Hands on
Cybersecurity
Training
A Broad Range of Experiences for Novices
Cyber Phoenix Academy
Gain Experience Working in All Key Areas of Information Security
The Cyber Academy
Offensive Cybersecurity Skills
3 Classes over 34 Weeks (25 hours per week)
Class 1: Immediate Immersion
Exploit a site and fix vulnerabilities, investigate suspicious activities, analyze malicious network traffic
Price: $1,650
Class 2: Cyber Defender
Analyze a remote intrusion attempt, investigate an incident using a SIEM, begin to understand malware, examine a compromised host’s memory, conduct a forensic disk examination
Price: $4,090
Class 3: Reverse Engineering and Exploitation
Reverse engineer suspicious files, conduct OSINT analysis, develop buffer overflow exploits, strengthen a buffer overflow exploit, evade anti-virus, develop custom malware payload, spearfish a company, exploit a company’s database, attack a nation-state
Price: $4,030
Seats Are Limited and Filling up Quickly. Sign Up Before They're Gone.
Cyber Defender
Foundational Cybersecurity Skills
3 Classes over 30 Weeks (15 hours per week)
Cyber Defender provides the opportunity to complete the first two courses of The Cyber Academy at a 15-hour-per-week pace. Once the following courses are completed, students gain access to Reverse Engineering and Exploitation.
Class 1: Immediate Immersion
Exploit a site and fix vulnerabilities, investigate suspicious activities, analyze malicious network traffic
Price:
Class 2: Cyber Defender 1
Advanced network traffic analysis, log analysis, malware analysis
Price:
Class 3: Cyber Defender 2
Memory forensics, disk forensics, incident response, and reporting
Price:
Seats Are Limited and Filling up Quickly. Sign Up Before They're Gone.
Testimonials
"The Cyber Academy has had resounding impact on my porfessional career"
Before enrolling in The Cyber Academy, I was working as the digital marketing manager for an e-comerce website (and) ..had very little understanding of information security. The Cyber Academy has had resounding impact on lm my professional career and I was able to secure employment within the information security field in less than one year. From reverse engineering binary files and developing software exploits to analyzing malware and responding to targeted cyber attacks, the many skills I developed are sought after by countless employers.” -Clif