts and words from the world of computers
  • Initial code experience 
  • Explore websites
  • Server side vs client side
  • Familiarity with the Developers Tool

On the types of operating systems, the different characteristics of each and their common uses.

  • Operating systems Windows, Linux, Mac
  • Operating system layers
  • Computer task management
  • User Management and Security Permissions, VS Standard Administrator Permissions
  • Sending commands in the CMD interface
  • Common computer applications and software

In this module we will learn about the structure of Internet networks and types of networks and network topologies.
We will understand why the internet connection in the school classroom is different from your home internet connection and what is the difference between them, and how does this "magic" happen when we type in a website address in a browser and suddenly an entire website is revealed to us

  • Types of connections and networks
  • Network topologies
  • Model 7 layers OSI
  • IP addresses
  • Maintain anonymity online
  • Using Proxys
  • Subnetting
  • Ports
  • DNS
  • DNS Poisoning 
  • Routing and Router Roles
  • Communication components
  • Using Packet Tracer
  • Advanced browser use

    Module project: Construction and design of an Internet network with several endpoints according to the topologies learned in the module
    ** We will not learn binary conversion of IP addresses in this course

In this module we will learn the basics of programming through experience in the three building blocks of the Internet frontend.
We will start construction of a medium-scale project.
In this module we will experiment with 3 different code languages

  • Introduction to HTML & CSS
  • Introduction to Javascrip
  • Variables, loops and functions in Javascript

    ** We will not discuss the concepts of object-oriented programming.
    This is a cyber course, not a programming course. For those interested in expanding their programming knowledge, it is recommended to check out our Python course.

In the follow-up module, we will delve deeper into WEB programming and build a medium-scale project.

  • Introduction to PHP and Server Language, Sessions Management
  • Building a website that includes the option of logging in with a username and password
  • Setting up a storage server and configuring the server
  • Domain selection and change of NS / DNS settings (free domain)

    Module project: Build a personal website from scratch that includes uploading to the server, selecting a domain and configuring the server

At this stage of the course we will start focusing on information security.
We will dive deeper into the worlds of information security, our anonymity and the preservation of our personal information.
We will learn to identify built-in vulnerabilities and basic systemic weaknesses in familiar applications, we will learn concepts from the worlds of IT and networks and we will experience Hands On in accepted practices from the cyber world.

  • Positions in the world of information security
  • Protocols for secure conduct in environments and organizations
  • The failure of the human factor
  • Antivirus
  • Firewall
  • Windows Event Viewer
  • Logs
  • Encryption, Hashing and Art Hiding Information
  • https VS http
  • Common loopholes and dangers in information systems
A 6-hour module project

In the cyber intelligence module we will dive deeper into the worlds of information security, our anonymity and the protection of our personal information.
We will learn to identify built-in vulnerabilities and basic systemic weaknesses in familiar applications, we will learn concepts from the worlds of IT and networks and we will experience Hands On in accepted practices from the cyber world.

  • Anonymity, VPN's & Proxy
  • Network traffic analysis and Internet packets
  • Explore websites, applications and computer applications
  • Extracting hidden intelligence information from the Internet
  • Extracting hidden information from photos and burying hidden information
  • Tracking users and people online

In the hacking module, we are going to experiment with "Tekel's" - cyber attacks.
Every lesson you are going to experience a new attack, understand and analyze it in depth, and come up with a unique skill set that not many teens possess.

  • Dropping / crashing servers - You will learn how to launch an attack to crash a website or application
  • Password breaking - the holy grail of the cyber world, we will learn 4 Different account hacking techniques
  • Building Viruses - You are going to build not one, but three different viruses for your computer at rising execution levels
  • Code Injections - How do I inject malicious code into a particular server or destination without the server "consenting" to it
  • Listening to wifi networks - we will learn and practice how hackers connect to the wifi network and see what everyone who is connected to it - does in it
  • Social Engineering - During the Corona we have seen many sites that impersonate Facebook, the IRS site or your bank site.
    So you are going to build a page like this
  • Google Hacking - In one lesson you will learn how to use Google to gain unauthorized access to user accounts.
    The potential here is endless

Having learned how to attack, we will now learn how to defend professionally.
You will actually learn how a security expert in a large organization like Google or Apple for example, conducts himself during his day and what tools he uses.

