We provide Israeli-led, simulator-based, corporate cybersecurity training for Australian organisations seeking to upskill their staff and guard against dynamic, ever-evolving and frequent cyber attacks.
corporate cybersecurity training
As the frequency and severity of cyber attacks grow, staff are increasingly becoming the weakest links within organisations.
Investment in training and development can play a crucial role in blunting the likelihood and severity of a potential cyber attack.
Business email compromise scams involving targeted phishing and hacking of businesses has resulted in the most significant losses across all cyber threat categories in 2019/20.
The costs of these attacks are skyrocketing with social engineering-driven scams remaining the number one attack vector for criminal and nation-state hackers.
Cell-Cyber offers a comprehensive range of cybersecurity courses, content and simulated training programs with learning pathways designed for both technical and non-technical participants.
Dynamic, Simulated Training Scenario's
Comprehensive Learning pathways
Tailored Learning by Company & Industry
Learn from Frontline Cyber Practitioners.
Cell-Cyber provides access to Israeli frontline cybersecurity practitioners & simulator-based learning pathways, delivered digitally.
Our training providers have extensive civil and military cybersecurity operational experience. We're not academics.
Cell-Cyber offers a comprehensive suite of cybersecurity courses, content and simulated training programs with learning pathways designed for both technical and non-technical participants, delivered digitally and on-demand.
The threat of cyber-attack has become a clear and present danger for Australian companies, with new attack vectors being weaponised each day, while the frequency and ferocity of attacks are greater than ever.
We offer unparalleled insight and understanding of cutting-edge tools, technologies and strategies to design, implement and manage an effective threat defence and equip you with job-ready skills for a range of specialist roles.
Our Corporate Training Pathways
With a selection of both short-form and long-form course content and learning pathways, Cell-Cyber offers a comprehensive suite of learning pathways to arm you with the skills and job readiness needed to take on a range of specialist cybersecurity roles.
CERTIFIED HANDS-ON MALWARE ANALYSIS EXPERT
This course offers advanced reverse engineering training with an emphasis on the Windows operating system delivered by very experienced 8200 alumni (Israeli Defence Force Intelligence).
Topics include research of malware, sandbox detection, code packing and unpacking, encryption and anti-debugging, exploits and a lot of low-level code!
x86/x64 Assembly [Optional]
OPEN SOURCE INTELLIGENCE
This course provides the tools and sources and methods of information gathering on the Internet, including the
use of social networks as a source of intelligence.
Our practitioners provide knowledge of the existing sources of information, including social networks, the range of benefits from using that information, how to operate on the internet without being blocked and arousing suspicion, and the treatment of different types of media.
Technical English comprehension
CERTIFIED HANDS-ON CYBER FORENSIC EXPERT
This course will cover the most cutting-edge subject matter currently dominating the digital forensics field.
The course will describe the forensic tools, methods, techniques and what to look for when investigating digital computer events.
Understanding of Windows environments
Understanding of Information Security
Understanding of networking concepts i.e. TCP/IP
CERTIFIED HANDS-ON WEB APPLICATION HACKER
The objectives of the course are to teach developers and security professionals how to find and exploit the most dangerous web vulnerabilities, giving them the tools necessary in order to audit web applications by themselves.
Backend web development languages [PHP/.NET etc]
Basic client-side web development [HTML/JS/CSS]
Basic database knowledge & SQL
CERTIFIED HANDS-ON WEB VULNERABILITY HUNTER
The course will introduce the common techniques used when auditing massive pieces of code, teach you how to detect complex vulnerabilities, and give you the tools to exploit them.
Web security exploitation techniques [SQLI/LFI/RFI/XSS]
Experience in web development languages [PHP/Java/JS]
CERTIFIED HANDS-ON WINDOWS MEMORY FORENSICS EXPERT
This course provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images.
Forensics & incident response concepts
Strong Windows & Linux knowledge
Experience with programming languages
Experience with Python
CERTIFIED HANDS-ON SIEM EXPERT
This course will walk you through the SIEM-SOC world including the advanced theory of SOC generations, strategies, and instruction on how to build your own SOC.
This course offers open discussions to enrich our students' knowledge and allow for the exploration of new ideas, as well as providing many LABs to practice event lifecycle via data mining, normalizing, handling and visualisation to better understand SIEM behind the scenes.