Ticket for 1 person: 2650 EGP
Ticket for 3 persons: 2500 EGP
This is a real Cyber Security Camp, We expect from you a less sleeping hours than normal. We will let you live the life of security professionals. This is not a training course. We are expecting a 12 hours of hands-on sessions, discussions, cyber games, challenges, meetings with mentors, one to one private chat every day. In these five days, you will be able to know if Cyber Security is your career for the next five years or not. You will get the chance to meet the experts, mentors and vendors representatives in different cyber Security fields, Network Security, Web Application Security, Mobile Secuirty and others. If you are planning to join a cyber security career or thinking to join a cyber security one, you should submit your name now. We have a limitation for 30 students only. Prepare yourself for the best ride ever.
Target Age : Up to 25 years old.
We are working with our partners to provide the first real Cyber Security Summer Camp in The Middle East. The idea behind the camp is to brief students on some of the concepts and challenges facing the cyber security profession today and in the future.
companies and governments are desperately facing a lack in the cyber security talents. Finding a suitable candidate that can be recruited by companies became a hard job. our mission is to discover young talents and provide them to the Cyber Security Community
- Cyber Security summer Camp T shirt
- Tons of Material about Cyber Security
- Accommodation for 5 Days / 4 Nights in triple rooms
- Three Meals / Day
- Cyber Security Summer Camp Badges
- Certificate of Completion
- Prizes for the winners in the Cyber War Day
- Printed Copies of all Security Kaizen Magazine issues
- A chance for them to demonstrate those special skills
- The possibility to challenge themselves
- The program will act as a positive network, where various specialities can communicate
- It will also act as an awareness and appreciation platform
- To show how they can use these skills in a responsible and ethical way
- It will be a chance to encourage and develop young talents, and later build up a pool of talents.
- The availability of highly qualified trainees.
- The possibility to position themselves positively for those young talents, which otherwise cannot be reached via the classic job market.
- To position themselves as a platform for skilled students
- To demonstrate the performance level of their own students
- To get more young people interested in computer security and to raise awareness of the importance of security
Cyber Security Career Planning : Day one focuses on introducing the different Cyber Security Career jobs opportunities to students. Attendees will be able to know how to put a career plan with a clear goal to achieve after 5- 10 years with milestones and action plan. The day is full of exercises and workgroup activities to build your future career. The Day ends with guest speakers who share their history on how they build their career.
Introduction to the Cyber Security Summer Camp
Most people thinks that all security professionals work the samy type of job, doing the same activities. In this session, we will introduce you to different cyber security jobs that exists either in the local market or international market. We will also mention sample of companies that you can target in each field.
This is the first exercise in cyber security summer camp. Each student will type their stregnthes and weakness either technichal or personal. The goal of this exercise is to know where you stand now to be able to build your Cyber Security Career
In this session, we will teach you how to plan your career in four major steps. We will take you step by step with exercises.
you can't reach a goal without knowing it. In this exercise, every student will put his own goal after 5-10 years. how you see yourself five years from now in the cyber security field.
After knowing the different cyber security jobs and how to plan your career, we will start discussing the different career paths you should take. What you should learn ? what certificates you should have ? what books you should read ? what skills you should get?
After knowing where do you stand and putting your ultimate your goal in the last two exercises, you will start to put a clear action plan to achieve this goal in a clear time schedule with clear milestones
In this session we will simulate a real interview in a cyber security company. What questions you should be prepared for? What should be your attitutde ? how to show your skills to win your job
This is a Scenario based exercise. Every student will describe his career status and Bluekaizen team will provde him/her with a career advice. This is like Ask the Experts model except it is focused only on next steps career advice.
Day two focuses on introducing the role of a network security engineer. Attendees will be able to know the basics of vulnerability assessment and penetration testing activities. The day is full of exercises and network security cyber challenges to build your skills in network security. The day ends with guest speakers who share their experience on how to work effectively in the network security field
Networks in you life, Your Networks Intro crash session, Network stack model, protocols overview, different between wireless and wired communication.
discussing server client application model. using netcat, socat and understanding network security aspects
Gomma prayer ( 11:30 - 1:15 )
Sniffing Network packets, Crafting your own packets.
Use scapy, wireshark and network sniffers and visualize the output, dumping files from network capture.
Understanding firewalls, UTMs.
Using Snort, writing rules and ideas to future projects.
