Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
    3 Topics
  3. What’s in the Digital World?
    3 Topics
  4. Cyber Threats: Meet the Villains
    3 Topics
  5. The Cyber Defense Arsenal
    3 Topics
  6. The Art of the Hack
    3 Topics
  7. CTF: The First Mission
    2 Topics
  8. Red Ranger – Network Defender (Sessions 7-10)
    The Power of Firewalls
    3 Topics
  9. DDoS Attacks: When Too Much is Too Bad
    3 Topics
  10. Wi-Fi Security: Is Your Home Network Safe?
    3 Topics
  11. CTF Challenge – Network Defense
  12. Blue Ranger – Cryptography Expert (Sessions 11-14)
    2048 Game - Understanding Code Logic
    3 Topics
  13. The Secret Language of Codes
  14. Modern Encryption: How Does It Work?
  15. Breaking the Code: Ethical Decryption
  16. CTF Challenge – Cryptography
  17. Yellow Ranger – Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
  18. Social Engineering: Trick or Treat?
  19. Web App Hacking: Finding Weak Spots
  20. CTF Challenge – Ethical Hacking
  21. Green Ranger – Threat Hunter (Sessions 19-20)
    Becoming a Threat Hunter
  22. CTF Challenge – Threat Hunting
  23. Module 3: Cyber Crisis Simulations
    Incident Response: Save the City’s Power Grid!
  24. Data Breach Mystery: Find the Insider
  25. Ransomware Attack: Pay or Fight?
  26. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  27. Final Mission: Defend Cyber City
  28. Cyber Ranger Graduation
  29. Where to Next? Exploring Cybersecurity Careers
  30. Optional Content & Enrichment (10 Extra Sessions)
    Geographical Mapping
  31. Red Team vs. Blue Team
  32. Advanced Forensics
  33. OSINT Challenges
  34. Spy Games
  35. Lockpicking 101 (Virtual)
  36. Defusing a Virtual Bomb
  37. AI in Cybersecurity
  38. Create Your Own CTF Challenge
  39. Internet of Things (IoT) Hacking
  40. Cyber Rangers Hall of Fame
Lesson 1 of 40
In Progress

Syllabus | Cyber Rangers

omri sagron 15/07/2025

https://gamma.app/embed/no3ks5qz9u7gfy8

Cyber Rangers – Full Curriculum

“It’s Morphin’ Time… into Cyber Defenders!”

Part of the Cyber School 6-Year Pathway

Target Audience: Grade 7 Students and Above (Ages 12+). This course is designed for Grade 7 students as the starting point, but older students are welcome to join.
Course Duration: 38 Core Sessions (1 hour each) + 10 Optional Sessions
Course Format: Fully Online, Hands-On Learning with Virtual Labs and CTF (Capture The Flag) Challenges


About the Cyber School 6-Year Pathway

In the Cyber School 6-Year Pathway, students level up their digital skills year after year, building their journey from computer basics to cybersecurity warriors. By Grade 7, they’re ready to morph into Cyber Rangers, exploring the world of ethical hacking, cyber defense, and security operations.

The 6 Courses in the Pathway:

  1. Cyber Kids (Grade 4+) – Foundations in computer basics, internet safety, and Scratch coding.
  2. Programming Through Games (Minecraft) (Grade 5+) – Code and create inside Minecraft.
  3. AI Explorer (Grade 6+) – Build, train, and deploy AI models.
  4. Cyber Rangers (Grade 7+) – Become digital defenders, explore cybersecurity, and take on hacking missions.
  5. Python Security (Grade 8+) – Dive deep into Python programming and secure coding practices.
  6. Cyber Battle Royale (Grade 9+) – Competitive CTF tournaments, AI security tools, and advanced cybersecurity skills.

Start Anytime, Learn at Your Own Pace:

  • Courses are recommended to be taken chronologically, but each course stands alone—students can join based on their interests and skills.

About This Course: Cyber Rangers

Inspired by the teamwork and heroism of the Power Rangers, Cyber Rangers transforms students into a team of ethical hackers, each mastering a different “Cyber Element” (Network Defense, Cryptography, Forensics, and Threat Hunting) to protect the digital world.

Every Cyber Ranger has a specialty—but it’s when they work together that they’re unstoppable.

Course Goals:

  • Learn cybersecurity fundamentals—network defense, ethical hacking, and digital forensics.
  • Understand the role of ethical hackers in protecting people and organizations.
  • Master tools like Wireshark, Burp Suite, and online CTF platforms.
  • Develop teamwork and problem-solving skills through Capture the Flag (CTF) challenges.
  • Explore real-world scenarios: phishing attacks, malware analysis, and data breaches.

Cyber Ranger Elements:

  1. Red Ranger – Network Defender (Fire)
  2. Blue Ranger – Cryptography Expert (Water)
  3. Yellow Ranger – Ethical Hacker (Lightning)
  4. Green Ranger – Threat Hunter (Earth)
  5. Pink Ranger – Digital Forensics Specialist (Wind)

Students will “choose their Ranger” but will rotate through all roles during the course.


Module 1: Welcome to the Cyber Squad (Sessions 1-6)

The adventure begins! Students join the Cyber Rangers and get their first mission: protecting the digital world.

