5FC4B8D9-E1F4-4542-8C21-9449212E9893 Created with sketchtool. call us Fill 1 Created with Sketch. contact us
    download syllabus

    About the Hacking Defined Bootcamp Training Programme

    A unique training programme in collaboration with KairosRT

    Hacking Essentials from A-Z aimed for IT professionals who want to open the doors to Offensive Security


    This programme will teach you a lot more than just how to do SQL Injections. The programme is designed to transform IT professionals into offensive security personnel. It will train your SOC operators to look at things from a hacker’s perspective. Your web application testers will undestand what other attack vectors they can use and, more importantly – how to communicate with businesses and stakeholders. Running a web application test is nice, but if your report and methodology do not exist you will end up no better than a Nessus or Accunetix scan.

    Here you will gain the knowledge, methodologies, and hands-on experience to enhance your cybersecurity skills and to advance your team’s capabilities to deal with real cyber challenges and threats.

    September, 7th 2020
    ‭+66 (0)2-566-0380‬
    Tuition Fees:
    2,850 USD (including registration fees and tax).
    Program Duration:
    5 days
    Academic hours:
    40 hours
    Program Format:
    The course will be over 5 consecutive days. There will be 40 hours of in-class lectures (5 days), and 80 hours of homework assignments. Lectures are held frontally in Sukhumvit, Bangkok. The program opens about 2-3 times a year
    Original ‘Hacking Defined Bootcamp’ certification of See Security International Cyber College. Students may also sit for the CEH certification, and later on for the OSCP exam.
    Target Audience:
    IT professionals and code developers who want to gain the fundamentals of the technical skills and methodological aspects and best practices in hacking
    Entry Requirements:
    Knowledge of English | Knowledge of IT and Operating Systems | Working knowledge of Networking | Working Knowledge of Linux Terminal | Ideally Knowledge in Python/C/ASM/Ruby

    Homework Assignments:
    80 Hours

    About See-Security and Kairos

    See Security College is a highly specialised and international cybersecurity college. One of seven colleges of its kind, our college offers training programmes aimed for absolute beginners to more advanced professionals. The college delivers its study programs worldwide, through the See Security International brand as well as well-known governmental and special cybersecurity agencies.

    See-Security CEO, Mr. Avi Weissman is one of the leaders of the Israeli Cyber industry and serves as an advisor and commentator to the Israeli government for the regulation of cyber professions. Further, Mr. Weissman was the co-founder of the Israeli Forum for Information Security (IFIS) together with Maj. Gen. (Res.) and former head of National Security Council, Yaakov Amidror. In addition to his role in leading the college, Avi is also a co-CEO of a cyber human resources company, See-HR and a cybersecurity consulting company, See Events – Managed SIEM/SOC.

    Kairos was founded by a small group of intelligence experts, ex-military officers, law enforcement personnel and other government employees with extensive backgrounds in cybersecurity. The group has dealt with various degrees of technical and commercial challenges associated with cybersecurity and intelligence. Kairos’s team of experts moved away from working at commercial organisations and joined together to fulfil their passion for doing quality, handcrafted security work.

    Kairos is a boutique consultancy company dealing with intelligence and offensive security and currently operating in Israel and South-East Asia.

    Target Audience

    This program is designed for those who have previous background in computers, and who are interested in acquiring a high-tech profession, combined with professional expertise and knowledge in the network, system and cyber protection world. Specifically aimed at IT personnel who wish to migrate to the security testing world as well as professionals within the pentesting/red teaming world who wish to acquire more tools, techniques and knowledge to improve their work and professional skill set.

    Frequently Asked Questions

    What is the course’s objective?

    The course aims to cover the essential skills, knowledge, and best practices in the field of ethical hacking. The course will also introduce relevant methodologies and writing skills to make sure students can write professional, valuable, and influential products and to better their communication with managers, CEOs and other cybersecurity professionals in organisations.

    What will I be learning?

    In this highly intensive training, all the required skills for a beginner hacker are comprehensively addressed: from reconnaissance, through penetration techniques and methods, to more advanced topics such as reverse engineering. The program further elaborates on the fundamentals by reviewing offensive aspects of System, Network, Mobile, Web, Application and more. The realm of Ethical Hacking is composed of various topics which require extensive knowledge in each. In this training, you will be introduced to all the core foundations as well as a business understanding of communication and processes of ethical hacking.

    What are the aims of the programme? 

    This hands-on rich programme combines class-and-home based practice and demos as well as through our unique lab platform and is aimed:

    1. To provide extensive theoretical and practical training in PT for students who are familiar with OS, Networking, and programming in Python
    2. To prepare students for the OSCP certification (at least six months after graduation)
    3. To cover methodological aspects and best-practices in PT to ease the communication with cybersecurity professionals within the and outside of your organisation

    What are the entry requirements?

    You will not be tested on these requirements for enrollment. However, we emphasise that without background knowledge, it will be challenging to keep up with materials covered throughout the course and even more challenging to pass the final exam. The following core knowledge branches are required:

    1. Practical knowledge and experience in IT systems.
    2. Working knowledge of IP, TCP, and other networking concepts.
    3. Working knowledge of the foundations of Windows-based Environments.
    4. Working knowledge in Linux terminals (i.e. bash, sh, zsh or any other).
    5. Preferably any of the following programming languages Python/C/ASM/Ruby.

    No mathematical or academic background is required.

    Will I be a Hacker at the end? 

    Hacking is a multidisciplinary profession and contains all sorts of specialisations. This course is intended to give the learner solid foundations (both technical and methodological) in the main branches of PT. After the course, the graduate will have a good understanding of how hackers conceptualise and approach cybersecurity challenges, and allow him or her to further explore the field by taking more specific training in the field. After the course, you will be able to take other forms of training which assumes the background covered in this unique training.

    What will my organisation benefit from hiring someone who graduated from the course? 

    An attackers’ perspective is different from that of a SOC operator. This training will not only allow for basic penetration testing skills but also enable Blue Teamers or SOC operators to excel in their day to day operations knowing what are the steps of an attack and how it can manifest in various EDR and other telemetries they might have.

    The programme is designed to transform IT professionals, into offensive security personnel. It will train your SOC operators to look at things from a hacker’s perspective. Your web application testers will understand what other attack vectors they can use and. In short, your employee will have a broader, sophisticated and multidisciplinary approach to tackle real-life problems, no matter what field of cybersecurity he or she is in (defence, SOC, CSP etc.)

    What are the pedagogical requirements of the course? 

    1. 2 hours of homework after each class
    2. Final Exam: The final exam will be delivered at the end of the course. Students must achieve a ‘pass’ to get a graduation diploma.
    3. Attendance in at least 80 per cent of the lectures.

    However, to be honest, the most basic and mandatory requirement is the willingness and desire to learn, evolve and consume information.

    What is the format of the course?

    This is a very intensive, hands-on rich 40-hours Bootcamp held over five consecutive days (8 hours per day). At the 5th day, the final exam will be delivered. The course will be held for the first time in Sukhumvit, Bangkok, in live, frontal sessions.

    What will I get? 

    Live sessions with one of Israel’s best hackers, original and prestigious certification from See Security International Cyber College, original slides from lecturers and access to our unique lab platform for hands-on practice. Students can record the sessions if they wish.

    Application and Next Steps

    Applicants must fill our online application form for enrollment.

    Are you up for the challenge? Read the syllabus and register here.