Train in real-world cybersecurity, from foundational concepts to ethical hacking and defensive strategies; equipping you to understand, detect, and prevent cyber threats.

Train in real-world cybersecurity, from foundational concepts to ethical hacking and defensive strategies; equipping you to understand, detect, and prevent cyber threats.

NEXT KICKOFF

-

/

Sun–Thurs

CODED Campus, Free Trade Zone

Start in

6
DAYS
04
HOURS
46
MINUTES
26
SECONDS

Duration

10 weeks

Level

Beginner–Friendly

Language

English (with Arabic support)

Format

In-Person, Kuwait

Schedule

Evenings (Sun–Thur)

Price

2600 KD

Duration

10 weeks

Format

In-Person, Kuwait

Level

Beginner–Friendly

Schedule

Evenings (Sun–Thur)

Language

English (with Arabic support)

Price

2600 KD

Duration

10 weeks

Format

In-Person, Kuwait

Level

Beginner–Friendly

Schedule

Evenings (Sun–Thur)

Language

English (with Arabic support)

Price

2600 KD

Become an Cybersecurity Analyst on Your Evenings and Weekends

Become an Cybersecurity Analyst on Your Evenings and Weekends

CODED's bootcamps are built from the ground up for working professionals, so you can upgrade your skills while continuing to work at your current job.

Practical Training

Engage in hands-on offensive and defensive exercises, and graduate with a portfolio proving readiness.

Instructor

Flexible Learning

Level up while you work, with flexible pacing and practical learning you can apply instantly.

Instructor

Flexible Learning

Level up while you work, with flexible pacing and practical learning you can apply instantly.

Instructor

Flexible Learning

Level up while you work, with flexible pacing and practical learning you can apply instantly.

Instructor

Accessible Payments

CODED offers flexible payments so trainees can start learning without financial barriers or delays.

Instructor

Overview

An intensive, hands-on cybersecurity bootcamp focused on real attack and defense techniques. You’ll train in practical labs, think like an attacker, and learn how to protect real systems—not just pass exams.

Real Skills

Train for real-world cybersecurity roles.

Real Skills

Train for real-world cybersecurity roles.

Real Skills

Train for real-world cybersecurity roles.

Cybersecurity Mindset

Think like an attacker. Act like a defender.

Cybersecurity Mindset

Think like an attacker. Act like a defender.

Cybersecurity Mindset

Think like an attacker. Act like a defender.

Hands-On Labs

Practice real scenarios, not just theory.

Hands-On Labs

Practice real scenarios, not just theory.

Hands-On Labs

Practice real scenarios, not just theory.

Offense & Defense

Learn how attacks work—and how to stop them.

Offense & Defense

Learn how attacks work—and how to stop them.

Offense & Defense

Learn how attacks work—and how to stop them.

Cybersecurity Curriculum

Your Journey From Beginner To Cybersecurity Specialist

Over the course of this bootcamp, you will evolve from a beginner into a cybersecurity professional capable of identifying vulnerabilities, defending systems, and protecting digital environments from real-world threats.

MODULE 1

Duration: 2 Weeks

Cybersecurity Foundations

This module builds a validated technical baseline by treating every topic as a cyber battlefield concept. Trainees operate from both attacker and defender perspectives from Day 1, moving through the full anatomy of a cyber attack, the Cyber Kill Chain, and the Incident Response lifecycle. They develop hands-on fluency across Windows log analysis, Kali Linux CLI, networking and traffic analysis with Wireshark, and web request manipulation with Burp Suite. The module then pushes into offensive territory — exploiting core web vulnerabilities including SQLi, XSS, command injection, and IDOR — while also covering AI prompt injection awareness, cryptography, and password cracking. Trainees must pass a Foundations Mini CTF to advance.

Key Skills:

Cyber Kill Chain & Incident Response

CLI Fluency (Kali Linux)

Network Traffic Analysis

Web Exploitation Basics

Cryptography Fundamentals

MODULE 2

Duration: 5 Weeks

Offensive Security: Ethical Hacking & Pentesting

This phase builds structured Red Team capabilities, enabling trainees to simulate real-world offensive security operations end to end. Trainees conduct professional OSINT and active reconnaissance, exploit web applications through progressive custom labs, escalate privileges across Linux and Windows systems, execute complete Active Directory attack chains, and perform lateral movement and persistence. The phase also covers hybrid cloud offensive operations and AI-assisted reconnaissance, analysis, and reporting. It culminates in a hybrid enterprise Red Team simulation where trainees deliver a professional penetration testing report with a full attack narrative, structured findings, and clear risk prioritization.

