Home

Cyber

Protect yourself and your organisation from one of the most prevalent threats today. Cyber.
Make friends as you learn
6361
Technologists have enrolled
Learning platform
Learn on the go. Wherever you are.
Average rating
Read reviews

What is the Cyber Defender Pathway?

The Cyber Defender Pathway provides in demand Cyber Security skills for those looking to get into one of the largest and fastest growing industries within tech. The courses are designed to take those who wish to transfer their skills into the digital world of Cyber Security, whether they come from a technical or non-technical background.

Your course journey

The Cyber Defender Pathway has been developed by WithYouWithMe not only to prepare you for the normalisation of Cyber skills across all workplaces, but also to provide you with the training that could land you in an entry level position upon graduating from the pathway.

IT Fundamentals

This course is a great course to complete if you are considering a career in technology.

It will give you an overview of;

  • Hardware
  • Software
  • Operating Systems
  • IT Horizon Topics.

This course is fast and quick to complete.

View course

Networking Fundamentals

This course provides an overview of the introductory topics for basic networking and is designed to teach you how computer networks work, from a small local area network through to the wider internet.

We delve into the purpose of Networks and how we can benefit from networking technologies.

This course will cover network address structures of IPv4 and IPv6, and common hardware like switches, routers, & cabling.

We also take look at other essential parts that make networks work including the OSI model, common network services, wireless networks, and more. 

View course

Linux Fundamentals

Why Learn Linux? Did you know that Linux powers 95% of the world's Top 1 million websites? Did you know that Linux is running on 80% of all smartphones in the world today?

View course

OSINT Introduction

An introductory course to OSINT (open source intelligence). This course is designed to educate students on the impact publicly available information can have on individuals and organizations.

View course

Cyber Security Analyst

The Cyber Security Analyst course is the final step in the Cyber Defender Pathway. Here you will learn a variety of skills relevant to the Cyber Security Analyst, relevant to understanding and implementing both the technical and business requirements for the defensive Cyber protection.

View course

Red Team Essentials

  • Design, plan, and execute a penetration test using a provided standard testing methodology;
  • Research and investigate attack techniques and describe mitigations for them; and
  • Provide a detailed report on your penetration testing activities conducted within the capstone project which highlights your activities, results, issues encountered, and the residual risk.

View course

Red Team Operator-Windows Buffer Overflow

In this course, you will learn how to use Immunity Debugger, Mona Modules, and msfvenom to create fully developed buffer overflow exploits in Python2 and Python3 for the Windows platform. We will also cover the common issues encountered and how to resolve them.

View course

Cyber Security Awareness

This course is designed to give you a basic understanding of Cyber Security and the awareness around it. It will guide you through what information security is, and some of the key points you need to be aware of as you navigate the digital world.

View course

How To Protect Your Data

In this course, learn what constitutes confidential data, why we need to keep it safe, and what are the security best practices which include both cyberspace and physical facilities. This course provides the foundational knowledge required to embark on a career in Data.

View course

What Is Social Engineering?

In this course, you'll learn what social engineering is, how it works, the different types of social engineering, and how to recognise social engineering attacks.

This course provides you with the foundational knowledge required to embark on a career in Cyber.

View course

Phishing Attacks

In this course the learner will learn how to identify phishing attacks, business email compromise attacks, phone scams, vishing attacks, and malware, and what to do about these attacks and how to protect against them.

This course provides you with the foundational knowledge required to embark on a career in Cyber.

View course

Linux Privilege Escalation

In this course, you will learn beginner and intermediate privilege escalation and local machine lateral movement techniques. Each lesson includes a bundled lab complete with activities.  

By the end of the course, you will be able to: 

  • Enumerate, validate, and exploit privilege escalation vulnerabilities in GNU/Linux environments; 
  • Identify and exploit insecure scripting for lateral movement and privilege escalation; and 
  • Provide a detailed report on your privilege escalation activities within the capstone project which highlights your activities, results, issues encountered, and the residual risk. 
View course
It takes
140 hours
to become a Cyber Defender.

Job outcomes

With the challenges of digital transformation looming over all aspects of modern society, the demand for Cyber Security aware and Cyber Security trained professionals is only growing across all industries, whether that be finance or retail, health or infrastructure, private or public.
Australia
USA
Canada
$103,538
Average salary
27,168
Total job openings
Common job titles
Information security/analyst
IT security analyst
Cyber security analyst
Senior security analyst
Top skills in demand
1. Security Operations Centres
2. Linux
3. Networking
4. Computer Security
5. Security Policies and Procedures
$85,704
Average salary
27,168
Total job openings
Common job titles
Information security/analyst
IT security analyst
Cyber security analyst
Senior security analyst
Top skills in demand
1. Security Operations Centres
2. Linux
3. Networking
4. Computer Security
5. Security Policies and Procedures
$88,546
Average salary
27,168
Total job openings
Common job titles
Information security/analyst
IT security analyst
Cyber security analyst
Senior security analyst
Top skills in demand
1. Security Operations Centres
2. Linux
3. Networking
4. Computer Security
5. Security Policies and Procedures

Meet the intructors

Meet our instructor team.  They are here to help, get in touch if you have any questions.

Brendan Churcher

CAF Veteran. Served in both the RCN and the Intelligence Branch for 12 years. Specialized in cyber warfare, information warfare and counter-terrorism. CISSP course, ISACA CSX and IBM Analysts notebook courses. WYWM Network Fundamentals, Linux and IT fundamentals comeplete. CSA underway. SME in threat intelligence and analysis. Have started the data analyst pathway and have dabbled in Azure as well. SANS SEC487 and OSIP are next on the table. Hobbies are hunting, sailing, gaming and painting miniatures.

Discord ID: BrendanC#1444
Location: CAN PST

Join our community

We have a Discord server where you’ll be able to chat with your instructors and cohort. Stay active in your learning!
Join discord
menucross-circle