• Courses

Exploitation

About:  In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how

Read More »

Exploitation

About:  In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how

Read More »

Web Red Teaming

About:  In this course, trainees will learn about various web vulnerability types and learn to use and develop penetration testing tools to exploit them. Subjects

Read More »

Malware Analysis

About:  After the module the students will be able identify, unpack, analyse, and perform basic reverse engineering of known malware samples. Subjects covered: Practice analysing

Read More »

Cloud Security

About: In this module, students will learn about the security of public and private Cloud Solution Providers (CSP), commonly used DevOps tools, attacks, and security

Read More »

Incident Response

About: In this module of the training, the participants will learn how to conduct a full investigation and how to define sets of rules and

Read More »

Network Forensics

About: This module is the first defence-oriented step of the training. The participants will learn how to conduct basic research and investigation of suspicious network

Read More »

Communication Skills

Subjects covered: The Art and Science of Resume Writing Understand what a resume is and is not Understanding how resumes are processed Types of resume

Read More »
No more posts to show

Programming and AI Fundamentals

About:  This course will teach essential programming foundations which will provide you with a powerful tool to conduct fast analysis, create automations, as well as …

Read More

Programming and AI Specialised

About:  This course will allow participants to delve deeper into data science and AI concepts. Participants are required to have a basic understanding of programming …

Read More

Threat Intelligence

About: Cyber Threat Intelligence is a force multiplier for any organization looking to defend their data against the suite of advanced malicious threat actors in …

Read More

Threat Hunting

About:  Threat hunting plays an increasingly important role in safeguarding organizations from ever-evolving threats. This enables them to stay ahead of cyber adversaries and better …

Read More

Exploitation

About:  In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how …

Read More

Programming and AI Fundamentals

About:  This course will teach essential programming foundations which will provide you with a powerful tool to conduct fast analysis, create automations, as well as …

Read More