  •  Locate LIVE hacks for your organization / property
  • Tracing the trace of the attacker until he reaches a point and exposing his identity
  • Performing counter-active actions against validity actions
  • Prevention and effective planning of systems against 95% of attacks
  • The human factor - training the human factor to prevent future attacks
  • A unique final project of its kind that uses all the material learned in the course

Prominent activities

Here's what your child is going to do

Cracking passwords

Hacker Pro Youth Cyber ​​Course

The Holy Grail of the cyber world - your passwords.
You're going to have a password hacking tournament. Have you ever done a password hacking tournament?

Code injections

Hacker Pro Youth Cyber ​​Course

Code injection is a process in which we put malicious code into an "innocent" area of ​​the site such as, for example, the login form with a username and password. What's going on from here? Stay with us and you will discover ...

Hidden listening to wifi networks

Hacker Pro Youth Cyber ​​Course

Why are public WiFi networks considered dangerous? This is because of the built-in loophole in them that allows hackers to see what you are doing when you surf them. Want to know how they do it?

Fishing

Hacker Pro Youth Cyber ​​Course

In the corona of 2020, phishing has become the most common cyber attack in the world.
We're going to learn how to recognize it, and of course ... experiment with it.

Server crashes

Hacker Pro Youth Cyber ​​Course

"Bombing" web requests on a particular server until it ... crashes.
Yes, you are going to try it!

Building a computer virus

Hacker Pro Youth Cyber ​​Course

Together with the class tutor, you are going to build a real computer virus.
Do not tell anyone.

All this and more, your child is going to do

Crazy, no?

What do I finish the course with?

You will complete the course with a rich resume of works and projects in the field of cyber, a honed arsenal of technological skills and abilities and a prestigious graduation certificate

Identification and analysis capabilities

You will be able to "see the matrix". Your technological awareness will expand so that you will see and recognize things you have not seen before

Rich portfolio

You will end the course with a portfolio of no less than 21 different projects that illustrate your new cyber capabilities

A unique set of skills

Do you know those who know "everything" about computers? Then you will become the technological geniuses of the house, with a tremendous and glorious set of skills

Prestigious graduation certificate

Our students have been accepted into prestigious majors and tracks thanks to the certificate that gives them proof of knowledge control

Questions you ask us

Girls and boys in seventh grade and up, with a strong desire to learn the secrets of the cyber world!

You need to know how to pronounce letters and words and know how to read simple words correctly.

Yes, but only within the educational institutions we work for.
We are spread over several dozen schools and institutions around the country, you are welcome to call and ask if we work at your child's school.
If not, the course will be open for online registration only.

Yes. First of all you sign up. If after the first lesson you have decided that it is not appropriate then no charge is made.
And in general - the first three sessions are without obligation, so if you decide to retire after them, there is no cancellation fee.
You can read about our cancellation policy in the last question.

Those who will deliver the content to your child are graduates of technology units, graduates in their field or industry workers.
It is important for us that the content comes from those with experience in their field, who not only know the material, but also have practical experience with it.
In addition, these are lecturers with extensive experience in training - because it is clear to us and to you, that in the end it falls on the instructor.

You will complete the course with a rich resume of works and projects in the cyber field, a honed arsenal of skills and abilities in the field of hacking and a prestigious graduation certificate.

No. Let's start with the fact that this is not a hacking course, and the goal is not to teach your children to be hackers.
Cyber ​​studies are similar to martial arts studies - we obviously need to experiment on the side of the attacker, in order to defend.
Second - the route is a 3-year route.
Obviously after the first year we have not yet reached our full potential, however However, they came out with a very solid knowledge in the field of cyber and hacking which is much more than basic, with high levels of performance and advanced hacking and defense skills that even some industry workers do not have.

