Welcome to our SG site!
We noticed you are viewing this site from
---
,
 do you want to visit our
US
site instead?
Visit
US
site
Career Kickstart Programme

Career Kickstart Programme

Career Kickstart Programme

The Cybersecurity Course That Gets You Employed In 6 Months

Helping individuals with no IT background enter the cybersecurity industry through world-class, hands-on training and career coaching.


Learning Outcomes: 

1. Foundational Knowledge:

  • Acquire knowledge and tools for corporate network exploration
  • Understand and defend against cyber-attacks
  • Familiarise with various attack scenarios

2. Linux Proficiency:

  • Utilise Linux command-line operations
  • Comprehend Linux system configurations and graphical interface
  • Implement automation in Linux

3. Programming and Scripting:

  • Learn about Python variables
  • Construct basic Python code

4. Security Operations Center (SOC) Insight:

  • Gain a solid understanding of the SOC environment
  • Develop practical skills in monitoring, log analysis, and event correlation
  • Apply knowledge in real-time using a simulation environment

5. Network and System Configurations:

  • Establish Domain roles and functionalities
  • Configure rules and policies for DC, firewall, IDS, and IPS

6. Penetration Testing:

  • Familiarise with the Penetration Testing Process
  • Test and identify security weaknesses in systems
  • Gather and enumerate vulnerabilities
  • Exploit vulnerabilities to attack networks
  • Implement steps to maintain access and pivot to other machines

7. Cybersecurity Career Preparation:

  • Master resume and CV writing for cybersecurity roles
  • Hone interview skills tailored for cybersecurity positions
  • Receive career coaching for a successful path in cybersecurity
Question text goes here
  • Become familiar with different attack scenarios

Course Syllabus:

Chapter 01
Cybersecurity Fundamentals
Question text goes here

Fundamental Concepts

  • Basic Networking
  • Remote Access
  • Steganography
  • Hash Encodings

Intro to Cybersecurity

  • OSI Model
  • Anonimity on the Network
  • Basic Cyber Attacks
  • Basic Network protocols

Linux Command-line

  • Linux Distribution
  • Basic Commands
  • Permissions
  • Text Manipulation
  • Bash Scripting
  • For loop, If statements, Functions,case

Networking

  • Network Configuring and Troubleshooting
  • Package management
  • Install Deb packages
  • Using APT

Intro To Python

  • Variables
  • Booleans
  • List
  • Dictionaries, Tuples
  • Loops

Python Conditions & Functions

  • Conditional Statements
  • While and For Loops
  • Working with Functions

Python Files I/O

  • Python Modules
  • Reading Files
  • Writing Files

Intro to Linux

  • Virtualisation
  • Bridge vs NAT
  • Linux Directories
  • Linux Users
  • Packages
  • File and Text Manipulation
  • Linux Scripting

Networking

  • TCP/IP and OSI Model
  • Network Routing Basics
  • Network Protocols
  • Remote Connection Protocols
  • Wireshark
  • Filtering and Parsing Traffic Logs
  • Extracting Objects

Network Analysis

  • Advance Wireshark
  • Traffic analysis
  • OS Fingerprinting
  • Detecting Suspicious Traffic
  • Filter packets
  • File Carving

Network Attacks

  • Network Scanning
  • MitM
  • LLMNR attack
  • Offline, Online Password Brute Force
  • Intro to Trojans
  • Payloads: Reverse vs Bind
  • Vulnerabilities on system
Chapter 02
Network Research
Question text goes here
  • Become familiar with different attack scenarios

Windows Domain

  • Install and configure windows server, ADDS
  • Manage Domain Protocols and Policies
  • Wireshark
  • IP address subnetting
  • Analyse Windows Events to monitor events and incidences on the DC

SOC Environment

  • ELK deployment
  • Beats deployment
  • Identifying threats
  • Data Aggregation
  • Real-Time Monitoring
  • Setting and Configuring pfsense rules
  • Passing traffic
  • Managing Network Security with IDS and IPS