Key Skills:

OSINT & Reconnaissance

Web Application Exploitation

Privilege Escalation

Active Directory Attacks

Pentest Report Writing

MODULE 3

Duration: 3 Weeks

Defensive Security: Blue Team Operations

This phase develops operational Blue Team capabilities, equipping trainees to function effectively within real-world security operations environments. Trainees operate within SOC workflows, triage alerts efficiently, investigate phishing campaigns, write and tune detection rules, and execute the full Incident Response lifecycle. They also conduct Windows, Linux, and network forensics, perform memory analysis, triage malware, run hypothesis-driven threat hunts, detect Active Directory abuse, and investigate hybrid cloud compromise — with AI integrated throughout. The phase culminates in a full hybrid Blue Team simulation, delivering a comprehensive incident response report with timeline reconstruction, root cause analysis, and detection improvement recommendations.

Key Skills:

SOC Workflow & Alert Triage

Log Analysis & Detection Engineering

Digital Forensics (DFIR)

Threat Hunting

Incident Response Reporting

Flexible Learning, Real Progress

Flexible Learning, Real Progress

10 weeks

5:00 PM – 8:45 PM (Sunday to Thursday)

70+ sessions

CODED bootcamps are built around doing—not watching. You learn through real projects, pair work, and team sprints, with clear progress tracking and continuous feedback. Every concept is taught in multiple ways—explain, demo, practice—so it sticks, and you keep lifetime access to resources to keep improving.

Evening Track

Evening training in ethical hacking and defensive security.

Instructor

Evening Track

Evening training in ethical hacking and defensive security.

Instructor

Evening Track

Evening training in ethical hacking and defensive security.

Instructor

Zero to Hero

From zero to hands-on offensive + defensive security skills you can prove.

Instructor

Zero to Hero

From zero to hands-on offensive + defensive security skills you can prove.

Instructor

Zero to Hero

From zero to hands-on offensive + defensive security skills you can prove.

Instructor
Learn By Building

Work on real applications every week, not exercises. Each milestone adds a new layer to your product.

Learn By Building

Work on real applications every week, not exercises. Each milestone adds a new layer to your product.

Learn By Building

Work on real applications every week, not exercises. Each milestone adds a new layer to your product.

Visible Progress

Clear milestones, structured feedback, and weekly deliverables keep your product moving forward.

Visible Progress

Clear milestones, structured feedback, and weekly deliverables keep your product moving forward.

Structured Thinking

Every concept is taught through explain, build, refine to understand why your system works, not just how.

Structured Thinking

Every concept is taught through explain, build, refine to understand why your system works, not just how.

Structured Thinking

Every concept is taught through explain, build, refine to understand why your system works, not just how.

Resources That Stay With You

Lifetime access to materials and guidance so you can keep building beyond the program.

Resources That Stay With You

Lifetime access to materials and guidance so you can keep building beyond the program.

How Does Your Day Look?

How Does Your Day Look?

Kick off

Quick sync to outline goals and blockers.

Kick off

Quick sync to outline goals and blockers.

Kick off

Quick sync to outline goals and blockers.

Instruction

Focused learning led by expert mentors.

Instruction

Focused learning led by expert mentors.

Instruction

Focused learning led by expert mentors.

Lab

Hands-on cyber operations to apply new attack and defense techniques in real environments.

Lab

Hands-on cyber operations to apply new attack and defense techniques in real environments.

Lab

Hands-on cyber operations to apply new attack and defense techniques in real environments.

Labs Review

Peer and mentor feedback for quality.

Labs Review

Peer and mentor feedback for quality.

Labs Review

Peer and mentor feedback for quality.

Recap

Summarize lessons and plan next steps.

Recap

Summarize lessons and plan next steps.

Recap

Summarize lessons and plan next steps.