Hiding data in network protocols and Firewall evasion techniques
Implement a chat application through icmp and discussing detection approaches
A blend of challenges related to discussed topics
Dinner accompanied with a networking evening with the Guest Mentor of the Day and available network security jobs.
Day three focuses on introducing the role of mobile security engineers. Attendees will get introducted to the basics of some securty architectures of different mobile platforms along with different defensive and offensive techniques used in today's world. The day is full of exercises and mobile security challenges to build your skills in this field. The day ends with guest speakers who share their experience on how to work effectively in the mobile security field.
You will see which the most used mobile platforms are and why mobile security is so critical nowadays. We will enumerate the most important mobile threats and provide a taxonomy useful to fully understand the rest of the day's sessions.
This session covers in great details all the security features and mechanisms implemented in one of the most important mobile Operating Systems: Android.
The students will learn how to create and configure the local environment for the Android SDK and all the Android related tools. An in-depth coverage of how to create and interact with Android Emulated and Actual Devices will help the students build strong foundations necessary to understand attacks and techniques covered in the following exercises..
The students will learn how Android applications are built and packaged in order to effectively reverse engineer them. Moreover they will be exposed to techniques and tools used for binary decompiling, reading the application source code and gathering hard-coded information.
The students will learn how to access runtime information on Android devices. Moreover, an Android malware will be reversed to let them learn more about static and dynamic malware analysis.
This session focuses on specific configurations that allow a user to intercept and sniff all the Android device communications. The students will learn how to analyze and manipulate the traffic that goes through the Android device.
The students will work to overcome the security mitigations of famous Android apps including Whatsapp, Viber and Facebook Messenger. They will also learn how to reverse undocumented network protocols used by such applications.
This session covers different techniques to perform a blackbox Android application pentesting and exploiting their vulnerabilities efficiently.
The students will learn how to validate the security of Android apps and devices, in addition to discovering and interacting with different attack surfaces exposed by Android apps.
Multiple mobile security challenges covering the discussed topics.
Day four focuses on introducing the role of a web application security engineer, bug bounty programs and how to gain money from finding vulnerabilities online. Attendees will be able to know the basics of Web Application security, OWASP TOP 10 vulnerabilities and how to build their career in that field. The day is full of exercises and web application security challenges to build your skills in that field. The day ends with guest speakers who share their experience on how to work effectively in the Web security field.
This can change but assuming some of them doesn't have a lot of background we can explain some concepts like (client and server side languages, how web servers work and so on). If they already know that I can push some topics from the other days here too.
We will discuss how the web works and the underlying technology that behind all the web magic. Also we will see a variety of tools used to examine websites. And we will see how to gather information about your target and what type of information we can collect.
We will talk about the idea of injection attacks in general and how to think of every user input as a potential injection point, once you grasp the idea we will see different kinds of injection attacks like sql, header injections, file inclusions .. etc.
In this exercise we wiil see a demo of the discussed injection attacks. We will also see how to break some basic filtering mechanisms.
In this session we will see how hackers can bypass authentication, hijack sessions or act in behave of the victim, We will also see how they can break into areas of websites dedicated only for admins.
We will see a simulated versions of real life attacks where the attackers were able to break the authentication and login into websites without creadintials. We will see how some one could act as an admin while he is not.
We will see in this session how security misconfigurations can affect the web applications security and we will also how the use of bad code even if it not yours you will end up with hackable web application. We will also talk about file uploads and how they affect your application.
Since this is our last lab we think you will be ready to take it to the next level. In this lab no more example code we will see some vulnerabilities found in real life applications and how to exploit them. The vulnerabilities will give you and idea about what kind of bugs can be found in real life and will explain some logical attacks.
A One hour of hacking. You will be devided into two teams. Each team will have aversion of thier site to protect. Every thing is possible and every attack is allowed to take down the other team's website and protect yours.
This a full day cyber security game. We are simulating a Cyber Crime where a group of hackers kidnapped a small kid from his parents. Attendees will be distributed into teams. Each team will pass by different challenges to find clues that will help them find a way to find the kidnapped victim. The Cyber war game is full of fun, knowledge, skills and excitment
Cyber Security War Game
The team who will be able to free the hostage will win a prize.
Till 12th of July 2016
Ticket for 1 person: 2650 EGP
Ticket for 3 persons: 2500 EGP
Till 1st of August 2016
Ticket for 1 person: 2950 EGP
Ticket for 3 persons: 2700 EGP
Till 10th of August 2016
Ticket for 1 person: 3150 EGP
Ticket for 3 persons: 2900 EGP