Training Program:
This module introduces GNU/Linux operating systems, principles of working in the command line, working with directories, and core commands executed in Bash.
- Command-line interface
- Initialization files
- Pipelines
- Command history and substitution
- Grep and sorting
- Stream redirection
- Network configuration
- File transfer
- Text editors Nano and Vim (Vi Improved)
- The kill command in Linux
- Searching, filtering, and manipulating text data in Linux
This course provides a systematic understanding of IT infrastructure and networking technologies required to begin a career in system administration, DevOps, or cybersecurity.
- Hardware and virtualization
- Hypervisors and virtual machines
- OSI model
- Services and interactions
- Web server and proxy
- Logging
- DNS
- Websites and web services
This module builds an understanding of the core areas of information security. The course provides essential knowledge and skills needed to begin learning cybersecurity.
- Linux basics
- Recon / OSINT
- Cryptography
- Password cracking
- Log analysis
- Scanning
- Network analysis
- Digital forensics
- Web application security
- Enumeration and exploitation
Fundamentals of ethical hacking and vulnerability exploitation.
This is an uncontrolled environment with no detection capabilities. The main goal is to demonstrate common vulnerabilities found in corporate networks and the techniques used to attack them.
This allows specialists to practice attacking virtual infrastructure, including the latest Windows versions, test new tools, and gain a new perspective on their company’s infrastructure.
- Bug Bounty fundamentals
- Linux exploitation
- Network security
- Attacks on Active Directory infrastructure
- Web application security
This module is designed to train reliable security analysts and incident response specialists focused on infrastructure protection and attack analysis.
You will practice testing attacker tools, monitoring modern attack techniques, and improving detection skills using various solutions including SIEM, IDS/IPS, Honeypot, and more.
The module provides hands-on experience with advanced attacks and adversary techniques.
- Reconnaissance and intelligence gathering
- Attacker movement across the network
- Exploitation, hardening, and C2 environment
- Malware delivery and execution
- Threat hunting and incident response
Methods of digital forensics and malware analysis.
This module provides a comprehensive understanding of the principles and methods used in digital forensics and malware analysis.
The module aims to develop the essential skills required for investigating malicious software and digital evidence at a professional and systematic level.
- Digital forensics
- Incident response process
- Network forensics
- Malware analysis
- Statistical property analysis