Campus Easy Access

Easily accessible from major areas in Kuwait, with nearby parking and services so getting to class is the easiest part of your day.

Modern Classrooms

Large screens, fast Wi-Fi, and power outlets everywhere—set up to code, debug, and present comfortably for hours.

Active Workspaces

Shared workstations, and collaboration spaces designed for pair programming, group projects, and project reviews.

Coffee Refreshers

Coffee, tea, and light snacks available so you can recharge between sessions and stay focused after a long workday.

Be the Next Success Story

Join the Cybersecurity Bootcamp, learn after work, and graduate ready to defend real systems and step into in-demand security roles across Kuwait’s digital economy.

Be the Next Success Story

Join the Cybersecurity Bootcamp, learn after work, and graduate ready to defend real systems and step into in-demand security roles across Kuwait’s digital economy.

Be the Next Success Story

Join the Cybersecurity Bootcamp, learn after work, and graduate ready to defend real systems and step into in-demand security roles across Kuwait’s digital economy.

Trusted by Learners in Kuwait

For years, learners have joined CODED to build real skills, grow confidence, and move forward — whether that means a stronger portfolio, a clearer direction, or a career shift.

Flexible Payment Plans

Powered by Rubapay

All bootcamp payments are processed through Rubapay, with flexible options that match your budget. Pay once, split into four interest-free payments, or spread the cost over twelve months — all designed to make your learning experience easier and stress-free.

Simple & Clear

Full Payment

One-time payment

Pay the full tuition upfront through Rubapay in a single, smooth transaction. This option is perfect for trainees who want a clear, simple payment process with no follow-ups or installments.

Most Popular

4 Installments

Pay over four months

Split your tuition into four equal monthly payments with zero interest through Rubapay. The total cost remains the same, making this the most popular and budget-friendly option for most students.

Flexible & Light

12 Installments

The most flexible plan

Spread the cost of your bootcamp over twelve smaller monthly payments. This option offers maximum flexibility and reduces monthly pressure, allowing you to focus fully on learning.

Simple & Clear

Full Payment

One-time payment

Pay the full tuition upfront through Rubapay in a single, smooth transaction. This option is perfect for trainees who want a clear, simple payment process with no follow-ups or installments.

Most Popular

4 Installments

Pay over four months

Split your tuition into four equal monthly payments with zero interest through Rubapay. The total cost remains the same, making this the most popular and budget-friendly option for most students.

Flexible & Light

12 Installments

The most flexible plan

Spread the cost of your bootcamp over twelve smaller monthly payments. This option offers maximum flexibility and reduces monthly pressure, allowing you to focus fully on learning.

Simple & Clear

Full Payment

One-time payment

Pay the full tuition upfront through Rubapay in a single, smooth transaction. This option is perfect for trainees who want a clear, simple payment process with no follow-ups or installments.

Most Popular

4 Installments

Pay over four months

Split your tuition into four equal monthly payments with zero interest through Rubapay. The total cost remains the same, making this the most popular and budget-friendly option for most students.

Flexible & Light

12 Installments

The most flexible plan

Spread the cost of your bootcamp over twelve smaller monthly payments. This option offers maximum flexibility and reduces monthly pressure, allowing you to focus fully on learning.

Frequently Asked Questions

Frequently Asked Questions

Frequently Asked Questions offers quick answers to common queries, guiding users through features and functionalities effortlessly.

Frequently Asked Questions offers quick answers to common queries, guiding users through features and functionalities effortlessly.

I’m a complete beginner—can I start here?

Yes. You start with systems, networking, and security basics before moving into offensive and defensive security.

Will I learn ethical hacking?

Yes—responsibly. You’ll learn how security professionals test systems to find weaknesses and report them properly.

Will I learn defense and SOC skills too?

Yes. You’ll learn how to detect threats, analyze logs, investigate incidents, and apply defensive practices used in real security teams.

What roles can I apply for after the program?

Graduates are positioned for entry-level roles including SOC Analyst, Junior Penetration Tester, Security Operations Analyst, DFIR Analyst, and Threat Hunting Assistant — with real professional deliverables to prove it.

What proof of skill will I leave with?

Hands-on practice across red/blue scenarios, CTF experience, and practical work you can speak about clearly in interviews.