Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Zoom Links
    1 Topic
  3. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
    3 Topics
  4. Whatโ€™s in the Digital World?
    3 Topics
  5. Cyber Threats: Meet the Villains
    3 Topics
  6. The Cyber Defense Arsenal
    3 Topics
  7. The Art of the Hack
    3 Topics
  8. CTF: The First Mission
    2 Topics
  9. Red Ranger โ€“ Network Defender (Sessions 7-10)
    The Power of Firewalls
    3 Topics
  10. DDoS Attacks: When Too Much is Too Bad
    3 Topics
  11. Wi-Fi Security: Is Your Home Network Safe?
    3 Topics
  12. CTF Challenge โ€“ Network Defense
  13. Blue Ranger โ€“ Cryptography Expert (Sessions 11-14)
    2048 Game - Understanding Code Logic
    3 Topics
  14. The Secret Language of Codes
    3 Topics
  15. Modern Encryption: How Does It Work?
    3 Topics
  16. Breaking the Code: Ethical Decryption
    3 Topics
  17. CTF Challenge โ€“ Cryptography
  18. Yellow Ranger โ€“ Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
    4 Topics
  19. Social Engineering: Trick or Treat?
    3 Topics
  20. Web App Hacking: Finding Weak Spots
    4 Topics
  21. Cross Site Scripting
    4 Topics
  22. Green Ranger โ€“ Breaking the code
    Cookies and Data
    4 Topics
  23. CTF Challenge โ€“ Javascript
  24. Module 3: Cyber Crisis Simulations
    Incident Response: Save the Cityโ€™s Power Grid!
    3 Topics
  25. Incident Response : Cyber Atack Unfolds
    3 Topics
  26. Incident Response - Defend the Powergrid
    3 Topics
  27. Incident Response : Lessons learned and report writing
    3 Topics
  28. Understanding Data Breaches
    4 Topics
  29. Looking for clues in a breach
    3 Topics
  30. Data Breach Mystery: Find the Insider
  31. Ransomware Attack: Pay or Fight?
    2 Topics
  32. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  33. Cyber Ranger Graduation
  34. Where to Next? Exploring Cybersecurity Careers
  35. Optional Content & Enrichment (10 Extra Sessions)
    Geographical Mapping
  36. Red Team vs. Blue Team
  37. Advanced Forensics
  38. OSINT Challenges
  39. Spy Games
  40. Lockpicking 101 (Virtual)
  41. Defusing a Virtual Bomb
  42. AI in Cybersecurity
  43. Create Your Own CTF Challenge
  44. Internet of Things (IoT) Hacking
  45. Cyber Rangers Hall of Fame
Lesson 1 of 45
In Progress

Syllabus | Cyber Rangers

omri sagron 10/01/2026

https://gamma.app/embed/no3ks5qz9u7gfy8

Cyber Rangers – Full Curriculum

โ€œItโ€™s Morphinโ€™ Timeโ€ฆ into Cyber Defenders!โ€

Part of the Cyber School 6-Year Pathway

Target Audience: Grade 7 Students and Above (Ages 12+). This course is designed for Grade 7 students as the starting point, but older students are welcome to join.
Course Duration: 38 Core Sessions (1 hour each) + 10 Optional Sessions
Course Format: Fully Online, Hands-On Learning with Virtual Labs and CTF (Capture The Flag) Challenges


About the Cyber School 6-Year Pathway

In the Cyber School 6-Year Pathway, students level up their digital skills year after year, building their journey from computer basics to cybersecurity warriors. By Grade 7, theyโ€™re ready to morph into Cyber Rangers, exploring the world of ethical hacking, cyber defense, and security operations.