Using SIEM

  • Firewall Monitoring and management
  • Install and configure firewall packages
  • Web Gateway Filtering
  • Vulnerability Assessment

Introduction to Threat Hunting

  • Hardening Domain
  • Setting up Open Source SIEM
  • Deploying OSSIM
  • Network and Host Monitoring and Logging

Chapter 03
Security Operations Centre (SOC) Analyst
Question text goes here
  • Become familiar with different attack scenarios

Reconnaissance

  • Monitoring Personal and Corporate Blogs
  • Collecting Employees PersonalInformation
  • Harvesting Organization Emails
  • Shodan Search Engine
  • Nmap Scanning
  • Services Versions
  • NSE Scripting

Enumeration

  • DNS Enumeration
  • FTP, SSH Enumeration
  • SMB, MySQL Enumeration
  • Network Traffic
  • NSE Enumeration
  • Vulnerabilities DetectionMethods
  • Automating the Scanning

Exploitation

  • Brute-ForcingServices
  • Metasploit
  • Working with Exploits
  • Meterpreter
  • Social Engineering

Post-Exploitation

  • Configuring Payloads
  • Analyzing Local Exploits
  • Privilege Escalation
  • Using the Meterpreter Modules
  • Windows Linux PostExploitations

Chapter 04
Penetration Testing
Question text goes here
  • Become familiar with different attack scenarios
Chapter 05
Question text goes here
  • Become familiar with different attack scenarios

Training Schedule:

Week 1

  • Basic Networking
  • Remote Access
  • Steganography
  • Hash Encodings

Week 2

  • OSI Model
  • Anonimity on the Network
  • Basic Cyber Attacks
  • Basic Network protocols

Week 3

  • Linux Distribution
  • Basic Commands
  • Permissions
  • Text Manipulation
  • Bash Scripting
  • For loop, If statements, Functions, Case

Week 4

  • Network Configuring and Troubleshooting
  • Package management
  • Install Deb packages
  • Using APT

Week 5

  • Intro to Linux (Ubuntu)
  • Text Manipulation
  • Services
  • Scanning the network

Week 6

  • Brute Force
  • Fail2Ban
  • Linux Scripting Recap

Week 7

  • Linux Scripting for scanning
  • Linux scripting to analyse files

Week 8

  • Scripting - If conditions
  • Scripting - functions
  • Scripting - case
  • Scripting to check password strength, malicious hash probability

Week 9

  • Diving into packets - wireshark
  • Local Network Attack - mitm
  • Local Network Attack - llmnr
  • VPN, Proxy and TOR
  • Intro to Trojans
  • Vulnerabilities on system

Week 10

  • Install and configure windows server, ADDS
  • Manage Domain Protocols and Policies
  • IP address subnetting
  • Analyse Windows Events Log
  • Monitor events and incidences on the DC

Week 11

  • Wireshark Analysis on SOC
  • IDS and IPS Configuration
  • Snort Installation and Rules Setting

Week 12

  • Firewall Monitoring and management
  • Install and configure firewall packages
  • Web Gateway Filtering
  • Vulnerability Assessment

Week 13

  • ELK deployment
  • Beats deployment
  • Identifying threats
  • Data Aggregation
  • Real-Time Monitoring
  • Setting and Configuring pfsense rules

Week 14

  • Hardening Domain
  • Setting up Open Source SIEM
  • Deploying OSSIM
  • Network and Host Monitoring and Logging
  • SMB protocol and security issues

Week 15

  • Backdoor with Netcat
  • Domain Attacks, Monitoring
  • Incidence Responding

Week 16

  • Variables, Strings, Integers
  • Booleans
  • List
  • Dictionaries, Tuples
  • Loops
  • Basic Python Scripting

Week 17

  • Conditional Statements
  • While and For Loops
  • Working with Functions
  • Python Modules
  • Reading Files
  • Writing Files

