top of page

CYBER SECURITY

RED TEAM

GIAC PENETRATION TESTER - GPEN

3 Days

This 3-day Intensive hands-on training is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.

​

Module 1: Installing, upgrading, and migrating servers and workloads

Module 2: Configuring local storage

Module 3: Implementing enterprise storage solutions

Module 4: Implementing Storage Spaces and Data Deduplication

Module 5: Installing and configuring Hyper-V and virtual machines

Module 6: Deploying and managing Windows Server and Hyper-V containers

Module 7: Overview of high availability and disaster recovery

Module 8: Implementing and managing failover clustering

Module 9: Implementing failover clustering for Hyper-V virtual machines

Module 10: Implementing Network Load Balancing

Module 11: Creating and managing deployment images

Module 12: Managing, monitoring, and maintaining virtual machine installations

CEH 312-50:CERTIFIED ETHICAL HACKING (CEHV13)

 3

Days

This 3 days Certified Ethical Hacker hands-on intensive training will is geared to give you the skills you need to level up your career and get a high-paying job! In Cyber Security & Penetration Testing Jobs.

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.

 

CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.

 

The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.

​

Module 1 : Introduction to Ethical Hacking

Module 2 : Foot Printing and Reconnaissance 

Module 3 : Scanning Networks

Module 4 : Enumeration

Module 5 : Vulnerability Analysis

Module 6 : System Hacking

Module 7 : Malware Threats

Module 8 : Sniffing

Module 9: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injections

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking & OT Hacking

Module 19: Cloud Computing

​Module 20: Cryptography

​

Cyber Security - Attack & Countermeasures Strategist (CSACS)

 2

Days

The Cyber Security - Attack & Countermeasures Strategist (CSACS), enables participants to understand the importance of Cyber Security, Network Security and latest Cyber Attack by providing industry knowledge and skills. In doing so, the Cyber Security - Attack & Countermeasures Strategist (CSACS) participants is able to understand how latest Cyber Attack been discovered using some very vast techniques. In addition, the Cyber Security - Attack & Countermeasures Strategist (CSACS) training helps participants learn how to implement counter response and preventative measures when it comes to a Cyber Hacking.

 

The Cyber Security - Attack & Countermeasures Strategist (CSACS) training provides in-depth Virtualization & Cloud labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real world hacking scenarios and equip the participants to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.

 

MODULE

Module 1 - Cyber Security Fundamentals

Module 2 - Building your “Hacking Lab”

Module 3 - Get Familiar with Kali Linux “The Attacker”

Module 4 - Hiding your Identity - Escape route

Module 5 - Footprinting and Reconnaissance (Information Gathering)

Module 6 - Network Scanning

Module 7 - Enumeration

Module 8 - Password Cracking

Module 9 - Malware Threat & Countermeasures

Module 10 - Sniff your Victim

Module 11 : Social Engineering Attack

Module 12 : Hacking WEB Server

Module 13 : SQL Injection

Module 14 : WiFi (Wireless) Cracking

​Module 15 : Evading IDS, Firewalls and Honeypots

CYBER HACKER : PENETRATION TESTING THE RIGHT WAY

 2

Days

This 2 days highly intensive training of CyberHacker : Penetration Testing The Right Way is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our Elite Group of Penetration Testing consultants.

This training also enhances your business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.

​

MODULE 

Module 1 : Information Gathering

Module 2 : Detecting Live System

Module 3 : Enumeration

Module 4 : Vulnerability Assessments

Module 5 : Malware Goes Undercover

Module 6 : Windows Hacking

Module 7 : Hacking UNIX/Linux

Module 8 : Pen Testing Wireless Networks

Module 9 : Networks, Sniffing, IDS

Module 10 : Injecting the Database

Module 11 : Attacking Web Technologies

Module 12 : Project Documentation

ETHICAL HACKING & PENTEST FOR IT ADMINISTRATOR

 2

Days

This intensive 2 days Technical Session aimed at people who are new to the world of hacking and penetration testing, for those with little or no previous experience, for those who are frustrated by the inability to see the big picture (how the various tools and phases fit together), for a person who wants to quickly get up-to-speed on with the seminal tools and methods for penetration testing, or for anyone looking to expand their knowledge of offensive security. 

​

 Module 1 : What is Penetration Testing? 

 Module 2 : Reconnaissance 

 Module 3 : Scanning 

 Module 4 : Exploitation 

Module 5 : Social Engineering 

Module 6 : Web-Based Exploitation 

Module 7 : Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter 

Module 8 : Wrapping Up the Penetration

NETWORK & server PENETRATION TESTING & ETHICAL HAcKING

 2

Days

As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable Ethical Hackers is a global need. Ethical Hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system.

They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from this Network Penetration Testing and Ethical Hacking training.

