× Career at RTG Tech Jobs About Contact Us
main image

Cyber Security Bootcamp

Course Starts
Academic Hours
Meetings per Week
Practical Training in our Development Department

The Cyber Security Bootcamp at Real Time Group is comprehensive, professional, and practical. The course is delivered to colleges, government personnel, tech companies, and security organizations in Israel and around the world.

As part of the studies in cybersecurity and information security, we will provide you with practical knowledge on how to defend against attacks and breaches for companies, organizations, government websites, and military systems. Including IoT (Internet of Things) products, SCADA/ICS (Control and Automation) products, servers, and home computing, a SOC (Security Operations Center) Analyst with SIEM (Security Information and Event Management).

The Cyber Security course constitutes preparation for the international CEH (Certified Ethical Hacker) exam.

Study Topics for the Cyber Security Program

In the course of this program, you will become familiar with the techniques and tools used by cybersecurity companies and intelligence agencies:

  • Quiet/Noisy victim data collection and attack (OSINT — Open Source Intelligence).
  • In-depth familiarity with techniques and tools for attacking Windows/Linux operating system servers with various attack techniques (Cyber Attack Infrastructure).
  • Weakness testing in servers using penetration attempts — hardware weaknesses, operating system weaknesses, database weaknesses, and target network weaknesses weaknesses (Penetration Testing).
  • Forensic investigation, tracking intruder traces upon breach detection in servers (Forensics Investigation).
  • Event identification and monitoring — response upon breach detection, solutions to mitigate breach damage (Incident Response).
  • Identification of viruses and malicious software (Malware Analysis).

In line with this mission, we have meticulously developed a well-structured study plan that encompasses all the practical, up-to-date, and pertinent knowledge. This plan also strategically allocates ample hours for hands-on practice and coding. Our goal is to provide you with a learning experience that nurtures both understanding and proficiency, ensuring you are well-prepared for the dynamic tech landscape.

Learn Cyber Security at Real Time College

The Cyber and Information Security course consists of 12 practical modules, where students learn Cyber Security in an interactive environment. Starting from acquiring critical thinking processes, analyzing security events and investigations, and culminating in gaining deep knowledge of operating systems, communication networks, and infrastructure services, you will learn how to scan, test, and secure IT systems, including communication networks, servers, databases, and applications. You'll also use Python for application development and BASH for scripting. All of this is accomplished through hands-on exercises on real servers and simulators that identify breaches in real time.

As part of the Cyber course, we teach "Penetration Testing," during which students put themselves in the role of a hacker to understand how they operate. The best way to test server security is to learn how to be a hacker yourself. What actions would you, as a hacker, take to efficiently carry out a breach? Try to identify weaknesses and vulnerabilities in the system.

Upon completing the penetration testing, you will need to fill out an impact report detailing vulnerable points in the system that need strengthening and improvement for the client.

The Cyber course at RT Group includes 6 specializations:

SOC Analyst with SIEM
Cyber Attack Infrastructure
Penetration Testing
Forensics Investigation
Incident Response

"The Toolbox" of Cyber Security and Information Security Studies:

A cybersecurity expert must possess emotional intelligence and psychological abilities to understand how hackers operate, as well as high technological skills. A cyber expert needs an in-depth understanding of the infrastructure, to comprehend how the company's computing system works, and to know its operational methods.

A cybersecurity specialist should possess the toolbox presented before you. By utilizing these tools, the cybersecurity specialist finds solutions for various situations that need to address:

  • Preventing Server Penetration (Penetration Testing)
  • Identification and Analysis of Malicious Software (Malware Analysis)
  • Forensic Investigation
  • Incident Response
  • SOC (Security Operations Center) Analyst with SIEM (Security Information and Event Management)
  • Executing Attacks (Cyber Attack Infrastructure)

All lectures (including those in the classroom) are recorded and available for playback at any time. Throughout the course, emphasis is placed on an innovative and advanced learning experience.

We believe in learning through practical exercises (a lot of practice), and therefore, a portion of the course is dedicated to exercises and projects. All students have access to the information portal on the college's website, which includes additional exercises, videos, and presentations.

The field of cybersecurity can be divided into 4 main domains:

1. Application Security — Protecting privacy and security in various web applications, such as credit card information.

2. Network Security — Securing servers and ensuring the integrity and availability of information.

3. Cloud Security — With the shift to cloud storage, more and more organizations are exposed to attacks in this area.

4. IoT Security — Security of systems in the physical world controlled by computers, such as cameras, sensors, locks, autonomous vehicles, and more.

What are penetration testing tools?

