Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
  3. What’s in the Digital World?
  4. Cyber Threats: Meet the Villains
  5. The Cyber Defense Arsenal
  6. The Art of the Hack
  7. CTF: The First Mission
  8. Red Ranger – Network Defender (Sessions 7-10)
    The Power of Firewalls
  9. DDoS Attacks: When Too Much is Too Bad
  10. Wi-Fi Security: Is Your Home Network Safe?
  11. CTF Challenge – Network Defense
  12. Blue Ranger – Cryptography Expert (Sessions 11-14)
    The Secret Language of Codes
  13. Modern Encryption: How Does It Work?
  14. Breaking the Code: Ethical Decryption
  15. CTF Challenge – Cryptography
  16. Yellow Ranger – Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
  17. Social Engineering: Trick or Treat?
  18. Web App Hacking: Finding Weak Spots
  19. CTF Challenge – Ethical Hacking
  20. Green Ranger – Threat Hunter (Sessions 19-20)
    Becoming a Threat Hunter
  21. CTF Challenge – Threat Hunting
  22. Module 3: Cyber Crisis Simulations
    Incident Response: Save the City’s Power Grid!
  23. Data Breach Mystery: Find the Insider
  24. Ransomware Attack: Pay or Fight?
  25. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  26. Final Mission: Defend Cyber City
  27. Cyber Ranger Graduation
  28. Where to Next? Exploring Cybersecurity Careers
  29. Optional Content & Enrichment (10 Extra Sessions)
    Red Team vs. Blue Team
  30. Advanced Forensics
  31. OSINT Challenges
  32. Spy Games
  33. Lockpicking 101 (Virtual)
  34. Defusing a Virtual Bomb
  35. AI in Cybersecurity
  36. Create Your Own CTF Challenge
  37. Internet of Things (IoT) Hacking
  38. Cyber Rangers Hall of Fame
Lesson 1 of 38
In Progress

Syllabus | Cyber Rangers

omri sagron 15/03/2025

https://gamma.app/embed/no3ks5qz9u7gfy8

Cyber Rangers – Full Curriculum

“It’s Morphin’ Time… into Cyber Defenders!”

Part of the Cyber School 6-Year Pathway

Target Audience: Grade 7 Students and Above (Ages 12+). This course is designed for Grade 7 students as the starting point, but older students are welcome to join.
Course Duration: 38 Core Sessions (1 hour each) + 10 Optional Sessions
Course Format: Fully Online, Hands-On Learning with Virtual Labs and CTF (Capture The Flag) Challenges


About the Cyber School 6-Year Pathway

In the Cyber School 6-Year Pathway, students level up their digital skills year after year, building their journey from computer basics to cybersecurity warriors. By Grade 7, they’re ready to morph into Cyber Rangers, exploring the world of ethical hacking, cyber defense, and security operations.

The 6 Courses in the Pathway:

  1. Cyber Kids (Grade 4+) – Foundations in computer basics, internet safety, and Scratch coding.
  2. Programming Through Games (Minecraft) (Grade 5+) – Code and create inside Minecraft.
  3. AI Explorer (Grade 6+) – Build, train, and deploy AI models.
  4. Cyber Rangers (Grade 7+) – Become digital defenders, explore cybersecurity, and take on hacking missions.
  5. Python Security (Grade 8+) – Dive deep into Python programming and secure coding practices.
  6. Cyber Battle Royale (Grade 9+) – Competitive CTF tournaments, AI security tools, and advanced cybersecurity skills.

Start Anytime, Learn at Your Own Pace:

  • Courses are recommended to be taken chronologically, but each course stands alone—students can join based on their interests and skills.

About This Course: Cyber Rangers

Inspired by the teamwork and heroism of the Power Rangers, Cyber Rangers transforms students into a team of ethical hackers, each mastering a different “Cyber Element” (Network Defense, Cryptography, Forensics, and Threat Hunting) to protect the digital world.

Every Cyber Ranger has a specialty—but it’s when they work together that they’re unstoppable.

Course Goals:

  • Learn cybersecurity fundamentals—network defense, ethical hacking, and digital forensics.
  • Understand the role of ethical hackers in protecting people and organizations.
  • Master tools like Wireshark, Burp Suite, and online CTF platforms.
  • Develop teamwork and problem-solving skills through Capture the Flag (CTF) challenges.
  • Explore real-world scenarios: phishing attacks, malware analysis, and data breaches.

Cyber Ranger Elements:

  1. Red Ranger – Network Defender (Fire)
  2. Blue Ranger – Cryptography Expert (Water)
  3. Yellow Ranger – Ethical Hacker (Lightning)
  4. Green Ranger – Threat Hunter (Earth)
  5. Pink Ranger – Digital Forensics Specialist (Wind)

Students will “choose their Ranger” but will rotate through all roles during the course.


Module 1: Welcome to the Cyber Squad (Sessions 1-6)

The adventure begins! Students join the Cyber Rangers and get their first mission: protecting the digital world.