You’ll learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Learning objectives include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

At the conclusion of this training class, you’ll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system.

 

MODULE

Module 1 - Ethical Hacking & Penetration Testing

Module 2 - Methodology Overview

Module 3 - Reconnaissance (Footprinting)

Module 4 - Scanning

Module 5 - Port & Service Enumeration

Module 6 - Data Enumeration

Module 7 - Vulnerability Assessment

Module 8 - Penetration/Access/Compromise

Module 9 - Evading Defenses & Erasing Tracks

Module 10 - Hacking Techniques

Web PenTest & Network Defense

 2

Days

MODULE

Module 1 - Introduction to Penetration Testing & Setup

Module 2 - Reconnaissance

Module 3 - Server-side-Attacks

Module 4 - Client Side Attacks

Module 5 - Attacking Authentication

Module 6 - Web Attacks

Module 7 - Web Application Firewalls & IDS

Module 8 - Defensive Countermeasures

Module 9 - Penetration Testing & Reporting

ETHICAL HACKING & PENETRATION TESTING MEGA TRAINING

 2

Days

Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This 3 days Mega Intensive Training is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This training is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.

​

MODULE 

Module 1 : Real-World Ethical Hacking: Hacking Windows OS!

Module 2 : Create Your Own Virtual Hacking Lab! A.K.A CyberRange Lab

Module 3 : Linux Terminal and Windows PowerShell Commands

Module 4 : Create a Virtual Network for Ethical Hacking!

Module 5 : Social Engineering: Capturing Usernames and Passwords via Phishing

Module 6 : Recon: Information Gathering, Scanning and Enumeration

Module 7 : Remote Hacking Windows Server 2019 & Windows 10 : Attack Phase

Module 8 : Hacking Windows Server & Windows 10: Command & Control Phase

Module 9 : Password Problems - Cracking, Snacking & Hijacking

Module 10 : Web Hacking - Testing and Securing Web Applications

Module 11 : Mobile Hacking on Android

BLUE TEAM

CYBER SECURITY ( GOVERNANCE RISK AND COMPLIANCE) PROFESSIONAL

 2

Days

This 2-day intensive training has been designed to provide with the knowledge and skills needed to support firms and organizations in Cyber Governance, Risk and Compliance Management.
​
MODULE
Module 1: Introduction
Module 2: Attacks and Modus Operandi
Module 3: Information Warfare, Cyber Espionage
Module 4: Defense
Module 5: The Future

INCIDENT HANDLING PRACTITIONER

 2

Days

The Certified Incident Handling Practitioner vendor neutral training is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.
 
In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.
​
MODULE
Module 1 - Incident Handling Explained
Module 2 - Threats, Vulnerabilities and Exploits
Module 3 – Preparation
Module 4 - First Response
Module 5 – Containment
Module 6 – Eradication
Module 7 – Recovery
Module 8 – Advanced - Computer Security Incident Response Team
Module 10 – Advanced - Log File Analysis
Module 11 – Advanced - Malware, Rootkits and Botnets
Module 12 – Advanced - Artifact Analysis

Digital forensics

 2

Days

The Digital Forensics Technical hands-on training is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.
This training is essential to anyone encountering digital evidence while conducting an investigation.
Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to
evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
Training Module
Module 1 – Computer Forensic Incidents
Module 2 – Investigative Theory
Module 3 – Investigative Process
Module 4 – Digital Acquisition and Analysis Tools
Module 5 – Disks and Storages
Module 6 – Live Acquisitions
Module 7 – Windows Forensics
Module 8 – Linux Forensics
Module 9 – Mac Forensics
Module 10 – Examination Protocols
Module 11– Digital Evidence Protocols
Module 12 – Digital Evidence Presentation
Module 13– Laboratory Protocols
Module 14– Specialized Artifact Recovery
Module 15– Advanced Search Strings and File Signatures
Module 16– eDiscovery and ESI
Module 17– Mobile Forensics
Module 18– Incident Handling
Module 19– Reporting

BTL1 : certified blue team level 1

 2

Days

The skills and tools you’ll learn in this course will be directly applicable to a range of security roles, and are actively used by defenders around the world.
​
Modules
Module 1 – Security Fundamentals
Module 2 – Phishing Analysis
Module 3 – Threat Intelligence
Module 4 – Digital Forensics
Module 5 – SIEM
Module 6 – Incident Response

Network Defense Professional (eNDP)

 2

Days

The NDP 2 Days Hands-On intensive training starts with basic security concepts and continues to the advanced level of network security.
This training will help you design secure networks, how to securely configure network devices such as routers and switches, as well as firewall configuration for websites and networks and virus protection.
In the final part of this training, you will learn how to provide security in the Windows operating system. You will also learn in depth important Windows services such as Active Directory, Group Policy, security path management, and vulnerability management.
​
MODULE
Module 1 : Introduction to Network Defense
Module 2 : Network Security
Module 3 : Endpoint Security

