Intro to
Cyber Security

Instructor-led training
(16 sessions)
€ 1.500

Are you a beginner or a professional that wants to break into the field of cybersecurity?

Intro to Cyber is the standard course to build strong foundations and feel confident on making the next step in your career. Perfect for 👨‍💻 beginners & IT professionals looking to upskill.

I want to become a
Cybersecurity Professional

Fill in the following form and we’ll notify you when registration opens.

You want to train your team?

Become a Cybersecurity Professional! 

This course includes key topics such as cybersecurity terminology, cryptography, network security, web application security, and scripting fundamentals, developing a strong learning mindset which is essential for the fast evolving world of Cyber Security. By the end of this course, you will have a thorough grasp of foundational cybersecurity principles and be equipped to dive into more complex topics and apply them in the real-world.

What You’ll Learn:
😈 Fundamentals of Cyber Security
😈 Operating Systems and Terminal Environments
(Linux and Windows)
😈 Cryptography
😈 Web Applications and Technology Stacks
😈 Structured Query Language (SQL)
😈 Networking & Protocols
😈 Introduction to Web Application Security
😈 Network Security
😈 Bash Scripting
😈 Python3
😈 Cyber Security Career Paths

Make the next step in your career!

Level:
Entry

Class schedule:
TBA

Duration:
8 weeks (8h/week)

Start date:
TBA

Course led by:

Aris Anastou

Aris Anastou is a seasoned cybersecurity professional specialising in penetration testing, vulnerability assessment, and security consulting. Over the years, he has collaborated and worked with organizations across various industries to identify and remediate security risks effectively. In addition to his technical expertise, Aris is skilled in designing and delivering cybersecurity training programs. He has trained teams and individuals, equipping them with the knowledge and skills needed to tackle complex security challenges and strengthen their overall cybersecurity posture.

Suitable for:

> Beginners in Cyber Security

> Students

> Career Changers

> IT Professionals

> Corporate teams

Student Pack Includes:

> Instructor available for technical support during the office hours (1h/week).

> Course materials such as slides, links to further reading, code snippets, lab exercises, etc.

> Interactive, engaging modules

Overview:

This comprehensive course is designed to provide you with a solid foundation in cyber security, equipping you with the essential knowledge and skills needed to understand and protect against the ever-evolving landscape of digital threats. Whether you’re a beginner looking to break into the field, an IT professional seeking to broaden your expertise, or someone interested in safeguarding personal and organizational data, this course is tailored to meet your needs.

Through a blend of theoretical lessons and practical, hands-on exercises, you will explore key concepts such as Cyber Security terminology, cryptography, network security, web application security, scripting and most importantly develop a learning mindset that will guide you for a long time. By the end of this course, you will have a clear understanding of basic cyber security principles and be well-prepared to apply these practices in real-world scenarios.

Join us now

and start your journey towards becoming a
Cybersecurity Professional! 

I want to become a
Cybersecurity Professional

Fill in the following form and we’ll notify you when registration opens.

Intro to Cyber Security course includes:
> 16 instructor-led sessions
> Course materials

Final Price
€ 600

FAQs:

Accordion Content

The Intro to Cyber Security course at Cyber Helmets is designed to provide beginners with a foundational understanding of cyber security principles, threats, and defense mechanisms. It covers essential topics to help you start your journey in the cyber security field and choose the right learning path for your career.

By the end of the course, you will:

  • Understand basic cyber security concepts and terminology.
  • Setup your own Hacking Environment.
  • Understand Web Application and Networks.
  • Basic Network & Web Application Security.
  • Gain hands-on experience with security tools and techniques.


To ensure you get the most out of the Intro to Cyber Security course at Cyber Helmets, a few preparations are recommended.

 

  • Firstly, ensure you have a reliable computer with internet access, as this will be crucial for accessing course materials, participating in live sessions, and completing hands-on labs.
  • Additionally, gather any required materials such as notebooks, pens, or digital note-taking tools to keep track of key concepts and important information.
  • It’s also beneficial to have a quiet and comfortable study environment where you can focus on learning without distractions. Before the course begins, you will receive an email with instructions on how to access our online learning platform – please review this information thoroughly to ensure you can navigate the platform with ease.
  • By taking these steps, you’ll be well-prepared to engage with the course and maximize your learning experience.

No prior knowledge is needed to complete the course. This course will get you started in the Cyber Security domain in just 64 hours.

You will have access to our dedicated support team for any technical or course-related questions. Additionally, you can reach out to your instructor during office hours for personalized assistance.

