AI for Cybersecurity Professionals: Intensive 5-Day Course
A 5-day intensive programme equipping cybersecurity leadership and governance teams with the skills to assess, secure, and oversee AI systems.
Web Technology for OSINT Practitioners (Advanced) – Oct 2024
This course designed for OSINT professionals aims to delve deeper into and impart practical skills and methods for conducting threat intelligence tasks using open source means.
Annual Advanced Cyber Specialist Course (ACSC)
The Advanced Cyber Specialist Course (ACSC) offers an intensive training programme designed to equip professionals with advanced cyber skills and expertise.
Annual Basic Cyber Specialist Course (BCSC)
The Basic Cyber Specialist Course (BCSC) offers a comprehensive training programme designed to equip individuals with the essential skills and knowledge needed to excel in cybersecurity.
Essential Skills for Cyber Specialists
In this two week Python module, participants will gain Python programming skills, starting from the basic commands, variables, flow control, loops, and data structures.
Web Technology for OSINT Practitioners (Advanced)
This course designed for OSINT professionals aims to delve deeper into and impart practical skills and methods for conducting threat intelligence tasks using open source means.
Covert Windows Red Team
This 5-day course offers participants an opportunity to learn and practice Red Team OPSEC methodologies and techniques.
Programming and AI Fundamentals
This course will teach essential programming foundations which will provide you with a powerful tool to conduct fast analysis, create automations, as well as gain knowledge of computer networks.
Programming and AI Fundamentals
This course will teach essential programming foundations which will provide you with a powerful tool to conduct fast analysis, create automations, as well as gain knowledge of computer networks.
Programming and AI Specialised
This course will allow participants to delve deeper into data science and AI concepts.
Threat Intelligence
Cyber Threat Intelligence is a force multiplier for any organization looking to defend their data against the suite of advanced malicious threat actors in today's world.
Threat Hunting
Threat hunting plays an increasingly important role in safeguarding organizations from ever-evolving threats.
Exploitation
In this course, trainees will learn how exploitation works on various operating systems.
Cloud Security
In this module, students will learn about the security of public and private Cloud Solution Providers (CSP), commonly used DevOps tools, attacks, and security tools.
Communication Skills
Develop effective communication skills for security teams including resume writing, interview preparation, and professional communication.
Computer Networks
In this module, participants will dive into TCP/IP Model and common protocols, learn how to capture and analyse network traffic, use Python to implement theoretical concepts.
Exploitation
In this course, trainees will learn how exploitation works on various operating systems.
Incident Response
In this module of the training, the participants will learn how to conduct a full investigation and how to define sets of rules and alarms to identify potential attacks.
Malware Analysis
After the module the students will be able identify, unpack, analyse, and perform basic reverse engineering of known malware samples.
Penetration Testing
In this module, the participants will learn about the cyber kill chain and practice its different steps and components.
Python Programming
This module is relevant for participants who have some programming experience but are not familiar with Python.
Web Red Teaming
In this course, trainees will learn about various web vulnerability types and learn to use and develop penetration testing tools to exploit them.
Web Technology for OSINT Practitioners (Basic)
This course for OSINT practitioners will teach you real-world skills and techniques to perform threat intelligence operations through open source means.
Windows OS
The participants will gain the required background for Windows systems a Cyber analyst needs to understand and investigate attacks.