Good question. The cyber course is a course I got married, Which means that the content taught in the course is new and unique.
As a technological college whose main target audience is technological children, we can tell you that the content taught is foreign and new to the vast majority of them.
So even if you have previous technical knowledge, and even if you have never experienced any technical project, the course starts from the beginner level and progresses at its own pace while everyone is exposed to the content for the first time and progressing at the same pace.
Of course, if we (or you) identify a mismatch resulting from level differences here or there, the child can be assigned to another more or less advanced group.

No. Most of the course is delivered on web platforms, so all processing and calculations are done on cloud networks.
This actually saves the need for a relatively powerful computer, since no significant processing operations are performed on the computer itself.

Minimum technical specifications for the course:
I3 processor
4GB RAM
- Internet connection of at least 15 MB is recommended

It is important for us to be transparent, which is why the cancellation policy is presented to you here.
The first three sessions of the course are defined as impression sessions.
That is, if you decide to cancel after 3 sessions or less, you will receive a relative refund without a cancellation fee, offsetting the relative portion of the sessions you have done so far.
If, after the first meeting, you have decided that it is not suitable for you - you will receive a full refund without questions, even for the first lesson.
If you continue to the fourth meeting onwards, there is a cancellation fee of 33% The rest of the meetings you have left.
For example, if you have 30 sessions left and you decide to separate, you will receive a refund for the remaining 20 sessions.
This is because the cyber course is a professional course, not a class.
There is a logical and chronological sequence between the sessions, and it is not possible to integrate in the middle of the year into an existing course similar to the way in which one registers for the class.
Also, the number of places in each course is limited in order to maintain a high level, fast pace and personal attitude.
In order for your child to continue to enjoy a course at the highest level, and not be affected by the fact that another child has left / retired, as is very common in activities for children, these cancellation fees are charged.

Questions that parents Who work in high-tech We are asked:

Yes, you have your own questions.

They are programmers in HTML, CSS, Javascript, PHP, SQL.
In Python and other languages ​​we do not touch on this course, there is Python course for youth Completely separate delivered entirely on the Python rim

First of all, we emphasize that this is not a programming course - but a course Cyber.
All the programming topics we teach, we teach from a "cyber" angle, for the purposes of our course.
The topics studied are basic topics such as variables, loops, functions, conditions, basic data structures.
In the Back End we will focus a bit on managing Sessions, managing cookies, transferring parameters to the server via the URL and using forms.

Do not expect the child to know how to build a professional website from scratch or any phone app, because this is not this course.
Cyber ​​refers to the aspect of detecting vulnerabilities in information systems, blocking them and actively defending against cyber attacks and hackers. 

Not in this course. This happens in a more advanced course.

Yes. They are taught IP addresses and subnetting, they even experience building networks using Packet Tracer and they will experiment with allocating IP addresses cost-effectively using all the relevant CMD and Routing commands to check network integrity

A question in its place, and here is our preparatory answer:
It is advisable to work on windows. About 80% of the course will work without any problem on the MAC system as well, however there are features that are used mainly in the Windows system.
It is desirable that you have the ability to organize a Windows computer for the child for at least some of the exercises in the course.
If this is not possible, we will allow the child to remotely connect to our Windows computer and the child will work on it in the individual lessons that need a Windows system.

Sign up for the Hacker-Pro Youth Cyber ​​Course Now:

For details and registration

You can fill out the form and a skyscraper representative will contact you within a few hours

Child class:

What it looks like with us:

Join the equal Discord community in Israel!

Cybergim is the most equal community in Israel. How do we know that?
Well, full of free content, hacking and cyber tutorials, award-winning competitions, leading YouTubers in Israel, a crazy YouTube channel, and of course full of gaming - you can not go wrong!