Week 18

  • Monitoring Personal and Corporate Blogs
  • Collecting Employees Personal Information
  • Harvesting Organization Emails
  • Shodan Search Engine
  • Nmap Scanning
  • Services Versions

Week 19

  • Using NSE Scripts
  • DNS, SMB, FTP, SSH, MYSQL Enumeration
  • Network Traffic
  • NSE Enumeration
  • Vulnerabilities Detection Methods
  • Automating the Scanning
  • Brute-Forcing Services
  • Metasploit
  • Working with Exploits and other databases
  • Meterpreter

Week 20

  • Bind and Reverse Shell with Netcat
  • Payloads and creating payloads
  • Msfvenom
  • Payloads Delivery
  • Privilege Escalation

Week 21

  • Post Exploit Linux
  • Post Exploit Windows
  • Cracking Windows password
  • Automate msfconsole with rc script

Week 22

  • OSINT with google and shodan
  • Shodan on linux
  • Bypass with Windows ISO and Kali
  • Social Engineering and tools
  • Intro to Web app hacking
2 x Weekdays Per Week (7 pm - 11 pm), 1 x Weekend Per Week (1 pm - 5 pm).
Question text goes here

Training Methodology:

Apprenticeship-based Training

  • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
  • Our trainers prioritize showing over telling, explaining intricacies without relying on slides, offering direct engagement.
  • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

Practice Labs

  • Engage in repeated practice sessions to solidify and reinforce your understanding.
  • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
  • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

Assessment and Project

  • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
  • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
  • Broaden your horizon by familiarizing yourself with diverse cyber-attack scenarios and their implications.
Question text goes here
  • Become familiar with different attack scenarios

FAQs:

Do I need to have any programming knowledge to join the course?

  • No prior programming or coding knowledge is needed. We teach all relevant programme skills, such as Python, during the course in the context of cybersecurity.

Are there grants available?

  • We currently don't offer grants as the curriculum requirements do not fit the standards we aspire to (e.g. MCQ-based tests to guarantee a 70% pass rate for grant applicants). Our priority is ensuring students gain valuable skills for a cybersecurity career. However, financing options are available.

What if I cannot cope and want to drop out?

  • We urge students to think twice before dropping out, as it impacts their progress. Our goal is to see every student graduate and secure a cybersecurity role. We're here to help you overcome challenges and adjust to your needs. If you're set on leaving, your trainer will work with a member of the student success team to assist you.

Can you guarantee that I will get a job?

  • We do not guarantee any students that they have a 100% chance of securing a job. We provide you with the best opportunity to secure a career in the industry. Each individual has a unique situation and expectations of a cybersecurity career upon graduating. From our experience, some graduates turn down job offers due to personal preferences (e.g. shift work, salary requirements, etc) and take longer to find a role they are comfortable with.

What are the computer specifications I need for the course?

  • A Windows or Mac laptop with the following specs:
    ▪ Intel: i5 or higher
    ▪ Preferred Windows OS ( Operation System )
    ▪ x64-compatible 2.0 GHz CPU minimum or higher
    ▪ 16 GB RAM minimum▪ 250 GB available hard-drive space
    ▪ Laptop or stationary computer workstation for every student
    ▪ Internet bandwidth - minimum base connection speed of 10 Mbps down/up is required.

What certifications do I get from the course?

  • The Career Kickstart course focuses on technical skills, and we do not issue any industry-specific certifications such as the CEH or CompTIA Security+. The entry-level certifications focus primarily on a theoretical understanding of cybersecurity and do not provide the technical skills required to enter the industry.
Question text goes here
  • Become familiar with different attack scenarios
Quick Info
Programme Fee
From $345/month
Duration
6 months, 200+ hours (Part-time)
Schedule
2 x Weekdays Per Week (7 pm - 11 pm), 1 x Weekend Per Week (1 pm - 5 pm).
Teacher-to-Student Ratio
1:30
Delivery Mode
Online
Register Now

Secure Your Future

Find out more about how we can help you secure your future in cybersecurity

Talk to us on
WhatsApp!