In recent years, there has been a significant rise in cyber attacks that have the capability to disrupt and devastate public organizations on a massive scale. There have been attempts to breach government offices, television channels, and more. These breaches have gained significance in certain situations, not only economically but also politically and nationally. Accordingly, the need for penetration testers to assess cyber threats has increased. Penetration Testing has become an accepted method over time, through which we aim to identify and prevent damage from various cyber threats.

The following table lists some of the most significant penetration testing tools and illustrates their characteristics:

Tool Name Purpose Resilience Cost
  • port scanner
  • Remote OC fingerprinting
Linux, NetBSD, FreeBSD, OpenBSD free
  • network scanning
  • port scanner
  • OS Detection
Linux, Windows, FreeBSD, OS X, HP-UX, NetBSD, Sun, OpenBSD, Solaris, IRIX, Mac, etc. free
  • Executes queries including ping, whois, hostname lookups, etc.
  • Identifies open UDP/TCP ports and determines which services will operate on these ports.
Windows 2000/XP/Vista/7/10/11 free
  • OS fingerprinting
  • firewall identification
Linux, FreeBSD, NetBSD, OpenBSD, Mac OS X, Solaris, Windows, and AIX free
  • Remote active OS fingerprinting
  • port scanner
  • TCP fingerprinting
Linux free
  • Web server fingerprinting SSL detection
  • Identification of internet-capable devices, for example, wireless access points, switches, modems, routers
Linux, Mac OS X, FreeBSD, Win32 (command line & GUI free
Nessus Identification of vulnerable points that allow remote surveillance/control or access to sensitive data. Mac OS X, Linux, FreeBSD, Apple, Oracle Solaris, Windows free in limited edition
GFI LANguard Identification of vulnerable points in the network Windows Server 2003/2008, Windows 7 Ultimate/ Vista, Windows 2000 Professional, Business/XP, Server 2000/2003/2008 Free trial version only
ISS Scanner Network Vulnerability Identification Windows 2000 Professional with SP4, Windows Server 2003 Standard with SO1, Windows XP Professional with SP1a Free trial version only
Shadow Security Scanner Network Vulnerability Identification, audit proxy and LDAP servers Windows but server scanners built on any platform Free trial version only
Metasploit Framework
  • Development and deployment of remote target exploit code
  • Assessment of the vulnerability level of computer systems
All versions of Unix and Windows Free
Brutus Telnet, ftp, and http password cracker Windows 9x/NT/2000 free

Benny Cohen
Real Time Group Founder and CEO

  • M.Sc. in Communication Engineering
  • B.Sc. in Electronics Engineering
  • Lecturer and Head of the Cyber and Information Security Course at RT-Group, with over 20 years of experience in software/hardware system development, including 6 years in the cybersecurity industry.
  • Specializes in penetration testing and provides training both domestically and internationally. Conducts penetration testing (PT) for security companies as well as leading enterprises in the industry.


Cyber Security Curriculum

The Cyber Security Bootcamp program is made up of a number of courses (modules).‎
We know that each of us arrives with a different background and level of knowledge. In order to tailor the content to best fit your needs, you can choose the track that is most suitable for you:‎
Cyber Security Bootcamp studies at the college are currently conducted online.‎

Comprehensive Track

This track includes all the courses in the program and is designed to make you an expert in the field.‎

  • Designed for students with little to no experience.
  • Requires 9 to 12 months to complete.‎
  • 490 academic hours.
Standard Track

This track includes only the courses and content specifically designed for the Cyber Security Bootcamp program.‎

  • Designed for students with prior knowledge in the high-tech industry.
  • Requires 6 to 7 months to complete.
  • 260 academic hours.
Self-Designed Track

This track allows you to select only the specific courses and content that you are interested in and wish to complete.‎

  • Designed for students with experience in the field.
  • Requires 1 to 3 months to complete, depending on the courses chosen by the student.
Cyber Modules
Cyber Security Fundamentals 20 academic hours ok-full-icon Comprehensive Track ok-standard-icon Standard Track

The Cyber Security Fundamentals course is an introduction to cybersecurity. It serves as the foundational course for principles in the field of cybersecurity and information security. The course covers both the practical and theoretical aspects of the cyber world. It explains the roles and requirements of a cybersecurity professional. In this course, you'll receive a general overview of all the subjects covered in the complete program. This includes topics such as defense layers, common breaches, and more.

Cyber Attack Infrastructure 50 academic hours ok-full-icon Comprehensive Track ok-standard-icon Standard Track

Definition and Implementation of Cyber Attack Types such as: Data Collection, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, Drive-by Attack, Man-in-the-Middle (MitM) Attack, Phishing and Spear Phishing Attacks, Password Attacks, SQL Injection Attack, and many more.

