Children and youth can also learn professional hacking and cyber studies.
The question is what to study? You need to understand how the computer works, how information passes through the Internet, and also how people think - it all starts with people.
The Hacker Pro Youth Cyber Course distills you with the hottest and most up-to-date topics in cyber, hacking and information security, from the basic level to a high level of execution of intrusions, protections and information security.
For details and registration
You can fill out the form and a skyscraper representative will contact you within a few hours
In the Hacker Pro youth cyber course - we will build websites and learn how to upload them to the server, build computer applications related to the cyber worlds, program in 4 different code languages, and wait for you crazy cyber activities like cracking passwords, hacking accounts and even create your own real computer virus. The course starts from a bite level and no prior knowledge is required.
Basic English. You need to know how to pronounce simple letters and words.
Basic technical skills.
No, you do not need to know how to program. You need to know how to operate your computer browser, save a file, install software, extract files and use common keyboard shortcuts.
Personal interview with the course director.
Why? To get to know you a little 🙂 and just to make sure it's a good match, for you and us
The Cyber Course for Youth Hacker Pro is divided into several modules arranged in chronological order according to increasing level of difficulty:
In the opening module of the course we will get to know better the tool that will be our best friend during the course - the computer.
On the types of operating systems, the different characteristics of each and their common uses.
In this module we will learn about the structure of Internet networks and types of networks and network topologies.
We will understand why the Internet connection in the school classroom is different from your home Internet connection and what is the difference between them, and how does this "magic" happen when we type in a website address in a browser and suddenly an entire website is revealed to us
In this module we will learn the basics of programming through experience in the three building blocks of the Internet frontend.
We will start construction of a medium-scale project.
In this module we will experiment with 3 different code languages
In the follow-up module, we will delve deeper into WEB programming and build a medium-scale project.
At this stage of the course we will start focusing on information security.
We will dive deeper into the worlds of information security, our anonymity and the preservation of our personal information.
We will learn to identify built-in vulnerabilities and basic systemic weaknesses in familiar applications, we will learn concepts from the worlds of IT and networks and we will experience Hands On in accepted practices from the cyber world.
In the cyber intelligence module we will dive deeper into the worlds of information security, our anonymity and the protection of our personal information.
We will learn to identify built-in vulnerabilities and basic systemic weaknesses in familiar applications, we will learn concepts from the worlds of IT and networks and we will experience Hands On in accepted practices from the cyber world.
In the hacking module, we are going to experiment with "Tekel's" - cyber attacks.
Every lesson you are going to experience a new attack, understand and analyze it in depth, and come up with a unique skill set that not many teens possess.
Having learned how to attack, we will now learn how to defend professionally.
You will actually learn how a security expert in a large organization like Google or Apple for example, conducts himself during his day and what tools he uses.
Identification and analysis capabilities
You will be able to "see the matrix". Your technological awareness will expand so that you will see and recognize things you have not seen before
Rich portfolio
You will end the course with a portfolio of no less than 21 different projects that illustrate your new cyber capabilities
A unique set of skills
Do you know those who know "everything" about computers? Then you will become the technological geniuses of the house, with a tremendous and glorious set of skills
Prestigious graduation certificate
Our students have been accepted into prestigious majors and tracks thanks to the certificate that gives them proof of knowledge control
For details and registration
You can fill out the form and a skyscraper representative will contact you within a few hours
Girls and boys in seventh grade and up, with a strong desire to learn the secrets of the cyber world!
You need to know how to pronounce letters and words and know how to read simple words correctly.
Yes, but only within the educational institutions we work for.
We are spread over several dozen schools and institutions around the country, you are welcome to call and ask if we work at your child's school.
If not, the course will be open for online registration only.
Yes. First of all you sign up. If after the first lesson you have decided that it is not appropriate then no charge is made.
And in general - the first three sessions are without obligation, so if you decide to retire after them, there is no cancellation fee.
You can read about our cancellation policy in the last question.
Those who will deliver the content to your child are graduates of technology units, graduates in their field or industry workers.
It is important for us that the content comes from those with experience in their field, who not only know the material, but also have practical experience with it.
In addition, these are lecturers with extensive experience in training - because it is clear to us and to you, that in the end it falls on the instructor.