  1. Morphing into a Cyber Ranger
    • Intro to cybersecurity and ethical hacking.
    • The Cyber Ranger code: “Hack for Good, Defend the Digital.”
    • Lab: Create your Cyber Ranger Identity Badge with an online design tool.
  2. What’s in the Digital World?
    • Understand networks, the internet, and how data travels.
    • Lab: Use Packet Tracer to map a simple network.
  3. Cyber Threats: Meet the Villains
    • Viruses, worms, trojans, and the classic “phishing” scam.
    • Lab: “Malware or Not?” – Identify threats in sample files.
  4. The Cyber Defense Arsenal
    • Firewalls, VPNs, and security protocols.
    • Lab: Set up a simulated firewall and test defenses.
  5. The Art of the Hack
    • How hackers break in (and how we can stop them).
    • Lab: Perform a safe “white-hat” hack on a mock website.
  6. CTF: The First Mission
    • Capture the Flag (CTF) basics—how cyber pros train.
    • Lab: Complete a mini-CTF challenge to earn your first Ranger Badge.

Module 2: Mastering the Cyber Elements (Sessions 7-20)

Students rotate through each Cyber Ranger role, mastering a unique set of cybersecurity skills.

🔥 Red Ranger – Network Defender (Sessions 7-10)

  1. The Power of Firewalls
    • How firewalls block bad guys.
    • Lab: Build a virtual firewall and test attack scenarios.
  2. DDoS Attacks: When Too Much is Too Bad
    • Distributed Denial of Service explained.
    • Lab: Simulate a DDoS attack on a controlled network.
  3. Wi-Fi Security: Is Your Home Network Safe?
    • Secure your router and block intruders.
    • Lab: Strengthen a virtual Wi-Fi network using real settings.
  4. CTF Challenge – Network Defense
  • Protect a simulated network from cyberattacks.

💧 Blue Ranger – Cryptography Expert (Sessions 11-14)

  1. The Secret Language of Codes
  • Ciphers, encryption, and secret messages.
  • Lab: Use Caesar Ciphers and Base64 to encrypt data.
  1. Modern Encryption: How Does It Work?
  • AES, RSA, and real-world encryption.
  • Lab: Encrypt and decrypt files using public/private keys.
  1. Breaking the Code: Ethical Decryption
  • How ethical hackers crack codes (when needed).
  • Lab: Complete a Cryptography CTF.
  1. CTF Challenge – Cryptography
  • Crack codes and decrypt secret messages.

⚡ Yellow Ranger – Ethical Hacker (Sessions 15-18)

  1. Hacking for Good: The Role of Ethical Hackers
  • Understanding penetration testing.
  • Lab: Perform a basic port scan using Nmap.
  1. Social Engineering: Trick or Treat?
  • How hackers manipulate people.
  • Lab: Run a simulated phishing email campaign.
  1. Web App Hacking: Finding Weak Spots
  • Common web vulnerabilities (XSS, SQL Injection).
  • Lab: Use Burp Suite to find vulnerabilities in a practice site.
  1. CTF Challenge – Ethical Hacking
  • Complete hacking challenges in a controlled CTF environment.

🌿 Green Ranger – Threat Hunter (Sessions 19-20)

  1. Becoming a Threat Hunter
  • Spotting threats in real-time data.
  • Lab: Use Wireshark to analyze suspicious traffic.
  1. CTF Challenge – Threat Hunting
  • Hunt down hidden threats in a simulated network.

Module 3: Cyber Crisis Simulations (Sessions 21-30)

Real-world scenarios where Cyber Rangers team up to stop major cyber disasters.

21-24. Incident Response: Save the City’s Power Grid!

  • A major cyberattack hits the grid. Can the Rangers stop it?
  • Lab: Teams defend a simulated critical infrastructure system.

25-28. Data Breach Mystery: Find the Insider

  • Who leaked company secrets? Analyze logs and emails to find the mole.
  • Lab: Use forensics tools to uncover clues.

29-30. Ransomware Attack: Pay or Fight?

  • Recover data or negotiate with attackers?
  • Lab: Use real tools to fight off ransomware.

Module 4: The Cyber Rangers Final Battle (Sessions 31-38)

Time to put everything they’ve learned to the test.

31-33. Mega CTF Tournament

  • Students form Ranger squads and compete in a Capture the Flag event.
  • Lab: Complete tasks in cryptography, network defense, and forensics.

34-36. Final Mission: Defend Cyber City

  • Teams defend a virtual city from an all-out cyberattack.
  • Lab: Stop the attack and present findings.
  1. Cyber Ranger Graduation
  • Students earn their official Cyber Ranger Badge.
  • Class celebration and awards.
  1. Where to Next? Exploring Cybersecurity Careers
  • Ethical hacking, forensics, and cyber law.
  • Lab: Plan next steps for cybersecurity pathways.

Optional Content & Enrichment (10 Extra Sessions)

  1. Red Team vs. Blue Team: Play attacker or defender in mock battles.
  2. Advanced Forensics: Dive deeper into recovering deleted data.
  3. OSINT Challenges: Use Open Source Intelligence to solve a mystery.
  4. Spy Games: Learn about cyber espionage and counterintelligence.
  5. Lockpicking 101 (Virtual): Explore the real-world skills of pen testers.
  6. Defusing a Virtual Bomb: Solve cryptography puzzles to beat the clock.
  7. AI in Cybersecurity: How AI helps stop cyberattacks.
  8. Create Your Own CTF Challenge: Build puzzles for classmates to solve.
  9. Internet of Things (IoT) Hacking: Secure smart homes from hackers.
  10. Cyber Rangers Hall of Fame: Showcase top students and projects.