SOC Analyst with SIEM 50 academic hours ok-full-icon Comprehensive Track ok-standard-icon Standard Track

A SOC Analyst with SIEM course provides comprehensive training on the role of a Security Operations Center (SOC) analyst, focusing on the effective utilization of Security Information and Event Management (SIEM) systems. This course equips participants with the knowledge and skills needed to excel in monitoring and responding to cybersecurity incidents.

Throughout the course, students will learn how to leverage SIEM tools to detect, analyze, and respond to security events within an organization's network. They will gain insights into the various stages of an event's lifecycle, understand the use of defense mechanisms, and become proficient in managing security logs.

Key topics covered include mastering the best practices of antivirus and password management, exploring effective defense tools, and implementing advanced security methodologies. By the end of the course, participants will be equipped with the expertise required to excel in the dynamic field of SOC analysis, enhance cybersecurity posture, and contribute to safeguarding critical digital assets.

Malware Analysis 40 academic hours ok-full-icon Comprehensive Track ok-standard-icon Standard Track

Malicious software, or malware, can manifest in various forms such as viruses, spyware, worms, and Trojan horses. While their functionalities might differ, their common objective is to gather information from an affected device or user without their knowledge or consent. Throughout the course, we will delve into these aspects, including exploring Malware Static analysis and dynamic analysis techniques.

Forensics Investigation & Incident Response 50 academic hours ok-full-icon Comprehensive Track ok-standard-icon Standard Track

In this course, you will learn the fundamental principles of cybersecurity operations, including how to document cyber breaches and the processes involved in responding to hacking incidents. You'll gain the skills to identify security breaches and understand the methods for detecting vulnerabilities. The course covers a comprehensive range of existing intrusion techniques, delving into the underlying causes that lead to such breaches.

Penetration Testing (PT) 50 academic hours ok-full-icon Comprehensive Track ok-standard-icon Standard Track

Penetration Testing Course — In this course, we conduct comprehensive penetration tests using various techniques performed by different penetration testers. The objective is to learn how to identify system vulnerabilities, security breaches, and measure the security level by attempting to breach internet websites. Additionally, the course covers how to detect and prevent such intrusion attempts.

Software Tools
Linux Admin 50 academic hours ok-full-icon Comprehensive Track

In this course, you will learn how to seamlessly operate a Linux system and techniques to maximize your utilization of Linux's capabilities. The curriculum is divided into two sections.

The first part of the course will cover installation, file management, and permissions. By the end of this part, you will be proficient in managing the system seamlessly.

In the second part of the course, you will delve into system configurations, users management, network cards, Linux kernel management, and more.

Linux is an open-source, free operating system known for its relatively high security. It provides software testers and developers with efficiency and freedom of action. The vast majority of software applications, such as servers, applications, databases, or internet services, are deployed on Linux operating systems. Therefore, it is critical for software testers to possess knowledge and experience in Linux. This course equips you precisely with such expertise.

Bash Scripting 25 academic hours ok-full-icon Comprehensive Track
Bash is a highly convenient and efficient shell (command line interface) environment. Developed by GNU contributors, it is essentially the default shell in Linux/GNU systems, serving as a vital foundation for the system. Like any shell, it encompasses a robust command system as well as an efficient scripting language.
Python 90 academic hours ok-full-icon Comprehensive Track

The focus is on Python 3, aiming to provide the knowledge and experience required for programming real-world applications in an object-oriented industry. You will learn how to develop software using Python. You will be taught techniques and appropriate tools to professionally develop high-level Python programs suitable for high-tech companies. This is a very practical course in which we will also be using circuit boards.

Python is currently considered one of the most popular and sought-after programming languages in the IT industry. Its popularity and widespread use in various industry projects make Python one of the most demanded programming courses. The high demand and diverse employment opportunities make Python highly beneficial to specialize in for a rewarding professional career with multiple growth opportunities.

Networking 40 academic hours ok-full-icon Comprehensive Track

Computer networking at the CCNA level: This course provides extensive knowledge in both theoretical and practical aspects of installation, maintenance, configuration, understanding of routers and switches, operation, network troubleshooting, and familiarity with computer networking protocols at the CCNA level. You will become familiar with the fundamental concepts and devices in networking, aspects and layers of LANs/WANs and the structure and functioning of architectures and protocols used in IP networks.

GIT (Version Control) 25 academic hours ok-full-icon Comprehensive Track

Git is an open-source version control system that serves as a tool for managing code versions and the software development process. Its primary purpose is to help developers efficiently manage code and track changes in software files.

