Bachelor’s degree in administrative information systems combined with cyber and information security studies

Bachelor’s degree stream in administrative information systems with a certificate in cyber
and information security with a contractual commitment to a high-tech job

The Peres Academic Center is proud to present a unique curriculum combining a Bachelor’s degree in Administrative Information Systems and a highly advanced, comprehensive certification program in cybersecurity and information security, with a specialization in the attack and defense of today’s infrastructure and platforms. This way you’ll be able to receive the advantage of an academic degree in addition with professional specialization in a field with plenty of demand, as well as a contractual commitment to employment!

This unique stream combines the standard content including highly advanced topics from the technological frontier that are in high demand in the high-tech industry, such as: cyberattack and cyberdefense methodologies, use of penetration testing tools for infrastructure and applications, SOC systems, work with SIEM systems, and more. This is to give you a clear advantage on your way to becoming a professional and to some of the most in-demand jobs in the industry.

Track Advantages

  • Contractual commitment to a job
    Accepted to this program? At the start of the course, we will sign a contract committing us to finding you a job. You’ll be able to work in a range of market-leading positions, such as: System SOC, information security implementation, and more.

  • High-quality content and practical experience
    Discover the world of hacking - offensive and defensive. Furthermore - hands-on experience with network infiltration tools thanks to HackerU’s unique and exclusive CYWAR challenge system.

  • Learn from the best
    Our team of lecturers is composed of professional trainers with vast experience in implementing and teaching topics of study from the high-tech industry.

3 steps for success‏

‏1 . Preliminary interviews

At this phase, you’ll undergo a personal interview examining your basic suitability for work in a computerized environment as well as your affinity for digital, cyber, and information security.

‏2 . Expanded course | 368 academic hours

In this course, you’ll study the most relevant contents for the cyber world and industry, such as: Cyber Infrastructure, Cisco, Linux, Windows, the Python programming language, as well as cyberattack and defense. You’ll also learn about the SOC center for monitoring information security and its SIEM systems.
In addition to practical and theoretical experience, the course will give you the optimal preparation for international certification tests such as the EC Council’s C|EH.

‏3 . Work placement | with a contractual commitment

At the end of the course, HackerU’s placement department will perform a placement process including support with writing CVs, personal practice work interviews, group workshops, and more. Afterwards, you’ll be invited to interviews by various companies, and we’ll continue to support you until you find a job in information security and cyber.

Courses in the stream

The curriculum is composed of required courses from the diploma in administrative information systems, in conjunction with specific courses for the cyber and information security stream. The curriculum includes the following topics of study:

Python Programming For Security

30 hours

Python As programing language, Exceptions & Error Handling, Sockets, Web Parsing, Automated Tools & Attacks, Final Project

etworks to Introduction Security and C

20 hours

In this module, you’ll learn the most fundamental topics from the world of computers, communications networks, and information security, such as: an introduction to computers, hardware, and operating systems; communications equipment; TCP/IP protocol; and virtual systems. You’ll practice setting up networks, learn about Linux systems and basic Terminal environment commands, discover the cyberattack cycle and cyberattacks that are currently popular such as brute force attacks, and even pull off attacks on common services such as RDP and SS.


20 hours

In this module, you will discover the Linux operating system, which in recent years has come into very common use at servers and organizations. In this module, you’ll get plenty of practical experience on how to use the system, but we won’t skimp on theory, either. It’s important to emphasize that this system is also used by most IoT components on the market and is also very popular in the hacking community.

Windows Server

20 hours

In this module, you’ll learn about Microsoft’s popular server OS. This course will teach you about business environments and Windows Server technologies. You’ll thus learn how many companies manage all their computers, how to protect such systems, and each how to attack them.

Cyber Infrastructure

40 hours

In this module, you’ll learn a series of advanced, up-to-date topics from the digital world and discover how to define and find critical infrastructures. Furthermore, you’ll discover the world of cyberattacks and learn how to exploit vulnerabilities in these systems. The main objective of this module is to learn the basic methodologies, from data collection to exploiting system vulnerabilities.

SIEM-SOC & Introduction To Malware Analysis

50 hours

In this module, you’ll discover the SOC center for monitoring information security, which systems are in use, and how to use SIEM systems to identify and ward off attackers in real time.

Cloud Security

In this module, we’ll learn how to use cloud platforms and how to manage and secure various cloud environments. Likewise, we’ll discover the skills you need to run it.


Thesis project - DFIR & Threat Hunting

64 hours

This module deals with performing forensic and investigative processes. The goal of this module is to learn how to investigate a cyber incident, how to identify threats by using various defense mechanisms, how to cope with cyberattacks in real time, and last but not least, learn about the dynamics of working in a SOC team.

Network Security

52 hours

In this module we’ll learn how to handle and secure various types of communications systems and network security equipment.
Network Security: Systems & Architecture, Secure Management & Access, Network Attacks & Mitigation, Network Traffic Analysis, Practical Cryptography, Firewall Fundamentals, VPN Technologies, Network Monitoring, IPS & IDS Concepts.

Offensive Security: Ethical Hacking

52 hours

In this module, we’ll focus on how potential attackers think in order to attempt to reach a more in-depth understanding of where they come from and what their intentions are. This is all in order to defeat them at their own game and to prepare for expected threats. During this module, we will study the most popular attack methodologies in the market and learn how to carry out a variety of such attacks, as well as defend against them. We will learn about social engineering attacks, infrastructure attacks, and application attacks.

Career Services

4 hours

This module helps you prepare for finding your first job in the world of cybersecurity. With the help of our placement department, we’ll hold workshops on writing CVs, personal practice work interviews, group workshops, and more.

Hours of study and course volume

Morning classes are spread across 3 semesters and are held from 8:15-15:30 on Monday, Wednesday, or Thursdays.


As a graduate of this stream, you will receive a Cyber Course Diploma
and information security from the Peres Academic Center and HackerU.

"I learned a lot! I learned how cyberattacks work, how to actually implement an attack on an organization and, of course, how to defend against one. At the end of the course, the placement department helped me find a job with Bugsec as an analyst. And today I investigate infiltrations and threats to organizations."

Ron Manichevsky, graduate of the cyber and information security course at HackerU

Additional undergraduate degrees

Free Call Sign up Now!