The 6 Courses in the Pathway:

  1. Cyber Kids (Grade 4+) โ€“ Foundations in computer basics, internet safety, and Scratch coding.
  2. Programming Through Games (Minecraft) (Grade 5+) โ€“ Code and create inside Minecraft.
  3. AI Explorer (Grade 6+) โ€“ Build, train, and deploy AI models.
  4. Cyber Rangers (Grade 7+) โ€“ Become digital defenders, explore cybersecurity, and take on hacking missions.
  5. Python Security (Grade 8+) โ€“ Dive deep into Python programming and secure coding practices.
  6. Cyber Battle Royale (Grade 9+) โ€“ Competitive CTF tournaments, AI security tools, and advanced cybersecurity skills.

Start Anytime, Learn at Your Own Pace:

  • Courses are recommended to be taken chronologically, but each course stands aloneโ€”students can join based on their interests and skills.

About This Course: Cyber Rangers

Inspired by the teamwork and heroism of the Power Rangers, Cyber Rangers transforms students into a team of ethical hackers, each mastering a different โ€œCyber Elementโ€ (Network Defense, Cryptography, Forensics, and Threat Hunting) to protect the digital world.

Every Cyber Ranger has a specialtyโ€”but itโ€™s when they work together that theyโ€™re unstoppable.

Course Goals:

  • Learn cybersecurity fundamentalsโ€”network defense, ethical hacking, and digital forensics.
  • Understand the role of ethical hackers in protecting people and organizations.
  • Master tools like Wireshark, Burp Suite, and online CTF platforms.
  • Develop teamwork and problem-solving skills through Capture the Flag (CTF) challenges.
  • Explore real-world scenarios: phishing attacks, malware analysis, and data breaches.

Cyber Ranger Elements:

  1. Red Ranger โ€“ Network Defender (Fire)
  2. Blue Ranger โ€“ Cryptography Expert (Water)
  3. Yellow Ranger โ€“ Ethical Hacker (Lightning)
  4. Green Ranger โ€“ Threat Hunter (Earth)
  5. Pink Ranger โ€“ Digital Forensics Specialist (Wind)

Students will โ€œchoose their Rangerโ€ but will rotate through all roles during the course.


Module 1: Welcome to the Cyber Squad (Sessions 1-6)

The adventure begins! Students join the Cyber Rangers and get their first mission: protecting the digital world.

  1. Morphing into a Cyber Ranger
    • Intro to cybersecurity and ethical hacking.
    • The Cyber Ranger code: โ€œHack for Good, Defend the Digital.โ€
    • Lab: Create your Cyber Ranger Identity Badge with an online design tool.
  2. Whatโ€™s in the Digital World?
    • Understand networks, the internet, and how data travels.
    • Lab: Use Packet Tracer to map a simple network.
  3. Cyber Threats: Meet the Villains
    • Viruses, worms, trojans, and the classic โ€œphishingโ€ scam.
    • Lab: โ€œMalware or Not?โ€ โ€“ Identify threats in sample files.
  4. The Cyber Defense Arsenal
    • Firewalls, VPNs, and security protocols.
    • Lab: Set up a simulated firewall and test defenses.
  5. The Art of the Hack
    • How hackers break in (and how we can stop them).
    • Lab: Perform a safe โ€œwhite-hatโ€ hack on a mock website.
  6. CTF: The First Mission
    • Capture the Flag (CTF) basicsโ€”how cyber pros train.
    • Lab: Complete a mini-CTF challenge to earn your first Ranger Badge.

Module 2: Mastering the Cyber Elements (Sessions 7-20)

Students rotate through each Cyber Ranger role, mastering a unique set of cybersecurity skills.

๐Ÿ”ฅ Red Ranger โ€“ Network Defender (Sessions 7-10)

  1. The Power of Firewalls
    • How firewalls block bad guys.
    • Lab: Build a virtual firewall and test attack scenarios.
  2. DDoS Attacks: When Too Much is Too Bad
    • Distributed Denial of Service explained.
    • Lab: Simulate a DDoS attack on a controlled network.
  3. Wi-Fi Security: Is Your Home Network Safe?
    • Secure your router and block intruders.
    • Lab: Strengthen a virtual Wi-Fi network using real settings.
  4. CTF Challenge โ€“ Network Defense
  • Protect a simulated network from cyberattacks.