In this course, you will learn the core features of Git, workflow techniques, and methods to undo changes or maintain multiple project versions. Additionally, you'll discover how to collaborate effectively with other teams and developers. Designed for programmers seeking the best and most suitable way to manage code development versions, the course covers essential workflow principles, core features, version control, collaboration, and more.

Admission Requirements

  • Knowledge in data communication and computing infrastructure.
  • Basic knowledge of programming languages (an advantage, not mandatory).
  • Professional interview.

Who is the online Cyber Security and Information Security course suitable for?‎

  • Beginners and advanced learners in the field of cybersecurity.
  • College graduates who are interested in professional retraining.
  • Hardware, software, and computer science engineers who are interested in specializing in cybersecurity.
Cyber Security Bootcamp certificate - REAL TIME college USA

Certifications and Credentials

Requirements for eligibility for the certificate:

  • Participation in at least 80% of the course hours
  • Submission of a final project / final exam with a score of 70 and above
  • Obligation to submit course assignments, including exercises, homework, and projects

Upon completing the Information Security program, you will be awarded a Cyber and Information Security Certificate from RTG. This certificate will attest to your high level of knowledge and professionalism.

At the end of the RTG Cyber Course, graduates will acquire the necessary knowledge to successfully pass the certification exam:

CEH (Certified Ethical Hacker) — Professional certification offered by the EC-Council (International Council of E-Commerce Consultants), a global leader in the field of cybersecurity standards, this certification is preferred by employers.

***The cost of the exams is not included in the course price.

Why Study Cyber Security at RTG

private lessons
project development
repeat course
recorded lessons

Job Placement Process

placement i
placement ii
placement iii

Tech Job Placement

teacher-image-Full support until the job interview and placement in a tech company.‎-

Full support until the job interview and placement in a tech company.‎

REAL TIME GROUP is a software house and training center that provides development, training, and placement services for hundreds of high-tech companies in Israel and abroad.‎

Our HR team will accompany you from the moment you finish the course, and even prior to that. During the project preparation process, we will help you prepare your resume and portfolio.‎

Throughout the training, our Placement Division will build your resume and prepare you for job interviews, so that you arrive ready and able to demonstrate professionalism and practical knowledge.‎

Our goal is to ensure your smooth entry into the tech world. Come join us to receive the training, tools, knowledge, and experience needed to work in the tech industry.‎

Paying Tuition for Cyber Security

Pay your tuition in advance through self-payment or with the help of your employer.‎

Numerous employers provide financial assistance for coding programs, so it is advisable to inquire with your employer regarding tuition support.‎

Some students turn to personal loans to fund their coding education.

A diverse range of personal lending choices is at your disposal for careful consideration and assessment. Should you opt for a personal loan, be sure to select the one that aligns most effectively with your individual circumstances and financial goals.‎

Your eligibility for various government aid and scholarship programs may vary depending on your location.

As such, it is recommended that you explore the options and inquire about any scholarships or financial aid opportunities available.‎


  1. Knowledge in data communication and computing infrastructure.
  2. Basic knowledge of programming languages (an advantage, not mandatory).
  3. Professional interview.

After completing the Cyber Security program, you will be able to pursue various opportunities in the cybersecurity field. You could explore roles such as Security Analyst, Network Security Engineer, Incident Responder, Penetration Tester, Security Consultant, and more. Companies across different industries, including technology firms, financial institutions, healthcare organizations, government agencies, and cybersecurity firms, are constantly seeking skilled professionals to safeguard their digital assets and data. This training will open doors to a wide range of career paths where your expertise in cybersecurity will be highly valued.

We believe that your success and ours depend on your dedication and commitment to learning! Therefore, the Cyber Security and Information Security courses include homework assignments, exercises, and a final project. Homework assignments will be done individually and privately by the student (if needed, full support will be provided by the instructors and various professionals at Real Time).

The project will demonstrate the knowledge and skills the student gained throughout the course and will encompass all the modules studied, aiming to create practical experience for the student and the opportunity to add this practical experience to the student’s resumes.

All the topics taught will be accompanied by extensive hands-on exercises, including submission of assignments and exams for various subjects. The exercises will cover server penetration, website breaches and defense, and more.

Currently, classes in the Cyber Security program take place online.

Salary Info Cyber Security

The estimated total pay for Entry Level Cyber Security is $82,443 per year in the United States area, with an average salary of $77,088 per year.

Source: glassdoor.com

We would be happy to advise, guide, and answer any questions.

All rights reserved Real Time Group ©