Hands on
Cybersecurity
Training

A Broad Range of Experiences for Novices

Cyber Phoenix Academy

Gain Experience Working in All Key Areas of Information Security

The Cyber Academy

Offensive Cybersecurity Skills
3 Classes over 34 Weeks (25 hours per week)

Class 1: Immediate Immersion

Exploit a site and fix vulnerabilities, investigate suspicious activities, analyze malicious network traffic

Price: $1,650

Class 2: Cyber Defender

Analyze a remote intrusion attempt, investigate an incident using a SIEM, begin to understand malware, examine a compromised host’s memory, conduct a forensic disk examination

Price: $4,090

Class 3: Reverse Engineering and Exploitation

Reverse engineer suspicious files, conduct OSINT analysis, develop buffer overflow exploits, strengthen a buffer overflow exploit, evade anti-virus, develop custom malware payload, spearfish a company, exploit a company’s database, attack a nation-state

Price: $4,030

Seats Are Limited and Filling up Quickly. Sign Up Before They're Gone.

Cyber Defender

Foundational Cybersecurity Skills

3 Classes over 30 Weeks (15 hours per week)

Cyber Defender provides the opportunity to complete the first two courses of The Cyber Academy at a 15-hour-per-week pace. Once the following courses are completed, students gain access to Reverse Engineering and Exploitation.

Class 1: Immediate Immersion

Exploit a site and fix vulnerabilities, investigate suspicious activities, analyze malicious network traffic

Price:

Class 2: Cyber Defender 1

Advanced network traffic analysis, log analysis, malware analysis

Price:

Class 3: Cyber Defender 2

Memory forensics, disk forensics, incident response, and reporting

Price:

Seats Are Limited and Filling up Quickly. Sign Up Before They're Gone.

Testimonials

"The Cyber Academy has had resounding impact on my porfessional career"

Before enrolling in The Cyber Academy, I was working as the digital marketing manager for an e-comerce website (and) ..had very little understanding of information security. The Cyber Academy has had resounding impact on lm my professional career and  I was able to secure employment within the information security field in less than one year. From reverse engineering binary files and developing software exploits to analyzing malware and responding to targeted cyber attacks, the many skills I developed are sought after by countless employers.” -Clif