SEC450: BLUE TEAM FUNDAMENTALS : SECURITY OPERATION & ANALYST

 2

Days

Security operations training to help you respond to security incidents and
vulnerabilities. Improve your operational security capability, leverage the security
operations centre (SOC) analyst and specialist training techniques used in
vulnerability management and security information event management (SIEM)
platforms.
Understanding the techniques provides a foundation for assessing and managing
cyber risk through effective security incident triage.
This training provides security operations analysts the foundation training
needed to address the cyber threat lifecycle, looking at common and advanced
attack vectors, detection, reporting and collaboration and simulated attack
​
Module 1 : Security Management
Module 2 : Incident Response & Continuity Management
Module 3 : Security Education
Module 4 : Security Information Event Management
SEC450
Module 5 : Vulnerability Management
Module 6 : Threat Detection
Module 7 : Security Assessments
Module 8 : Simulated Attack - Defend - Attack

Cyber Defence for Network Administrator

 2

Days

The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.
Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This intensive training will prepare Network administrators with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyse the subject material.
In addition, network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.
​
MODULE
Module 1: Network Security Threats, Vulnerabilities, and Attacks
Module 2: Network Security Controls, Protocols, and Devices
Module 3: Network Security Policy Design and Implementation
Module 4: Physical Security
Module 5: Host Security
Module 06: Secure Firewall Configuration and Management
Module 07: Secure IDS Configuration and Management
Module 08: Secure VPN Configuration and Management
Module 9: Wireless Network Defence
Module 10: Network Traffic Monitoring and Analysis
Module 11: Network Risk and Vulnerability Management
Module 12: Data Backup and Recovery
​Module 13: Network Incident Response and Management

END USER SECURITY AWARENESS TRAINING MANAGEMENT

 1

Day

Why Your Organization Needs Security Awareness Training
Your employees are not able to stay ahead of modern cyber threats on their own. Any company, from large to small, is susceptible to being hacked and exploited. The damage is pretty much always severe.
​
MODULE 
Module 1 : What Is Cybersecurity?
Module 2 : What is Social Engineering?
Module 3 : Emails and Links
Module 4 : Basics of Online Security

Network Security

 2

Days

The Network Security “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.
Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This intensive training will prepare Network administrators with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyse the subject material.
In addition, network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.
​
MODULE :
Module 01: Network Security Threats, Vulnerabilities, and Attacks
Module 02: Network Security Controls, Protocols, and Devices
Module 03: Network Security Policy Design and Implementation
Module 04: Physical Security
Module 5: Host Security
Module 06: Secure Firewall Configuration and Management
Module 07: Secure IDS Configuration and Management
Module 08: Secure VPN Configuration and Management
Module 9: Wireless Network Defence
Module 10: Network Traffic Monitoring and Analysis
Module 11: Network Risk and Vulnerability Management
Module 12: Data Backup and Recovery
Module 13: Network Incident Response and Management

Cybersecurity Essential

 2

Days

Module 1 : Know Yourself - The Threat and Vulnerability Landscape
Module 2 : Know Your Enemy - The Current Threat And Vulnerability Landscape
Module 3 : Encryption Crash Course
Module 4 : Setting Up a Testing Environment Using Virtual Machine
Module 5 : Operating System Security & Privacy
(WINDOWS VS MAC OS X VS LINUX)
Module 6 : Security Bugs And Vulnerabilities
Module 7 : Social Engineering And Social Media
Offence Aand Defence
Module 8 : Security Through Isolation And
Compartmentalization

certified security analyst

 2

Days

The CSA program offers a seamless learning progress
continuing where the Ethical Hacking program left off.
The new CSA includes updated curricula and an industry
recognized comprehensive step-by step penetration testing
methodology. This allows a learner to elevate their ability in
applying new skills learned through intensive practical labs and
challenges

​

​Module 1 : Penetration Testing Essential Concepts
Module 2 : Introduction to Penetration Testing Methodologies
Module 3 : Penetration Testing Scoping and Engagement
Methodology
Module 4 : Open-Source Intelligence (OSINT) Methodology
Module 5 : Social Engineering Penetration Testing Methodology
Module 6 : Network Penetration Testing Methodology – External
Module 7 : Network Penetration Testing Methodology – Internal
Module 8 : Network Penetration Testing Methodology - Perimeter
Devices
Module 9 : Web Application Penetration Testing Methodology
Module 10 : Database Penetration Testing Methodology
Module 11 : Wireless Penetration Testing Methodology
Module 12 : Cloud Penetration Testing Methodology
Module 13 : Report Writing and Post Testing Actions

bottom of page