We provide Israeli-led, simulator-based,  corporate cybersecurity training for Australian organisations seeking to upskill their staff and guard against dynamic, ever-evolving and frequent cyber attacks. 

 corporate cybersecurity training

Icon4.png

As the frequency and severity of cyber attacks grow, staff are increasingly becoming the weakest links within organisations.

Icon2.png

Investment in training and development can play a crucial role in blunting the likelihood and severity of a potential cyber attack.


Business email compromise scams involving targeted phishing and hacking of businesses has resulted in the most significant losses across all cyber threat categories in 2019/20.
 
The costs of these attacks are skyrocketing with social engineering-driven scams remaining the number one attack vector for criminal and nation-state hackers. 

 

Cell-Cyber offers a comprehensive range of cybersecurity courses, content and simulated training programs with learning pathways designed for both technical and non-technical participants.

C:\> Corporate

Stock Market
Dynamic, Simulated Training Scenario's
Finance Chart
Comprehensive Learning pathways
Tailored Learning by Company & Industry
Financial Chart
Stock Trade
Learn from Frontline Cyber Practitioners.

Cell-Cyber provides access to Israeli frontline cybersecurity practitioners & simulator-based learning pathways, delivered digitally.

Icon2.png

Our training providers have extensive civil and military cybersecurity operational experience. We're not academics.

Cell-Cyber offers a comprehensive suite of cybersecurity courses, content and simulated training programs with learning pathways designed for both technical and non-technical participants, delivered digitally and on-demand.

The threat of cyber-attack has become a clear and present danger for Australian companies, with new attack vectors being weaponised each day, while the frequency and ferocity of attacks are greater than ever. 

We offer unparalleled insight and understanding of cutting-edge tools, technologies and strategies to design, implement and manage an effective threat defence and equip you with job-ready skills for a range of specialist roles. 

Our Corporate Training Pathways

With a selection of both short-form and long-form course content and learning pathways, Cell-Cyber offers a comprehensive suite of learning pathways to arm you with the skills and job readiness needed to take on a range of specialist cybersecurity roles. 

POWERED BY:

Logo
Woman learning online

CHMAE

CERTIFIED HANDS-ON MALWARE ANALYSIS EXPERT

 

This course offers advanced reverse engineering training with an emphasis on the Windows operating system delivered by very experienced 8200 alumni (Israeli Defence Force Intelligence).

Topics include research of malware, sandbox detection, code packing and unpacking, encryption and anti-debugging, exploits and a lot of low-level code!

PREREQUISITES:

C++
Python
x86/x64 Assembly [Optional]

50 Hours

5 Classes

Employees learning about cyber security

OSINT

 

OPEN SOURCE INTELLIGENCE

 

This course provides the tools and sources and methods of information gathering on the Internet, including the
use of social networks as a source of intelligence.


Our practitioners provide knowledge of the existing sources of information, including social networks, the range of benefits from using that information, how to operate on the internet without being blocked and arousing suspicion, and the treatment of different types of media.

PREREQUISITES:

Technical English comprehension

10 Hours

2 Classes

 Cyber courses from home

CHCFE

 

CERTIFIED HANDS-ON CYBER FORENSIC EXPERT

This course will cover the most cutting-edge subject matter currently dominating the digital forensics field.

 

The course will describe the forensic tools, methods, techniques and what to look for when investigating digital computer events.

PREREQUISITES:

Understanding of Windows environments
Understanding of Information Security 
Understanding of networking concepts i.e. TCP/IP

50 Hours

5 Classes

People learning on computers

CHWAH

 

CERTIFIED HANDS-ON WEB APPLICATION HACKER

 

The objectives of the course are to teach developers and security professionals how to find and exploit the most dangerous web vulnerabilities, giving them the tools necessary in order to audit web applications by themselves.

PREREQUISITES:

Backend web development languages [PHP/.NET etc]
Basic client-side web development [HTML/JS/CSS]
Basic database knowledge & SQL

 

50 Hours

5 Classes

Programmer in cybersecurity

CHWVH

 

CERTIFIED HANDS-ON WEB VULNERABILITY HUNTER

 

The course will introduce the common techniques used when auditing massive pieces of code, teach you how to detect complex vulnerabilities, and give you the tools to exploit them.

PREREQUISITES:

Web security exploitation techniques [SQLI/LFI/RFI/XSS]
Experience in web development languages [PHP/Java/JS]

50 Hours

5 Classes

Young People - learning about cybersecurity

CHWMFE

 

CERTIFIED HANDS-ON WINDOWS MEMORY FORENSICS EXPERT

This course provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images.

PREREQUISITES:

Forensics & incident response concepts
Strong Windows & Linux knowledge
Experience with programming languages
Experience with Python

50 Hours

5 Classes

Typing on a computer

CHSE

 

CERTIFIED HANDS-ON SIEM EXPERT

 

This course will walk you through the SIEM-SOC world including the advanced theory of SOC generations, strategies, and instruction on how to build your own SOC.

 

This course offers open discussions to enrich our students' knowledge and allow for the exploration of new ideas, as well as providing many LABs to practice event lifecycle via data mining, normalizing, handling and visualisation to better understand SIEM behind the scenes.

50 Hours

5 Classes

Our corporate training pathways are cutting-edge, hyper-relevant and tailored to the unique needs of your organisation and industry.

Cyber-attacks are evolving rapidly and traditional Universities and training providers in Australia are struggling to keep up with job-relevant training.

Icon2.png

We’re different from traditional Universities and Registered Training Organisations (RTOs) in Australia.
 
Our training practitioners have extensive experience training diverse teams from technology startups and SME's to multinational organisations and governments.

We don't offer generic content. Cyber threats evolve too rapidly so our training material is constantly updated by the world's leading cyber practitioners on the frontlines of Israel's threat defence.

We tailor our learning pathways based on the unique needs of your organisation and your industry to ensure that your personnel are well equipped to deal with a dynamic, evolving and costly threat.

If you would like to explore how we can train your team, get in touch with our Sales team below to get started.