CODED's bootcamps are built from the ground up for working professionals, so you can upgrade your skills while continuing to work at your current job.
Practical Training
Engage in hands-on offensive and defensive exercises, and graduate with a portfolio proving readiness.

Accessible Payments
CODED offers flexible payments so trainees can start learning without financial barriers or delays.

Overview
An intensive, hands-on cybersecurity bootcamp focused on real attack and defense techniques. You’ll train in practical labs, think like an attacker, and learn how to protect real systems—not just pass exams.
Cybersecurity Curriculum
Your Journey From Beginner To Cybersecurity Specialist
Over the course of this bootcamp, you will evolve from a beginner into a cybersecurity professional capable of identifying vulnerabilities, defending systems, and protecting digital environments from real-world threats.
MODULE 1
Duration: 2 Weeks
Cybersecurity Foundations
This module builds a validated technical baseline by treating every topic as a cyber battlefield concept. Trainees operate from both attacker and defender perspectives from Day 1, moving through the full anatomy of a cyber attack, the Cyber Kill Chain, and the Incident Response lifecycle. They develop hands-on fluency across Windows log analysis, Kali Linux CLI, networking and traffic analysis with Wireshark, and web request manipulation with Burp Suite. The module then pushes into offensive territory — exploiting core web vulnerabilities including SQLi, XSS, command injection, and IDOR — while also covering AI prompt injection awareness, cryptography, and password cracking. Trainees must pass a Foundations Mini CTF to advance.
Key Skills:
Cyber Kill Chain & Incident Response
CLI Fluency (Kali Linux)
Network Traffic Analysis
Web Exploitation Basics
Cryptography Fundamentals
MODULE 2
Duration: 5 Weeks
Offensive Security: Ethical Hacking & Pentesting
This phase builds structured Red Team capabilities, enabling trainees to simulate real-world offensive security operations end to end. Trainees conduct professional OSINT and active reconnaissance, exploit web applications through progressive custom labs, escalate privileges across Linux and Windows systems, execute complete Active Directory attack chains, and perform lateral movement and persistence. The phase also covers hybrid cloud offensive operations and AI-assisted reconnaissance, analysis, and reporting. It culminates in a hybrid enterprise Red Team simulation where trainees deliver a professional penetration testing report with a full attack narrative, structured findings, and clear risk prioritization.
Key Skills:
OSINT & Reconnaissance
Web Application Exploitation
Privilege Escalation
Active Directory Attacks
Pentest Report Writing
MODULE 3
Duration: 3 Weeks
Defensive Security: Blue Team Operations
This phase develops operational Blue Team capabilities, equipping trainees to function effectively within real-world security operations environments. Trainees operate within SOC workflows, triage alerts efficiently, investigate phishing campaigns, write and tune detection rules, and execute the full Incident Response lifecycle. They also conduct Windows, Linux, and network forensics, perform memory analysis, triage malware, run hypothesis-driven threat hunts, detect Active Directory abuse, and investigate hybrid cloud compromise — with AI integrated throughout. The phase culminates in a full hybrid Blue Team simulation, delivering a comprehensive incident response report with timeline reconstruction, root cause analysis, and detection improvement recommendations.
Key Skills:
SOC Workflow & Alert Triage
Log Analysis & Detection Engineering
Digital Forensics (DFIR)
Threat Hunting
Incident Response Reporting
10 weeks
5:00 PM – 8:45 PM (Sunday to Thursday)
70+ sessions
CODED bootcamps are built around doing—not watching. You learn through real projects, pair work, and team sprints, with clear progress tracking and continuous feedback. Every concept is taught in multiple ways—explain, demo, practice—so it sticks, and you keep lifetime access to resources to keep improving.
Campus Easy Access
Easily accessible from major areas in Kuwait, with nearby parking and services so getting to class is the easiest part of your day.

Modern Classrooms
Large screens, fast Wi-Fi, and power outlets everywhere—set up to code, debug, and present comfortably for hours.

Active Workspaces
Shared workstations, and collaboration spaces designed for pair programming, group projects, and project reviews.

Coffee Refreshers
Coffee, tea, and light snacks available so you can recharge between sessions and stay focused after a long workday.

Trusted by Learners in Kuwait
For years, learners have joined CODED to build real skills, grow confidence, and move forward — whether that means a stronger portfolio, a clearer direction, or a career shift.
Flexible Payment Plans
Powered by Rubapay

All bootcamp payments are processed through Rubapay, with flexible options that match your budget. Pay once, split into four interest-free payments, or spread the cost over twelve months — all designed to make your learning experience easier and stress-free.

I’m a complete beginner—can I start here?
Yes. You start with systems, networking, and security basics before moving into offensive and defensive security.
Will I learn ethical hacking?
Yes—responsibly. You’ll learn how security professionals test systems to find weaknesses and report them properly.
Will I learn defense and SOC skills too?
Yes. You’ll learn how to detect threats, analyze logs, investigate incidents, and apply defensive practices used in real security teams.
What roles can I apply for after the program?
Graduates are positioned for entry-level roles including SOC Analyst, Junior Penetration Tester, Security Operations Analyst, DFIR Analyst, and Threat Hunting Assistant — with real professional deliverables to prove it.
What proof of skill will I leave with?
Hands-on practice across red/blue scenarios, CTF experience, and practical work you can speak about clearly in interviews.



