๐Ÿ’ง Blue Ranger โ€“ Cryptography Expert (Sessions 11-14)

  1. The Secret Language of Codes
  • Ciphers, encryption, and secret messages.
  • Lab: Use Caesar Ciphers and Base64 to encrypt data.
  1. Modern Encryption: How Does It Work?
  • AES, RSA, and real-world encryption.
  • Lab: Encrypt and decrypt files using public/private keys.
  1. Breaking the Code: Ethical Decryption
  • How ethical hackers crack codes (when needed).
  • Lab: Complete a Cryptography CTF.
  1. CTF Challenge โ€“ Cryptography
  • Crack codes and decrypt secret messages.

โšก Yellow Ranger โ€“ Ethical Hacker (Sessions 15-18)

  1. Hacking for Good: The Role of Ethical Hackers
  • Understanding penetration testing.
  • Lab: Perform a basic port scan using Nmap.
  1. Social Engineering: Trick or Treat?
  • How hackers manipulate people.
  • Lab: Run a simulated phishing email campaign.
  1. Web App Hacking: Finding Weak Spots
  • Common web vulnerabilities (XSS, SQL Injection).
  • Lab: Use Burp Suite to find vulnerabilities in a practice site.
  1. CTF Challenge โ€“ Ethical Hacking
  • Complete hacking challenges in a controlled CTF environment.

๐ŸŒฟ Green Ranger โ€“ Threat Hunter (Sessions 19-20)

  1. Becoming a Threat Hunter
  • Spotting threats in real-time data.
  • Lab: Use Wireshark to analyze suspicious traffic.
  1. CTF Challenge โ€“ Threat Hunting
  • Hunt down hidden threats in a simulated network.

Module 3: Cyber Crisis Simulations (Sessions 21-30)

Real-world scenarios where Cyber Rangers team up to stop major cyber disasters.

21-24. Incident Response: Save the Cityโ€™s Power Grid!

  • A major cyberattack hits the grid. Can the Rangers stop it?
  • Lab: Teams defend a simulated critical infrastructure system.

25-28. Data Breach Mystery: Find the Insider

  • Who leaked company secrets? Analyze logs and emails to find the mole.
  • Lab: Use forensics tools to uncover clues.

29-30. Ransomware Attack: Pay or Fight?

  • Recover data or negotiate with attackers?
  • Lab: Use real tools to fight off ransomware.

Module 4: The Cyber Rangers Final Battle (Sessions 31-38)

Time to put everything theyโ€™ve learned to the test.

31-33. Mega CTF Tournament

  • Students form Ranger squads and compete in a Capture the Flag event.
  • Lab: Complete tasks in cryptography, network defense, and forensics.

34-36. Final Mission: Defend Cyber City

  • Teams defend a virtual city from an all-out cyberattack.
  • Lab: Stop the attack and present findings.
  1. Cyber Ranger Graduation
  • Students earn their official Cyber Ranger Badge.
  • Class celebration and awards.
  1. Where to Next? Exploring Cybersecurity Careers
  • Ethical hacking, forensics, and cyber law.
  • Lab: Plan next steps for cybersecurity pathways.

Optional Content & Enrichment (10 Extra Sessions)

  1. Red Team vs. Blue Team: Play attacker or defender in mock battles.
  2. Advanced Forensics: Dive deeper into recovering deleted data.
  3. OSINT Challenges: Use Open Source Intelligence to solve a mystery.
  4. Spy Games: Learn about cyber espionage and counterintelligence.
  5. Lockpicking 101 (Virtual): Explore the real-world skills of pen testers.
  6. Defusing a Virtual Bomb: Solve cryptography puzzles to beat the clock.
  7. AI in Cybersecurity: How AI helps stop cyberattacks.
  8. Create Your Own CTF Challenge: Build puzzles for classmates to solve.
  9. Internet of Things (IoT) Hacking: Secure smart homes from hackers.
  10. Cyber Rangers Hall of Fame: Showcase top students and projects.