• Courses

Search Result For Archives: Courses

Penetration Testing

About: In this module, the participants will learn about the cyber kill chain and practice its different steps and components. The participants will analyse case

Read More »

Windows OS

About: The participants will gain the required background for Windows systems a Cyber analyst needs to understand and investigate attacks. Subjects covered: Intro to computer

Read More »

Computer Networks

About: In this module, participants will dive into TCP/IP Model and common protocols, learn how to capture and analyse network traffic, use Python to implement

Read More »

Linux OS

About: This module is relevant for participants who have little or no Linux experience. In this module, the participants will be introduced to the Linux

Read More »

Python Programming

Course Summary This module is relevant for participants who have some programming experience but are not familiar with Python. This module will cover all the

Read More »
No more posts to show

Web Technology for OSINT Practitioners (Basic)

About:  This course for OSINT practitioners will teach you real-world skills and techniques to perform threat intelligence operations through open source means. Through hands-on practice …

Read More

Exploitation

About:  In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how …

Read More

Web Red Teaming

About:  In this course, trainees will learn about various web vulnerability types and learn to use and develop penetration testing tools to exploit them. Subjects …

Read More

Malware Analysis

About:  After the module the students will be able identify, unpack, analyse, and perform basic reverse engineering of known malware samples. Subjects covered: Practice analysing …

Read More

Cloud Security

About: In this module, students will learn about the security of public and private Cloud Solution Providers (CSP), commonly used DevOps tools, attacks, and security …

Read More

Incident Response

About: In this module of the training, the participants will learn how to conduct a full investigation and how to define sets of rules and …

Read More