You will complete the course with a rich resume of works and projects in the cyber field, a honed arsenal of skills and abilities in the field of hacking and a prestigious graduation certificate.
No. Let's start with the fact that this is not a hacking course, and the goal is not to teach your children to be hackers.
Cyber studies are similar to martial arts studies - we obviously need to experiment on the side of the attacker, in order to defend.
Second - the route is a 3-year route.
Obviously after the first year we have not yet reached our full potential, however However, they came out with a very solid knowledge in the field of cyber and hacking which is much more than basic, with high levels of performance and advanced hacking and defense skills that even some industry workers do not have.
Good question. The cyber course is a course I got married, Which means that the content taught in the course is new and unique.
As a technological college whose main target audience is technological children, we can tell you that the content taught is foreign and new to the vast majority of them.
So even if you have previous technical knowledge, and even if you have never experienced any technical project, the course starts from the beginner level and progresses at its own pace while everyone is exposed to the content for the first time and progressing at the same pace.
Of course, if we (or you) identify a mismatch resulting from level differences here or there, the child can be assigned to another more or less advanced group.
No. Most of the course is delivered on web platforms, so all processing and calculations are done on cloud networks.
This actually saves the need for a relatively powerful computer, since no significant processing operations are performed on the computer itself.
Minimum technical specifications for the course:
I3 processor
4GB RAM
- Internet connection of at least 15 MB is recommended
It is important for us to be transparent, which is why the cancellation policy is presented to you here.
The first three sessions of the course are defined as impression sessions.
That is, if you decide to cancel after 3 sessions or less, you will receive a relative refund without a cancellation fee, offsetting the relative portion of the sessions you have done so far.
If, after the first meeting, you have decided that it is not suitable for you - you will receive a full refund without questions, even for the first lesson.
If you continue to the fourth meeting onwards, there is a cancellation fee of 33% The rest of the meetings you have left.
For example, if you have 30 sessions left and you decide to separate, you will receive a refund for the remaining 20 sessions.
This is because the cyber course is a professional course, not a class.
There is a logical and chronological sequence between the sessions, and it is not possible to integrate in the middle of the year into an existing course similar to the way in which one registers for the class.
Also, the number of places in each course is limited in order to maintain a high level, fast pace and personal attitude.
In order for your child to continue to enjoy a course at the highest level, and not be affected by the fact that another child has left / retired, as is very common in activities for children, these cancellation fees are charged.
They are programmers in HTML, CSS, Javascript, PHP, SQL.
In Python and other languages we do not touch on this course, there is Python course for youth Completely separate and delivered entirely on the Python language
First of all, we emphasize that this is not a programming course - but a course Cyber.
All the programming topics we teach, we teach from a "cyber" angle, for the purposes of our course.
The topics studied are basic topics such as variables, loops, functions, conditions, basic data structures.
In the Back End we will focus a bit on managing Sessions, managing cookies, transferring parameters to the server via the URL and using forms.
Do not expect the child to know how to build a professional website from scratch or any phone app, because this is not this course.
Cyber refers to the aspect of detecting vulnerabilities in information systems, blocking them and actively defending against cyber attacks and hackers.
Not in this course. This happens in a more advanced course.
Yes. They are taught IP addresses and subnetting, they even experience building networks using Packet Tracer and they will experiment with allocating IP addresses cost-effectively using all the relevant CMD and Routing commands to check network integrity
A question in its place, and here is our preparatory answer:
It is advisable to work on windows. About 80% of the course will work without any problem on the MAC system as well, however there are features that are used mainly in the Windows system.
It is desirable that you have the ability to organize a Windows computer for the child for at least some of the exercises in the course.
If this is not possible, we will allow the child to remotely connect to our Windows computer and the child will work on it in the individual lessons that need a Windows system.
For details and registration
You can fill out the form and a skyscraper representative will contact you within a few hours
Cybergim is the most equal community in Israel. How do we know that?
Well, full of free content, hacking and cyber tutorials, award-winning competitions, leading YouTubers in Israel, a crazy YouTube channel, and of course full of gaming - you can not go wrong!
Do you have a question?
Fill in the details and we will get back to you soon