An Introduction to Cyber Security course is a crucial stepping stone for anyone looking to break into the cyber security field. It provides foundational knowledge, practical skills, and industry insights that are essential for a successful career. By taking this course, you not only prepare yourself for advanced studies and certifications but also demonstrate your commitment to potential employers, making you a more competitive candidate in the job market.

Yes, we offer intermediate and advanced courses in cyber security for those who wish to continue their education and deepen their knowledge. Information about follow-up courses will be provided towards the end of the Intro to Cyber Security course.

Yes, the course includes hands-on labs and practical exercises to help you apply the concepts you learn in real-world scenarios. These activities are designed to enhance your understanding and provide practical experience.

You will need a laptop with internet access and the ability to install required software tools. All other course materials, including lecture notes and lab instructions, will be provided.

Classes are delivered through a live online sessions. Live sessions allow for real-time interaction with the instructor and fellow students.

The course duration is 64 hours, with classes held twice a week for four hours per session. This gives you the ability to digest the information during the course, ask questions and prepare for the next class.

There are no specific prerequisites for this course. However, a basic understanding of computer operations and networking concepts can be helpful.

The course fee is 1500$. This includes all instructional materials and access to any online labs.

Syllabus:

Intro to GCP

  • GCP Hierarchy
  • Google Workspace
  • gcloud config
  • Basic Hacking Techniques

Exploitation of GCP Services

  • IAM
  • KMS
  • Secrets 
  • Storage
  • Compute Instances & VPC
  • Cloud Functions
  • CloudSQL
  • Pub/Sub
  • App Engine
  • Google APIs
  • Cloud Shell

Methodologies

  • White box

Security Services

  • GCP Logging & Monitoring

Syllabus:

Intro to AWS

  • AWS Organization
  • AWS Principals
  • Basic Hacking Techniques

Exploitation of AWS Services

  • IAM
  • STS
  • KMS
  • Secrets Manager
  • S3
  • EC2 & VPC
  • Lambda
  • RDS
  • SQS
  • SNS

Methologies

  • White box

Common Detection Mechanisms

  • CloudTrail

Syllabus:

Azure Basics

  • Azure Organization
  • Entra ID
  • Azure Tokens & APIs
  • Basic Enumeration Tools

 

Exploitation of Azure Services

  • Entra ID IAM
  • Azure IAM
  • Azure Applications
  • Azure Key Vault
  • Azure Virtual Machine & Networking
  • Storage Accounts
  • Azure File Share
  • Azure Table Storage
  • Azure SQL Database
  • Azure MySQL & PostgreSQL
  • Azure CosmosDB
  • Azure App Service
  • Basic Azure Research Technique
  • Azure Function Apps
  • Static Web Apps
  • Azure Container Registry
  • Azure Container
  • Instances, Apps & Jobs
  • Azure Queue
  • Azure Service Bus
  • Azure Automation Account
  • Azure Logic Apps
  • Azure Cloud Shell
  • Azure Virtual Desktop

 

Methologies

  • White box
  • Black box
  • Pivoting between Entra ID & AD

 

Common Detection Mechanisms

  • Azure & Entra ID Logging & Monitoring
  • Microsoft Sentinel
  • Microsoft Defender for Cloud & Microsoft Defender EASM

Fundamentals and Setup

  1. Overview of Android’s architecture and ecosystem dynamics.
  2. Exploration of security features native to Android using Java, Kotlin, C++, and Rust.
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on Android.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including certificate validation and pinning.
  • Cryptography in Android apps
    a) Utilization of Android’s Crypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of biometrics.
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
  • Android IPC
    a) Detailed exploration of Intents, deep links, Binders/services, and broadcast receivers.
  • Webviews
    a) Identifying and resolving common security issues in Android Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an Android app.
    b) Identifying known vulnerabilities within these components.
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including App Transport Security issues & certificate pinning.
  • Cryptography in IOS apps
    a) Utilization of iOS’s CryptoKit & CommonCrypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys and leveraging the secure enclave.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of Local Authentication (biometrics).
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
    d) Using Device Check and App Attest
  • iOS IPC
    a) Detailed exploration of URL schemes, deep (universal) links, and extensions.
  • Webviews
    a) Identifying and resolving common security issues in iOS Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an iOS app.
    b) Identifying known vulnerabilities within these components.
  • Implementing App Integrity
    a) What to look for
    b) How to implement
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Fundamentals & Setup

  1. Overview of iOS’s architecture and ecosystem dynamics.
  2. Exploration of security features native to to iOS using Objective-C, Swift, and C(++).
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in iOS code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on iOS.