  1. Morphing into a Cyber Ranger
    • Intro to cybersecurity and ethical hacking.
    • The Cyber Ranger code: “Hack for Good, Defend the Digital.”
    • Lab: Create your Cyber Ranger Identity Badge with an online design tool.
  2. What’s in the Digital World?
    • Understand networks, the internet, and how data travels.
    • Lab: Use Packet Tracer to map a simple network.
  3. Cyber Threats: Meet the Villains
    • Viruses, worms, trojans, and the classic “phishing” scam.
    • Lab: “Malware or Not?” – Identify threats in sample files.
  4. The Cyber Defense Arsenal
    • Firewalls, VPNs, and security protocols.
    • Lab: Set up a simulated firewall and test defenses.
  5. The Art of the Hack
    • How hackers break in (and how we can stop them).
    • Lab: Perform a safe “white-hat” hack on a mock website.
  6. CTF: The First Mission
    • Capture the Flag (CTF) basics—how cyber pros train.
    • Lab: Complete a mini-CTF challenge to earn your first Ranger Badge.

Module 2: Mastering the Cyber Elements (Sessions 7-20)

Students rotate through each Cyber Ranger role, mastering a unique set of cybersecurity skills.

🔥 Red Ranger – Network Defender (Sessions 7-10)

  1. The Power of Firewalls
    • How firewalls block bad guys.
    • Lab: Build a virtual firewall and test attack scenarios.
  2. DDoS Attacks: When Too Much is Too Bad
    • Distributed Denial of Service explained.
    • Lab: Simulate a DDoS attack on a controlled network.
  3. Wi-Fi Security: Is Your Home Network Safe?
    • Secure your router and block intruders.
    • Lab: Strengthen a virtual Wi-Fi network using real settings.
  4. CTF Challenge – Network Defense
  • Protect a simulated network from cyberattacks.

💧 Blue Ranger – Cryptography Expert (Sessions 11-14)

  1. The Secret Language of Codes
  • Ciphers, encryption, and secret messages.
  • Lab: Use Caesar Ciphers and Base64 to encrypt data.
  1. Modern Encryption: How Does It Work?
  • AES, RSA, and real-world encryption.
  • Lab: Encrypt and decrypt files using public/private keys.
  1. Breaking the Code: Ethical Decryption
  • How ethical hackers crack codes (when needed).
  • Lab: Complete a Cryptography CTF.
  1. CTF Challenge – Cryptography
  • Crack codes and decrypt secret messages.

⚡ Yellow Ranger – Ethical Hacker (Sessions 15-18)

  1. Hacking for Good: The Role of Ethical Hackers
  • Understanding penetration testing.
  • Lab: Perform a basic port scan using Nmap.
  1. Social Engineering: Trick or Treat?
  • How hackers manipulate people.
  • Lab: Run a simulated phishing email campaign.
  1. Web App Hacking: Finding Weak Spots
  • Common web vulnerabilities (XSS, SQL Injection).
  • Lab: Use Burp Suite to find vulnerabilities in a practice site.
  1. CTF Challenge – Ethical Hacking
  • Complete hacking challenges in a controlled CTF environment.

🌿 Green Ranger – Threat Hunter (Sessions 19-20)

  1. Becoming a Threat Hunter
  • Spotting threats in real-time data.
  • Lab: Use Wireshark to analyze suspicious traffic.
  1. CTF Challenge – Threat Hunting
  • Hunt down hidden threats in a simulated network.

Module 3: Cyber Crisis Simulations (Sessions 21-30)

Real-world scenarios where Cyber Rangers team up to stop major cyber disasters.

21-24. Incident Response: Save the City’s Power Grid!

  • A major cyberattack hits the grid. Can the Rangers stop it?
  • Lab: Teams defend a simulated critical infrastructure system.

25-28. Data Breach Mystery: Find the Insider

  • Who leaked company secrets? Analyze logs and emails to find the mole.
  • Lab: Use forensics tools to uncover clues.

29-30. Ransomware Attack: Pay or Fight?

  • Recover data or negotiate with attackers?
  • Lab: Use real tools to fight off ransomware.

Module 4: The Cyber Rangers Final Battle (Sessions 31-38)

Time to put everything they’ve learned to the test.

31-33. Mega CTF Tournament

  • Students form Ranger squads and compete in a Capture the Flag event.
  • Lab: Complete tasks in cryptography, network defense, and forensics.

34-36. Final Mission: Defend Cyber City

  • Teams defend a virtual city from an all-out cyberattack.
  • Lab: Stop the attack and present findings.
  1. Cyber Ranger Graduation
  • Students earn their official Cyber Ranger Badge.
  • Class celebration and awards.
  1. Where to Next? Exploring Cybersecurity Careers
  • Ethical hacking, forensics, and cyber law.
  • Lab: Plan next steps for cybersecurity pathways.

Optional Content & Enrichment (10 Extra Sessions)

  1. Red Team vs. Blue Team: Play attacker or defender in mock battles.
  2. Advanced Forensics: Dive deeper into recovering deleted data.
  3. OSINT Challenges: Use Open Source Intelligence to solve a mystery.
  4. Spy Games: Learn about cyber espionage and counterintelligence.
  5. Lockpicking 101 (Virtual): Explore the real-world skills of pen testers.
  6. Defusing a Virtual Bomb: Solve cryptography puzzles to beat the clock.
  7. AI in Cybersecurity: How AI helps stop cyberattacks.
  8. Create Your Own CTF Challenge: Build puzzles for classmates to solve.
  9. Internet of Things (IoT) Hacking: Secure smart homes from hackers.
  10. Cyber Rangers Hall of Fame: Showcase top students and projects.